Items already in our database:
PestPatrol sold here, ZoneAlarm by ZoneLabs Sold Here
1 Why are some entries missing from the Start Menu? In Windows Me, 2000, and XP, Microsoft has added a feature called "Personalized Menus." This is one of the worst designs they've ever inflicted on us. Instead of allowing users to turn on or off certain features, Windows does it automatically, hiding items that aren't used frequently. This constantly changing interface is not only annoying, but it goes against one of the major precepts behind good user interface design - keep the interface consistent! Here's how to fix it:
Windows Me/2000:
Select Settings in your Start Menu, and then select Taskbar & Start Menu.Turn off the Use Personalized Menus option.
Windows XP:
Select Settings in your Start Menu, and then select Taskbar & Start Menu.Choose the Start Menu tab, choose Classic Start Menu, and click Customize. Turn off the Use Personalized Menus option, and click Ok when you're done. 3
2 Stop Pop-Up Spam Messages In a new low, spammers are now abusing a seemingly-innocuous feature in Windows 2000and Windows XP systems to place pop-up messages on systems with high-speed connections to the Internet.
The NET command is used to send such messages (e.g. net send * Hello World), and the messenger service (different than Windows Messenger) allows users to receive such text messages. By default, it is running and active on all Windows 2000 and Windows XP systems. Here's how to turn it off:
Open the Services window (services.msc).Double-click the Messenger entry in the list. Click Stop to close the service. Select Disabled from the Startup type list to prevent it from loading automatically the next time Windows starts.Close the Services window when you're done.
Once it has been disabled, you will no-longer receive such messages. Note that many firewalls also prevent this type of data from reaching your computer in the first place, but it certainly can't hurt to turn off the service anyway. 4
3 Stop Windows XP from asking if you want to send a report to Microsoft whenever a program crashes Whenever a program crashes, whether it’s a Microsoft application, a component of Windows, or a third-party application, a window appears, prompting you to send a "report" to Microsoft. If you actually believe that Microsoft will use the data you send them to fix bugs in Windows, I have some beach-front property in Nevada to sell you...
Here's how to disable this feature, either completely or selectively:
Open System in the Control Panel (or right-click on the My Computer icon and select Properties. Choose the Advanced tab, and click Error Reporting. You can disable error reporting entirely here, or enable it selectively for certain programs. Click Ok when you're done. 3
4 Outlook Express - Use a Signature Instead of retying your name, E-Mail address, web address, etc. at the end of a message, have Outlook Express do that for you. Open Outlook Express and select the "Tools" menu, choosing "Stationary." Choose the "Mail" or "News" tab, depending on what messages you wish the signature to appear. Click on the "Signature..." button to insert a text signature to your messages. On the dialog box that appears, check "Add this signature to all outgoing messages" and type in your signature in the text box. Instead of retying your name, E-Mail address, web address, etc. at the end of a message, have Outlook Express do that for you. Open Outlook Express and select the "Tools" menu, choosing "Stationary." Choose the "Mail" or "News" tab, depending on what messages you wish the signature to appear. Click on the "Signature..." button to insert a text signature to your messages. On the dialog box that appears, check "Add this signature to all outgoing messages" and type in your signature in the text box. 12
5 Clean Your Computer It is recommended to clean your input and output devices from time to time. Why?
Dirt on a scanner's scanning area can affect the scanned images' quality.Toner, liquid, or dust can affect the quality of printed images.Dirt can affect or destroy a keyboard.Dirt can cause a mouse to behave erratically.Dirt can propagate on a monitor, making it hard to see your work.
Ask The Geek for specifics on how to clean your equipment to achieve optimal computing
quality. 1
6 Windows 2000 - Put the Desktop in your Taskbar Do you frequently multitask? If so, all of the windows created by running applications can quickly cover your desktop. If you'd like, you can make the desktop icons immediately accessible from your taskbar. Just right-click an empty area of your taskbar, choose "Toolbars", and check "Desktop". Your desktop icons will then be immediately accessible without having to minimize your current windows. If you have a lot of desktop icons, click on the two greater-than arrows (">>") to the right of your desktop icons and a popup menu will appear allowing you to select from any of the available desktop icons not immediately visible on your taskbar. 2
7 Windows 98 - See Volcano Names Here's an interesting Easter Egg. Right-click an empty area of your desktop and choose
"Properties" from the popup menu that appears. On the multi-tabbed dialog box that
follows, select the "Screensaver" tab. Scroll down to the "3D Text" screensaver,
select it, and click the "Settings" button. On the dialog box that appears, type in
"volcano" (without quotes) in the "Display - Text" field. Click the "OK" button. Now,
whenever the screensaver activates or if you press the "Preview" button, a list of
volcanoes will appear in 3d. 1
8 Windows 98 - Restart the System without Rebooting If you are having problems in your current Win98 session, such as the Explorer
crashing or a lot of GPFs appearing, you *may* be able to "fix" the problem by merely
restarting your computer. This, however, can take a while, especially if you have a
slow system or devices to load in your AUTOEXEC.BAT and/or CONFIG.SYS files. You also
*may* be able to solve the problem by just restarting Win98 and not your computer.
To do so, hold down your left SHIFT key and keep it pressed throughout this tip. Click
the "Start" button, selecting "Shut Down." Choose "Restart Your Computer" from the
dialog box that appears, then click "OK." You may now release the SHIFT key; Win98
will proceed to shut down. 1
9 Microsoft Internet Explorer 6 - Turn Off AutoComplete Normally, IE6 attempts to automatically type in web addresses after you begin typing in a few characters. Depending on your setup, IE6 may also try to automatically complete forms and passwords for you as well. While this may seem useful at times, in other instances this automatic completion can be downright annoying.
To turn this feature off, click the "Tools" menu and select "Internet Options". From the multi-tabbed dialog box that follows, select the "Content" tab. Click the "AutoComplete" button. An "AutoComplete Settings" dialog box appears. Now, check or uncheck the options you would like. For example, to stop IE6 from automatically entering in web addresses, uncheck the "Web addresses" checkbox.
Press "OK" to close this dialog box, then "OK" to close the "Internet Options" dialog box. 5
10 Windows 98 and Outlook - Remove Outlook Express Splash Screen To remove the 'splash' screen that appears when opening Outlook
Express, you will need to modify the registry. If you are
comfortable doing so, run "regedit.exe" Navigate down to
HKEY_CURRENT_USER, Software, Microsoft, then click on "Outlook
Express." On the right pane, right-click on a blank area, choosing
"New" then "DWORD Value." Name this value "NoSplash." Right-click on
the new DWORD Value you made and choose "Modify." On the dialog box
that appears, enter "1" as the value data and press OK to close the
dialog box. Now, close Registry Editor. 1
11 Windows XP - Mouse Behaving Erratically? If your mouse occasionally bounces around the screen, clicks items when you don't want them clicked, or maybe even if it just can't detect a wheel (if one exists), this tip is for you.
First off, if your mouse performs erratically, it may require a cleaning. Refer to your mouse manual for details. All disclaimers apply.
You may also want to try changing some advanced XP settings. Open the "Mouse" Control Panel. On the multi-tabbed dialog box that follows, click the "Hardware" tab. Choose the "Properties" button.
Another multi-tabbed dialog box should appear. Choose "Advanced Settings". Now, click on the "?" icon on the top-right corner of this window and then click the text next to "Sample Rate", "Wheel Detection", and "Input Buffer Length". These provide helpful hints to configuration tweaks that may solve your mouse problems. Performs the tweaks as desired and needed, but make sure to write down your original settings in case something goes wrong.
When you are done tweaking, press "OK" to close the dialog boxes. 3
12 Check for New Graphics Drivers Having a problem with an application crashing all the time, or do you have an application which appears with faulty graphics or text? The problem may be a graphics driver that is incompatible with a piece of software you are running or with other hardware. Fortunately, there may be a fix. Although we do not recommend *always* getting the "latest and greatest" of things, here is one exception.
The software that is used to communicate between your graphics card and your operating system is called your graphics card driver. When you have free time, check your manufacturers' websites to see if upgrades have been placed online. These upgrades may increase performance, fix bugs, or both.
Here are some websites of interest:
http://www.nvidia.com - For Riva TnT and GeForce
http://www.ati.com - For Rage and Radeon
11
13 Microsoft Word 2000 - Play Games With Your Assistant Want to play games with your Office Assistant? Click on the assistant and drag it to your document. Now, start typing so that your text gets near the assistant. As soon as your text gets too close, the assistant will move out of the way! Keep typing near the assistant and the assistant will keep bouncing around your document, and eventually out of your document completely. 7
14 Microsoft Word 2000 - Share Documents with Obscure Fonts Do you routinely create Word documents using obscure fonts? If your documents contain fonts other than "Arial", "Courier", and "Times New Roman", it is quite possible that other people reading your documents may not have the fonts you have on your system. While Word tries to make a best guess when rendering fonts on these other machines, it is obvious that your documents will not look the way that they were originally intended.
There is a way around this problem, if you're willing to have your Word files take up a lot more space. You can embed fonts directly into your document so people on other computers can see your documents the way you intended them to be seen.
Click on the "Tools" menu and select "Options". On the "Options" multi-tabbed dialog box that follows, click the "Save" tab. Check "Embed TrueType fonts". If you don't plan on having your document edited, you can save space and also check "Embed characters in use only". However you choose, press "OK" to close the dialog box.
Now, every document that you save from now on will include, embedded, all of the fonts that you use in said documents. 7
15 Common File Extensions And Information On The Types Extensions are three letters or numbers that appear at the end of a file name and indicate what type of file it is, what the file is used for, and if it will work on your computer. Below is a list of common file extensions and information on the type of file (pictures/graphics and sounds) they signify:
Pictures
.bmp (Bitmap) - A type of graphics file. These files are normally used for things like cartoon images.
.gif (Graphics Interchange Format) - A type of graphic image very common in online services and the Internet. GIF includes file compression as part of its definition, so no additional file compression software is needed.
.jpg or .jpeg (Joint Photographers Experts Group) - A graphics format designed to take up as little space as possible while retaining as much quality as possible. JPG files are smaller than GIF files, but take longer to display.
.art - Indicates a graphics file compressed using AOL's Johnson-Grace system. .pcx - Indicates older graphics files, commonly used for clip art.
.pct or .pict - Indicates the original Macintosh graphics format. Macintosh software will display these files. Does not work on IBM computers.
.eps (Encapsulated Postscript File) - These are images designed for vector, or line-based, graphics. Drawing programs such as Adobe Illustrator use this format.
.tif (Tagged Image Format) - Bitmapped graphic images popular among desktop publishers.
Sounds .wav (Windows Sound File) - These files are used for playing music, sounds, and voices. Mac users can find utilities in the Software Center at Keyword: Software to convert them to sound files that the Macintosh can play.
.mid or .midi (Musical Instrument Digital Interface) - MIDI files are songs for most sound cards and MIDI boards. These songs are generally digitized versions of songs and sound like the Muzak played in elevators and stores. .au (Sound File From The Internet) - AOL's software can play these files, but more commonly uses midi's and wav files.
.mod (Music Module) - These are music files that include the instruments as well as the score, and they play through a sound card, not MIDI. You will need a special program to play these files in Windows or on the Macintosh.
.snd - Indicates a sound file. These are Macintosh System 7 sounds that can be played on Windows using converters such as SOX. Macintosh software will run these files. Does not work on IBM computers.
Movies
.avi (Audio Visual File) - Used for Windows video files. It is best to go into Windows Explorer to open these files by double clicking on them. Generally an AVI is a short movie, that sometimes even has sound.
Email
.mme (Multipurpose Internet Mail Extensions) (MIME) - MIME converts a binary attachment (a program or word processing document or even an image) to a text format, that can be handled by the machines that send e-mail through the Internet. You will need a special MIME decoder to turn the file back into it's original file type. For more information on MIME converters, see Keyword: MIME NOTE: It is recommended, that whenever possible, you do not send email using this format, because most people using IBM computers will not be able to read it.
Screen Savers
.scr - Indicates a Windows screen saver file. These will not work unless placed in your 'c:\windows' directory.
11
16 Having Excel automatically enter consecutive numbers You may want to enter consecutive numbers in a row of cells. Excel has a nice feature that will do it automatically for you. To do this:
Enter the first number of the string into a cell.Press and hold the Ctrl key.
While the Ctrl key is pressed, click the cells fill handle (the small black square) and drag it over the range in which you want it to fill in consecutive numbers automatically.
Let go of the mouse button.
Let go of the ctrl key.
Now, your consecutive numbers will be automatically filled in. 8
17 The two ways of inserting the date and time There are two ways of inserting the date and the time in an Office
document. The first way of inserting the date that will remain the
same. You can do this by:
Clicking the Insert menu at the top of the window.
Then clicking Date and Time.
Then you choose the format of your choice and click OK.
There is another way of doing this that inserts the date, and then
this date is then updated to todays date. In other words, if you
insert the date today and print tomorrow, tomorrow's date will be in
the document. You can do this by selecting the Update automatically
box before you click OK after following the steps stated above. 1
18 Following a link while staying at the current page While browsing in Internet Explorer, you may want to follow a link yet stay at the current page at the same time. To do this:
Right click on the link. Click Open in New Window. Or, you can simply hold Shift while clicking the link.
This will open a separate browser window with the original page directly beneath it. 5
19 Adding a cover to a finished Word document Let's say you've just finished a long Word document, and you want to add a cover page. All you have to do is:
Go to the beginning of your document and press Ctrl+Enter. This automatically enters a page break. Then all you do is push the up arrow and hit Enter. Now you have added a page to the front of your document, and you can make your cover page.
7
20 Making a startup application minimize after opening To make an application start up when Windows 98 is launched, you
simply drag its shortcut into the StartUp menu. If you want this
application to minimize as its opened so that you don't have to
minimize it later you can simply tell Windows 98 to start the
program minimized.
If you already have the program in your StartUp menu all you have to
do is change its Properties. To get to the shortcut:
*Click the START button.
*Select PROGRAMS.
*Click WINDOWS EXPLORER.
*Navigate your way to C:\Windows\Start Menu\Programs\StartUp
*Here are all of your StarUp shortcuts.
*Now, you simply right-click the shortcut and select Properties.
*Click the Shortcut tab.
*In the Run box select Minimized and click Apply.
1
21 Getting information on your Clip Arts in Microsoft Excel You can get all of the information that you want about Clip Arts in Excel. To do this:
Click on Insert in the toolbar.
Select Picture.
Click on Clip Art…
When Microsoft Clip Gallery 3.0 opens click on the Clip Art that you which to research.
Click on Clip Properties…
This will show you the file size and the name.
If you ever want to use the file again record its name. Then use the Find feature that is located in the Edit menu in the toolbar to find the Clip Art. Then you simply click on the picture to insert it. 8
22 Quickly getting to a files Properties You can quickly get to any files Properties menu by holding the Alt key while double-clicking the file. 11
23 Using Text Boxes in Excel To create a Text Box with Excel, you need to have the Drawing toolbar present. To do this:
Open the View menu.
Select Toolbars.
Click Drawing.
To insert a Text Box, simple click the Text Box button, the one with the little A on it. Simply use your mouse to drag the box to the size you want it. To format a text box, simply click in the Text Box, open the format menu, and click Text Box. It’s that simple! 8
24 Speeding up your printer You may realize that your printer tends to print a little slower than usual. The solution is to add more memory to your printer. Yes, printers need memory too. Adding memory to your printer will give it a speed boost, especially when printing graphics. Most printers must store the data of an entire page before it can print it. The majority of all printers come standard with 1MB of printer memory. For peak performance, try upgrading to 2MB of memory. If you constantly print large graphic files, try upgrading to 4MB. Refer to your printer’s manual or the manufacturer for specifications on adding memory. 11
25 Viewing saved animated GIFs If you saved an animated GIF from a web site to you hard drive, you probably won't be able to see the animation if you open it up with another graphics program. To view the animation, simply use Internet Explorer. 11
26 Following a link while staying at the current page While browsing in Internet Explorer, you may want to follow a link yet stay at the current page at the same time. To do this:
Right click on the link.
Click Open in New Window.
Or, you can simply hold Shift while clicking the link.
This will open a separate browser window with the original page directly beneath it. 5
27 Making a makeshift microphone You don't have to buy an expensive microphone for your PC. You can simply use walkman-type headphones! You plug them in to the microphone jack on your sound card, and talk into the speakers in the headphones. This really works! 11
28 Basic error messages you may encounter on the web Here are the 6 most commonly found error messages on the web, and their explanations
ERROR 403 Forbidden Pages
This means that you are not authorized to view the content of this site.
ERROR 404 – Not Found
You may go to a web site or click a link to a site that does not exist and you’ll probably get an error message saying, "Error 404, Object Not Found." If you do, there is a little trick you can do to help locate the missing file. Let’s pretend you attempted to go to http://www.website.com/page/missing/web.html. If you receive an error message saying it cannot find that web site, try going back to the root of the website to try and locate the site that you are looking for. For example, attempt to go to http://www.website.com/page/missing. You may be able to find a link for your page from there. And if that doesn’t work, try going to http://www.website.com/page, and then just http://www.website.com. You should have a good chance of locating the site you are looking for from one of those sites if it has been moved or renamed. However, if it has been deleted you are out of luck.
ERROR 503 – Service Unavailable
This means that normally, the page would be there, but there is a temporary problem. Try again in a minute or so.
Host Unknown
This means that the host you tried to reach is unavailable, and that there is no forwarding address. Check out http://www.4domains.com to see if it is a valid site.
Too Many Connections – Try Again Later
This one is pretty self-explanatory. Just click reload or Refresh until you get where you want to go.
File Contains No Data
This means that the page you are trying to go to actually exists, but nothing is there. Try back in a few minutes, they may be just updating their site at that time. 5
29 Effectively searching with AltaVista When you are searching with AltaVista, your results are listed 10 at a time, with a short summary of the page directly below it. You can set AltaVista to display a longer list of titles without summaries. To do this, simply set AltaVista to display your results in Compact Form. 5
30 Automatically emptying the Documents list upon startup You can automatically have Windows empty the Documents list on the Start menu for you. Make sure to have a backup of your AUTOEXEC.BAT before continuing. To do this:
Locate and open your AUTOEXEC.BAT file (usually C:\AUTOEXEC.BAT)
Now, add the following line to it:Echo Y|If Exist C:\Windows\Recent\*.*Del:\Windows\Recent\*.*>Nul
Now save your AUTOEXEC.BAT file and reboot Windows. The Documents list will now be empty. 11
31 Using Internet Explorer in kiosk mode You can run practically any version of Internet Explorer in kiosk mode. Kiosk mode will run the browser in full screen mode without any toolbar buttons or menu bars. To do this:
Click the Start button
Click Run
In the Open field, type iexplore -k page and click OKSubstitute the URL of the page you want to go to in place of page 5
32 Who can read cookies? You might think of cookies as a security threat. Only the issuers of the cookies can read them. Other sites cannot read them. 5
33 Using the AutoFilter feature of Excel Microsoft Excel comes with a nice feature called AutoFilter. AutoFilter is used with tables to single out a certain subset of that table. For example, you may have a list with each salesman’s name and the number of toothbrushes they have sold. To show a table of only the salesman who sold over a certain amount of toothbrushes, you can use auto filtering. To do this:
- Make sure all of the data in your table is correct.
- Open the Data menu.
- Select Filter.
- Click AutoFilter.
- Now, a down arrow will appear on the top cell of the range.
- Click the arrow and pick the minimum value that you want.
Now Excel with display the salesmen who meet your criteria. To display the entire table again, click the down arrow and select All. To completely disable AutoFilter, select AutoFilter from the Data menu again. 8
34 Preventing Spam from reaching you automatically A nice way to prevent Spam, you know, those annoying emails sent in bulk, is to add a simple line to your email address. For example, if your email address is john@doe.com, tell a newsgroup that your address is john@DELETEME.doe.com. A person may see that your email address is wrong, but an automatic email address collector will never know.
IMPORTANT: Add a little note at the bottom that says remove the "deleteme" before replying. Hopefully, this will eliminate a significant amount of Spam. 11
35 Finding missing websites (ERROR 404) You may go to a web site or click a link to a site that does not exist and you'll probably get an error message saying, "Error 404, Object Not Found." If you do, there is a little trick you can do to help locate the missing file. Let's pretend you attempted to go to http://www.website.com/page/missing/web.html. If you receive an error message saying it cannot find that web site, try going back to the root of the website to try and locate the site that you are looking for. For example, attempt to go to http://www.website.com/page/missing. You may be able to find a link for your page from there. And if that doesn’t work, try going to http://www.website.com/page, and then just http://www.website.com. You should have a good chance of locating the site you are looking for from one of those sites if it has been moved or renamed. However, if it has been deleted you are out of luck. 4
36 Recovering files from the Recycle Bin If you unintentionally delete a file, you can easily retrieve that file from the Recycle Bin. To do this, simply:
Double-click the Recycle Bin iconWhen the window is open, select the file you want to recoverOpen the File menu and select Restore, and the files will be returned to their original location 2
37 Browsing your hard drive with Internet Explorer You can browse through your hard drive or LAN simply by typing the path into the Address field in Internet Explorer. 5
38 Using the START menu to access websites You can access a website simply by using the Run feature from the Start menu. To do this:
Click the START button.
Click Run.
In the Open field, type the URL of the web site you wish to go to (For example, http://www.anysite.com.)
Then, click OK and your default browser will load the specified website. 5
39 Speeding up your browsing by increasing your cache size You can have Internet pages download faster if you devote more of your hard drive space to storing web documents. To do this, you need to increase your memory and disk caches. If you have some extra hard drive space and wish to do this:
Open up Internet Explorer.
From the View menu click Options.
Click the Advanced tab.
Click Settings.
Now simply drag the slider to a desired percentage.
Click OK to save your settings. 5
40 Getting around Windows without a mouse There is another way of getting around while inside a window other than using the mouse. If you are in Windows Explorer, or any window, on the left side of the screen, you can navigate through folders without the mouse. You can move up and down between folder by using the up and down arrows. You can also expand each folder by pressing the right arrow key once it is selected, or collapse them with the left arrow key. To open a folder once it is selected, simply press Enter. 3
41 Put MP3s on a CD You will need a "burner," a compact disk drive that makes recordable and rewritable disks. These are known as CD-Rs and CD-RWs, respectively.
Recordable disks can be burned once; rewritable disks can be burned repeatedly, much like a floppy disk. A few expensive car units and other devices can play MP3s. But in most cases, the MP3s have to be decompressed before they are playable outside a computer. That balloons the files from 3 megabytes or less in most cases to more than 20 megabytes.
So it takes many more CDs to produce playable CDs than it does to store the MP3s. 11
42 Files Accidentally Deleted? Better move fast! It's important to recover files as soon as possible; if they're still on the hard drive, they could be overwritten at any time. Try using Symantec's Norton Utilities to retrieve files accidentally deleted. The program's Unerase wizard does a good job of bringing back to life files and fragments of files thought to be long gone. In case you're wondering, Norton Utilities does the reverse, too. It lets you permanently erase sensitive data off your PC or Mac. 11
43 Fit more icons on your desktop If you're running out of real estate on your Desktop, you can reduce the size of your icons. This works in Windows 98 and XP:
--Right click on the Desktop
--Click Properties and Appearance
--In Windows XP, click Advanced
--Choose Icon from the drop down list
--Select a smaller size to the right of the drop down list
--In Windows 98, click Apply
--In Windows XP, click Apply and OK
--Click OK to close the window 3
44 Automatically delete temporary Internet files You can have Internet Explorer automatically delete files in the Temporary Internet Files folder every time you close your browser. From Internet Explorer, select Tools and Internet Options. Select the Advanced Tab. Scroll down to the Security section. There, check the option “Empty Temporary Internet Files folder when browser is closed.” 5
45 Web site disables the Back button Some Websites disable your back button to keep you on their site. If this happens again, right click on the back button. You’ll see a list of pages that you have visited. Click something on that list to move back. This works for the Forward button, too. 5
46 Icon Spacing Feeling a bit claustrophobic with your icons? If you aren’t happy with their spacing, there is a very easy way to modify them. Right-click the desktop and select Properties. Under the Appearance tab, click the down arrow under Item and select Icon Spacing (Vertical or Horizontal). Then adjust the Size using the arrows. Click Apply to view your changes. To save these changes as part of a color scheme, click Save As, name the scheme, and click OK. If you don’t want to save the changes as part of a color scheme, simply click OK to close the Display Properties box. 2
47 Start Your Screen Saver Immediately If you want your screen saver to appear when you want it, like when you leave your desk, just make a desktop shortcut.
Go to the Windows>>System folder. Pick your favorite screen saver. Hint: It has a .scr file extension. Right-click on the screen saver file. Select Send To>>Desktop, which creates a shortcut. Now double-click the desktop shortcut to launch your screen saver. 2
48 What CD type should I use? If you're burning CDs and using CD-Rs, you've probably noticed some are marked for music. Some are marked for data. Some aren't marked for anything in particular. So what should you use? Simple.
When you use the burner on your computer, it doesn't matter. Data is data, and it all works the same way. So you can safely use any CD-R blanks, regardless of what you're burning.
CD recording machines made just for home audio systems are a different story. These require CD-R disks marked specifically for music. The music CDs include a flag that tells the recorder that an acceptable disk is being used. A portion of the cost of these disks goes to compensate artists for the copies made. That is why blank CD-Rs marked for music are usually more expensive than those marked for data.
Reportedly, some off-brand manufacturers market low-quality CD-Rs as "music" blanks, assuming defects will be less noticeable in a music recording. These may not have the flags necessary to run on audio system recorders. If you are using an audio system recorder, stick to brand names. 11
49 Death of a hard drive You know you're in trouble when you boot up and Windows is unable to find your hard drive. If you boot from a startup disk and can find the hard drive, you may have a virus. But if the hard drive has just disappeared, it could well be dead.
Hard drives can die without warning. But sometimes they refuse to work intermittently, failing to start the first time but then firing up when the computer is rebooted. That's a sign of trouble. And it starts making some strange noises, that's also pretty bad. Mine once sounded like a cat!
If you think your hard drive is failing, act fast. Rescuing data from a dead hard drive can be expensive. The best time to prepare is when the sky is blue and the drive is humming.
Back up your data. You can use a CD burner, a second hard drive or a tape. Be sure you have a startup disk.
If the worst occurs, you'll find very large drives can be purchased at a reasonable price. A computer shop can do the work, if you're not ready to tackle the job. The labor could be expensive, though. If the computer is getting old, you might want to replace it instead of heading into the upgrade zone. 11
50 How to Start in Safe Mode On a Windows PC, restart the computer while holding down the Ctrl
key. Instead of the normal startup sequence, you'll be presented
with a list of options. Select Safe Mode. Once Windows starts up,
you'll see the words Safe Mode in all four corners of the screen.
If your computer seems to operate properly in Safe Mode, you'll know
the problem is not with Windows. However, remember that when you
start the computer in Safe Mode, Windows uses default settings (VGA
monitor, no network, Microsoft mouse driver, and the minimum device
drivers required to start Windows) and you will not have access to
CD-ROM drives, printers, or other devices.
On a Mac, go to the Extensions Manager control panel and select Mac
OS Base Set from the Selected Set list. Then restart your computer. 1
51 Forward e-mail netiquette When you forward e-mail, a new message is created that usually contains the original addresses in the body of the e-mail. That's bad. Most e-mail programs let you highlight those e-mail addresses and delete them before you click send. But, a better way is to select only the part you want to forward and paste it into a new e-mail.
To really be a good netizen, use your e-mail program's blind carbon copy feature. This way, you're not divulging everyone's e-mail addresses when so many of us like to keep our address private to prevent spam. 11
52 SYSTEM.INI Enhancements Take Full advantage of your hardware with these undocumented
secrets.
Edit the SYSTEM.INI file & Add these lines to the [386Enh] section. WARNING!!! DO NOT ATTEMPT THIS IF YOU ARE NOT EXPERIENCED IN THIS
TYPE OF SYSTEM PERFORMANCE ENHANCING. USE THIS TIP ONLY ON WINDOWS
95, 98, and Windows ME. WE ARE NOT RESPONSIBLE FOR ANYTHING YOU DO
TO YOUR COMPUTER. IF YOU DO NOT AGREE WITH THIS LAST SENTENCE THEN
WE ASK THAT YOU DO NOT USE THIS TIP.
1. MaxBPs=768 (210 Break Points by default) Windows uses 160 BP's just to start, leaving your Apps. a mere 50
BP's. API’s (your Applications) use BP’s everytime you open & close
programs. They’re gone till you reboot windows again. #1 Cause for your system crash late in the day.
2. DebugLocalReboot=On Allows you to just Ctrl+Alt+Del to close a "HUNG" program.
3. NoEmmDriver=Off If you don't use any DOS apps. or QEMM7 drivers, you can free up
some UMB.
4. DMABufferSize=64 (16 default) Increases responsiveness for TBU's and Sound cards.
5. PageOverCommit=1 (4 times the RAM default) Changes the Recomended Size of the Swap File.
6. PageBuffers=32 (4 default) Speeds up the Virtual Memory (from a 2 to a 16 lane highway). 1
53 Where can I find Excel tutorials? There are a number of tutorials on the Internet. Try the one at University of South Dakota ( http://www.usd.edu/trio/tut/excel/). Florida Gulf Coast University ( http://www.fgcu.edu) offers a good one, too. Enter "Excel tutorial" in the search box to locate it. 8
54 Keep Up With the News To keep up with current events and breaking news, be sure to listen to your local News/Talk radio station all the time. If you spend a lot of time online, you may also want to get news delivered to your in-box.
To sign up for N.Y. Time's e-mail updates: http://www.nytimes.com/services/email/email.html
CNN's e-mail alerts: http://www.cnn.com/EMAIL
MSNBC's breaking news updates work a bit differently. You download a free application and as news breaks an audible and visual signal alerts you. http://www.msnbc.com/tools/newstools/d/news_alert.asp 11
55 Putting New Sounds on Your Desktop Getting sounds into the computer is pretty simple, assuming you have
a microphone and a sound card. And once you get those sounds inside
your computer, you can associate them to different system events
like opening a program, starting Windows, errors and more! Here's
how to do it:
In Windows 98:
--Click Start >> Programs >> Accessories >> Entertainment >> Sound
Recorder
--Click File >> New
--Click the red dot and start recording
--When finished recording, click the black box
--Click File and Save as
--Save file anywhere you please
--Close Sound Recorder
--Click Start >> Settings >> Control Panel
--Double click Sounds
--Click once on an event, highlighting it
--In the Sound area, click Browse
--Navigate to the file you saved
--Click the file name; click OK; close Control Panel
In Windows XP:
--Click Start >> All Programs >> Accessories >> Entertainment >>
Sound Recorder
--Record as in Windows 98
--Close Sound Recorder
--Click Start >> Control Panel
--Double click Sounds and Audio Devices
--Select the Sounds tab
--To name your sound scheme, click Save As…
--Click once on an event; click the Browse button
--Navigate to the saved file and click it once
--Click OK; close Control Panel
1
56 Setting a New Home Page in IE --Go to the site that you'd like to make your home page::subliminal message:: Go to www.homecomputerrepaironline.com
--From IE's toolbar, select Tools>>Internet Options
--Click the General tab, if it isn't already open
--Under "Home page," click on the "Use current"
--That's it!
8
57 Spring Cleaning Your Hard Drive You want to clean up your hard drive. What files are okay to remove
without causing any trouble?
There are tons. For starters, get rid of those programs you no
longer use. Go to Start>>Settings>>Control Panel>>Add/Remove
Programs. Depending on your version of Windows, you’ll see either an
Install/Uninstall tab or a listing of programs installed on your PC.
When you find a program you no longer use, select it and click
Add/Remove or in Windows XP, Change/Remove.
Next, get rid of files that accumulate as you use the Internet. In
Internet Explorer, select Tools>>Internet Options. On the General
tab, click the Delete Files and Clear History buttons. In Navigator,
open the Cache folder in your Netscape folder and delete the icons
in it.
If all this sounds like too much work, a separate uninstaller
program is money well spent. Symantec’ s Norton CleanSweep 2002
examines your system thoroughly to identify duplicate files, orphan
files, Internet cookies, cache and history files, and files that
belong to application software programs. See The Geek for details. 1
58 Make Your Own Icons You can make your own icons for programs. Here's how:
1. Go to Start>>Programs>>Accessories, and then Paint.
2. From the Image menu, select Attributes. Enter 32 pixels in Height
and Width.
3. Get creative. Make an icon using the paintbrush or pencil tools.
Name and save your icon when you're done.
4. Right-click an existing icon on your desktop. Select Properties.5. Click Change Icon and then, Browse. Find the folder containing
the icon you made.
6. Look! Your work of art will now adorn your desktop! 1
59 Is Your Computer Slowing Down? Here's what to do to get the best performance from your computer:
1. Regularly Scan and Defrag your hard drive. This is the most
common sense approach to keeping your machine on top of its game,
but it's the most commonly neglected. If you use your machine for
business I would set up a schedule to do this at least once a week.
If you use your computer mainly for home use, do it at least once a
month. Scanning the drive for problems alerts you to them and gets
rid of them before they become potentially hazardous, and defragging
re- organizes your drive clusters in a nice, neat package,
preventing your hard drive from having to search all over the disk
for information. You'll find these programs by clicking
Start>>Programs>>Accessories>>System Tools.
2. Regularly delete old Temp files and unused programs, then clear
your Recycle Bin: Another "yeah, no kidding" suggestion, but one
that is also often neglected in computer maintenance. Along with
your schedule for scanning and defragging you should have a regular
schedule for removing old, useless stuff from your machine. Old
programs that you haven't used in at least six months and don't plan
on using again should be the first to go, but use the program's
Uninstaller or Add/Remove in Control Panel to get rid of them. Also,
regularly scan your folders and directories for old files--they take
up nothing but space, and a major killer for hard drives is clutter.
If you're unsure about ANY files or programs, don't delete them
until you check them out thoroughly and get a second opinion.
Regularly checking and dumping all the contents of the Recycle Bin
is another one of those little details that lots of folks forget
about, but it should be done on a regular basis.
3. Eliminate hidden and unnecessary system tray apps. Another
performance-sapper are programs that run in the background, many of
which you might not even need. To find out just what's running,
launch your System Configuration Utility and find out exactly what's
loading each time you start your computer. Access this program by
clicking Start>>Run, then type in "MSCONFIG" (without the quotes),
and select the Startup tab once it launches. Here you'll find a long
list of programs, but of course the question is which programs you
can take off the list. Start by eliminating any duplicate entries,
and then uncheck anything from Real Networks, as well as any music
or jukebox programs. If in doubt, leave it running, but you could
always try your system without a program and see if it becomes
unstable--just make sure you create a backup first (click on the
Create Backup button under the General tab). 1
60 Updating to XP If you have Windows 98, you can save some money and buy the Windows
XP Upgrade. When you install that over Windows 98, you end up with
all the features of the full edition. The XP Upgrade is for people
who are making the jump from Windows 98 or Windows ME. Windows 95
cannot be upgraded—those users need the Full edition. Buy the
cheaper XP Home edition unless you are in a business environment
with serious networking needs. Then, you’d be better served by the
Professional Edition.
Before you do the upgrade, though, drop by Microsoft’s XP web site
(www.microsoft.com/windowsxp). There, download the Upgrade Advisor,
which will tell you if your hardware and software will work on XP.
Download it overnight. It’s a 50 MB file! And if you do the upgrade,
make sure you have at least 256 megabytes of RAM. 1
61 Choosing the Best CD-RW What do the numbers mean when you look at a CD-RW drive?
The big three numbers to check are the speed making CD-Rs
(single-recording CDs), making CD-RWs (rewritable CDs), and playing
CDs, respectively. A CD-RW rated at 24X/10X/40X, for instance, means
it writes CD-Rs 24 times speed (about 3.6 MB per second), rewrites
CD-RWs at 10 times speed (about 1.5 MB per second) and plays CDs at
40 times speed. There is one more number to look at--the buffer.
Make sure the drive has a 2-4 MB buffer to handle system
interruptions. The bigger the number here, the better. 1
62 E-Mail Image Size There's nothing like getting a picture that takes 30 minutes to download. Resolution (that is, dpi, or dots per inch) is very important. If you scan your pictures at a high resolution, the files will be huge. For photos headed for e-mail instead of a printer, use your photo editing software to set the image at 70 dpi and size them at four inches by six inches. 12
63 Eliminate Pop-Up Ads When the new browser windows start appearing, hold down the Alt key
and press and release the F4 key when each new window opens. Of
course, software will do the same thing. Panicware's
(www.panicware.com) Pop-Up Stopper works with Internet Explorer and
Netscape and is free for personal use. 1
64 To Launch or Not To Launch! Automatically launch any program or file when you start your
computer by using drag and drop to put it in the Startup folder,
typically located at C:\Windows\StartMenu\Programs\Startup.
OR
Prevent items in your Startup folder from automatically launching.
Press Ctrl when Windows is booting to prevent launching programs or
files in the Startup folder. 1
65 Viewing Messages from any Web-based E-mail Provider The technique outlined in the steps below can be used to view messages from any Web-based e-mail provider, including Yahoo, Lycos, Excite and others.
Creating a Hotmail Folder:1. On the View menu, click Folder List to turn on the Folder List.
2. Right-click Outlook Today, and then click New Folder.
3. Name the folder "Hotmail" then click OK.
Your Folder List should now include a Hotmail mail items folder.
Associating the Hotmail Folder with the Hotmail Web Site:
1. In the Folder List, right-click the Hotmail folder, then click Properties.
2. On the Home Page tab, type "http://www.hotmail.com" in the Address box.
3. Click to select "Show home page by default for this folder", and then click OK.
Now when you click the Hotmail folder in your folder list, you will see the option to log on to your account.
You can also add a Hotmail folder shortcut to your Outlook Bar by dragging the Hotmail folder to the Outlook Bar. 11
66 Fix Windows XP Do you think you might have messed something up on your Windows XP? Just go to START then RUN and type: sfc /scannow and hit ENTER.Windows will check all of it's files for problems and fix them. 3
67 System Configuration Utility This valuable diagnostic tool lets advanced users isolate software
that may be causing system problems, and it provides a one-stop
checklist of all the applications Windows is launching at start-up.
It's installed by default, but it doesn't appear as an individual
icon, only as an item on the Tools menu in System Information. Find
msconfig.exe in your Windows\System folder and make a shortcut to
it. System Configuration Utility is available only for Windows 98,
98 SE, and me. 1
68 Launching Multiple Apps Do you want to click a single icon to start more than one
application? You can create a batch file that launches as many
programs as you want. Open Notepad and type start followed by a
space and the command line of an application (for example,
c:\windows\calc.exe); then press Enter. If your path includes long
file or folder names, you must either enclose the path in quotation
marks (for example, "c:\programfiles\accessories\mspaint.exe") or
use shortened versions of the long names (for example, c:\progra~1\
access~1\mpaint.exe). Add more lines following this pattern for each
program you want to start with one icon.
Don't press Enter after the last line. Choose File, Save and type a
file name (in quotation marks) with the .bat extension. (The
quotation marks keep Notepad from overriding the .bat extension with
its default .txt extension.) Double-click the batch file (or its
Shortcut) to launch your programs. 1
69 Get the Biggest View Possible To get the most spacious, capacious view of your folder or Explorer
window, press F11 to enter kiosk mode. This view makes the file pane
fill the whole screen. It hides all toolbars next to the menu bar
and makes the file pane even bigger than maximized size. Even
Windows' taskbar is covered by this mode. To pop it back into view,
move your pointer to the taskbar's last location.
To make your screen even bigger, right-click a toolbar at the top
and choose Auto-Hide. This slides the toolbar out of sight when not
in use, but it pops back when you move your pointer to the top of
the screen. If you have an Explorer bar showing on the left, you can
hide it by clicking the Auto-hide pushpin button at the top of that
panel (in some Windows 9x systems you have to slide the pointer away
from the Explorer bar). The bar pops back when you move the pointer
to the left side of the screen. Click the Auto-Hide button again to
make that panel stay in place. To exit kiosk mode, hit F11 again.
Note: For Windows 95, this tip requires Internet Explorer 4's
Desktop Update. 1
70 Open to a Location in a Document All Versions Shortcuts can do more than merely link to files,
folders, or programs. If you're using Word, Excel, or another
application that supports Object Linking and Embedding, you can make
a shortcut that will take you to a specific place in a file--a boon
if you work with long documents.
The precise method varies by application, but one of these
techniques should work: First, open your document and highlight the
passage or cell(s) you want to bookmark with a shortcut. Right-click
and drag the selection to the desktop or to the folder you desire,
then choose Create Document Shortcut Here. If that doesn't work,
highlight the selection and choose Edit, Copy. Right-click an empty
area on the desktop or in a folder and select Paste Shortcut. Some
applications also require you to return to the original document and
choose File, Save. The next time you need to consult the desired
passage, just launch the document shortcut. 1
71 What are the requirements to run Windows XP? Windows XP Home Edition
233 MHz CPU, 64MB Ram and 2 GB hard disk space.
Recommended: 300 MHz CPU and 128MB Ram
Windows XP Professional
233 MHz CPU, 64MB Ram and 2 GB hard disk space.
Recommended: 300 MHz CPU and 128MB Ram
3
72 Quick keyboard shortcuts for Outlook Express Try these easy-to-remember Outlook Express shortcut keys for
mouse-free operation.
Ctrl-M: Send and receive mail
Ctrl-D: Delete a message
Ctrl-Shift-B: Open your address book
Ctrl-R: Reply to a message
Ctrl-I: Open the Inbox
Ctrl-N: Create a new message
1
73 Access your files via browser Saving files to the Web from inside Office XP sounds swell, but what
about when you're on the road and Web ready but don't have Office XP
on your current computer?
No problem. Just open your browser--any will do--and enter this URL:
http://www.msnusers.com/name@hotmail.com/files
where name@hotmail is your Passport ID.
You may have to type in your Passport ID and password (you won't if
you earlier told Passport to save the info to the computer you're
working on), but then you'll see a browser-based directory of the
files you saved from Office XP's applications. Click any filename to
download that file from the storage site and save it to disk.
Depending on which applications you have on the computer you're
working on, you may be able to open and edit the file from the hard
drive; recent editions of WordPerfect, for instance, can open
Microsoft Word documents. 1
74 Why are some entries missing from the Start Menu? In Windows Me, 2000, and XP, Microsoft has added a feature called
"Personalized Menus." This feature, if you want to call it a
feature, hides the most infrequently used shortcuts on the Start
Menu.
Here are the steps to turn it off:
Windows Me/2000:
1) Select Settings in your Start Menu, and then select Taskbar &
Start Menu.
2) Turn off the Use Personalized Menus option.
Windows XP:
1) Select Settings in your Start Menu, and then select Taskbar &
Start Menu.
2) Choose the Start Menu tab, choose Classic Start Menu, and click
Customize.
3) Turn off the Use Personalized Menus option, and click Ok when
you're done. 1
75 Encrypting and Decrypting Compressed Folders in Windows ME Another advantage of compressed folders (zipped) in Windows ME is that you can encrypt them. Here are two ways to do it:
1) Right-click the compressed folder or file, and then click Encrypt
2) Double-click the compressed folder or file, and then click
Encrypt on the File menu
When you open an encrypted folder, you receive a dialog box prompting you for the password. The password is stored in the .zip archive. If you forget the password, there is no way to retrieve it.
You can use one of these procedures to decrypt a compressed folder or file:
1) Right-click the compressed folder or file, and then click Decrypt
2) Double-click the compressed folder or file, and then click Decrypt on the File menu
1
76 Multiuser features in Windows XP Like Windows 2000, but unlike Windows 95, 98, and Me, the ability to log in multiple users simultaneously plays a big role in Windows XP. There is a default Administrator account set up when Windows XP is first installed, but you can create as many accounts as you need later, depending on how many people will be using the machine. Each user, once he or she has an account, can customize XP to his or her liking. Individual users get their own subfolders in the Documents And Settings folder; this folder serves as a centralized location for most personalized information, such as the Start Menu, Favorites, and Documents settings.
Missing Administrator account
Once you have created regular user accounts, the default Administrator account vanishes from the Welcome screen, which you see when the computer starts up. Press Ctrl-Alt-Delete twice at the Welcome screen to retrieve the standard logon dialog. You can log on as Administrator from here. To switch among accounts, just click the Log Off button on the Start menu. You'll then see the Log Off Windows dialog box. Click the Switch User button, and you'll be taken to the Welcome screen where you can select and log on to other accounts.
Show yourself
Only the Administrator can set up new user accounts (go to Control Panel > User Accounts > Create A New Account). You can select a picture to identify the account. When you're logged on to the system under your username, this picture, along with your username, peeks out at you from the top of the Start menu. There are a slew of 48x48-pixel bitmap images to choose from within XP. They're housed in D:\Documents And Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures. But why limit yourself? You can also copy any graphic you want into this folder or browse for another from your hard drive. Usable file types are BMP, GIF, JPEG, or PNG. However, always use a square picture, to limit the white space on the side. Your image can be any size but will be displayed as 48x48-pixel image, so a close-up works best.
Hide yourself
Once you've created a user account, password-protect it to keep other users from viewing your files, Favorites, and cookies. Why? You may not want your child to see the note that you're sending to his or her teacher, or you may be planning someone's surprise party. (Note: Anyone with an Administrator account can still see them.)Worried about remembering your password? Create a hint to help you when you initially create it by following the prompts during setup. XP stores the password hints in the Registry at Hkey_local_machine\Software\Microsoft\Windows\Current Version\Hints. What if the hint doesn't help? Any user or Administrator can create a password reset disk, which you can use to log on and create a new password. Go to Control Panel > User Accounts and select "Prevent a forgotten password" in the Related Tasks box on the left. Follow the wizard's instructions. After creating the disk, find a safe place for it. Don't forget the password or where you put the disk. Someone else could use it to change your password without you knowing it. 3
77 Know your rights in Windows XP Windows XP comes bundled with Windows Media Player 8.0. While Media Player plays just about any digital media file format--it supports 35, including MP3--it records music only in the Windows Media Audio, or WMA, format. The reason? Content protection.
When recording, or ripping, music from CDs, Media Player allows you to make protected recordings so that no one will be able to copy the recording from one computer to another. You can turn copy protection on or off on the Copy Music tab by checking or unchecking the box that says Protect Content. Remember your legal obligations when it comes to copying music. 3
78 Mail - How to make an e-mail template If you want to preserve some time (who doesn't) you can prepare a template e-mail message.
First in Outlook Express (although it probably works in other e-mail programs as well), start a new message (press the Compose New Message button. In this message you can select the Stationary you want to use, the signature and/or any other standard text you want to send with all your messages. Now save your message (click File > Save As, and give it a name (save as a *.eml type).
Add a shortcut (or the file itself) to your Quick Launch bar (\Windows \ Application Data \ Microsoft \ Internet Explorer \ Quick Launch), or on the Desktop. Now if you want to send a new message, just click the shortcut.
Some people have been complaining that it is not possible to send a CC (Carbon Copy) or BCC (Blind Carbon Copy) of all outgoing messages to an other e-mail address, well now you can! Using the template just add the address you want to send the CC or BCC to, and safe it.
If you use the template with version 5 of Outlook Express, you will probably already have noticed that OE deletes the template as soon as you used it once. You can "fix" this by making your *.eml template Read-only. To do this, open Windows Explorer and find your *.eml template. Right-click on it, and from the contect menu choose Properties. Check the box in front of the Read-only attribute, press Apply and OK. 12
79 Disk Cleanup Windows 98 Includes a nifty utility to clean your disks (for example
remove temporary files which were "left over").
To Start Disk Cleanup:
1) Open Windows Explorer or My Computer
2) Right-click the disk you want to free space on, and then click
Properties
3) On the General tab, click Disk Cleanup
4) Click the unnecessary files you want to remove, and click OK 1
81 Auto-fill In The Address In Internet Explorer Instead of typing the entire web address of a
website, simply type in the main part of the
address then hold down the CTRL (Control) key and
tap the ENTER key.
EXAMPLE:
To visit http://www.shopthegeek.com
1) type: shopthegeek
2) Hold down the CTRL(control) key
3) Tap the ENTER key
Note: This trick only works in Internet Explorer
with addresses ending in .com. 1
82 CDROM Drive Won't Open? Will your CDROM drive not open because your computer is either dead or not turned? You can still open the tray to get a CD out in most cases. Take a paper clip and straighten it out so it forms one straight piece of wire. Look for a tiny pin hole on the front of your CDROM drive, most drives have them. Stick the paper clip in the hole and move it in and out with firm pressure until the drive opens slightly. You may now pull the tray rest of the way out with your hand. 11
83 AMI (American Megatrends) Click here for the full PDF file.
Note you will need Adobe Acrobat Reader to view this document. Click here for Adobe's website 101
84 Award and/or Phoenix (now merged) Click here for page of PDF files for multiple versions.
Note you will need Adobe Acrobat Reader to view these documents. Click here for Adobe's website 101
87 Acer, AOpen Acer, 28.8 Fax AT&F&C1&D2&K3%C0Acer, 33.6 Fax AT&F&C1&D2&K3%C0Acer, 33.6 AT&F0&D0S0=0Acer, Analog 28.8 PCMCIA AT&F&C1&D2&K3%C0Acer, Analog 33.6 PCMCIA AT&F&C1&D2&K3%C0Acer, FM56PVS 56k flex AT&F&C1&D2Acer, FM56PVS 56k flex +MS=56,1,32000,56000Acer, FM56ITU 56k AT&D2&C1X4V1Q0S7=70W2\N3&K3Acer, FM56PVS 56k AT&D2&C1X4V1Q0S7=70W2+MS=11\N3&K3Acer, 56KFlex Limited to 33.6 +ms=11,0,9600,33600Acer, 56KFlex Limited to 33.6 +ms=11,1Acer, 56k ACF V.90 (Limited to 33.6) AT&F&C1&D2+MS=v34Acer, 56k ACF V.90 (Limited to 33.6) AT&F&C1&D2&K3+MS=v34Acer, 56k ACF V.90 AT&F&C1&D2&K3+MS=v90,0Acer, 56k ACF V.90 AT&F&C1&D2+MS=v90,0Acer, 56k ACF V.90 AT&F&C1&D2s10=200+MS=v90,1Acer, 56k ACF V.90 AT&F&C1&D2Acer, 56k ACF V.90 AT&F&C1&D2s95=3Acer, 56k ACF V.90 AT&F&C1&D2W2Acer, 56k HCF V.90 +ms=v90Acer, 56k HCF 56kflex +ms=k56flexAcer, 56k HCF 33.6 mode +ms=v34Acer, 56k HCF V.90 (limited to 33.6) AT&F&C1&D2+MS=v34Acer, 56k HCF V.90 (limited to 33.6) AT&F&C1&D2&K3+MS=v34Acer, 56k HCF V.90 (to disable V.90) +ms=v34,0,19200,33600Acer, 56k HCF V.90 AT&FE0V1S0=0&C1&D2W0Acer, 56k HCF V.90 AT&F&C1&D2W2Acer, 56k HCF V.90 AT&F&C1&D2+MS=v90,0Acer, 56k HCF V.90 AT&F&C1&D2&K3+MS=v90,0Acer, 56k HCF V.90 AT&F&C1&D2s10=200+MS=v90,1Acer, 56k HCF V.90 AT&F&C1&D2s95=3AOpen, 56k FM56 (limited to 33.6) +MS=v34AOpen, 56k FM56 (limited to 33.6) +MS=11,0,9600,33600AOpen, 56k FM56 (limited to 33.6) +MS=11,1AOpen, 56k FM56 (limited to 33.6) AT&F&C1&D2+MS=v34AOpen, 56k HCF Chipset AT&F&C1&D2AOpen, 56k HCF Chipset AT&F&C1&D2+MS=v90,0AOpen, 56k HCF Chipset AT&F&C1&D2s10=200+MS=v90,1AOpen, 56k HCF Chipset AT&F&C1&D2&K3AOpen, 56k HCF Chipset AT&F&C1&D2s95=3AOpen, 56k HCF Chipset AT&F&C1&D2W2AOpen, 56k HCF Chipset (limited to 33.6) +MS=v34AOpen, 56k HCF Chipset (limited to 33.6) AT&F&C1&D2+MS=v34AOpen, 56k HCF Chipset (limited to 33.6) AT&F&C1&D2&K3+MS=v34Note: HCF Init strings also pertain to HSF Chipsets in this case as well.AOpen, 56k ACF Chipset AT&F&C1&D2AOpen, 56k ACF Chipset +MS=v90,0AOpen, 56k ACF Chipset +MS=v90,1AOpen, 56k ACF Chipset AT&F&C1&D2W2AOpen, 56k ACF Chipset AT&F&C1&D2+MS=v90,0AOpen, 56k ACF Chipset AT&F&C1&D2+MS=12AOpen, 56k ACF Chipset AT&F&C1&D2&K3+MS=v90,0AOpen, 56k ACF Chipset AT&F&C1&D2s10=200+MS=v90,1AOpen, 56k ACF Chipset AT&F&C1&D2s95=3AOpen, 56k ACF Chipset AT&F&C1&D2s10=200s25=100AOpen, 56k ACF Chipset AT&F&C1&D2s10=200s25=100s30=0AOpen, 56k ACF Chipset AT&F&C1&D2s10=200s25=100s91=10AOpen, 56k ACF Chipset AT&F&C1&D2s10=200s25=100s91=13AOpen, 56k ACF Chipset (limited to 33.6) +MS=11,1AOpen, 56k ACF Chipset (limited to 33.6) AT&F&C1&D2+MS=11,1AOpen, 56k ACF Chipset (limited to 33.6) +MS=11,0,9600,33600AOpen, 56k ACF Chipset (limited to 33.6) AT&F&C1&D2&K3+MS=11AOpen, 56k ACF Chipset (limited to 33.6) +MS=v34AOpen, 56k ACF Chipset (limited to 33.6) AT&F&C1&D2+MS=v34AOpen, 56k ACF Chipset (limited to 33.6) AT&F&C1&D2&K3+MS=v34
105
88 Aceex, Actiontec Aceex, 9600 AT&F\N3\Q3S95=1Aceex, Designer 9600 AT&F1X4&C1&D2&R0&Y0%C1\J0\N3\Q3W1&K3Aceex, Designer 14.4 AT&F1X4&C1&D2&R0&Y0%C1\J0\N3\Q3W1&K3Aceex, 1496 AT&F&C1&D2%C1\J0\N3\Q3\V1W1&K3S95=46Aceex, 1414 v.32bis AT&F\N3\Q3S95=1Aceex, 1414 v.32bis AT&F&D0\N3\Q3Aceex, DM2814H AT&F1S95=1
105
89 Active, Acubit Active, 14.4 AT&FB0F10X3&K3\N5%C1S0=0Active, 288UB/V34 ATF0&K3S0=0Acubit, 14.4 Fax AT&F&C1&D2%C1\J0\N3\Q3\V1W1&K3S95=46
105
90 Adtech Adtech, Micro 2400 V.42bis AT&F&C1&D2\N3\Q3\V1W0Adtech, Hi-Per 96/144 AT&F&C1&D2&K3\J0Adtech, Hi-Per 96/96 AT&F&C1&D2&K3\J0S7=60S11=60Adtech, Comm-Panion ATQ0V1X4&C1&D2+H1Adtech, Perfect DataFax V AT&FV1X4&C1&D2&K3S36=7\V1&Q0
105
91 Adtran, AIWA, Alliance, Allsync, Altima, Amberlogic, AMP Adtran ISDN Express XRT 1 B-Channel 56k ATS54=12S53=2S27=0Adtran ISDN Express XRT 1 B-Channel 64k ATS54=12S53=3S27=0Adtran ISDN Express XRT 2 B-Channels 112k ATS54=12S53=2S27=1Adtran ISDN Express XRT 2 B-Channels 128k ATS54=12S53=3S27=1Adtran ISDN ISU 128k AT&C1&D2&R0&S2\Q3S34=15AIWA, 9600 Inteligent FAX AT&D2&C1X4V1Q0S7=70\N3\Q3\J0AIWA, 14.4 Inteligent FAX AT&D2&C1X4V1Q0S7=70\N3\Q3\J0Alliance, 9600 AT&D2&C1X4V1Q0S7=70AllSync, 9600 AT&D2&C1X4V1Q0S7=70Altima, 4XX Internal Fax/Data AT&F&C1&D2L3W1\G1\K1Amberlogic, Mistral ATZQ0V1F7&E0&K3AmberLogic, Mistral 14.4 AT&FW2&C1&D3&E5&K1\C5\Q0AMP, 14.4 PCMCIA AT&F&C1&D2S95=1
105
92 Amquest Amquest, 14.4 (w/WinRPI) AT&F&D0&K3+H3S95=1S0=0Amquest, 14.4 (RPI) ATAT&D2&C1X4V1Q0S7=70W2Amquest, 14.4 AT&F&C1&D2S95=1Amquest, 14.4 Fax AT&F&C1&D2%C0"H0
105
93 AMT, Amstrad, Anchor, Anderson-Jacobson, Andest AMT, STAR 9600 (V.42bis) AT&F2&C1&D2\V2&Y0AMT, STAR 1442 (V.32bis) AT&F2&C1&D2\V2&Y0Amstrad, PC Modem AT&F&C1&D2&K3%C0Amstrad, PC Modem AT&F&C1&D2&K3Anchor, 2400 AT&D2&C1X4V1Q0S7=70Anchor, 96E5 AT&F&C1&D2\N5\Q3\V2%C3Anderson-Jacobson, 96/32 STH AT&F&C1&D2*C1*LG2*M2*E1Andest, Fax/Data Modem 14.4 AT&F&C1&D2&K3\J0\N7\V1
105
94 Aniga Angia, DataSTAR/FaxSTAR 9600 AT&F&C1&D2%C1Angia, DataStart for Compaq LTE AT&F&C1&D2&K3&U0Angia, DataStart for Compaq LTE AT&F0&C1&D2&K3&U0Angia, DataSTAR/FaxSTAR 14.4 AT&F&C1&D2%C1Angia, 19.2 AT&D2&C1X4V1Q0S7=70W2\N3&K3Angia, PCMCIA 14.4 AT&D2&C1X4V1Q0S7=70W2\N3\Q3\J0Angia, PCMCIA 19200 AT&D2&C1X4V1Q0S7=70W2\N7&K3Angia, PCMCIA 28.8 AT&D2&C1X4V1Q0S7=70W2\N7&K3Angia, PCMCIA SafeJack AT&FL1%C0"H0Angia, PCMCIA SafeJack AT&FL1%C0"H0\N3Angia, PCMCIA-II AT&FL1%C0Angia, Communications PCMCIA Fax AT&FW2&C1&D3\J0\N7\Q3\V2%C1S7=60Angia, 28.8 cell AT&F&C1&D2X4S7=90
105
95 Apache Apache, 28.8 AT&F&C1&D2&K3%C0Apache, 28.8 AT&F&C1&D2&K3Apache, 33.6 AT&F&C1&D2&K3Apache, v341-M 28.8T AT&C1&D2&Q0&K4
105
96 Apex Data (Smart Modular Technologies) Apex Data, AT&F\N0%C0 Apex Data, ATS0=0E1Q0V1X4 Apex Data, 9600 AT&D2&C1X4V1Q0S7=70\N3&K3 Apex Data, PCMCIA AT&FW2&C1&D3&K3&Q5\J0\N7\Q2\V2%C1S7=60 Apex Data, PCMCIA (IBM Thinkpad) AT&F&C1&D2&K3&Q5E1V1Q0X4\N0 Apex Data, 14.4 AT&F&C1&D2&K3%C0 Apex Data, 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Apex Data, 14.4 AT&FS0=0S7=60&K3&D2X3\N3-K0 Apex Data, 14.4 PCMCIA AT&FS0=0S7=60&K3&D2X3\N3-K0 Apex Data, 14.4 PCMCIA AT&D2&C1X4V1Q0S7=70W2\N7&K3 Apex Data, 14.4 PCMCIA AT&D2&C1X4V1Q0S7=70W2\N3&K3 Apex Data, PCR-1414 PCMCIA AT&FX3&C1&D2&K3\N3%C0 Apex Data, PCA-1414 PCMCIA AT&FX4S95=1 Apex Data, IBA-1414 PCMCIA AT&FX4S95=1 Apex Data, 14.4 v.32bis AT&F&C1&D2\N3W2 Apex Data, 14.4 v.32bis AT&F\N3W2 Apex Data, V.32bis Fax AT&F&C1&D2%C1\J0\N7\Q3\V2 Apex Data, V.32 Fax AT&F&C1&D2%C1\J0\N7\Q3\V2 Apex Data, 28.8 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Apex Data, 28.8 AT&FS0=0S7=60&K3&D2X3\N3-K0%E2 Apex Data, 28.8 PCMCIA AT&D2&C1X4V1Q0S7=70W2\N3&K3 Apex Data, 28.8 PCMCIA AT&FS0=0S7=60&K3&D2X3\N3-K0%E2 Apex Data, 28.8 V.34 PCMCIA AT&FX4S95=1 Apex Data, V.32/V.32bis Data/Fax AT&FW2&C1&D3&K3&Q5\J0\N7\Q2\V2%C1S7=60 Apex Data, V.34 AT&FW2&C1&D3&K3&Q5\J0\N7\Q2\V2%C1S7=60
105
97 Apple/Mac Apple Express, AT&F\N3&K3 Apple Express, AT&F&D0\N3S0=0 Apple Express, AT&F&Q5 Apple Express, AT&F\N3&K3 Apple Express, AT&F&D0 Apple Express, 14.4 AT&F&Q0 Apple Express, 28.8 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Apple Express /Geoport, AT&F&D0&Q0 Apple, GeoPort AT&FS37=11N0M0 Apple, GeoPort AT&F&D0\N3S0=0 Apple, GeoPort 14.4 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3\J0 Apple Powerbook 3400, Int 33.6 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Best Data, 9624FXMAC AT&F&C1&D2S11=60L3 Best Data, 1442VLXMAC AT&F&C1&D2S11=60L Best Data, 1442FLXMAC AT&F&C1&D2S11=60L3 Best Data, 1442FLXMAC AT&F&C1&D2S11=60L3 Best Data, 1442FXMAC AT&F&C1&D2S11=60L3 Best Data, Smart One 2834FLXMAC AT&F&D0&K3&Q5S0=0 Best Data, Smart One 1442FLXMAC AT&F&D0&K3&Q5S0=0 Best Data, Smart One 1442VLXMAC AT&F&D0&K3&Q5S0=0 Best Data, Smart One 2834VLXMAC AT&F&D0&K3&Q5S0=0 Best Data, Smart One 336FLX Mac AT&F0L1 Best Data, 2834FLXMAC AT&F&C1&D2S11=60L3 Best Data, 2834VLXMAC AT&F&C1&D2S11=60L3 Best Data, 2834FXMAC AT&F&C1&D2S11=60L3 Boca, V.34 Fast Mac AT&F&D0S0=0 Boca, V.34 Fast Mac AT&F&C1&D2&K3%C1%E1S95=47 Digicom, Eagle 9600/Scout Plus AT&F&D FastMac, AT&F&C1&D0&K3&Q5S0=0S95=3S10=35 Geoport, AT&FE0 Geoport, AT%C0S46=136 Geoport, AT&FE0&Q0 Geoport, AT&F\N3 GeoPort, 14.4 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3\J0 Global Village, Gold 14.4 AT&FV1Q0X3&C1&D2%C0\N3 Global Village, Bronze AT&F%C0\N0 Global Village, TelePort Bronze AT&F Global Village, Teleport Silver AT&F1&D0S0=0 Global Village, TelePort Silver AT\J0\N3%C0&C1&D2\Q3\V1 Global Village, TelePort Silver AT\J0\N3%C1&C1&D0\Q3\V1 Global Village, TelePort Silver AT&F1S11=60 Global Village, Teleport Silver AT&F1%C0\N0 Global Village, TelePort Silver AT&D2&C1X4V1Q0S7=70W2\N3&K3 Global Village, TelePort Gold AT&F1 Global Village, Teleport Gold AT&F1&D0S0=0 Global Village, Teleport Gold AT&F1S95=44 Global Village, Teleport Gold AT&F1S95=44 Global Village, Teleport Gold AT&F1S95=44 Global Village, TelePort Gold 9600 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Global Village, TelePort Gold II AT&F1&K3 Global Village, TelePort Gold II AT&F1&K3 Global Village, Teleport Gold II AT&F1&D0&K3S0=0 Global Village, TelePort Gold II 14.4 AT&D2&C1X4V1Q0S7=70W1S95=0\N3&K3 Global Village, Teleport Gold IIv AT&F1&D0&K3S0=0 Global Village, Teleport Gold IIv AT&F1%C1&K3 Global Village, TelePort Mercury AT&F1 Global Village, TelePort Mercury AT&F1&K3 Global Village, Teleport Mercury AT&F1&D0\Q3S0=0 Global Village, TelePort Mercury 19.2 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Global Village, TelePort Mercury AT&F1&K3 Global Village, TelePort Platinum AT&F1W1S95=44 Global Village, TelePort Platinum AT&F1W1S95=44 Global Village, Teleport Platinum AT\N0%C0 Global Village, TelePort Platinum AT&F1%C0 Global Village, TelePort Platinum AT&F&C1&D2&K3%C0 Global Village, TelePort Platinum AT&F1+MS=74 Global Village, TelePort Platinum AT&F1+MS=74%C0 Global Village, TelePort Platinum 28.8 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Global Village, TelePort Platinum 33.6 AT&F1E0W2S95=45S0=0&D3S7=60\13 Global Village, TelePort Platinum V Int (Performa 6300CD) AT&F1%C1&K3 Global Village, Powerport Silver AT&F1&D0S0=0 Global Village, Platinum AT&F1&D0S0=0S95=44 Global Village, PowerPort Gold/Silver AT&F\J0\Q3\N7%C0\V2W1 Global Village, PowerPort Gold/Silver AT&F\J0\Q3\N7%C1\V2W1 Global Village, PowerPort Gold PC AT&F1%C0\N0 Global Village, PowerPort Silver& Gold AT&F\J0\Q3\N7\V2W1%C0\N0 Global Village, PowerPort Gold AT&F\J0\Q3\N7&C1\V2W1 Global Village, Powerport Gold AT&F1&D0S0=0 Global Village, Powerport Mercury (PowerBook 1xx) AT&F1&D0\Q3S0=0 Global Village, Powerport Mercury (PowerBook Duo/2&5xx) AT&F&D0S0=0 Global Village, PowerPort Mercury (100 Series) AT&F1 Global Village, PowerPort Mercury (200/500 Series) AT&F Global Village, PowerPort Mercury (200/500 Series) AT&F%C0\N0 Global Village, PowerPort Mercury (100 Series Mac) AT&F1 Global Village, PowerPort Mercury (200/500 Series Mac) AT&F Global Village, PowerPort Mercury (200/500 series Mac) AT&F\N2%C1 Global Village, PowerPort Mercury (200/500 series Mac) AT&F%C0\N0 Global Village, PowerPort Mercury AT&F%C0\N0 Global Village, PowerPort Silver AT&F\J0\Q3\N7&C1\V2W1 Global Village, PowerPort Platinum AT&F1W1S95=44%C0\N0 & Platinum/Platinum PRO PC card AT&F1W1S95=44%C0\N0 Global Village, PowerPort Platinum Pro PC Card AT&F0W1-K2-SEC=0 Global Village, PowerPort Platinum Pro PC Card AT&F1W1W2S95=44S11=50 Global Village, 33.6 Internet Edition AT&F1W1S95=44 Global Village, K56flex PC card AT&F1W1S95=44 Global Village, Teleport 56 X2 AT&F1E0Q0V1&C1&D2S0=0 Global Village, Teleport 56Kflex AT&F1W2S95=44 Global Village, TelePort 56k AT&D2&C1X4V1Q0S7=70&K1&M4S15=0 Hayes, Accura 144+Fax/Mac AT&F&D0&K3&Q5S0=0 Hayes, Optima 144+Fax/Mac AT&F&D0&K3&Q5S0=0 Hayes, Accura 28.8 / 33.6 ATE1Q0V1X4&C1&D2&K3&Q5S0=0S36=7 Hayes, Accura 288 + Fax AT&F&D0&K3&Q5S0=0 Hayes, Optima 288 Business AT&F&D0&K3&Q5S0=0 Hayes, Optima 288+Fax AT&F&D0&K3&Q5S0=0 iMAC 56k modem AT&FE0Q0V1X4&C1&K3S95=1S7=75S0=0 iMAC 56k modem AT&FE0Q0V1X4&C1&K3S95=1S7=75S0=0+MS=11/1 Mac v.34 AT&F1 Mac v.34 Line Link 14.4 E AT&F&C1 Mac v.34 PowerUser 14.4 E AT&F&C1 Macintosh, Int AT&F\N3&D3&Q5 Macintosh, Express AT&F&D0&Q5\N3S0=0 Macintosh, Express AT&F\N3&D3&Q5A Motorola, 33600 AT&F*DC0*FL3 MultiTech, MT1432MU, MT1432MU AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT1432BA/MT1432BAI/MT1432BA AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT1932PCS, MT1932PCS AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT932BA/MT932BAI/MT932BA AT&F0&D0&E2&E4&E13&E15S0=0 Prometheus, ProModem 144e AT&FW1L3&C1S7=90 Supra, Express 14.4 Plus AT&F1&C1&D2&K3\N3%C0 Supra, Express 14.4 Plus AT&F1&C1&D2&K3%C0 Supra, Express 14.4 Plus AT&F1S0=0 Supra, Express 28.8 Mac AT&F1&C1&D2&K3\N3%C0 Supra, Express 28.8 Mac ext AT&F1S0=0 Supra, Express 28.8 / 33.6 Mac AT&F1X3 Supra, FAXModem v.32bis Mac ext AT&F1S0=0 Supra, FAXModem 28.8 / 33.6 Mac ext AT&F1S0=0 USRobotics, Mac & Fax AT&F&D0&H1 USRobotics, Mac & Fax AT&F1&D0&H1&K2&M5 USRobotics, Mac & Fax AT&F&C1&D2&H1&R2&K0 USRobotics, Mac & Fax AT&F&D2&H1 USRobotics, Mac & Fax AT&D0&F1&H1&K2&M5 USRobotics, Sportster 14.4 Mac&Fax AT&F1&D0S0=0 USRobotics, Sportster 28.8 v.34 Mac&Fax AT&F1&D0S0=0 Zoom, PCMCIA 14.4C Fax AT&F&D0&K3&Q5S0=0 Zoom, PCMCIA v.34C Fax AT&F&D0&K3&Q5S0=0 Zoom, PKT 14.4 Pocket AT&F&D0&K3&Q5S0=0 Zoom, VFX v.32bis FaxM AT&F&D0&K3&Q5S0=0 Zoom, V.34X Fax (Model 460) AT&F&D0&K3&Q5S0=0 Global village info: Select the Port Speed: 2400 for Bronze 9,200 for Silver 38,400 for Gold or Gold II 57,600 for Mercury and Platinum
105
98 April Technologies, Arriva, Aspen April Technologies, Series 9600 AT&F&C1&D2%C1\J0\N9\Q3April Technologies, Series 14.4 AT&F&C1&D2%C1\J0\N9\Q3Arriva, 14.4 PCMCIA AT&F&C1&D2\Q3%C0Aspen, 14.4EFX Data Fax (RPI based) AT&F&C1&D3&K3+H3Aspen, 14.4EFX Data Fax (RPI based) AT&FW2&C1&D2&K3S7=50S36=7S46=2S48=7Aspen, 28.8 AT\N0%C0Aspen, 28.8 Int AT&FE0Q0V1X4&C1&S0&D2&Q5\N3Aspen, 28.8 Int AT&FE0&D2\Q3S37=0\A0\N5Aspen, 28.8 Int AT&F&C1&D2\Q3\V0S7=50Aspen, 28.8 EFX Int AT&F&C1&D2S95=1Aspen, v.34 EFX AT&FQ0V1W1X4&C1&D2&K3&Q5\N3%C1 %E1S0=0S2=255S37=0S36=7S48=7S95=44Aspen, 33.6 (ATI3 = CL MD34xx) AT&F\N5%C0"H0S10=150
105
99 Archtek American Corp Archtek SmartLink, ATS0=0E1Q0V1X4Archtek Smartlink, 2400BS AT&FE1Q0V1&D2X4&C1Archtek Smartlink, 2400BV AT&FE1Q0V1&D2X4&C1Archtek Smartlink, 2400S AT&FE1Q0V1&D2X4&C1Archtek Smartlink, 2400SV AT&FE1Q0V1&D2X4&C1Archtek Smartlink, 2400V AT&FE1Q0V1&D2X4&C1Archtek SmartLink, 9600BUM AT&F&C1&D2W2Archtek SmartLink, 9600UM AT&F&C1&D2W2Archtek SmartLink, 9600UM AT&FX4&C1&D2&R0&Y0&M5%C1\J0\N5\Q3Archtek SmartLink, 9614AV AT&F&C1&D2W2Archtek SmartLink, 9614BAV AT&F&C1&D2W2Archtek SmartLink, 9614UM AT&F&C1&D2W2Archtek SmartLink, 9624BC AT&FE1Q0V1&D2X4&C1Archtek SmartLink, 9624BCV AT&FE1Q0V1&D2X4&C1Archtek SmartLink, 9624BP AT&FE1Q0V1&D2X4&C1Archtek SmartLink, 9624BS AT&FE1Q0V1&D2X4&C1Archtek SmartLink, 14.4 AT&FArchtek SmartLink, 14.4 AT&F&C1&D2Archtek SmartLink, 14.4 AT&F&C1&D2&K3\N3Archtek SmartLink, 14.4 AT&D2&C1X4V1Q0S7=70\V1\N3\Q3&K3Archtek SmartLink, 14.4/9600 Fax AT&F&C1&D2&K3%C0Archtek Smartlink, 1414 PCR PCMCIA AT&F&C1&D2\N3S95=1Archtek SmartLink, 1414AV AT&F&C1&D2\Q3%C0Archtek SmartLink, 1414AV AT&F&C1&D2W2Archtek SmartLink, 1414BA AT&F1S95=1Archtek SmartLink, 1414BA AT&F&K3\N3\Q3S95=1Archtek SmartLink, 1414BAT AT&F&C1&D2W2Archtek SmartLink, 1414BAV AT&F&C1&D2W2Archtek SmartLink, 1414BCL AT&FX4Archtek SmartLink, 1414BCL AT&FX4S95=1Archtek SmartLink, 1414BCV AT&FX4Archtek SmartLink, 1414BRV AT&F&C1&D2W2Archtek SmartLink, 1414BRW AT&F&C1&D2W2Archtek SmartLink, 1414MCV AT&FArchtek SmartLink, 1414MCV AT&FX4 Archtek Smartlink, 1414PCV PCMCIA AT&FX4 Archtek Smartlink, V.32bis AT&FW2&C1&D3&K3\N3\J0\Q3\-J1S7=60Archtek SmartLink, 1914AT AT&F&C1&D2W2Archtek SmartLink, 1914ATU AT&F&C1&D2W2Archtek SmartLink, 1914BAT AT&F&C1&D2W2Archtek SmartLink, 1914BATU AT&F&C1&D2W2Archtek SmartLink, 2834A v.34 AT&F&C1&D2W2Archtek SmartLink, 2834A v.34 AT&F&K3\N3\Q3S95=1Archtek SmartLink, 2834A v.34 AT&FN1W2&C1&D3&K3%C1\J0\N3\Q3"H3S7=60Archtek SmartLink, 2834B AT&F1S95=1Archtek SmartLink, 2834B AT&F&K3\N3\Q3S95=1Archtek SmartLink, 2834BA AT&FW2Archtek SmartLink, 2834BA AT&F&C1&D2W2Archtek SmartLink, 2834BA AT&F&K3\N3\Q3S95=1Archtek SmartLink, 2834BA AT&FN1W2&C1&D3&K3%C1\J0\N3\Q3"H3S7=60Archtek SmartLink, 2834BRV AT&F&C1&D2&K3\N3%C3%E2S95=1Archtek SmartLink, 2834BRW AT&F&C1&D2&K3\N3%C3%E2S95=1Archtek SmartLink, 2834PCA PCMCIA AT&FW2&C1&D3N1&K3\J0\Q3"H3S7=60Archtek SmartLink, 3334BAV AT&FN1&C1&D3&K3%C1\N3\J0S7=60Archtek SmartLink, 3334BR AT&FN1W2&C1&D3&K3%C3\N3S7=60Archtek SmartLink, 28.8 AT&D2&C1X4V1Q0S7=70\V2\N3\Q3&K3Archtek SmartLink, 28.8 AT&F1S95=1, Archtek SmartLink, 28.8 AT&F&K3\N5%C0W2Archtek SmartLink, V.34 28800 AT&F&C1&D2&K3%C0Archtek SmartLink, V.34 33600 AT&F&C1&D2&K3%C0Archtek SmartLink, X2 56K Limited to 33.6 S32=32Archtek SmartLink, X2 V.90 Limited to 33.6 S32=64Archtek SmartLink, X2 V.90 S32=98Archtek SmartLink, V.90 5634PEW AT&FS32=98Archtek SmartLink, V.90 AT&F2Archtek SmartLink, V.90 (limit to v.34) +MS=11Archtek SmartLink, V.90 (limit to v.34) +MS=11,1Archtek SmartLink, V.90 (limit to v.34) AT&F&C1&D2&K3+MS=11Archtek SmartLink, V.90 (limit to v.34) +MS=v34Archtek SmartLink, V.90 (limit to v.34) AT&F&C1&D2&K3+MS=v34Archtek SmartLink, V.90 AT&F&C1&D2s95=3Archtek SmartLink, V.90 AT&F&C1&D2W2Archtek SmartLink, V.90 AT&F&C1&D2s10=200s25=100Archtek SmartLink, V.90 AT&F&C1&D2s10=200s25=100s30=0Archtek SmartLink, V.90 AT&F&C1&D2s10=200s25=100s91=10Archtek SmartLink, V.90 AT&F&C1&D2s10=200s25=100s91=13Archtek SmartLink, V.90 +MS=v90,0Archtek SmartLink, V.90 +MS=v90,1
105
100 Askey Askey, 1433VQH-X 33.6 AT&F1E0V1Q0=0&C1&D2&B1&A3Askey, V1456VQH AT&FE0V1&C1&D2S95=47S0=0Askey, 14.4 PCMCIA AT&F&C1&D2%C1J0N3Q3V2Askey, 14.4 AT&F1Askey, 14.4 AT&FE0V1&C1&D2S95=47S0=0Askey, 14.4 AT&F&D0\N0\Q0"H0S95=1Askey, 33.6 AT&F1E0V1Q0=0&C1&D2&B1&A3Askey, 56k Flex Limited to 33.6 +ms=11,1Askey, 56k Flex Limited to 33.6 +ms=11,0,9600,33600
105
101 AST AST, ATS0=0E1Q0V1X4AST, 2400 / 9600 Fax AT&F&C1&D2&K3%C0AST, 4066 2400 bps AT&F\N0AST, 9600 Fax AT&F&C1&D2&K3%C0AST, Advantage 14.4 Int AT&F&C1&D2&K3%C0AST, Premium Exec Internal Data/Fax (MNP 5) AT&F&C1&D3\G0\J0\N3\Q2S7=60AST, Starbright AT&F&D2W2AST, Starbright 14.4 AT&F&C1&D2\N3W2AST, 28800 AT&4\N0%C0
105
102 ATI Technologies ATI, ATS0=0E1Q0V1X4ATI, 2400 AT&D2&C1X4V1Q0S7=70ATI, 2400etc AT&F1&C1&D2X6S9=10S10=180&Y0ATI, 2400etc AT&F1&B0&C1&D0&T5M0H0V1E0X2S2=1S0=0ATI, 2400etc AT&FN1Q0V1&C1&D2&G0&I0&J0&B0&K3&L0&P0&Q5&R0&S1&T4&X0S2=255S0=0&E1X40&Y0ATI, 2400etc MNP AT&C1&D2&K3ATI, 2400etc MNP AT&Q5&C1&U1&D0&T5M0H0W1X5V1E0S2=1S0=0ATI, 2400etc AT&F2&C1&D2S2=255W1&B1ATI, 2400etc AT&FW2&B1&C1&D3&K3&Q6&U1S7=60ATI, 2400etc V.42 AT&F2&C1&D2X6&Y0ATI, 9600 ETC AT&F&C1&D2&K3&U0ATI, 9600 ETC AT&FX4&Q0&C1&D2&K3ATI, 9600 ETC AT&F2&C1&D2X6&Y0ATI, 9600 ETC AT&FQ0V1X4W1&C1&D2&Q6&K3&O1&B1&R1&S0S0=0S2=255&T10&U1ATI, 9600 ETC AT&FV1Q0X4&C1&D2&Q6&U0W1ATI, 9600 ETC AT&F2&C1&D2X6&Y0ATI, 9600 ETC-E ATS0=0Q0V1W1X4&C1&D2&K3&U0ATI, 9600 ETC-E AT&D2&C1X4V1Q0S7=70W2&Q5&K3ATI, 9600 ETC-E AT&FW2&B1&C1&D3&K3&Q6&U1S7=60ATI, 9600 ETC-E ATS0=0E1V1X4W1&K0&N0&O0&Q0&U0M0&C0&D0ATI, 14.4 RPI AT&F&C1&D3&K3ATI, 14.4 RPI AT&F&C1&D3&K3+H3ATI, 14.4 AT&FW2&C1&D3&K3&Q5S7=60ATI, 14.4 PCMCIA ETC Express AT&FW2&C1&D2&K3&Q5S7=50ATI, 14.4 PCMCIA ETC Express AT&FW2&C1&D2&K3&Q5S7=60ATI, 14.4 PCMCIA ETC Express AT&F0S0=0Q0V1W0X4&C1&D2&K3&R0ATI, 14.4 ETC AT&D2&C1X4V1Q0S7=70W2&Q5&K3ATI, 14.4 ETC AT&FW1&C1&D3&K3&N1&Q6&U1S7=60ATI, 14.4 ETC AT&F2W1&C1&D3&K3&N1&Q6&U1S7=60ATI, 14.4 ETC Ext AT&F2W2&C1&D2&B1&K3&O1&Q6&U1ATI, 14.4 ETC-E AT&F2S0=0Q0V1W1X4&C1&D2&K3&U0ATI, 14.4 ETC-E AT&FX4&C1&D2&K3&Q5S95=1ATI, 14.4 ETC-I AT&F2S0=0Q0V1W1X4&C1&D2&K3&U0ATI, 14.4 ETC-I AT&F&U0&B1ATI, 14.4 ETC-I AT&FS0=0S2=255S7=40S37=0S36=1S89=62N1Q0S95=44V1X4W1&C1&D2&K3&Q5ATI, Vigor 2400 AT&F&E0N0S37=6ATI, Vigor 2400 AT&FS37=6S95=1N0ATI, Vigor 14.4 AT&F&C1&D2&K3ATI, Vigor 14.4 AT&F&C1&D2S0=0Q0V1&K3&Q5S10=50ATI, Vigor 14.4 AT&F&C1&D2X1W2&Q5&U0S37=11N0ATI, Vigor 14.4 AT&F2W2N1&E0&C1&D2&K3&Q6&U1S7=50 ATI, Vigor 14.4 AT&F2W2N1&E0&C1&D2&K3&Q6&U1S7=60 ATI, 19200/14400 ETC AT&F&C1&D2&K3%C0ATI, 19200/14400 ETC AT&F&C1&D2&K3&U0ATI, 19200 AT&F&U0&B1ATI, 19200 AT&D2&C1X4V1Q0S7=70W2S37=11&Q5&K3ATI, 19200 ETC AT&F&C1&D2&K3ATI, 19200 ETC AT&F1V1X4N1Q0W1&C1&D2&E1&B1&K3&Q6&N0&O0&U1S0=0S2=255S36=1S37=0S89=254S95=44ATI, 19200 ETC-E AT&F2S0=0Q0V1W1X4&C1&D2&K3&U0ATI, 19200 ETC-E Ext AT&F2W2&C1&D2&B1&K3&O1&Q6&U1ATI, 19200 ETC-E Ext AT&F2W2&C1&D2&B1&K3&O1&Q6&U1S7=55ATI, 19200 ETC-I AT&F2S0=0Q0V1W1X4&C1&D2&K3&U0ATI, 300 Series 19.2 AT&F&C1&D2&K3S46=136ATI, 28.8 AT&D2&C1X4V1Q0S7=70W2&Q5&K3
105
103 AT&T AT&T, AT&F&C1&D2AT&T, AT&F&C1&D2&K3&Q6\N3AT&T, ATS0=0E1Q0V1X4AT&T, AT&F&C1&D2\Q3\N3\J0AT&T, AT&F&C1&D2\N3\Q3\G0\J0AT&T, 2224 CEO AT&F&C1&D2\C1\G0\J0\N3\Q3\V1AT&T, Model 4000 2400 AT&D2&C1X4V1Q0S7=70AT&T, Model 4000 2400 AT&F&C1&D2&K3%C0AT&T, Model 4000 2400 ATZQ0V1X4F1AT&T, Model 4024 2400 ATS0=0Q0V1X1&C1AT&T, DataPort AT&F&C1&D2\Q3%C0AT&T, DataPort AT&FL1%C0V1X4&C1&D2AT&T, DataPort 9600 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3AT&T, DataPort 14.4 AT&F&C1&D2\Q3%C0AT&T, DataPort 14.4 AT\N7%C1&C1&D0AT&T, DataPort 14.4 AT&F&C1&D2\Q3AT&T, Dataport 14.4 AT&F\N0%C0AT&T, DataPort 14.4 AT&F0&D0\Q3S0=0AT&T, Dataport 14.4 AT\N7%C1&C1&D0\Q3AT&T, DataPort 14.4 AT&D2&C1X4V1Q0S7=70\G0\N7\Q3AT&T, DataPort 14.4 AT&FX6&C1&D2\N7\Q3%C1S7=60AT&T, DataPort 14.4 AT%B9600S41=3\C0&D2\G0\Q0\X1\D0\N0%C0AT&T, Dataport 14.4/FAX AT&F&C1&D2%C1X6\D1\N7\Q3AT&T, DataPort 14.4/FAX Ext AT&FX6&C1&D2\N7\Q3%C1S7=60AT&T, DataPort 14.4/FAX Int AT&FX6&C1&D2\N7\Q3%C1S7=60AT&T, DataPort 14.4 Model 2001 AT&D2&C1X4V1Q0S7=70\G0\N7\Q3AT&T, DataPort 14.4 PCMCIA AT&D2&C1X4V1Q0S7=70\G0\N7\Q3AT&T, DataPort Express 14.4 Ext AT&F&C1&D2\J0\N7\Q3%C1S7=60AT&T, DataPort Express 14.4 Int AT&F&C1&D2\J0\N7\Q3%C1S7=60AT&T, Dataport Express 14.4 AT&F&C1&D2\Q3%C0AT&T, DataPort Express 14.4 AT&F&C1&D2\J0\N7\Q3%C1S7=60AT&T, DataPort 19200 AT&F&C1&D2\Q3%C0AT&T, 1914 Q/V.32 Terbo AT&FX4AT&T, Paradyne Dataport 14.4 Fax AT&F&C1&D2X4AT&T, Paradyne Dataport Express 14.4 Fax AT&FAT&T, v.32/v.32bis Models AT&F0&D0\G0\N7\Q3\J0%C1S0=0AT&T, ComSphere 14.4 AT&F&C1S0=1E1AT&T, ComSphere 3800 14.4 AT&FX4AT&T, ComSphere 3800 14.4 AT&FX6&C1&D2\N5\Q3%C1"H3S7=60AT&T, Comsphere 3810 14.4 AT&F&C1&D2\Q3%C0"H0AT&T, Comsphere 3810 14.4 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3AT&T, Comsphere 3810 33.6 AT&F&C1&D2X6S0=0S7=90AT&T, Comsphere 3810, 3811, 3820, 3825 AT&F&C1&D2\Q3%C0"H0AT&T, Comsphere 3830 AT&F&C1&D2\Q3%C0"H0AT&T, ComSphere 3830 AT&FX6&C1&D2\N5\Q3%C1"H3S7=60AT&T, Comsphere 28.8 / 33.6 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3AT&T, KeepInTouch Express PCMCIA AT&F&C1&D1AT&T, KeepInTouch Express PCMCIA AT&FX6&C1&D2\N7\Q3%C1S7=60AT&T, KeepinTouch Express PCMCIA AT&F&C1&D2%C1X6\D1\N7\Q3AT&T, KeepInTouch Express PCMCIA 14.4 AT&F0&D0S0=0 AT&T, KeepInTouch Express PCMCIA 14.4 AT&F&C1&D2\Q3%C0AT&T, KeepInTouch Express PCMCIA 14.4 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3AT&T, KeepInTouch Express PCMCIA 28.8 AT&F&C1&D2\Q3%C0AT&T, KeepInTouch Express PCMCIA 28.8 AT&D2&C1X4V1Q0S7=70\G0\N7\Q3AT&T, v.34 Models AT&F0&D0S0=0AT&T, Paradyne KeepInTouch Express AT&FAT&T, Paradyne Comsphere 3800 AT&F&C1&D2\Q3%C0AT&T, Paradyne Comsphere 3800 AT&FQ0V1X6&C1&D2\Q3\N1AT&T, Paradyne Comsphere 3820 AT&F&C1&D2\N5\D1\Q3AT&T, Paradyne Comsphere 3820 AT&F0X4Z3&C1&D3\D3\G1\N5%C1S7=60AT&T, Paradyne Comsphere 3820 AT&F0X6&C1&D2\N5\Q3%C1"H3S7=60AT&T, Paradyne Comsphere 3820 AT&F&C1&D2\Q3%C0"H0AT&T, DataPort 28.8 AT&F&C1&D2\Q3%C0AT&T, DataPort 28.8 AT&D2&C1X4V1Q0S7=70\G0\N7\Q3AT&T, DataPort 28.8 AT&FX6&C1&D2\N7\Q3%C1S7=60 AT&T, DataPort PCMCIA 28.8 AT&D2&C1X4V1Q0S7=70\G0\N7\Q3AT&T, Dataport Express 28.8 AT&F%C0AT&T, DataPort 33.6 AT&F&C1&D2\Q3%C0AT&T, Paradyne Dataport Express 288 V.34 AT&FAT&T, 28.8 AT&FS0=0V1E1X6\Q3\N7%C1M0&C1&D0AT&T, 33.6 Fax AT&F&C1&D2\Q3%C0
105
104 AusLinx, Austin, Automark, Aztech, Avatech AusLinx, AT&F&C1&D2E1V1W1S0=0S7=0S10=25S91=13S92=1AusLinx, Kookaburra AT&FW2&C1&D2&K3&Q5lS7=60S36=7S46=138S48=7S91=13S95=0AusLinx, Tasmanian Devil AT&FW2&C1&D0&K3&Q5lS7=60S36=7S46=138S48=7S91=13S95=0Austin, Fax/Data AT&FW2X4&C1&D3&K3&Q5\J0\N3%C3S7=60Automark, 14.4 AT&FX1&D2&C1&K3E1\N3%C0Automark, 28.8 AT&FX1&D2&C1&K3E1\N3%C0Avatech, 2400 AT&D2&C1X4V1Q0S7=70Aztech, AT3500 AT&FE1Q0X3&C1&D2&K3M1S2=255Aztech, 56k Flex limited to 33.6 +ms=11,1Aztech, 56k Flex limited to 33.6 +ms=11,0,9600,33600
105
105 Avtek Avtek, 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3Avtek, CD760 AT&F&K3&D2S0=0X4W2S95=45Avtek, CD930 AT&FB15\N3&K3&D2%C0Avtek, Mega Data/Fax AT&F+C61B0X1&C1&P1S6=4V1S0=0S7=60Avtek, Mega DataFax 14.4 AT&FS0=0V1X3&K3&D2Avtek, MegaModem 1234 AT&FS0=0V1X3Avtek, MegaPlus Fax 28.8 AT&FS0=0S7=60&K3&D2X3\N3-K0Avtek, MegaPlus Fax V.32 AT&F&D2&C1Avtek, MegaPlus Fax V.32bis AT&F\N3%C0&K3&D2&C1Avtek, MegaPlus Fax V.34 AT&F+MS=74,1,300,28800s0=0S7=60&K3&D2X3\N3-K0Avtek, MegaPlus V.32 AT&FS0=0S7=60&K3&D2X3Avtek, MegaPlus V.32bis AT&F\N3%C0&K3&D2&C1Avtek, MegaPlus V.34bis AT&F\N3%C0&K3&D2&C1Avtek, MegaPlus Voice AT&FS0=0S7=60&K3&D2X3\N3-K0Avtek, MegaPlus Voice 14.4 AT&D2X3S7=70Avtek, MegaPlus Voice 14.4 AT&FS0=0S7=60&K3&D2X3\N3-K0Avtek, MegaPlus Fax 1234 AT&fs0=0s7=60&k3&d2x3\N3-K0Avtek, MegaPlus V32b CD920 AT&FS0=0S7=60&K3&D2X3#K0Avtek, MegaPlus V32b CD950 AT&FS0=0S7=60&K3&D2X3\N3-K0Avtek, MegaPlus Fax 14.4 CD720 AT&D2S7=70 Avtek, MegaPlus Fax 14.4 CD920 AT&D2S7=70Avtek, MegaPlus Fax 14.4 CD930 AT&D2X3S7=70Avtek, MegaPlus Fax V.32b CD930 AT&FS0=0S7=60&K3&D2X3#K0 Avtek, MegaPlus Fax 14.4 CD960 AT&D2X3S7=70 Avtek, MegaPlus Fax V.32b CD960 AT&FS0=0S7=60&K3&D2X3\N3-K0Avtek, Megaplus Fax 14.4 CD990 AT&D2S7=70W1Avtek, Mega 14.4 CD1000 AT&D2&C1X4V1Q0S7=70Avtek, Mini Pocket Fax AT&F+C61B0X1&C1&P1S6=4V1S0=0S7=60Avtek, MiniPocket V32b CD980 AT&FS0=0S7=60&K3&D2X3#K0Avtek, Flash CD1500 28.8 AT&D2X3V1Q0S7=70Avtek, Flash CD1050 28.8 AT&D2X3V1Q0S7=70Avtek, MegaPlus Fax CD740 28.8 AT&D2X3S7=70Avtek, Megaplus Fax CD740 28.8 AT&F%E2S7=60-K0X3&D2S0=0Avtek, Megaplus Fax CD990 28.8 AT&F&D2&K3X3-K0Avtek, V.34 28.8 Data/Fax AT&F&D2&C1&K3%C0\N3X3
105
106 Banksia Banksia AT&FX4&C1&D2%C0S95=9Banksia, AT&F&C1&D2E1V1Q0S0=0S7=60S95=0W2Banksia, 14.4 ATX4&C1&D2&K3&T5\N3S0=0Banksia, 14.4 AT&D2&C1X4V1Q0S7=70Banksia, Blitzer 14.4 AT&D2&C1V1Q0S7=70W2Banksia, MyModem 14.4 AT&F&K3&D2&C1\N3%C0Banksia, MyModem 14.4 AT&FE1Q0V1X4&C1&D3Banksia, PCM 14.4 AT&F&K3&D2&C1\N3%C0Banksia, PCM 14.4 AT&FE1Q0V1X4&C1&D3W2&K3 &Q5\N3%C3S7=60 Banksia, 28.8 AT&D2&C1X4V1Q0S7=70Banksia, Deskporte 28.8P AT&F&Y0&C1&D2Banksia, Deskporte 28.8S AT&F&C1&D2S0=0S7=60Banksia, MyFastModem 28.8 AT&FE1Q0V1X4&C1&D3Banksia, MyFastModem 28.8 AT&F&C1&D2%E2&K3S10=60Banksia, PCM 28.8 AT&F&C1&D3%C3%G0\J0-M0\N6\Q2\V2S7=60Banksia, HC Modem 33.6 AT&F%C0S95=0W2Banksia, MyVoiceModem 33.6 AT&F&C1&D2&K3%C0Banksia, MyVoiceModem 33.6 AT&F&C1&D2E1V1Q0S0=0S7=60S95=0W2&K3%C0Banksia, PCMCIA 28.8 AT&F%C0Banksia, PCMCIA 33.6 AT&F&C1&D2M0E1V1Q0S0=0S7=60S95=0W2Banksia, Wave Modem SP 33.6 AT&F%C0-SMS=0Banksia, Wave Modem SP 33.6 AT&F&C1&D2Q0V0S0=0S7=60S95=0W2Banksia, Wave Modem SP 56k AT&F&C1&D2Q0V0S0=0S7=60S95=0W2Banksia, Wave Modem SP 56K Flex AT&FS95=0W0Banksia, Wave Modem SP 56K Flex AT&F%C0S95=0W2+MS=56,1,300,52000Banksia, Wave Modem SP 56K V.90 AT&F%C0S95=0W2+MS=12,1,19200,45333
105
107 Bausch, BEC. Bitcomm, Black Box, BSM, BT Bausch Datacom, 3522 AT&F\Q3\N3\J0\V1\C1BEC, 14.4 ATI Fax AT&F&C1&D2S95=1BEC, 14/14i AT&F&C1&D2&K3%C0BEC, 28.8i AT&F&C1&D2S95=1Bitcomm, AT&F&C1&D2&K0&Q0S37=9N0W2%C0Bitcomm, AT&F&C1&D2&K3&Q6\N0S37=11N0W2%C0Bitcomm, 14.4 AT&FB0\N5%C1F10Bitcomm, Bit Blitzer 2400 AT&C1&D2E0V1M0S2=1S0=0S6=1S10=1X1Bitcomm, BitSurfer V.32bis Data/Fax AT&FW2X4&C1&D3&K3&Q6S7=60Black Box All-In-One V.32 ATV1Q0X4&C1&D2\N3\V0Black Box 144FX/144FX-PC AT&F&C1&D2&K3&Q5\N3S95=43BSM, ATS0=0E1Q0V1X4BSM, 14.4 Quik Com MNP AT&D2&C1X4V1Q0S7=70\N3\Q3\J0BSM, Quik Com MNP AT&F\Q3\J0\N3%C1&C1&D2BSM, Quik Com MNP ATS0=0E1Q0V1X4&K3BT, ATS0=0E1Q0V1X4BT, 9600 ATZ&C1&D2&K3BT, 9600 AT&F&C1&D2&K3BT, V.32 ATS0=0Q0V1E1&EO&K0 Bullet, 14.4 ATS0=0E1Q0V1X4Bullet, ModemMan, 9600 AT&D2&C1X4V1Q0S7=70$E0
105
108 Best Data Best Data, AT&F&C1&D2S11=60l3Best Data, AT&F1&C1&D2&K3%C0Best Data, 2400/2400Fax Modem AT&F&C1&D2Best Data, 2400/2400Fax Modem AT&F&C1&D2W2Best Data, 2400/2400Fax Modem AT&Q5%C1&C1&D0&K0Best Data, 2400/2400Fax Modem AT&F&C1&D2&K3\N0\N7%C0"H0\N7%C1"H3Best Data, 2400B AT&F&C1&D2S11=60L3Best Data, 2400X AT&F&C1&D2S11=60L3Best Data, Smart One 2834F/FX AT&F0Q0X1&K3%C3\N3&D2Best Data, Sendfax 4800 ATQ0V1X4&C1&D2&S0Best Data, Sendfax 4800 AT&F&C1&D2&K3Best Data, Ace 5000 DSP (IBM Mwave DSP) AT&F&D0&K3&Q5S0=0Best Data, ACE 5000 AT&F&C1&D2Best Data, ACE Multimedia Fax/Modem AT&F&C1&D2&K3\N0\N7%C0"H0\N7%C1"H3Best Data, Smart One ACE 5000 AT&F&C1&D2&K3\N7%C0"H0Best Data, Smart One ACE 5000 AT&F&C1&D2\N7%C0"H0Best Data, 9624X AT&F&C1&D2Best Data, 9624X AT&F&C1&D2W2Best Data, 9624X AT&F&C1&D2&K3Best Data, 9624FQ AT&F&C1&D2Best Data, 9624FQ AT&F&C1&D2W2Best Data, 9624FQ AT&Q5%C1&C1&D0&K0Best Data, 9624FQ AT&F&C1&D2&K3Best Data, 9642 AT&F&C1&D2W2Best Data, 9648FX AT&F&C1&D2S11=60L3Best Data, 9648FX AT&F&C1&D2&K3Best Data, 9624FXMAC AT&F&C1&D2S11=60L3Best Data, 9624FX AT&F&C1&D2S11=60L3Best Data, 9624FX AT&F&C1&D2&K3Best Data, 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3Best Data, 14.4 AT&FX1&D2&C1&K3\N3%C0Best Data, 14.4 (RPI) AT&D2&C1X4V1Q0S7=70W2Best Data, 14.4 (RPI) AT&F&C1&D3&K3+H3 Best Data, 14.4 Mwave DSP AT&D2&C1X4V1Q0S7=70\N7\Q3Best Data, 14.4FX (RPI) AT&F\V1Best Data, 1442 AT&F&C1&D2W2Best Data, 1442F AT&F&C1&D2&K3&Q5%C0&Q5%C3\N0Best Data, 1442VLXMAC AT&F&C1&D2S11=60L3Best Data, C1442VLX AT&F&C1&D2S11=60L3Best Data, 1442FC AT&F\V1Best Data, 1442FLX AT&F&C1&D2S11=60L3Best Data, 1442FLXMAC AT&F&C1&D2S11=60L3Best Data, 1442FX AT&F\V1Best Data, 1442FX AT&F&C1&D2S95=1Best Data, 1442FX AT&F&C1&D2&K3\N0 Best Data, 1442FXMAC AT&F&C1&D2S11=60L3Best Data, 1442FQ AT&F&D2&C1S95=1+H3Best Data, 1442FT AT&F&D2&C1S95=1+H3Best Data, 1442FTX AT&F&D2&C1S95=1+H3Best Data, 1442VFC AT&F&C1&D2S11=60L3Best Data, 1442VFT AT&F&D2&C1S95=1+H3Best Data, 1442VLXMAC AT&F&C1&D2S11=60L3Best Data, 28.8 v.34 AT&F&C1&D2\N3S95=1Best Data, 28.8 v.34 AT&F&C1&D2&S1Best Data, 28.8 v.34 ATX4&C1&D2E1Best Data, 28.8 v.34 AT&F&C1&D2S11=60L3Best Data, 28.8 v.34 AT&F&C1&D2\N3Best Data, 28.8 v.34 AT&F&C1&D2Best Data, 28.8 v.34 AT&D2&C1X4V1Q0S7=70W2\N3&K3Best Data, 28.8 v.34 AT&FX3&C1&D2&K3\N3%C0Best Data, Smart One AT&F&K3X4S95=3Best Data, Smart One AT&F&K3X4S95=3&Q5N1Best Data, Smart One AT&F&K3X4S95=3&Q6N1 Best Data, Smart One 9600 AT&F&C1&D2&K3%C0Best Data, Smart One 9600 AT&F&C1&D2&K3%C0Best Data, Smart One 9624 AT&F&C1&D2W2Best Data, Smart One 9624FQ RPI AT&F&C1&D2&K3%C0Best Data, Smart One 14.4 AT&F&D2Best Data, Smart One 14.4 AT&F&D0Best Data, Smart One 14.4 AT&F&C1&D2Best Data, Smart One 14.4 AT&Q5%C1&C1&D0&K0Best Data, Smart One 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3Best Data, Smart One 14.4 RPI AT&FW2&C1&D3&K3S7=50Best Data, Smart One 1442 F AT&F&C1&D2S95=1Best Data, Smart One 1442F AT&F&C1&D2&K3%C0Best Data, Smart One 1442F AT&F&C1&D2S7=50Best Data, Smart One 1442F AT&F&C1&D2&K3&Q5%C0&Q5%C3\N0Best Data, Smart One 1442FC - Int AT&F&D0&K3&Q5S0=0Best Data, Smart One 1442FLX - Ext AT&F&D0&K3&Q5S0=0Best Data, Smart One 1442FLXMAC AT&F&D0&K3&Q5S0=0Best Data, Smart One 1442FQ AT&F0W2V1X4&K3S7=50Best Data, Smart One 1442FQ - Int(w/WinRPI) AT&F&D0&K3+H3S95=1S0=0Best Data, Smart One 1442FQ AT&F&C1&D2&K3%C0Best Data, Smart One 1442FQ Int AT&FW2&C1&D2&Q6&K3S7=60S36=7S46=2S48=7Best Data, Smart One 1442FQ Int AT&F&D2&C1S95=1+H3Best Data, Smart One 1442FX 14.4 AT&D2&C1X4V1Q0S7=70\N3&K3Best Data, Smart One 1442FX 14.4 AT&FW2&C1&D3&K3&Q5%C3\N3S7=60S36=7 S46=138S95=47S0=1Best Data, Smart One 1442VF - Int AT&F&D0&K3&Q5S0=0Best Data, Smart One 1442VF-01 AT&F&C1&D2S7=50Best Data, Smart One 1442VLX - Ext AT&F&D0&K3&Q5S0=0Best Data, Smart One 1442VLXMAC AT&F&D0&K3&Q5S0=0Best Data, Smart One 2834 AT&F&C1&D2S11=60L3Best Data, Smart One 2834 AT&FX4&C1&D3&K3\N3%C3S7=60Best Data, Smart One 2834FX AT&F0Q0X1&K3%C3\N3&D2Best Data, Smart One 2834FLX AT&F\N3N1&C1W2&D3%C3M1S7=60Best Data, Smart One 2834FLX - Ext AT&F&D0&K3&Q5S0=0 Best Data, Smart One 2834FX - Int AT&F&D0&K3&Q5S0=0 Best Data, Smart One 2834VLX - Ext AT&F&D0&K3&Q5S0=0 Best Data, Smart One 2834VLXMAC AT&F&D0&K3&Q5S0=0 Best Data, Smart One 2834VF - Int AT&F&D0&K3&Q5S0=0Best Data, Smart One 28800 AT&F&C1&D2&K3%C0 Best Data, Smart One 28.8 FLX AT&F1\N3N1&C1W2&D2%C3M1S7=50Best Data, Smart One 28.8 VF AT&F1\N3N1&C1W2&D2%C3M1S7=60 Best Data, Smart One 28.8 VLX AT&F1\N3N1&C1W2&D2%C3M1S7=60 Best Data, Smart One Pro 288LXDSVD/288LXSP Ext AT&F&D0&K3&Q5S0=0Best Data, Smart One 9624FQ - Int (w/WinRPI) AT&F&D0&K3+H3S95=1S0=0Best Data, Smart One 336FLX AT&F&C1&D2L3S95=3S11=55Best Data, Smart One 336FLX Mac AT&F0L1Best Data, Smart One 33.6 AT&F&C1&D2Best Data, Smart One 33.6 AT&F&C1&D2&K3%C0Best Data, Smart One 33.6 AT&D2&C1X4V1Q0S7=70W2\N3&Q5&K3Best Data, Smart One 33.6FLX AT&F&C1&D2L3S95=3S11=55Best Data, Smart One 33.6FLX (Mac OT/PPP) AT&F0L1Best Data, Smart One External V.Fast AT&F&C1&D2&K3Best Data, Smart One External V.Fast AT&F&C1&D2&K3&Q5%M0Best Data, Smart One Internal V.Fast AT&F&C1&D2&K3&Q5%C0Best Data, Smart One Internal V.Fast AT&F&C1&D2&K3 Best Data, 2834FLXMAC AT&F&C1&D2S11=60L3 Best Data, 2834VLXMAC AT&F&C1&D2S11=60L3Best Data, 2834VLX AT&F&C1&D2S11=60L3Best Data, 2834FLX AT&F&C1&D2S11=60L3Best Data, 2834FXMAC AT&F&C1&D2S11=60L3Best Data, 2834FX AT&F&C1&D2S11=60L3Best Data, 2834VF AT&F&C1&D2S11=60L3Best Data, RS2834SP AT&F&C1&D2S11=60L3Best Data, RS2834SPX AT&F&C1&D2S11=60L3Best Data, RS2834SP-PNP AT&F&C1&D2S11=60L3Best Data, RS2834SVDSPX AT&F&C1&D2S11=60L3Best Data, RS2834SVDSP AT&F&C1&D2S11=60L3Best Data, RS2834SVDSP-PNP AT&F&C1&D2S11=60L3Best Data, RS2834F AT&F&C1&D2S11=60L3Best Data, RS2834F-PNP AT&F&C1&D2S11=60L3Best Data, RS2834VF AT&F&C1&D2S11=60L3Best Data, RS2834VF-PNP AT&F&C1&D2S11=60L3Best Data, 2834F AT&F&C1&D2S11=60L3Best Data, 28.8 AT&D2&C1X4V1Q0S7=70W2\N3&K3Best Data, 336VLX AT&F&C1&D2S11=60L3Best Data, 336FLX AT&F&C1&D2S11=60L3Best Data, 336FLX AT&F&C1&D2L3S95=3S11=55 Best Data, 336FLX AT&C1&D2&K3+H3S95=1S7=60Best Data, 336VF AT&F&C1&D2S11=60L3Best Data, 336SP AT&F&C1&D2S11=60L3Best Data, 336F AT&F&C1&D2S11=60L3Best Data, ESP200 AT&F&C1&D2S11=60L3Best Data, 56K Mach-2 (X2) AT&F&C1&D2S11=60L3Best Data, 56K Flex AT&F&C1&D2S11=60L3Best Data, 56K Data/Fax AT&FN1W2X4&C1&D3&K3&Q5%C3\N3S7=60
105
109 Boca Research Boca, AT&F\N0%C0 Boca, AT&F&K0S37=9N0&D0&Q0\G0\N0 Boca, 2400 V.42bis AT&F&C1&D2\Q3\N3\J0\V1 Boca, 2400 w/ V.42bis AT&F&C1&D2\Q3%C0 Boca, M2400i AT&F3&C1&D2 Boca, M1440 AT&F&C1&D2&K3%C0 Boca, M1440 ATS0=1N0F8&K0%C0\N0\J0 Boca, M1440 AT&F&C1&D2&K3S46=136 Boca, M1440i int ATS48=0S37=9S46=136%C0%E0%M0&K0&Q0&R1&C1&D2\G0\N1N0 Boca, 14.4 ATS46=0S37=9N0&Q0&D2&K0%C0 Boca, 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Boca, 14.4 AT&F&C1&D2\N3S95=1 Boca, 14.4 AT&F&C1&D2&K3%C1%E1\N3S95=47 Boca, 14.4 ATZS46=136S37=9%C0N0 Boca, 14.4 int AT&C0N0S37=9&K0W0&Q0S36=3S48=128%C0 Boca, 14.4 ext AT&FS0=1S36=0&K0&Q6N0S37=9&D2 Boca, 14.4 Fax ATS46=0S37=9N0&Q0&D2&K4 Boca, 14.4 V.32bis AT&F&C1 Boca, 14.4 V.32bis AT&F&C1\N3 Boca, 14.4 V.32bis AT&Q5%C1&C1&D0&K3 Boca, 14.4 V.32bis AT&F&C1&D2&K3%C0 Boca, 14.4/V.32bis (V.42bis) AT&FW2&C1&D3&K3&Q5%C1\N3S7=60S36=7S46=138S95=47 Boca, 14.4/V.32bis (V.42bis) AT&FW2&C1&D3&K3&Q5%C1\N3S7=60S36=7S46=138S95=47 Boca, 14.4 PCMCIA AT&FX4S95=1 Boca, 14.4 Pocket Modem AT&F&C1&D2&K3%C0 Boca, 14.4 CELLcard PCMCIA AT&F&C1&D2&K3%C0 Boca, 14.4 Ultra Performance AT&F&C1&D2&K3%C0 Boca, 14.4 Online Express AT&F&C1&D2&K3%C0 Boca, 14.4 Online Express AT&F&D0S0=0 Boca, Sound Expression 14.4VSp AT&F&D0\J0\Q3S0=0 Boca, Sound Expression 14.4SRS AT&F&D0&K3S0=0 Boca, Multimedia 14.4 AT&F&C1&D2S95=1 Boca, Complete Communicator 14.4 AT&F&C1&D2&K3%C0 Boca, Complete Communicator Gold Int AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47 Boca, Complete Office Communicator AT&F&D0\Q3S0=0 Boca, V.32bis AT&Q5%C1&C1&D0&K3 Boca, V.32bis AT&Q5%C0&C1&D2&K3 Boca, COMBOcard PCMCIA AT&F&C1&D2&K3%C0 Boca, CELLcard PCMCIA 28.8 AT&F&C1&D2&K3%C0 Boca, Starion MV.34 28.8 AT&F&C1&D2&K3%C0 Boca, MV28KE AT&F&C1&D2\N3S95=1 Boca, MV34E AT&FW2&C1&D2S95=1 Boca, MV34I AT&FW2&C1&D2S95=1 Boca, MV288KI AT&F&C1&D2\N3&S1 Boca, MV28KE AT&FE0V0L1N1Q0X4W0 Boca, MV28KE AT&C1&D3&K3&Q5&S0%E2 Boca, MV28KE ATS0=1S2=255S7=60S95=2 Boca, MV28KE AT&F&C1&D2\N3S95=1 Boca, MV28KE AT&FS0=0S30=0E1Q0V1X4&C1&D2&K3\G0%C0 Boca, MV28KI AT&F&Q6%C0\N0 Boca, MV28KI AT&F%C3E1/N3S11=50+MS=11,1,14400,28800 Boca, MV28KI AT&F&C1&D2\N3S95=1 Boca, MV28KI AT&FS0=0S30=0E1Q0V1X4&C1&D2&K3\G0%C0 Boca, V.Fast Class 28.8 AT&F&C1&D2&K3%C0 Boca, V.Fast Class AT&F&C1&D2&K3&Q5\N3%C3S7=60S95=47 Boca, V.Fast Class AT&F&C1&D2&K3&Q5\N3%C3S7=60S95=47 Boca, V.34 AT&F&C1&D2&K3 Boca, V.34 AT&F&C1&D2&K3W2X4S95=3 Boca, V.34 AT&F&C1&D2&K3W2X4S95=3&Q5 Boca, V.34 AT&F&C1&D2&K3W2X4S95=3&Q6 Boca, V.34 28.8 AT&F&D0&Q5\N3S0=0 Boca, V.34 Ext AT&FW2&C1&D2&K3&Q5\N3%C3S7=60S95=47 Boca, V.34 Int AT&FW2&C1&D2&K3&Q5\N3%C3S7=60S95=47 Boca, V.34 Office Communicator AT&F&C1&D2&K3%C0 Boca, V.34 Fast Mac AT&F&D0S0=0 Boca, V.34 Fast Mac AT&F&C1&D2&K3%C1%E1S95=47 Boca, Sound Expression v.34SVD AT&F&D0&K3S0=0 Boca, Sound Expression v.34SRS AT&F&D0&K3S0=0 Boca, 28.8 / 33.6 AT&F&C1&D2\N0%C0 Boca, 28.8 / 33.6 AT&F&C1&D2&K3%C0 Boca, 28.8 / 33.6 AT&F&D0X4W2S95=3 Boca, 28.8 / 33.6 AT&F&D0X4W2S95=3&Q5 Boca, 28.8 / 33.6 AT&F&D0X4W2S95=3&Q6 Boca, 28.8 / 33.6 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Boca, 28.8 / 33.6 Int AT&F&CI&D2 Boca, MD56I AT&FW2&C1&D2&K3&Q5N3%C3S7=60S95=47L2+MS=56,0,9600,56000 Boca, 56kflex uses the Rockwell chipset, just use the generic rockwell flex strings.
105
111 Silicon Integrated Systems Corporation (SIS) http://www.sis.com 103
112 VIA Technologies, INC. http://www.viaarena.com 103
113 Intel Corporation http://www.intel.com 103
114 Calcom Calcom, ATS0=0E1Q0V1X4Calcom, 9600 AT&F&C1&D2&K3%C0Calcom, 9600 AT&F&C1&D2&K3Calcom, 14.4 AT&F&C1&D2&K3Calcom, 14.4 AT&F&C1&D2&K3%C0Calcom, 14.4 AT&F2\N3Calcom, 14.4 AT&F&C1&D2S7=90S0=0Calcom, 14.4 AT&F&C1&D3&K3&M5\N5\Q3\V1%C1S7=60S36=7S46=138S48=7S95=47Calcom, 14.4 v.32bis AT&D2&C1X4V1Q0S7=70\N3&K3Calcom, 14.4VF AT&F&C1&D2&K3%C0Calcom, 14.4VF AT&F&C1&D2%C0Calcom, 14.4 V.32bis AT&D2&C1X4V1Q0S7=70\N3&K3Calcom, 14.4 Ext AT&F&C1&D3&K3\N5S7=60S36=7S46=138S95=47Calcom, 14.4 Int AT&F&C1&D3&K3\N5S7=60S36=7S46=138S95=47Calcom, 14.4 Ext AT&F&C1&D3&K3\N5S7=60S36=7S46=138S95=0Calcom, 1442 AT&FCalcom, 1442F AT&F&C1&D2&K3%C0Calcom, 1442F AT&F&C1&D2%C0Calcom, 1442VF AT&FCalcom, PC1414MX AT&FS0=0S7=60E1Q0V1X4&M5&K3%C0Calcom, 2842 AT&FX4S95=1Calcom, 28.8EX V.42 AT&F&C1&D2&K3%C0Calcom, 28.8EX V.42 AT&F&C1&D2&K3\N3%C0Calcom, 28.8F V.42 AT&F&C1&D2&K3%C0Calcom, 28.8F V.42 AT&F&C1&D2&K3\N3%C0Calcom, 33.6F V.42 AT&F&C1&D2&K3%C0Calcom, 33.6F V.42 AT&F&C1&D2&K3\N3%C0
105
115 Cambridge, Cermetek, Charter Pacific, Cleo AllSync, Codex, CommaCorp Cambridge Computers, 1414VH AT&FCambridge Computers, 1414VQC PCMCIA AT&FCambridge Computers, 1428 VQE AT&FX4S95=1Cambridge Computers, 1428 VQH AT&FX4S95=1Cermetek, 2400 AT&D2&C1X4V1Q0S7=70Charter Pacific, AT&F&C1&D2S95=0W2Cleo AllSync, 3780+ AT&D2&C1X4V1Q0S7=70\Q2%C1\C2\N1Codex 2264 AT&F&C1&D2*FL3*SM0Codex 2264 ATQV1X4&C1&D2&S1*XC1*FL3*SM1Codex 3220 AT&F&C1&D2*FL3*DC0Codex 3260 /3261 /3262 /3263 /3265 AT&F&C1&D2*FL3*DC0Codex 3260 AT&FL1&C1&D2*DC0Codex V.34R AT&F&C1&D2*FL3*DC0CommaCorp, 3242 (rebadged Spirit II) AT&F*Q0*E0S9=6
105
116 Cardinal Cardinal, 2400 AT&D2&C1X4V1Q0S7=70Cardinal, 2400 V42 AT&F&C1&D2\N3\Q3\J0\C2\V2Cardinal, 2450 V42 AT&F&C1&D2\N3\Q3\J0\C2\V2Cardinal, 9600 AT&F&C1&D2S95=1 Cardinal, 9600 AT&F&C1&D2Cardinal, 9600 AT&F&C1&D2&H1&I1&M4 Cardinal, 9600 AT&D2&C1X4V1Q0S7=70\G0&Q5&K3Cardinal, 9600 V.42 AT&F&C1&D2S95=41Cardinal, 9650 V.42 AT&F&C1&D2S95=41Cardinal, 14.4 (V.42bis) AT&F&C1&D3&K3&Q5\N3%C1%M3S7=60S46=138S48=7S95=47 Cardinal, 14.4 AT&F&C1&D2&K3%C0Cardinal, 14.4 AT&F&C1&D2&Q5S95=1Cardinal, 14.4 AT&F&C1&D2X4Cardinal, 14.4 AT&F&C1&D0&Q5 Cardinal, 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Cardinal, 14.4 int ATK3n0w0s95=0&q0s37=9s46=136s48=128s36=1Cardinal, 14.4 (RPI) AT&D2&C1X4V1Q0S7=70W2 Cardinal, 14.4 V32bis AT&D2&C1X4V1Q0S7=70\N3&K3 Cardinal, 14.4 V32bis AT&F&C1&D2S95=41Cardinal, 14.4 V32bis AT&FN0S37=9&Q0&D2\N1Cardinal, 14.4k fax v.42 bis AT&FW0&Q0&D2Cardinal, 14450 V32bis AT&F&C1&D2S95=41Cardinal, 14.4 DSP AT&FCardinal, 14.4 PCMCIA AT&F&C1&D2S95=1 Cardinal, 14.4 PCMCIA Fax AT&F0&C1&D2&K3%C0Cardinal, Accelerator 14.4 AT&F&D2X1 Cardinal, Fax 14.4 AT&F&C1&D2&Q5S95=1 Cardinal, 19.2 AT&D2&C1X4V1Q0S7=70W1\N3Cardinal, 19.2 Terbo AT&F&C1&D2&Q5S95=1Cardinal, 19.2 Terbo AT&F&C1&D2&K3%C0Cardinal, 19.2 Terbo AT&F&C1&D2Cardinal, 28.8 Fax AT&FX1&K3\G0%C3&D2Cardinal, 28.8 / 33.6 AT&F&C1&D2&K3%C0Cardinal, 28.8 / 33.6 AT&D2&C1X4V1Q0S7=70W2\N3&K3Cardinal, 28.8 / 33.6 AT&F&C1S0=1E1Cardinal, 28.8 / 33.6 AT&F&D0&K3&Q5S0=0Cardinal, 28.8 / 33.6 AT&FW2&C1&D3&K3&Q5%C3S7=60Cardinal, 28.8 V.34/V.FC AT&D2&C1X4V1Q0S7=70W2\N3&K3Cardinal, MB14400SR AT&FS0=0E1Q0V1X4&C1&D2S95=3Cardinal, MB2210/MB2450 AT&F&C1&D2\N3\Q3\J0\C2\V2Cardinal, MB2250F AT&FS0=0E1Q0V1X4&C1&D2S95=3Cardinal, MB2296F AT&FS0=0E1Q0V1X4&C1&D2S95=3Cardinal, MB2296SR AT&F&C1&D2\N3\Q3\J0\C2\V2Cardinal, MVP Series AT&FS0=0E1Q0V1X4&C1&D2S95=3Cardinal, MVP144DSP-C AT&F&D0&K3&Q5S0=0 Cardinal, MVP144DSP-C AT&FW1&C1&D3&K3&Q5\N5%C1S7=60 Cardinal, MVP144DSP-C AT&F&C1&D2Cardinal, MB9650SR AT&FS0=0E1Q0V1X4&C1&D2S95=3Cardinal, MVP144C2 PCMCIA AT&F&C1&D2Cardinal, MVP144C2 PCMCIA AT&FW2&C1&D3&Q5&K3%C3\N3&Q5S46=138S7=50Cardinal, MVP144DSP AT&F&C1&D2Cardinal, MVP144DSP AT&F&D0&K3&Q5S0=0 Cardinal, MVP144DSP AT&F&C1&D2\N5 Cardinal, MVP144DSP AT&FW1&C1&D3&K3&Q5\N5%C1S7=55Cardinal, MVP144DSP AT&FW1&C1&D3&K3&Q5\N5%C1S7=60Cardinal, MVP144I AT&F&C1&D2&K3+H3S95=1Cardinal, MVP144I AT&FW2&C1&D2&Q6&K3S7=50Cardinal, MVP144I AT&FW2&C1&D2&Q6&K3S7=60Cardinal, MVP144IV2 AT&F&C1&D2S95=1Cardinal, MVP144WIN 14.4/19.2 AT&F&C1&D2\N2Cardinal, MVP144WIN AT&F&C1&D2S7=50Cardinal, MVP144XF (RPI) AT&F&C1&D3&K3+H3Cardinal, MVP144XF (RPI) AT&FW2&C1&D3&K3&Q6S7=50Cardinal, MVP144XV2 AT&F&C1&D2S95=1Cardinal, MVP1921 AT&FS0=0E1Q0V1X4&C1&D2S95=3Cardinal, MVP1921 AT3l2&K3&D2%E1S95=45W2C1\N3%C1Cardinal, MVP1921 ATX3L2&K3&D2%E1S95=45W1C1\N3%C1Cardinal, MVP288 Series AT&F&C1&D2Cardinal, MVP288 AT&F&C1&D2&K3%C0Cardinal, MVP288 AT&F&C1&D2Cardinal, MVP288C2 PCMCIA AT&FW2&C1&D3&Q5&K3%C3\N3&Q5S46=138S7=60Cardinal, MVP288I AT&F&C1&D2Cardinal, MVP288I AT&F&C1&D2\N5Cardinal, MVP288I AT&F&C1&D2S95=1Cardinal, MVP288I AT&F&D0&K3&Q5S0=0Cardinal, MVP288I AT&FW2&C1&D2&K3&Q5\N3%C3S7=50Cardinal, MVP288I AT&FW2&C1&D2&K3&Q5\N3%C3S7=60Cardinal, MVP288I AT&F&D0&K3&Q5S0=0 Cardinal, MVP288I AT&F&C1&D2S95=1 Cardinal, MVP288IS AT&F&C1&D2S95=1Cardinal, MVP288IV AT&F&C1&D2\N5Cardinal, MVP288IV2 AT&FW2&C1&D3&K3&Q5\N3%C3S7=50S46=138S95=47Cardinal, MVP288XF AT&F\N0%C0Cardinal, MVP288XF AT&F1%C3\N5Cardinal, MVP288XF AT&FW2&C1&D2&K3&Q5\N3%C3S7=50Cardinal, MVP288XF AT&FW2&C1&D2&K3&Q5\N3%C3S7=60Cardinal, MVP288XF AT&F&D0&K3&Q5S0=0Cardinal, MVP288XF AT&F\N0%C0Cardinal, MVP288XF AT&F&D0X4S95=3Cardinal, MVP288XF AT&F&D0X4S95=3\N3%C3MS=11Cardinal, MVP288XF AT&FW2&D3&K3&Q5\N3%C3S7=60S95=46Cardinal, MVP288XF AT&FW2&D3&K3&Q5\N3%C3S7=60S95=47Cardinal, MVP288XF AT&F&D0X4S95=3\N0%C0MS=11Cardinal, MVP288XF AT&F&C1&D2S95=1 Cardinal, MVP288XS AT&F&C1&D2S95=1Cardinal, MVP288XV AT&F&C1&D2\N5Cardinal, MVP288XP V.FC/V.34 AT&FQ1W2&D3&K3S7=60S95=46Cardinal, MVP288XP V.FC/V.34 AT&FQ1W2&D3&K3S7=60S95=47Cardinal, Other High-Speed Models (non-RPI) AT&F&D0&K3&Q5S0=0 Cardinal, 3480 / 56k X2 AT&F&C1&D0&Q5Cardinal, 3480 / 56k X2 AT&D2&C1X4V1Q0S7=70&K1&M4&B1&H1&R2Cardinal, Connecta 3440 56K AT&F1X4&A3&B1&C1&D3&K1S7=60Cardinal, Connecta 3440 56K AT&FX4&B1&C1&D3&K3S7=60
105
117 Cirrus Logic Cirrus Logic, AT&F&W&W1Cirrus Logic, ATS0=0E1Q0V1X4Cirrus Logic, AT&FS37=66N1 Cirrus Logic, 14.4 AT&F&C1&D2\Q3%C0Cirrus Logic, 14.4 AT&F&C1&D2\Q3\N3\J0%C1"H3S7=50 Cirrus Logic, 14.4 AT&F&C1&D2\Q3\N3\J0%C1"H3S7=60 Cirrus Logic, CLMD1414 AT&F\C1\N3\Q3\V1Cirrus Logic, CLMD1414 (VFC Disabled) AT&F\C1\N3\Q3\V1"H0S10=150 Cirrus Logic, CLMD1414 PCMCIA AT&FV1W2X4&C1&D3&K3%C0%E1Q0-J1"H3S7=60Cirrus Logic, CLMD34 AT&F\N2%C0 Cirrus Logic, CLMD34 AT&F&C1&D2%C1\N2 Cirrus Logic, CLMD34 AT&F\N2%C0"H0Cirrus Logic, CLMD34 AT&F&C1&D2%C1\N2Cirrus Logic, 33.6 AT&F\N0%C0Cirrus Logic, 33.6 AT&F\Q3\N3%C0Cirrus Logic, 33.6 AT&F&C1&D2X4V1\Q3\N4%C0Cirrus Logic, 33.6 AT&F&C1&D2Q3N3J0%C1"H3S7=60Cirrus Logic, 33.6 AT&FE0V1W4&C1&D2Q3N3J1%C1H3S95=47S0=0Cirrus Logic, CL-MD3450 AT&FX4Cirrus Logic, 56k X2 AT&FX4\N2%C0Cirrus Logic, 56k X2 S32=32&N16&U10Cirrus Logic, 56k X2 AT&F&C1&D2+FCLASS=0#VCL=0Cirrus Logic, CL-MD56K 56k X2 AT&D2&C1X4V1Q0S7=70W3\N3&K3Cirrus Logic, 56k +MS=v90,0,32000,48000Cirrus Logic, 56k (limited to 33.6) +MS=v34,0,9600,33600
105
118 Compaq Compaq, AT&F&Q6Compaq, AT&F&C1&D2Compaq, 2400 int AT&F&C1&D2&B1V1S2=1&WCompaq, PCMCIA 2400 AT&D2&C1X4V1Q0S7=70\N3\Q3\J0Compaq, 9600 Int AT&D2&C1X4V1Q0S7=70W2&Q5&K3Compaq, 9600 PCMCIA AT&F&C1&D2&K3%C0Compaq, Contura 9600 AT&FX4&C1&D2&K3&Q5S95=1Compaq, Contura 9600 AT&FE1QV1&D2X4&C1&Q5&K3Compaq, Contura 9600 AT&FE1QV1&D2X4&C1&Q5&K3S35=0 Compaq, Enhanced Internal(V.42bis) AT&F&C1&D2X4W1&Q5S46=2&K3S36=7&Y0Compaq, Enhanced 9600 Fax AT&F&C1&D2&K3%C0Compaq, Enhanced 9600 Fax AT&F&C1&D2&K3Compaq, Contura 9600 AT&FX4&C1&D2&K3&Q5S95=1Compaq, 14.4 Internal AT&D2&C1X4V1Q0S7=70W2&Q5&K3Compaq, 14.4 Internal AT&F&C1&D2X6B9L1Compaq, 14.4 Voice/Fax AT&F&C1&D2&K3%C0Compaq, 14.4 Int (if modem does not hang up) AT&F&C1&D2S35=0+FCLASS=0Compaq, 14.4 PCMCIA AT&F&C1&D2S95=1Compaq, 14.4 PCMCIA AT&F&C1&D2&S1Compaq, 14.4 PCMCIA AT&F&C1&D2&K3%C0Compaq, 14.4 PCMCIA AT&FW2X4&C1&D3\N3%C3\Q3S95=47Compaq, 14.4 PCMCIA AT&FW2X4&C1&D3&K3&Q5\N3%C3S7=60S95=47Compaq, Enhanced 14.4 AT&F&C1&D2S95=1Compaq, Internal 14400HV AT&F&C1&D2\Q3%C0Compaq, Internal 14400HV AT&F&C1&D2\Q3Compaq, Internal 14400 AT&F&C1&D2%C0Compaq, Presario 14.4 AT&FW1&C1&D3\N3\Q3S7=60Compaq, Presario 14.4 AT&F&C1&D2S35=0S95=1Compaq, Presario 14.4 AT&F&C1&D2&K3%C0Compaq, Presario 14.4 AT&FW1&C1&D3\N3\Q3S7=50Compaq, Presario 19.2 AT&FW1&C1&D3\N3\Q3S7=50Compaq, Presario 19.2 AT&FW1&C1&D3\N3\Q3S7=60Compaq, Presario 192-VS AT&F&C1&D2&K3%C0Compaq, Presario 28.8 AT&F\N5%C1Compaq, Presario 33.6 AT&F\N5%C1Compaq, Presario 336-VSC AT&F&C1&D2&K3%C0Compaq, Presario 336 DF 56K Upgradeable AT&F&Q6Compaq, SpeedPaq 14.4 AT&F&C1&D3&K3&Q5\J0\N3%C1S7=60S36=7S46=2S48=7S95=47Compaq, SpeedPAQ 14.4 AT&F&C1&D2W2\V1Compaq, SpeedPaq 144/P AT&FW2&C1&D3&K3&Q5\N3%C1S7=60S36=7S46=2S48=7S95=47Compaq, Speedpaq 14.4 AT&F&C1&D2W2Compaq, Speedpaq 14.4/I AT&F&C1&D2W2Compaq, Speedpaq 14.4/P AT&F&C1&D2W2Compaq, Speedpaq PCMCIA 19200 AT&D2&C1X4V1Q0S7=70W1&Q5&K3\Q3Compaq, Speedpaq, PCMCIA 28.8 AT&D2&C1X4V1Q0S7=70W1&Q5&K3\Q3Compaq, Speedpaq, PCMCIA 28.8 AT&FW2X4&C1&D3&K3%C1\J1\N3\V1"H3S7=60S37=17Compaq, 28.8 (v.34) AT&F&C1&D3&K3%C1\J0\N3S7=60Compaq, 28.8 (v.34) AT&F&C1&D3&K3&Q5\J0\N3%C1S7=60 S26=7S46=2S48=7S95=47Compaq, 28.8 Fax AT&F&C1&D2&K3%C0Compaq, 28.8 PCMCIA AT&F&C1&D2&K3%C0Compaq, 28.8 PCMCIA AT&FW2X4&C1&D3&K3%C1\J1\N3\V1"H3S7=60S37=17Compaq, 33.6 Fax AT&F&C1&D2&K3%C0Compaq, 33.6 vsc AT&FW1&C1&D3N3Q3S7=60Compaq, 56KFlex AT&F&C1&D2&K3%C0Compaq, 56k Rockwell HCF Chipset AT&F&C1&D2x4W1S7=60S11=60&Q5546=2&K3S36=7Compaq, 56k Lucent Chipset AT-v90=0Compaq, 56k Lucent Chipset ATs38=0Compaq, 56k Lucent Chipset ATs30=0Compaq, WIN CE Handheld s51=15
105
119 Complete, Compuadd, Compucom Complete AT&F&C1&D2Complete ATS0=0E1Q0V1X4Complete Communications Gold 14.4 AT&F&C1&D2Complete Communications Gold 14.4 AT&F&C1&D2X4Complete Communications Gold 14.4 AT&F&C1&D2\N3Complete Communicator GOLD AT&C1&D2&K3Complete Communicator GOLD AT&F&C1&D2&K3&Q5\N3%C1Complete Communicator V.42 AT&F&C1&D2\Q3\N3\J0\V1Complete Communicator v.34 AT&FQ0V1X4S0=0S2=255&C1&D2&K3&Q5\J0\N3\Q3%C1Complete FAX/9624 AT&F3W1&C1&D2&K3\J0\N3\Q3\V1%C0Complete Fax/Portable Plus ATS0=0E1Q0V1X4Complete Modem Plus AT&F3W1&C1&D2&K3\J0\N3\Q3\V1%C0Complete Modem Plus ATS0=0E1Q0V1X4Complete PC Turbo 14.4 AT&F&C1&D2&K3\N3Complete PC TurboModem Plus AT&F&D2&C1Complete PCGOLD ATS0=0E1Q0V1X4Complete Turbo 14.4 AT&F&C1&D2Complete Turbo 14.4 AT&F&C1&D2&K3\N3Complete Turbomodem AT&FX4S95=1Complete TurboModem Plus AT&F&D2&C1Complete TurboModem Plus ATS0=0E1Q0V1X4 Complete TurboModem Plus AT&FS0=0E1Q0V1X4&C1&D2\Q3Complete TurboModem Series AT&FV1X4&C1&D2&P0%C1S0=0S2=255\J0\N6\Q3\V1Compuadd, ATS0=0E1Q0V1X4Compuadd, 9600 MNP5 AT&FX4&C1&D2%C1\J0\N3\Q3\V1CompuCom, ATS0=0E1Q0V1X4CompuCom, Speedmodem ATS0=0E1Q0V1X4&K3CompuCom, Speedmodem AT&F2*H1\N3\Q3%C1&C1&D1CompuCom, Speedmodem 14.4 AT&D2&C1X4V1Q0S7=70\N3\Q3CompuCom, SpeedModem Champ 14.4 AT&F2*H2%C0S0=0S2=1&C1&D2V1Q0M0X1H0&WCompuCom, SpeedModem Combo 19.2 AT&F2*H2%C1S0=0S2=1&C1&D2\C1Q0V1E1M0H0X4&WCompuCom, Speedmodem STAR AT&F2*H2\J0\N3\Q3%C1&C1&D2
105
120 Compudyne Compudyne, 9600 AT&F&C1&D2&K3%C0Compudyne, 9600 AT&F&C1&D2&K3Compudyne, 9600 9642 AT&D2&C1X4V1Q0S7=70W2&Q5&K3Compudyne, 9642 AT&F&C1&D2S95=44Compudyne, 14.4 AT&F&C1&D2Compudyne, 14.4 AT&F&C1&D2&K3%C0Compudyne, 1442F AT&F&C1Compudyne, 1442 FX AT&F&C1&D2S95=1
105
121 Computer Peripherals Computer Peripherals Viva 9600 AT&F&C1&D2&K3&Q5%C0Computer Peripherals Viva 9600 AT&F&C1&D2&K3%C0Computer Peripherals Viva 28.8 AT&F&C1&D2&K3%C0Computer Peripherals Viva 28.8 AT&F&C1&D2&K3Computer Peripherals Viva 33.6 AT&F&C1&D2&K3%C0Computer Peripherals Viva 33.6 AT&F&C1&D2&K3
105
122 Concord, CPC, CPV, Cptel Concord, 9600 AT&D2&C1X4V1Q0S7=70\N3&K3\J0ControlWare Citam (ISDN) ATZ&C0&D1&M0&R1&S0S8=1CPC Turbo Modem+ AT\N6%C1&C1&D0\Q3\V1CPC Turbo Modem+ AT\N6%C0&C1&D2\Q3\V1CPC Turbo Modem+ AT\N6%C1&C1&D0\Q3CPC TM 28800 V.Fast AT&F&D2&K3%C0CPC TM 33600 V.Fast AT&F&D2&K3%C0CPV Delta 14.14 AT&F4X3CPV Delta 14.4 AT&F4X3Cptel 14.4 Data/Fax AT&F&C1&D2%C0S95=1
105
123 Conexant (formerly Rockwell Semiconductor) Generic, Rockwell Chipset AT&F&D0&K3&Q5S0=0Generic, Rockwell RPI Chipset AT&F&D0&K3+H3S95=1S0=0Generic, Rockwell RPI Chipset AT&F&C1&D2&K3+H11S95=1Generic, Rockwell RPI Chipset AT&F&C1&D2+H11S95=1Generic, Rockwell RPI Chipset AT&F&C1&D2&K3+H11S95=1Generic, Rockwell RPI Chipset AT&F&C1&D2&K3+H11Y0S95=1Generic, Rockwell RPI Chipset AT&F&C1&D2&K3E1V1+H11Y0S95=1Generic, Rockwell RPI Chipset AT&F&C1&D2&K3&Q5E1V1Q0X4+H11S95=1Generic, Rockwell RPI Chipset AT&F&C1&D0&K3&Q5E1V1Q0+H11Y0S7=75S95=1Generic, Rockwell RPI+ Chipset AT&F\N0&K3&C1&D2Generic, Rockwell RPI+ Chipset AT&F&C1&D2&Q6&K3Generic, Rockwell RPI+ Chipset AT&F&D0&K3+H11S0=0Rockwell based 14.4 AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47 Rockwell based 14.4 PCMCIA AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47 Rockwell based 14.4 RPI AT&FW2&C1&D2&Q6&K3S7=60 Rockwell based 28.8 V.34/V.FC AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47Rockwell based 56k V.90 (flex enabled) +MS=12,1Rockwell based 56k V.90 AT&F%E1Rockwell based 56k V.90 (flex and V.34 disabled) +MS=12,1,34667,56000Rockwell based 56k flex only +MS=56,1Rockwell based 56k flex only +MS=56,1,34000,56000Rockwell based 56k flex, disabled, V.34 only +MS=11,0,9600,33600Rockwell based 56k flex, disabled, V.34 only +MS=11,1Rockwell Based 56k V.90 AT&F&W&W1E0X4W2Rockwell based 56k HCF V.90 +MS=v90Rockwell based 56k HCF 56kflex +MS=k56flexRockwell based 56k HCF 33.6 mode +MS=v34Rockwell Based 56k HCF V.90 AT&FE0V1S0=0&C1&D2W0 Rockwell Based 56k HCF V.90 AT&FE0V1S0=0&C1&D2W0
105
124 Creative Labs Creative Labs, Phone Blaster AT&F&C1&K3Creative Labs, Phone Blaster AT&F&D0L3&R1S38=0S7=60S11=60S46=138S48=7Creative Labs, Phone Blaster 14.4 AT&F0&C1&D2&K3%C0Creative Labs, Phone Blaster 28.8 AT&F0&C1&D2&K3%C0Creative Labs, Phone Blaster 28.8 DSVD AT&F0&C1&D2&K3%C0Creative Labs, Modem Blaster AT&F&D0&K3\N5S0=0Creative Labs, Modem Blaster AT&FW2&D0X4S95=3Creative Labs, Modem Blaster AT&FW2&D0X4S95=3\N3%C1Creative Labs, Modem Blaster AT&FW2&D0X4S95=3\N0%C0Creative Labs, Modem Blaster AT&Fl3S10=250M2Creative Labs, Modem Blaster 14.4 PCMCIA AT&FCreative Labs, Modem Blaster 14.4 AT\N0Creative Labs, Modem Blaster 14.4 AT&F0&C1&D2\Q3%C0Creative Labs, Modem Blaster 14.4 AT&F&C1&D2&K3%C0Creative Labs, Modem Blaster 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3Creative Labs, Modem Blaster 14.4 AT&D2&C1X4V1Q0S7=70\N3\Q3\J0Creative Labs, Modem Blaster 19.2 AT&FCreative Labs, Modem Blaster 28.8 AT&F&C1&D2\N3S95=1Creative Labs, Modem Blaster 28.8 AT&FCreative Labs, Modem Blaster 28.8 AT&F0&C1&D2&K3%C0Creative Labs, Modem Blaster 28.8 ATS48=0S30=0Creative Labs, Modem Blaster 28.8 AT&D2&C1X4V1Q0S7=70&K3Creative Labs, Modem Blaster 28.8 int AT&Fl3S10=250M2S11=45Creative Labs, Modem Blaster 28.8 DSVD AT&F0&C1&D2&K3%C0Creative Labs, WS-2814IM4 AT&FL3s10=250M2
105
125 Creatix, CTK, CXR Creatix, 14.4 PCMCIA AT&F&C1&D2&K3%C0Creatix, 28.8 AT&F&C1&D2\Q3%C0Creatix, 33.6 AT&F&C1&D2\Q3%C0Creatix Polymedia 28.8 AT&F%C0CTK Shorty, 2400 AT&F\Q3\N3%C1\J0CTK Shorty, V.42bis + Fax AT&F&K3\N3%C3\J0CTK Shorty, 14.4 + Fax AT&F2\Q3\N6%C1\C1\J0CXR Telcom 1445 AT&F1&C1&D2*LR2*LG2*E0
105
126 Dacom, Dallas, Dash, Dataflex Dacom, FASTLANE V32 AT&F&C1&D2&R0*E1*F3*S1 Dallas, Fax 96/96 AT&F&C1&D2W1S95=41Dallas, Fax 14.4 AT&F&C1&D2&K3%C0Dallas, Fax 14.4 ATQ0V1X4&C1&D2Dallas, Fax 14.4 / 14.4 Pro Plus AT&F&C1&D2W1S95=41 Dash, 28.8 /33.6 AT&F&C1&D2&K3%C0 Dataflex, Rapier 9600 AT&F&C1&D2%C1&I1\N3\Q2Dataflex, Pocket Comfax II AT&F3&C1&D2\G0\N3\Q3Dataflex, Pocket Quadcom II AT&F3&C1&D2\G0&Q5\N3\Q3Dataflex, Pocket Quadsync II AT&F3&C1&D2\G0&Q5\N3\Q3
105
127 Data Race Data Race, 14.4 AT&F&D0\N7\J0\Q3S11=55Data Race, Action 24 AT&F&C1&D2&K3S64=5Data Race, RediMODEM 9600 AT&F&C1&D2\N7\J0\Q3\V2Data Race, Action 32 / 32L AT&F&C1&D2W1&K3S64=5Data Race, Action PC V.32 AT&FL1\J0%C0Data Race, Apex V.32/V.32bis AT\N7%C0&C1&D2\Q3Data Race, Apex v.32/v.32bis AT\N7%C1&C1&D0\Q3Data Race, Action 1496 AT&F&C1&D2W1&K3S64=5Data Race, APL 1496 AT\N7%C1&C1&D0\Q3Data Race, APL 1496 AT\N7%C0&C1&D2\Q3Data Race, Redicard PCMCIA AT&F&Q5\N3W2Data Race, RediMODEM 14.4 AT&F&C1&D2\N7\J0\Q3\V2Data Race, RediCARD V.32bis AT&F&C1&D2&K3&Q6\J0\N7\Q3\V2%C1S7=60Data Race, RediMODEM V.32bis AT&F&C1&D2&K3&Q6\J0\N7\Q3\V2%C1S7=60Data Race, RediModem V.32bis AT&F&C1&D2\Q3%C0Data Race, RediModem V.32bis AT&F1L1\J0%C0
105
128 Dataplex, DATASystem, DataTrek, DoveFax Dataplex, 296 AT&F&E4*E4&I1&D2&C1&K2Dataplex, Access v.34 28.8 AT&F0Dataplex, Access 28.8 AT&D2&C1X3S7=70Dataplex, DPX-223 ATQ0V1X4&C1&D2&K3&E0&I0Dataplex, DPX-225 28.8 AT&F0x6&C1&D2&K2&U3S0=0DATASystem, 14.4XP AT&FV1E00\C1X4\J0DataTrek, 624 (UK) AT&F&C1&D2&P1\N3\Q3\J1DataTrek, 624 (US) AT&F&C1&D2\N3\Q3\J1DataTrek, 2424 (MNP) AT&F&C1&D2\N3\Q3\J1DataTrek, 2496CFM PCMCIA AT&F&C1&D2&Y0\J0\N3\Q3\V1%C2S134=5DataTrek, V.32 AT&F&C1&D2&Y0\J0\N3\Q3\V1%C2S134=4DataTrek, V.32 AT&F&C1&D2\Q3DataTrek, Elite M/FM/SFM AT&F&C1&D2&Y0\J0\N3\Q3\V1%C2S134=5DoveFax, 144E AT&F&C1&D3*E1*E5*E9*F3*M2*N6*S1S7=60
105
129 DEC, Dell, Designer DEC, DF296-DA (DECmodem V32) AT&F&C1&D2%A1%F2$M2$C1DEC, 14.4 Internal AT&F&C1&D2&K3%C0DEC, 14.4 Internal AT&F&C1&D2&K3Dell, Data/Fax 24/96V AT&F&C1&D2&K3\V1Dell, Data/Fax 96/96V AT&F1&C1&D2\N7\Q3\V2Dell, 14.4 Internal AT&F&C1&D2&K3%C0Dell, DS92M AT&F&C1&D2\Q3%C0Dell, DS92M ATQ0V1X4&C1&D2\V1\A3\Q0\J1\N1Dell, High-Speed Models AT&F&D0&K3&Q5S0=0Dell, Notebook (325 series) V.32 fax ATS0=0 E1Q0V1X4&K3Dell, Data/Fax ATS0=0 E1Q0V1X4&K3Designer, 14.4 AT&D2&C1X4V1Q0S7=70\N3\Q3\J0
105
130 Diamond Diamond, DataPump 14.4 i/e AT&FB0l3X3&C1&D2&K3&P1%C0\N3Diamond, DataPump 28.8 i/e AT&FB0l3X3&C1&D2&K3&P1%C0\N3Diamond, DataSystem 1414 Pocket AT&Fl3&C1&D2$F4$S0$E1Diamond, LightFax 1414LC AT&FB0l3X3&C1&D2&K3&P1%C0\N3Diamond, LightFax 28.8 AT&FB0l3X3&C1&D2&K3&P1%C0\N3Diamond, Pump 1414 Int AT&FB0l1N0X1&C1&D2&P1Diamond, Pump V.34 i/e AT&FB0l3X1&C1&D2&K3&P1%C0\N3Diamond, V32bis int ATX1&C1&D2E1Diamond, SupraExpress 56i Sp AT&F2&C1&D2S11=60L3+ms=56Diamond Telecommander, 3300 AT#CID=1Diamond TeleCommander, 3500 AT&F&D0X4W2Diamond TeleCommander, 3500 AT&F&D0X4W2%C3\N3Diamond TeleCommander, 3500 AT&F&D0X4W2%C0\N0
105
131 Digicom Digicom, 9600 9642 AT&D2&C1X4V1Q0S7=70W2&Q5&K3 Digicom, Connection 96+ AT&F&C1&D2&K3\N5 Digicom, Connectoin 96+ ATZ\N0&D2&K0S48=48 Digicom, Connection + 9600 v.32 AT&F Digicom, Connection 14.4 AT&FW1 Digicom, Connection 14.4 AT&F&D0&K3\N5S0=0 Digicom, Connection 14.4 AT&F&C1&D2&K3\N5 Digicom, Connection 14.4 AT&F&C1&D2&K3%C0 Digicom, Connection 14.4 AT&C1&K3\N0%C0 Digicom, Connection + 14.4 AT&F Digicom, Connection 14.4 DF AT&F&C1&D2&K3\N5M3\%C1 Digicom, Connection 14.4+FAX AT&F&C1&D3&K3\N5%C1S48=7S7=60 Digicom, Connection 14.4 AT&D2&C1X4V1Q0S7=70\N3&K3 Digicom, Connection 19.2 AT&D2&C1X4V1Q0S7=70\N3&K3 Digicom, Connection Pro 19.2 AT&F Digicom, Connection 19200 Terbo AT&F&C1&D2&K3%C0 Digicom, DSI9624 LE AT&F*F3*E9&C1 Digicom, Eagle 9600 AT&F&D0 Digicom, Eagle 9600 AT&F&C1&D2X4 Digicom, Eagle 9600 AT&D2&C1X4V1Q0S7=70*E3*F3*S1 Digicom, Eagle 9600 AT&F&C1&D2*F3*E6 Digicom, Eagle 9600 AT&F&C1&D2*F3 Digicom, Eagle 14.4 AT&F Digicom, Eagle 14.4 AT&F&C1&D2*F3*E6 Digicom, Eagle 14.4 AT&F&C1&D2*F3 Digicom, Eagle 14.4 AT&D2&C1X4V1Q0S7=70*E3*F3*S1 Digicom, Eagle V.32 AT&F&C1&D2&R0*E9*F3*M2*N3*S1 Digicom, Eagle V.32+ AT&F&C1&D2&R0*E9*F3*M2*N6*S1 Digicom, Eagle 9600/Scout Plus Mac AT&F&D0 Digicom, PC Classic 14.4 AT&D2&C1X4V1Q0S7=70\N3&K3 Digicom, PC strings/classic 14.4 AT&F&K3\N3\Q3S95=1 Digicom, Scout AT&F&C1&D2*F3*E6 Digicom, Scout AT&F&C1&D2*F3 Digicom, Scout AT&F&C1&D2&R0*E9*F3*M2*N3*S0 Digicom, Scout 14.4 AT&D2&C1X4V1Q0S7=70*E3*F3*S1 Digicom, Scout PCMCIA 14.4 AT&F Digicom, Scout PCMCIA 14.4 AT&F&C1&D2\Q3%C0 Digicom, Scout PCMCIA 14.4 AT&F&C1&D2\Q3*E6 Digicom, Scout Plus AT&F&C1&D2*F3*E6 Digicom, Scout Plus AT&F&C1&D2&R0*E9*F3*M2*N6*S0 Digicom, Scout Plus AT&F&C1&D2*F3 Digicom, Scout Plus ATZ*E0*N3*M0*S0*F0&D2 Digicom, Scout Plus 14.4 AT&F Digicom, Scout 28.8 / 33.6 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Digicom, Scout 28.8 / 33.6 AT&F&C1&D2&K3%C0 Digicom, Scout 28.8 / 33.6 AT&F&C1&D2*F3*E6 Digicom, Scout 28.8 / 33.6 AT&F&C1&D2\Q3%C0 Digicom, Scout 28.8 / 33.6 AT&F&C1&D2\N3S95=1 Digicom, 3656 X2 UPGRADE AT&F&C1&D2^M Digicom, D136 56K X2 AT&F&C1&D2L3S95
105
132 Digitan, Direct Connect, Discovery, DoveFax Digitan, DS92M AT&F&C1&D2\Q3%C0Digitan, DS92M AT&F&C1&D2\Q3Digitan, 14.4 AT&F&C1&D2&Q5S95=1Digitan, DS144FVM 14.4 AT&F&D0&Q5S0=0Digitan, DS144FVM 14.4 AT&F&C1&D2&K3%C0Digitan, DS144FVM 14.4 AT&D2&C1X4V1Q0S7=70W2&Q5&K3\N3Digitan, Hi-IQ (ZX1896) Fax AT&F&C1&D2\Q3\N7\V1Digitan, DS288F 28.8 AT&D2&C1X4V1Q0S7=70W2&Q5&K3\N3Digitan, DS288FVM 28.8 AT&D2&C1X4V1Q0S7=70W2&Q5&K3\N3Digitan, 28.8 /33.6 AT&F&C1&D2&K3%C0Digital Scholar, Plus AT&F&C1&D2%A1%F2Direct Connect, AT&FX4&C1&D2&Q6%R1%K2-E5%C1Discovery, ATB0l1&G0S0=0S6=2S11=95W2X3S46=138%C0Discovery, ATB0l1&G0S0=0S6=2S11=95W2X4S46=138S95=0DoveFax, 14.4 Fax AT&F&C1&D2*E3&Q5%C0DoveFax, 14.4 Fax ATQ0V1X4&C1&D2
105
133 Dowty, DP, Dr. Neuhaus, DSI, Dynamode Dowty Quantum, 96 AT&F&C1&D2&I1&K2&E1Dowty Quattro, PC AT&F&C1&D2&E1&K2DP Defender 1000D AT&F&C1&D2&K3S46=136Dr. Neuhaus Fury, 2400 PC/TI + MNP AT&F\Q3\N3\J0\V1\T0Dr. Neuhaus Fury, 2402 TI AT&F\Q3\N3\J0\V1Dr. Neuhaus Fury, 2403 TI AT&F3&C1&D2Dr. Neuhaus Fury, 2400 Pocket/Fax AT&F3&C1&D2Dr. Neuhaus Fury, 2400 PC/Fax AT&F3&C1&D2Dr. Neuhaus Fury, Card 2400 AT&F3&C1&D2Dr. Neuhaus Faxy, 9600 AT&F3&C1&D2Dr. Neuhaus Fury, 9600 TI AT&F&C1&D2\N6\V1\Q3Dr. Neuhaus Fury, 9601 TI AT&F&C1&D2\N3\V1\Q3Dr. Neuhaus Fury, 14.4 TI AT&F&C1&D2\N6\V1\Q3Dr. Neuhaus Fury, 14.4 TI/SL AT&F&C1&D2\N3\V1\Q3DSI, Connection 14.4 AT&F&C1&D2&K3\N5DSI, 1442PC AT&F&C1&D2&K3%C0Dynamode, AT&F&C1&D2&K3\N3Dynamode, 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3Dynamode, 28.8 AT&D2&C1X4V1Q0S7=70W2\N3&K3
105
134 Dynalink Dynalink, AT&F%E2&C1&D2W2X3&K3&W Dynalink, 9696VH AT&F&C1&D2\N3%C1&K3&Q9S95=43 Dynalink, 1428 int AT&F&C1&D2&K3%C0 Dynalink, 14.4 int v.32bis AT&F&D0S0=0 Dynalink, 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Dynalink, 1414 VE ATX1&C1&D2E1 Dynalink, 1414 VH AT&F&C1&D2\N3%C1&K3&Q9S95=43 Dynalink, 1414 VQE and 1414VQI AT&D2&C1X4V1Q0S7=70 Dynalink, 1414 VQE and 1414VQI AT&D2&C1X1V1Q0S7=70S95=46 Dynalink, 1414 VQH AT&F&D2&C1X1&P1&G0%C0 Dynalink, 1414 VQE AT&FX3&C1&D2W2S95=255&W&W1 Dynalink, 1428 VQE AT&F&C1&D2&K3%C0 Dynalink, 1428 VQE AT&F&KS95=3&S1\N5%C3%E0 Dynalink, 1428 VQE AT&FX4S95=1 Dynalink, 1428 VQE AT&F&KS95=3&S1\N5%C3E0L Dynalink, 1428 VQE AT&F&KS95=3&S1\N5%C3%E0L Dynalink, 1428 VQE AT&F&C1&D2W2X3%E1 Dynalink, 1428 VQH AT&FX4S95=1 Dynalink, 1433 VQH Fastcard + AT&F1&H1&R2X1 Dynalink, 1440 VQE AT&F&D0&K3&Q5S0=0 Dynalink, V.32bis AT&F&D2&C1X1W2&P1&G0%C0 Dynalink, V.34 AT&F&C1&D2W2X3%C0 Dynalink, 28.8 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Dynalink, 28.8 AT&FS95=3X3%E1&W Dynalink, 33.6 AT&F&C1&D2W2 Dynalink, 33.6 AT&F&C1&D2W2X1 Dynalink, 56k AT&F&C1&D2
105
135 Echo Communications Echo Communications, ATS0=0E1Q0V1X4Echo Communications, AT&F&C1&D2&K3M1L1S0=0S7=55Echo Communications, 14.4 AT&F&C1&D2Echo Communications, 14.4 AT&F&C1&D2\Q3%C0Echo Communications, 28.8/33.6 AT&F&C1&D2Echo Communications, 28.8/33.6 AT&F1&B1&H1&R2&A3&K3X4&I0Echo Communications, 28.8/33.6 AT&FX4&A1&B1&H1&M4&R2Echo Communications, 28.8/33.6 AT&F1S27=16&K0Echo Communications, 28.8/33.6 AT&FX4&A1&B1&H1&M4&R2&K0S27=26Echo Communications, 28.8/33.6 AT&FX4Echo Communications, 28.8/33.6 AT&F1Echo Communications, 28.8/33.6 AT&F2Echo Communications, 28.8/33.6 AT&F1S27=16&K0S10=150Echo Communications, 33.6 (locked at 9600bps) AT&F&Q6&K0S37=6Echo Communications, 33.6 (locked at 14400bps) AT&F&Q6&K0S37=11Echo Communications, PCMCIA AT&F1Echo Communications, PCMCIA AT&F2Echo Communications, PCMCIA ATS0=0E1Q0V1X4Echo Communications, PCMCIA AT&F&C1&D2\Q3%C0Echo Communications, PCMCIA AT&FX4&B1&H1&R2&K0Echo Communications, PCMCIA AT&F&C1&D2W2\V1%C1\J0\N7\Q3 Echo Communications, PCMCIA AT&F&C1&D3%C1\J0\N7\Q2\V2S7=50Echo Communications, PCMCIA AT&F&C1&D3%C1\J0\N7\Q2\V2S7=60Echo Communications, 56k Rockwell based V.90 +ms=11,1 (limit speed to 33.6)Echo Communications, 56k Rockwell based V.90 +ms=v34 (limit speed to 33.6)Echo Communications, 56k Rockwell based V.90 +ms=v90To show correct Connection speeds use these inits:Echo Communications, Rockwell based AT+MR=2Echo Communications, Rockwell based ATS95=255Echo Communications, Rockwell based ATS95=47
105
136 ECS, Edison, Elcomm, Ellcon, ELsa, Epson, Ericsson, EXP ECS 400 AT&F&C1&D3&K3&Q5\N3%C3S7=50ECS 400 AT&F&C1&D3&K3&Q5\N3%C3S7=60Edison, 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3Elcomm, 28.8 AT&F&C1%C3&D2\l1\N3*NC40X3&W1Ellcon, 14.4 and 28.8 AT&F&D2&C1X3W2S6=0Elsa MicroLink, 2400T2VX AT&FX4&C1&D2&R6&E4$BA0$MB9600Elsa MicroLink, 2410 w/MNP-5 AT&FX4&C1&D2&R6&E1$BA0$SB9600Elsa MicroLink, 2410 w/V.42bis AT&FX4&C1&D2&R6&E1$BA0$SB9600Elsa MicroLink, 2410 (no MNP) ATE1Q0V1X4&C1&D2Elsa MicroLink, 2440T/2440TR AT&FX4&C1&D2\Q3\N3%C3Elsa MicroLink, 9624T2VX AT&FX4&C1&D2&R6&E4$BA0$MB9600Elsa MicroLink, 14.4 Series AT&FX4&C1&D2\Q3\N3%C3Elsa MicroLink, 28.8 Series AT&FX4&C1&D2Elsa MicroLink, 28.8 Series AT&FX4Elsa MicroLink, ISDN/PC AT&FX4&C1&D2\Q3Elsa MicroLink, ISDN/TL AT&FX4&C1&D2\Q3Epson, PCMCIA ATS0=0Q0V1&C1&D2&Q0&K3&S1W2S95=18N0Epson, 14.4 PCMCIA AT&F&C1&D2&K3%C0Epson, 14.4 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3\J0Epson, 14.4 PCMCIA AT&F0&C1&D3&K3\N3%C3S7=60Ericsson, DC12 AT&FE0V1X3S0=0&C1&D2\V1EXP Computer, 14.4 AT&D2&C1X4V1Q0S7=70&Q5&K3\J0EXP Computer, 14.4 AT&FW2X4&C1&D3&K3%C3\N3S7=60EXP Computer, 14.4 PCMCIA AT&F%C0EXP Computer, 14.4 PCMCIA AT&F0&D2&R0V1W1&C1S95=L3\N3EXP Computer, 14.4 PCMCIA AT&FS0=0E1Q0V1X4&C1&D2&K3%C0Express AT&F\N3%C0
105
137 Eiger Labs Eiger, 14.4 AT&F&C1&D2Eiger, 14.4 AT&FX4Eiger, 14.4 AT&D2&C1X4V1Q0S7=70\N3\Q3\J0Eiger, 14.4 PCMCIA AT&D2&C1X4V1Q0S7=70\N3\Q3\J0Eiger, 14.4 PCMCIA AT&D2&C1X4V1Q0S7=70W2\N3&K3Eiger Labs, EFX 28.8/33.6 AT&F&C1&D2Eiger Labs, EFX 28.8/33.6 AT&F&C1&D2S95=1Eiger Labs, EFX 28.8/33.6 PCMCIA AT&F&C1&D2X4&K3%C0Eiger Labs, EFX 28.8/33.6 PCMCIA AT&F0W2X4%C3&K3&D2S7=50Eiger Labs, EFX 56k PCMCIA AT&FW2X4&C1&D2S7=60
105
138 ESS Technology ESS, X2/V.90 AT&FS32=98ESS, X2/V.90 +MS=11,0,9600,33600 ***ESS, X2/V.90 +MS=11,1,9600,33600 ***
105
139 E-Tech E-Tech, P1496MX Pocket AT&F&C1&D2$E3$F4$S0E-Tech, Bullet E2400M AT&F&C1&D2$E3$F4$V5$S1E-Tech, Bullet PC2400MH AT&F&C1&D2$E1$F4E-Tech, Bullet 9600 AT&F&C1&D2\Q3%C0E-Tech, Bullet 9600 AT&F&C1&D2\Q3E-Tech, Bullet 14400 /19200 AT&F&C1&D2\Q3%C0E-Tech, Bullet 14400 /19200 AT&F&C1&D2\Q3E-Tech, Bullet C1414CX AT&F&D0S0=0 E-Tech, Bullet C1414AX AT&F&D0S0=0S7=90S11=60 E-Tech, Bullet PC1414 AT&F&C1&D2&K3%C0E-Tech, Bullet PC1414UX AT&F&D0S0=0 E-Tech, Bullet E1414MX AT&F&D0S0=0S7=90S11=60 E-Tech, Bullet P1414MX AT&F&D0S0=0S7=90S11=60 E-Tech, Bullet PC1414MX AT&F&D0S0=0S7=90S11=60 E-Tech, Bullet P1496MX AT&F&D0S0=0S7=90S11=60 E-Tech, Bullet PC2400MH AT&F&D0S0=0S7=60S11=60 E-Tech, Bullet E2400M AT&F&D0S0=0S7=45S11=60 E-Tech, Bullet P9624MX AT&F&D0S0=0S7=60S11=60 E-Tech, Bullet E9696M AT&F&C1&D2$E3$F4$X4$S0E-Tech, Bullet PC9696M AT&F&C1&D2$E1$F4$S1E-Tech, Bullet P9696MX AT&F&D0S0=0S7=90S11=60 E-Tech, Bullet PC9696M AT&F&D0S0=0S7=90S11=60 E-Tech, Bullet E9696M AT&F&D0S0=0S7=90S11=60 E-Tech, Bullet C9624RX AT&F&D0S0=0S7=60S11=60 E-Tech, Bullet P192MX AT&F&D0S0=0S7=90S11=60 E-Tech, Bullet PC288MX AT&F&D0S0=0 E-Tech, Bullet PC192MX AT&F&D0S0=0S7=90S11=60 E-Tech, Bullet 100E AT&F&D0S0=0E-Tech, Bullet E288MX AT&F&D0S0=0E-Tech, Bullet 33.6 AT&F&C1&D2\Q3E-Tech, UFO 9600 AT&F&C1&D2\Q3%C0E-Tech, UFO 9600 AT&F&C1&D2\Q3E-Tech, UFO 14400 AT&F&C1&D2\Q3%C0E-Tech, UFO 14400 AT&F&C1&D2\Q3E-Tech, UFO 19200 AT&F&C1&D2\Q3%C0E-Tech, UFO 19200 AT&F&C1&D2\Q3E-Tech, UFOMATE P1496MX AT&F&C1&D2$F4$C0E-Tech P1496MX Ufomate 14.4 AT&D2S7=70
105
140 Everex Everex, Evercom 12e AT&FE1V1Q0X4&C1&D2&I1&Y0Everex, Evercom 24e+ (MNP 5) AT&F&C1&D2\Q3\C1\N3\J0\V1Everex, 2400 AT&D2&C1X4V1Q0S7=70Everex, Carrier 24 AT&F\Q3\N3\J0\V10Everex, Carrier 24/96 AT&F&C1&D2\Q3\N3\J0\V1\C1Everex, EverFax 24/96E AT&F&C1&D2\Q3\N3\J0\V1Everex, 96E+ AT&F1&C1&D2\V2W1Everex, 9600 AT&F&C1&D2\Q3%C0Everex, 9600 AT&D2&C1X4V1Q0S7=70\N3\Q3\J0
105
141 FastTalk, Fastcomm, FastMac, Focus, Forval, Frecom, Freedom, Fury FastTalk II AT&F&C1&D2\Q3%C0FastTalk II AT&F&C1&D2\Q3Fastcomm, 2496/Turbo AT#F#EE0#CL2#CH1#CW#LCN#LDNS2=43Fastcomm, 9600 AT&F&C1&D2&K3%C0Fastcomm, 9696 AT&F&C1&D2&H1&I1&M6S10=2FastMac, AT&F&C1&D0&K3&Q5S0=0S95=3S10=35Focus, 14.4 AT&Q5%C1&C1&D0&K3S36=7Forval, 14.4 AT&D2&C1X4V1Q0S7=70\N3\Q3\J0Forval, IM14.4 AT&F&C1&D2&Y0\J0\N3\Q3\V1Frecom, Winfast 14.4 AT&F&C1&D2*LG2*M2*V1*E10Frecom, Winfast 9600 AT&F&C1&D2*LG2*M2*V1*E10Freedom Series V.32bis Data/FAX AT&F&C1&D3&K3&Q6\J0\N7\Q3\V2%C1S7=60Fury, 9600 /14.4 /19.2 AT&F&C1&D2\N3\Q3%C0Fury, 9600 /14.4 /19.2 AT&F&C1&D2\Q3%C0
105
142 Galaxy, Garnet, Garvin, GDC, General Datacom Getronics, GRID, GVM Galaxy, 14.4 AT&F&C1&D2\Q3%C0Galaxy, Gemini AT&F&D2\Q3%C0Galaxy, Gemini AT&F&D2\Q3Garnet, V.34 28.8 /33.6 AT&F&C1&D2&K3%C0Garnet, V.34 28.8 /33.6 AT&F&C1&D2&K3Garvin, Super Modem 14.4 AT&F&C1&D2GDC DeskTop AT&F&C1&D2\Q3%C0GDC DeskTop AT&F&C1&D2\Q3General DataComm, 596 AT&FQ0E1V1&C1&D2General Datacomm, 596 V.42 AT&F\Q3&C1&D2W1\V2Getronics Personal ATQ0V1X4&C1&D2&S1GRID, 14.4 Fax AT&F&C1&D2\N7%C1\Q3\J0\V2GVM MAKK-CHAMPION ATQ0V1X4&C1&D2
105
143 Gateway 2000 Gateway, TelePath AT&F&Q6&C0&K3Gateway, TelePath ATS0=0E1Q0V1X4Gateway, TelePath AT&FS0=0E1Q0V1X4&C1&D2&Q0%C0%M0\G0Gateway, TelePath AT&FQ0V1X4&C1&D2&K3&H3&M4&B1&N0S48=7 S146=138S0=0S2=255S95=44Gateway, TelePath PCMCIA AT&F&C1&D2&Q0&K0%C0W2Gateway, 9600 TelePath AT&D2&C1X4V1Q0S7=70W2&Q5&K3Gateway, 14.4 TelePath AT&F&C1&D2E1Gateway, 14.4 TelePath AT&D2&C1X4V1Q0S7=70&M4&H1&B1Gateway, 14.4 TelePath AT&D2&C1X4V1Q0S7=70&M4&B1&H1&R2Gateway, 14.4 TelePath PCMCIA AT&D2&C1X4V1Q0S7=70W2\N3&K3Gateway 2000, Nomad PCMCIA ATS0=0E1Q0V1X4Gateway 2000, Nomad 9600 AT&F&C1&D2\Q3%C0Gateway 2000, Nomad 9600 AT&F&C1&D3%C1\J0\N3\Q2S7=60Gateway 2000, Nomad 14.4 AT&F&C1&D2\Q3%C0Gateway 2000, Telepath AT&F&C1&D2&Q9&K3W2S37=0S38=0Gateway 2000, Telepath AT&FS37=9%C0&K0&Q6\G0Gateway 2000, Telepath 14.4 AT&FX4&B1&H1&R2&K0Gateway 2000, Telepath 14.4 AT&F&M0&K0&N6&H0S0=1Gateway 2000, Telepath 14.4 ATS46=0S37=9N0&Q0&D2&K0%C0Gateway 2000, Telepath 1.5 14.4 AT&F&C1&D2&K3%C0Gateway 2000, Telepath 550 AT&FX4&B1&C1&D2&H1&K1&R2Gateway 2000, Telepath 550 AT&FX4&A3&B1&C1&D2&H1&K1&M4S7=60Gateway 2000, Telepath 5500 AT&F1&D0S0=0Gateway 2000, Telepath 5500 AT&FS0=0E1Q0V1X4&A1&B1&C1&D2&H1&K1&R2Gateway 2000, Telepath II 14.4 AT&FX4&B1&H1&R2&K0Gateway 2000, Telepath II 14.4 AT&F&C1&D2E0X4&Q6%C0Gateway 2000, Telepath II 14.4 AT&FX4&A1&B1&H1&M4&R2Gateway 2000, Telepath II AT&F1&D0S0=0Gateway 2000, Telepath II AT&FS0=0E1Q0V1X4&A1&B1&C1&D2&H1&K1&R2Gateway 2000, TelePath II Fax AT&FX4&A3&B1&C1&D2&H1&K1&M4&N0S7=60Gateway 2000, Telepath IIv AT&F1&D0S0=0Gateway 2000, Telepath II 28.8 AT&FX4&B1&H1&R2&K0Gateway 2000, Telepath II 28.8 AT&FX4&A1&B1&H1&M4&R2Gateway 2000, Telepath AT&F&D0&K3&Q5S0=0Gateway 2000, Telepath PCMCIA AT&F&D0S0=0Gateway 2000, Telepath PCMCIA AT&FX4Q0V1W2&C1&D3&K3&Q3-B1"H3S7=60Gateway 2000, Telepath FM144 AT&F1&D0S0=0Gateway 2000, TelePath AT&FW2&C1&D3&K3&Q5\N3%C1S7=60S36=7S46=138S48=7S95=47Gateway 2000, TelePath 550 AT&FX4&A3&B1&C1&D2&H1&K1&M4S7=60Gateway 2000, Telepath PCMCIA 14.4 AT&F&C1&D2&K3%C0Gateway 2000, TelePath PCMCIA Fax AT&FX4&C1&D3&K3&Q5\N3%C3S7=60Gateway 2000, Telepath 28.8 AT&D2&C1X4V1Q0S7=70&M4&B1&H1&R2Gateway 2000, Telepath 28.8 AT&D2&C1X4V1Q0S7=70W2\N3&K3Gateway 2000, Telepath 33.6 AT&FX4&B1&H1&R2&K0Gateway 2000, TelePath II 33.6 AT&D2&C1X4V1Q0S7=70W2\N3&K3Gateway 2000, Telepath Winmodem 56k V.90 AT&F-V90=0
105
144 Global Village Global Village, Gold 14.4 AT&FV1Q0X3&C1&D2%C0\N3 Global Village, Bronze AT&F%C0\N0 Global Village, TelePort Bronze AT&F Global Village, TelePort Bronze AT&D2&C1X4V1Q0S7=70W2\N3&K3 Global Village, TelePort Silver AT&F1S11=60 Global Village, Teleport Silver AT&F1&D0S0=0 Global Village, Teleport Silver AT&F1%C0\N0 Global Village, TelePort Silver AT\J0\N3%C0&C1&D2\Q3\V1 Global Village, TelePort Silver AT\J0\N3%C1&C1&D0\Q3\V1 Global Village, TelePort Silver AT&D2&C1X4V1Q0S7=70W2\N3&K3 Global Village, TelePor Gold AT&F1 Global Village, Teleport Gold AT&F1&D0S0=0 Global Village, Teleport Gold AT&F1S95=44 Global Village, Teleport Gold AT&F1S95=44 Global Village, Teleport Gold AT&F1S95=44 Global Village, TelePort Gold 9600 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Global Village, TelePort Gold II AT&F1&K3 Global Village, Teleport Gold II AT&F1&D0&K3S0=0 Global Village, TelePort Gold II 14.4 AT&D2&C1X4V1Q0S7=70W1S95=0\N3&K3 Global Village, Teleport Gold IIv AT&F1&D0&K3S0=0 Global Village, Teleport Gold IIv AT&F1%C1&K3 Global Village, TelePorr Mercury AT&F1 Global Village, TelePort Mercury AT&F1&K3 Global Village, Teleport Mercury AT&F1&D0\Q3S0=0 Global Village, TelePort Mercury 19.2 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Global Village, TelePort Mercury (for PC) AT&F1&K3 Global Village, TelePort Platinum AT&F1W1S95=44 Global Village, TelePort Platinum (for PC) AT&F1W1S95=44 Global Village, Teleport Platinum AT\N0%C0 Global Village, TelePort Platinum AT&F1%C0 Global Village, TelePort Platinum AT&F&C1&D2&K3%C0 Global Village, TelePort Platinum AT&F1+MS=74 Global Village, TelePortPlatinum AT&F1+MS=74%C0 Global Village, TelePort Platinum 28.8 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Global Village, TelePort Platinum 33.6 AT&F1E0W2S95=45S0=0&D3S7=60\13 Global Village, TelePort Platinum V Int (Performa 6300CD) AT&F1%C1&K3 Global Village, Powerport Silver AT&F1&D0S0=0 Global Village, Platinum AT&F1&D0S0=0S95=44 Global Village, PowerPort Gold/Silver AT&F\J0\Q3\N7%C0\V2W1 Global Village, PowerPort Gold/Silver AT&F\J0\Q3\N7%C1\V2W1 Global Village, PowerPort Gold PC AT&F1%C0\N0 Global Village, PowerPort Silver& Gold AT&F\J0\Q3\N7\V2W1%C0\N0 Global Village, PowerPort Gold AT&F\J0\Q3\N7&C1\V2W1 Global Village, Powerport Gold AT&F1&D0S0=0 Global Village, Powerport Mercury (PowerBook 1xx) AT&F1&D0\Q3S0=0 Global Village, Powerport Mercury (PowerBook Duo/2&5xx) AT&F&D0S0=0 Global Village, PowerPort Mercury (100 Series) AT&F1 Global Village, PowerPort Mercury (200/500 Series) AT&F Global Village, PowerPort Mercury (200/500 Series) AT&F%C0\N0 Global Village, PowerPort Mercury (100 Series) AT&F1 Global Village, PowerPort Mercury (200/500 Series) AT&F Global Village, PowerPort Mercury (200/500 series) AT&F\N2%C1 Global Village, PowerPort Mercury (200/500 series) AT&F%C0\N0 Global Village, PowerPort Mercury AT&F%C0\N0 Global Village, PowerPort Silver AT&F\J0\Q3\N7&C1\V2W1 Global Village, PowerPort Platinum AT&F1W1S95=44%C0\N0 & Platinum/Platinum PRO PC card AT&F1W1S95=44%C0\N0 Global Village, PowerPort Platinum Pro PC Card AT&F0W1-K2-SEC=0 Global Village, PowerPort Platinum Pro PC Card AT&F1W1W2S95=44S11=50 Global Village, 33.6 Internet Edition AT&F1W1S95=44 Global Village, K56flex PC card AT&F1W1S95=44 Global Village, Teleport 56 X2 AT&F1E0Q0V1&C1&D2S0=0 Global Village, Teleport 56Kflex AT&F1W2S95=44 Global Village, TelePort 56k AT&D2&C1X4V1Q0S7=70&K1&M4S15=0
105
145 GVC GVC, Super Modem 2400 AT&F\V1%C1\C1\J0\N3\Q3&Y0GVC, 2400 ext ATS0=0V1E0M0S2=1X1GVC, 9600 AT&D2&C1X4V1Q0S7=70W2S46=0&Q5&K3GVC, 9600 AT&FS0=0E1Q0V1X4&C1&D2\Q3%C0GVC, 9600 AT&F2B0X4&C1&D1%C1\N6\Q3\V1\C1\J0GVC, 9600 AT&C1&D2%C1\Q3\J1\N6\V1\L1GVC Super Modem 9600 V.32 AT&F2X4&C1&D2%C1\C1\G0\J0\N6\Q3\V1&Y0GVC, 14.4 AT&F2&C1&D2GVC, 14.4 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3\J0GVC, 14.4 AT&D2&C1X4V1Q0S7=70W2N1&Q5&K3GVC, 14.4 (in IBM PS1's) AT&F&C1&D2X4S0=0S7=90GVC, 14.4 (in IBM Aptiva's) AT&FX4GVC, 14.4 (in IBM Aptiva's) AT&F2\N6V1S11=55Q0E0GVC, 14.4 Fax AT&F2&D0GVC, 14.4 Fax AT\N6%C1X4&C1&D0\G0\J0\Q3\V1GVC, 14.4 PCMCIA AT&F&C1&D2S95=1GVC, 14.4 V.32bis AT&F&D0%C0\Q0\N3GVC, 14.4 V.32bis AT&F&D0\N3GVC, 14.4 V.32bis AT\N6%C1X4&C1&D0\G0\J0\Q3\V1GVC, 14.4 V.42bis AT&F2&C1&D2\V1&Y0GVC, FAX 14.4 V.42bis/MNP5 AT&F2&D2GVC, F-114 AT&F&C1&D2\Q3%C0GVC, FM14400 AT&F&C1&D2\Q3%C0GVC, FM14400 PCMCIA AT&F&C1&D2\Q3%C0GVC, FM14400 PCMCIA AT&FL1%C0GVC, SM-144V (V.42bis) AT&F&C1&D3%C1\J0\N6\Q2\V1S7=60GVC, FM-288 AT&F&C1&D3%C1\J0\N6\Q3\V1S7=60GVC, FM9648/24 AT&F&C1&D2\Q3%C0GVC, FM9648/24 PCMCIA AT&F&C1&D2\Q3%C0GVC, FM9696/24 AT&F&C1&D2\Q3%C0GVC, GM14400 AT&F&C1&D2\Q3%C0GVC, GM28800 AT&F&C1&D2\Q3%C0GVC, GM33600 AT&F&C1&D2\Q3%C0GVC, SM14400 AT&F&C1&D2\Q3%C0GVC, SM9600 AT&F&C1&D2\Q3%C0GVC, SM9600 AT&F&C1&D2\N6\Q3%C0GVC, V.32 bis AT&FS0=0 E1Q0V1X4 &C1&D2\Q3%C0GVC/MaxTech, 14.4 AT&FS0=0E1Q0V1X4&C1&D2&K3GVC/MaxTech, XM144 AT&F&D0S0=0GVC/MaxTech, XVM144 AT&F&D0S0=0GVC/MaxTech, FM144 AT&F2&D0S0=0GVC/MaxTech, XM144 PCMCIA AT&F&D0S0=0GVC/MaxTech, XVM144 PCMCIA AT&F&D0S0=0GVC/MaxTech, FM9624 v.42 AT&F2&D0S0=0GVC/MaxTech, FM9696 AT&F&D0S0=0GVC/MaxTech, XM288 AT&F2&D0S0=0GVC/MaxTech, FM288 AT&F2&D0S0=0GVC/MaxTech, SM96 AT&F&D0S0=0GVC/MaxTech, SM96 V.42 AT&F2&D0S0=0GVC/Maxtech, 28.8 AT&F2S0=0E1Q0V1X4&C1&D2\Q3\T0\V3%C0\G0GVC, FM28.8 /33.6 AT&F&C1&D2\Q3%C0GVC, E288MX ATS7=60T0L0M1N3%C1&K3B0N1X4GVC, 28.8 / 33.6 V.34 AT&F&C1&D2 %C1J0N6Q3V1S7=60T0&E1GVC, 28.8 / 33.6 AT&F2%C0GVC, 28.8 / 33.6 AT&F&D0GVC, 28.8 / 33.6 AT&F&D0%C0\Q0GVC, 28.8 / 33.6 AT&D2&C1X4V1Q0S7=70l0GVC, 28.8 / 33.6 AT&D2&C1X4V1Q0S7=70\N3&K3GVC, 28.8 / 33.6 ATS7=60T0L0M1N3%C1&K3B0N1X4GVC, 28.8 / 33.6 AT&F&C1&D2%C1J0N6Q3V1S7=60T0&E1GVC, 56k V.90 +ms=v90GVC, 56k 56kflex +ms=k56flexGVC, 56k 33.6 mode +ms=v34GVC, 56k 33.6 mode +ms=11,1GVC, 56k V.90 (to disable V.90) +ms=v34,0,19200,33600
105
146 Harmony Harmony, 28.8 /33.6 AT&F&C1&D2&K3%C0Harmony, 18022 56K FDSP AT&F1E0V1Q0S0=0&C1&D2&B1&A3&M4
105
147 Hayes Hayes, Compatible 9600 /14.4 /28.8 /33.6 AT&F&C1&D2&K3%C0 Hayes, Smartmodem ATX4V1Q0S7=70 Hayes, Smartmodem V Series 2400/2400B AT&F&C1&D2 Hayes, Smartmodem 9600 AT&F&C1&D2&K3 Hayes, Smartmodem V Series 9600/9600B/9600 V.32 AT&F&C1&D2 Hayes, Smartmodem Optima 9600 AT&F&C1&D2&K3S46=136 Hayes, V-Series/Ultra AT&Q5S36=7&C1&D0&K3 Hayes, V-Series Smartmodem 9600 AT&F&C1&D2&K3S46=0 Hayes, Ultra 9600 AT&F&C1&D2&K3&Q6 Hayes, Accura AT&F&C1&D2&Q5&K3S38=0S95=42 Hayes, Accura AT&F&D2&C1 Hayes, Accura AT&D2&C1X4V1Q0S7=70 Hayes, Accura 24 EC AT&F&C1&D2&Q5&K3S38=0S95=42 Hayes, Accura 9600 AT&F&C1&D2&Q5&K3S38=0S95=42 Hayes, Accura 9600 AT&D2&C1X4V1Q0S7=70W2N1&Q5&K3 Hayes, Accura 14.4 AT&F Hayes, Accura 14.4 AT&F&Q5 Hayes, Accura 14.4 AT&F&C1&D2&K3S46=136 Hayes, Accura 14.4 AT&D2&C1X4V1Q0S7=70W2N1&Q5&K3 Hayes, Accura 14.4 AT&D2&C1X4V1Q0S7=70&Q5&K3 Hayes, Accura 14.4 AT&F&C1&D2&Q5&K3S38=0S95=42 Hayes, Accura 144+Fax/Mac AT&F&D0&K3&Q5S0=0 Hayes, Accura 144+Fax AT&F&D0&K3&Q5S0=0 Hayes, Accura 144 + FAX AT&F&C1&D2&K3&Q6 Hayes, Accura 144B+Fax AT&F&D0&K3&Q5S0=0 Hayes, ACCURA 144 EC AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47 Hayes, ACCURA 144 + FAX144 AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47 Hayes, ACCURA 144B + FAX144 AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47 Hayes, Dual Ultra 144 Line Card AT&F&D0&K3&Q5S0=0 Hayes, Optima AT&D2&C1X4V1Q0S7=70W2&Q5&K3 Hayes, Optima 2400 AT&F&C1&D2&K3W1S95=42 Hayes, Optima 9600 AT&F&C1&D2&K3&Q6 Hayes, Optima 9600 AT&D2&C1X4V1Q0S7=70W2&Q5&K3 Hayes, Optima 9600 AT&F&C1&D2&Q5&K3W2S38=0S95=42 Hayes, Optima 14.4 AT&F&D0 Hayes, Optima 14.4 AT&F&C1&D2&K3%C0 Hayes, Optima 14.4 AT&F&C1&D2&K3&Q6 Hayes, Optima 14.4 AT&D2&C1X4V1Q0S7=70W2&Q5&K3 Hayes, Optima 14.4 Fax AT&F&C1&D2&Q9&K3W2S37=0S38=0S95=46 Hayes, Optima 144+Fax PC Card Non-Jack AT&F&D0&K3&Q5S0=0 Hayes, Optima 144+Fax AT&F&D0&K3&Q5S0=0 Hayes, Optima 144 Business AT&F&D0&K3&Q5S0=0 Hayes, Optima 144+Fax/Mac AT&F&D0&K3&Q5S0=0 Hayes, Optima 144+Fax PC Card w/EZjack AT&F&D0&K3&Q5S0=0 Hayes, Optima 144B+Fax AT&F&D0&K3&Q5S0=0 Hayes, OPTIMA 144 + FAX144 AT&FW2&C1&D2&K3&Q5S7=60S46=138S48=7S95=47 Hayes, OPTIMA 144B + FAX144 AT&FW2&C1&D2&K3&Q5S7=60S46=138S48=7S95=47 Hayes, Optima 14.4 PCMCIA AT&F&C1&D2&K3S46=136 Hayes, Optima PCMCIA 14.4 AT&D2&C1X4V1Q0S7=70W2S46=136&Q5&K3 Hayes, OPTIMA 144 + FAX144 PCMCIA AT&FW2&C1&D2&K3&Q5S7=60S46=138S48=7S95=47 Hayes, OPTIMA 144 + FAX144 Pocket Edition AT&FW2&C1&D2&K3&Q9S7=60S46=138S48=7S95=47 Hayes, Ultra 144/ SC EZ AT&F&D0&K3&Q5S0=0 Hayes, Ultra 14.4 AT&F&C1&D2&K3&Q6 Hayes, Accura 28.8 / 33.6 AT&F Hayes, Accura 28.8 / 33.6 AT&Q6 Hayes, Accura 28.8 / 33.6 ext AT&FS95=3&D0X4 Hayes, Accura 28.8 / 33.6 ext AT&FS95=3&D0X4&Q5 Hayes, Accura 28.8 / 33.6 ext AT&FS95=3&D0X4&Q6 Hayes, Accura 28.8 / 33.6 Mac ATE1Q0V1X4&C1&D2&K3&Q5S0=0S36=7 Hayes, Accura 288 + Fax AT&F&D0&K3&Q5S0=0 Hayes, Accura 288 + FAX ATS0=0 E1Q0V1X4&K3 Hayes, Accura 288B+Fax AT&F&D0&K3&Q5S0=0 Hayes, Accura 288 + Fax/Mac AT&F&D0&K3&Q5S0=0 Hayes, Accura 288 V.FC AT&F&C1&D2&Q5&K3S38=0S95=42 Hayes, Accura 288 V.34/V.fc + fax AT&FX3&K3&D0 Hayes, Accura 288 V.34/V.fc + fax AT&F&C1&D2&K3&Q6 Hayes, Accura 288 V.34/V.FC + FAX AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47 Hayes, Accura 288B V.34/V.FC + FAX AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47 Hayes, Accura 28.8 / 36.6 AT&D2&C1X4V1Q0S7=70W2N1&Q5&K3 Hayes, Accura 28.8 / 36.6 AT&F&C1&D2&K3S46=136 Hayes, Accura 28.8 / 36.6 AT&F&C1&D2&K3%C0 Hayes, Accura 56K AT&F&C1&D0W2 Hayes, Accura 56K AT&F&C1&D0E0W2 Hayes, Accura 56K AT&D2&C1X4V1Q0S7=70W2N1S109=0&Q5&K3 Hayes, Accura 56K + FAX AT&F&C1&D2 Hayes, Accura 56K + FAX ext AT&F&C1&D2 Hayes, Accura (Rockwell K56flex) 56k AT&D2&C1X4V1Q0S7=70W2N1+MS=11&Q5&K3 Hayes, Optima 28.8 / 36.6 AT&F&K3S7=90S9=16S10=36 Hayes, Optima 28.8 / 33.6 AT&F&k3L1M0S7=90S9=16S10=36 Hayes, Optima 28.8 / 33.6 AT&F&C1&D2&S0 Hayes, Optima 28.8 / 33.6 AT&F&C1S46=136S48=0 Hayes, Optima 28.8 / 33.6 AT&F&C1&D2S37=12 Hayes, Optima 28.8 / 33.6 AT&F&C1&D2&K3S46=136 Hayes, Optima 28.8 / 33.6 AT&D2&C1X4V1Q0S7=70W2&Q5&K3 Hayes, Optima AT&F&Q9 Hayes, Optima 288 V.FC + Fax AT&F&C1&D2&K3&Q9W2S37=0S38=0S95=46 Hayes, OPTIMA 288 V.34/V.FC + FAX AT&FW2&C1&D2&K3&Q9S7=60S46=138S48=7S95=47 Hayes, OPTIMA 288B V.34/V.FC + FAX AT&FW2&C1&D2&K3&Q9S7=60S46=138S48=7S95=47 Hayes, Optima 288 Business AT&F&D0&K3&Q5S0=0 Hayes, Optima 288+Fax PC Card Non-Jack AT&F&D0&K3&Q5S0=0 Hayes, Optima 288+Fax PC Card w/EZjack AT&F&D0&K3&Q5S0=0 Hayes, Optima 288+Fax AT&F&D0&K3&Q5S0=0 Hayes, Optima 288 Business Modem Mac AT&F&D0&K3&Q5S0=0 Hayes, Optima 288B+Fax AT&F&D0&K3&Q5S0=0 Hayes, Optima 288 V.FC+FAX AT&K3X3&D0 Hayes, Optima 288 V.FC+FAX AT&F&C1&D2&Q6&K3 Hayes, Optima 288 V.FC+FAX AT&FE1l1V1X4&C1&D0S0=0S7=60 Hayes, Optima 288+Fax Mac AT&F&D0&K3&Q5S0=0 Hayes, Optima 288 PCMCIA AT&F&C1&D2&K3%C0 Hayes, Optima 288 PCMCIA AT&F&D0S95=3&K3X4 Hayes, Optima 288 PCMCIA AT&F&D0S95=3&K3X4&Q5 Hayes, Optima 288 PCMCIA AT&F&D0S95=3&K3X4&Q6 Hayes, Optima 288 PCMCIA AT&D2&C1X4V1Q0S7=70W2S46=136&Q5&K3 Hayes, Optima 288 ext AT&F&D0S95=3X4 Hayes, Optima 288 ext AT&F&D0S95=3X4&Q5 Hayes, Optima 288 ext AT&F&D0S95=3X4&Q6 Hayes, Optima 28.8 and 33.6 AT&F&C1&D2 Hayes, Optima 28.8 and 33.6 AT&F&C1&D2&K3 Hayes, Optima 28.8 and 33.6 AT&F&C1&D0E0W2 Hayes, Optima 56K AT&F&C1&D0E0W2 Hayes, US-Quad Ultra 28.8 v.34 AT&F&D0&K3&Q5S0=0 Hayes, Ultra 96/SC EZ AT&F&D0&K3&Q5S0=0 Hayes, Ultra 9600 AT&F&C1&D2 Hayes, Ultra 14.4 AT&F&C1&D2W1S38=0 Hayes, V Series 2400/2400B V.42 AT&F&C1&D2&K3&Y0 Hayes, V Series 9600/9600B V.42 AT&F&C1&D2&K3&Y0 Hayes, V-Series 9600 AT&D2&C1X4V1Q0S7=70S46=0&Q5&K3 Hayes, V-Series Ultra 9600 AT&D2&C1X4V1Q0S7=70W2S46=0&Q5&K3 Hayes, V-series ULTRA Smartmodem 14.4 AT&FW2&C1&D2&K3&Q5S7=60S38=10S46=2S48=7S95=63 Hayes, V-Series Ultra 14.4 AT&D2&C1X4V1Q0S7=70W2S46=0&Q5&K3 Hayes, 28.8 V.FAST AT&Q6&KS37=9N%C0\N0 Hayes, ISDN TA 2.0 (ISDN 56k) AT&F%A1=0%A2=2%A4=1%A0=2W1&D2&K3 Hayes, ISDN TA 2.0 (ISDN 64k) AT&F%A1=0%A2=2%A4=0%A0=2W1&D2&K3 Hayes, ISDN Terminal Adaptor AT&F&C1&D2&K3%A1=0%A2=2%A0=2W1
105
148 Hidem, Highwayman, Holmes, Hornet HSP, Hypertec Hidem, 2400 AT&FHidem, 2442 AT&F\N7Hidem, 9600 AT&FW2\N6Hidem, 14.4FAX AT&FW2\N6Hidem, 14.4P/FAX AT&FW2\N6Hidem, 14.4DLX AT&FW2\N6Highwayman, AT&FB0l3X3&C1&D2&P1\N3Holmes, Correspondent ATQ0V1X4&C1&D2&S1Hornet 2 AT&F1&Q6HSP Deluxe 33.6 AT&F&C1&D2&K3W1Hypertec, AT&FS0=0S7=60&K3&D2X3#K0Hypertec, AT&FS0=0S7=60&K3&D2X3\N3-K0
105
149 IBM/MWave IBM, PS/2 Data/Fax AT&F&C1&D2\Q3\N3\J0\V1IBM, 9600 7855 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3 IBM, 9600 Internal PS/1 AT&D2&C1X4V1Q0S7=70 IBM, 9600 Internal ThinkPad AT&D2&C1X4V1Q0S7=70W2\G0\N3\Q3 IBM, N51 Laptop 9600 AT&F&C1&D2\J0\N7\Q3\V2%C1IBM, 12000 7855 AT&D2&C1X4V1Q0S7=70\G0&A8\N3\Q3 IBM, 14.4 Int AT&F&C1&D2%C0IBM, 14.4 Int AT&F&C1&D2IBM, 14.4 Int AT&D2&C1X4V1Q0S7=70W1\N3&Q5&K3IBM, 14.4 7851-001 AT&D2&C1X4V1Q0S7=70W2\G0&Q5&K3\J0 IBM, 14.4 7851-002 AT&D2&C1X4V1Q0S7=70W2\N3&K3 IBM, 14.4 7852-001 (SOHO) AT&D2&C1X4V1Q0S7=70W2\N3&K3 IBM, 14.4 Internal (ISA) AT&D2&C1X4V1Q0S7=70W2\N3&K3 IBM, 14.4 Internal (Microchannel) AT&D2&C1X4V1Q0S7=70W2&Q5&K3 IBM, 14.4 Internal ThinkPad AT&D2&C1X4V1Q0S7=70W2\G0\N3\J0 IBM, 14.4 Mwave (Generic) AT&D2&C1X4V1Q0S7=70\N7\Q3 IBM, 14.4 Mwave AT&F&C1&D2&K3IBM, 14.4 Mwave WindSurfer (old) AT&D2&C1X4V1Q0S7=70\N3\Q3 IBM, 14.4 PS/55 note Data/Fax AT&D2&C1X4V1Q0S7=70\N3&K3 IBM, 14.4 DataFax Highspeed AT&F&C1&D2\J0\N3&K3&Q5%C3W1IBM, 14.4 Easy Options AT&FW2&C1&D3&K3&Q5%C3\N3S7=60S95=47 IBM, 14.4 N51 Laptop AT&F&C1&D2\J0\N7\Q3\V2%C1IBM, 14.4 NC400 AT&F&C1&D2&K3%C0IBM, 14.4 Options AT&F&C1&D2&K3%C0IBM, 14.4 Options PCMCIA AT&F&C1&D2&K3%C0IBM, 14.4 Options PCMCIA AT&F&C1&D2&K3IBM, 14.4 PCMCIA (Integrated DAA) AT&D2&C1X4V1Q0S7=70W2\G0%E2\N3&K3 IBM, 14.4 PCMCIA (Original) AT&D2&C1X4V1Q0S7=70W2\G0%E1\N3&K3 IBM, 14.4 PCMCIA AT&F&C1&D2&K3%C0IBM, Aptiva 14.4 Int AT&D2&C1X4V1Q0S7=70\G0\N3\Q3\J0 IBM, Aptiva 14.4 Int AT&F&C1&D2\Q3%C0IBM, 19.2 7857 AT&D2&C1X2V1Q0S7=70&E1&K2&U4&I1 IBM, 28.8 7852-010 AT&D2&C1X4V1Q0S7=70W2\N3&K3 IBM, 28.8 7852-013 AT&D2&C1X4V1Q0S7=70W2\N3&K3 IBM, 28.8 Internal (ISA) AT&D2&C1X4V1Q0S7=70W2\N3&K3IBM, Mwave ATS0=0Q0V1&C1&D2MIBM, Mwave 28.8 / 33.6 AT&C1&D0W2\N4IBM, Mwave 28.8 / 33.6 AT&F&D0&N0\N3%C1%E2S0=0 IBM, Mwave 28.8 / 33.6 AT&F&D0X4W2IBM, Mwave 28.8 / 33.6 AT&F&D0X4W2\N4IBM, MWave 28.8 / 33.6 AT&F&K0\N0 IBM, Mwave 28.8 / 33.6 AT&F&C1&D2&K3IBM, Mwave 28.8 / 33.6 AT&FV1&D0W2X4IBM, Mwave 28.8 / 33.6 AT&D2&C1X4V1Q0S7=70\N7\Q3 IBM, Mwave 28.8 / 33.6 AT&F&D3\N5\Q3IBM, Mwave 28.8 / 33.6 ATS28=18IBM, Mwave 28.8 / 33.6 AT"H%C\N*TH8IBM, Mwave 28.8 / 33.6 AT"H%C\NS28=18IBM, MWave WindSurfer AT&F\N0%C0 IBM, 28.8 PCMCIA (Integrated DAA) AT&D2&C1X4V1Q0S7=70W2\G0%E2\N3&K3 IBM, 7851 14.4Kbps External Data/Fax AT&FW2&C1&D3&K3&Q5%C3\N3S7=60S36=7S46=138S95=47 IBM, 7855 Model 10 AT&F&C1&D2&AL8&B8N1&I0&M0\D0\IBM, Data/Fax PCMCIA AT&F&C1&D3&K3&Q5%C3\N3S7=60S38=7S46=138S48=7S95=47 IBM, ThinkPad 701C/701CS Int AT&FW2&C1&D3&K3&Q6%C1S7=60 IBM, ThinkPad Internal V.32terbo AT&F&C1&D2&K3%C0IBM, ThinkPad Internal V.32terbo AT&F&C1&D2&K3IBM, Data/Fax 56k X2 AT&D2&C1X4V1Q0S7=70&M4&B1&H1&R2 IBM, PCMCIA 56k X2 AT&D2&C1X4V1Q0S7=70&M4&B1&H1&R2IBM, WaveRunner (ISDN) HDLC Async to Sync AT&FV1X4Y0&D3%C1 IBM, WaveRunner (ISDN) V.120 AT&FV1X4Y0&D3%C1IBM, X2 56K Limited to 33.6 S32=32IBM, X2, V.90 Limited to 33.6 S32=64
105
150 Icodata, Identify, IGER, Image, ImagiNation, Incomm Icodata, 14.4 V.32bis int fax AT&FW2&C1&D2&K3S7=60S36=7S46=2S48=7 Icodata, 14.4 AT&F&K3\N5%C0 Icodata, 14.4 AT&D2&C1X4V1Q0S7=70W0 Identity, 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Identity, 14.4 Fax AT&F&K3&C1&D2%C0 Identity 14.4 AT&F2\N6&C1&D2\J0S7=60S11=55 Identity ID9600 AT&F2\N6&C1&D2\J0 IGER, 14.4 PCMCIA AT&D2&C1X4V1Q0S7=70W1S95=46 IGER, 14.4 PCMCIA AT&D2&C1X4V1Q0S7=70 iMAC 56k modem AT&FE0Q0V1X4&C1&K3S95=1S7=75S0=0 iMAC 56k modem AT&FE0Q0V1X4&C1&K3S95=1S7=75S0=0+MS=11/1 Image Twincom, 96/42i AT&F&C1&D2&K3\N3\G0S95=41 Image Twincom, 14.4 AT&FS0=0E1Q0V1X3&C1&D2&Q5%C0S7=55S95=46 Image Twincom, 14.4/DF AT&F&C1&D2&Q5S95=46 ImagiNation 14.4FX3 Data Fax AT&FW2&C1&D2&K3S7=60S36=7S46=2S48=7 Incomm, 2405 AT&F&C1&D2\J0\N3\Q3\V1 Incomm, 9600/9605 AT&F&C1&D2\J0\N3\Q3\V1
105
151 Inforunner, Infotel, Intecom, Integran, Intelligent, Interlink, Intertex, Inwave, IRE Info Runner, 2496 Fax AT&F&C1&D2&R0\N7%C1\V1\J0\Q3&K3 Info Runner, 9600 AT&F&C1&D2&K3%C0 Info Runner, 9600 AT&F&C1&D2\Q3%C0 Infotel, AT&q0s37=9n0s36=3s48=128%c0&d2 Infotel, AT&FS37=0N0W2&C1&D2&K0&Q6\N0%C0%M0 Infotel, 9600 AT&F2&C1&D2 Infotel, 14.4 AT&FW1S95=41 Infotel, 14.4 AT&F&C1&D2X3&K3 Infotel, 14.4 AT&D2&C1X4V1Q0S7=70%E0&Q5&K3 Infotel, PCMCIA 14.4 AT&D2&C1X4V1Q0S7=70\N3\Q3\J0 Infotel, 1414VQ AT&F&C1&D2&K3%C0 Infotel, 1414VQP AT&F&C1&D2&K3%C0 Infotel, 144I AT&Q0S37=9N0&D2 Infotel, 144I (V.42bis) AT&F&C1&D3&K3&Q5\N3%C1S7=60S36=7S46=138S48=7S95=47 Infotel, 1414QVE (V.32bis) AT&F&D3&K3&Q5\J0\N3%C3S7=60S36=7 Infotel, 1428VQ 28.8 /33.6 series AT&F&C1&D2&K3%C0 Infotel, 14.4 AT&D2&C1X4V1Q0S7=70W2\G0%E0N1&Q5&K3\J0 Infotel, 28.8 AT&D2&C1X4V1Q0S7=70%E0&Q5&K3\N3 Infotel, 28.8 AT&D2&C1X4V1Q0S7=70W2\G0%E0N1&Q5&K3\J0 Intecom, PDI-1000/S AT&F&C1&D2&K3X4 Integran, FAX MP96 9600 AT&D2&C1X4V1Q0S7=70 Integran, 9600 Fax AT&D2&C1X4V1Q0S7=70\N3\Q3\V3 Intelligent Modem, Series 9600 AT&F&C1&D2%C1\J0\N3\Q3\V1 Interlink, Base6 AT&F&D2&C1$F3$C0S7=60 Interlink, Fastbit 14.4 AT&F$F3F0=0F7=60 Interlink, Fastbit II AT&F&C1&D2$F3S7=60 InterLink, Fastbit II 14.4 AT&D2 Interlink, Faxmodem 3i AT&F&D2&C1\Q3%C0S7=60 Interlink, Hotlink 28.8 AT&FE1V1X4&C1&D2S7=90%C0\N3 Interlink, Hotlink 5i (internal) AT&F&K3&D0&C1&W1S95=45 Interlink, IQ6 AT&F$F3&D2&C1$C0S7=60 Interlink, Voidax AT&F&D2&C1&K3%C0 Intertex, Data/Fax 2400 AT&F&C1&D2&K3\J0\N30 Intertex, Data/Fax 14.4 AT&F&C1&D2&K3\J0\N30 Inwave, Hurricane 14.4 Fax AT&F&C1&D2&K3&Q5\N3%C1 IRE, 28.8 AT&D2&C1X4V1Q0S7=70\N3&K3
105
152 Intel Intel, 2400 AT&D2&C1X4V1Q0S7=70 Intel, 2400B MNP AT&F\Q3\N3\J0\V1 Intel, 9600 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3\J0 Intel, 9600 EX AT&F&C1&D2\Q3\N3\J0\V1%C0 Intel, 9600 EX AT\N3%C1&C1&D0\Q3 Intel, 9600 EX AT&F&C1&D2\Q3%C0"H0 Intel, 9600 EX AT&F&C1&D2\Q3 Intel, 9600 PCMCIA AT&F%C0 Intel, 9600 PCMCIA AT&F&C1&D2\Q3%C0 Intel, 96/14.4 EX series AT\N0%C0\Q0-J0 Intel, 96/14.4 EX Series ATZ0-J0\N0 Intel, 14.4 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3\J0 Intel, 14.4 AT&FL1%C0"H0 Intel, 14.4 AT&F&C1&D2\Q3L1%C0"H0 Intel, 14.4 AT&FL1"H0%C0\V3\J0 Intel, 14.4 AT&D0&C1X4V1Q0S7=70S12=2\G0\N3\Q3\J0 Intel, 14.4 AT\N0%C0\Q0B8 Intel, 14.4 int ATZB8Q1\C0\N1%C0\V"H Intel, 14.4 Int AT&F&D2&C1\N3%C0 Intel, 14/14e 14.4 AT&F\N0%C0 Intel, 144/144e AT&F&D0\Q3\N3%C1-J1"H3S0=0 Intel, 14.4 Int AT&FL1\J0%C0"H0 Intel, 14.4 EX AT&F&D0 Intel, 14.4 EX AT\N3%C1&C1&D0\Q3 Intel, 14.4 EX AT&F&C1&D3\J0\N3\Q2\V2%C1"H3S7=60 Intel, 14.4 EX AT&F&D0\Q3\N3%C1-J1"H3S0=0 Intel, 14.4 Ext AT&F&D0X4W0S95=3 Intel, 14.4 EX AT&F&T5 Intel, 14.4 Ext AT&FL1\J0%C0"H0 Intel, 144/144i AT&F&D0\Q3\N3%C1-J1"H3S0=0 Intel, 144/144i AT\N0%C0\Q0B8 Intel, 14.4/14.4 Fax AT&F&C1&D2\J0\N3\Q3\V2 Intel, 14.4 PCMCIA AT&F%C0 Intel, 14.4 PCMCIA AT&F&C1&D2\Q3%C0 Intel, 14.4 PCMCIA AT&F&T5\N4 Intel, 14.4 PCMCIA AT&FB0&C1&D2\N3%C0 Intel, 14.4 PCMCIA AT&D2&C1X4V1Q0S7=70W2\N3&K3 Intel, PCMCIA Faxmodem 14.4/14.4 (Release 2) AT&FW2&C1&D3\N3\Q3%C3S7=60S95=47 Intel, PCMCIA Faxmodem 14.4/14.4 (Release 3) AT&FW2&C1&D2&K3\N3%C3S7=60S95=47 Intel, 14.4/14.4 PCMCIA (Release 2) AT&F&D0\Q3&Q5S0=0 Intel, 14.4/14.4 PCMCIA (Release 3) AT&F&D0&K3&Q5S0=0 Intel, 2400 v.42bis AT&F&D0\Q3\N3%C1-J1"H3S0=0 Intel, 2400B MNP/2400EX MNP AT&F&D0\Q3\N3%C1-J1"H3S0=0 Intel, 24v/96i AT&F&D0\Q3\N3%C1-J1"H3S0=0 Intel, 24v/96e AT&F&D0\Q3\N3%C1-J1"H3S0=0 Intel, 96/96 PCMCIA (Release 3) AT&F&D0&K3&Q5S0=0 Intel, 96/96 PCMCIA (Release 2) AT&F&D0\Q3&Q5S0=0 Intel, 96/96e AT&F&D0\Q3\N3%C1-J1"H3S0=0 Intel, 96/96i AT&F&D0\Q3\N3%C1-J1"H3S0=0 Intel, 9600EX AT&F&D0\Q3\N3%C1-J1"H3S0=0 Intel, PCMCIA Faxmodem 14.4/14.4 (Release 2) AT&FW2&C1&D3\N3\Q3%C3S7=60S95=47 Intel, PCMCIA Faxmodem 14.4/14.4 (Release 3) AT&FW2&C1&D2&K3\N3%C3S7=60S95=47 Intel, SatisFAXtion 100 AT&F\C1S11=55&Y00 Intel, SatisFAXtion 200 AT&F\N0%C0 Intel, SatisFaxtion 200 AT&F&C1&D2\Q3"H0%C0 Intel, SatisFAXtion 200 AT&F&C1&D2\Q3\V1\N3 Intel, SatisFaxtion 200 AT&FL1"H0%C0\V3\J0 Intel, SatisFaxtion 400 AT&FL1\J0%C0"H0 Intel, SatisFAXtion 400 AT&F&T5&C1&D2\J0\N3\Q3\V2 Intel, SatisFAXtion 400e AT/n0/q0%c0 Intel, SatisFAXtion 400 and 400e AT&F&C1&D3\J0\N3\Q1\V2%C1"H3S7=60 Intel, SatisFAXtion 400e 14.4 AT&D2&C1X4V1Q0S7=70\N3&K3 Intel, SatisFAction Classic (Upgraded) AT&F&D0\Q3\N3%C1-J1"H3S0=0 Intel, SatisFAXtion 300 AT&F&D0\Q3\N3%C1-J1"H3S0=0 Intel, SatisFAXtion 350 AT&F&D0\Q3\N3%C1-J1"H3S0=0
105
153 Jaton Jaton, 56k Communicator(X2) AT&FV1&C1&D2Jaton, Modulator 56 AT&FV1&C1&D2
105
154 J&M, Juni, Kortx, Ktx J&M, 14.4FX AT&F&C1&D2&K3%C0J&M, 14.4FX AT&F&C1&D2&K3Juni, V.34 AT&FB0X3W2%E0Kortex International All S0=0 E1Q0V1X4Kortex International KxTel Fax S0=0 E1Q0V1X4KTX (gvc clones) AT&F&C1&D2S0=0S95=0W2
105
155 Lasat, LCE, Leading Edge, Lightning, LightSpeed, LineLink Lasat, unique 24/96 Fax AT&F&C1&D2S38=0S95=2W0Lasat, Credit 14.4 AT&F&C1&D2S38=0S95=2W0Lasat, 14.4 Series AT&F&C1&D2S38=0S95=2W0Lasat, 14.4 AT&D2&C1X4V1Q0S7=70\N3&K3Laser, Sendfax ATQ0V1X4&C1&D2LCE-125, Series AT&F1E1V1X4&C1&D2&K3\N6LCE-132, P AT&F1E1V1X4&C1&D2&K3&Q5\N6Leading Edge, 14.4 Int AT&FS0=0E1Q0X4V1&C1&D2\Q3%C0LightFax, 1414VLC ATx3v1b0f0m1l2q0w2&l0&p1s6=3s7=60s8=2s91=14s92=14&y0&w0Lightning LightCom, 9600 AT&F&C1&D2S36=7S95=430&Y0Lightning LightCom, 14.4 AT&F&C1&D2W2LightSpeed, 1414VLC AT&FX3&K3&D0LightSpeed, LightFax 28.8 AT&F&C1&D2&K0\N3%C0LightSpeed, LightFax 33.6 AT&F&C1&D2&K3%C0LineLink, 14.4 E AT&F0&D0&Q6&K3&R0\N7S0=0LineLink, 14.4 E AT&F&C1Linkskey, 56kflex (limited to 33.6) +ms=11,0,9600,33600Linkskey, 56kflex (limited to 33.6) +ms=11,1Linkskey, 56kflex +ms=+ms=56,1,19200,56000,1,0Linkskey, 56kflex +ms=+ms=56,1,34000,56000
105
156 Logicode Logicode, Quicktel 2400H ATE1Q0V1X4&C1&D2 Logicode, Quicktel 2400 V.42bis AT&F&C1&D2%C1&K3\N3 Logicode, Quicktel 2400X ATE1Q0V1X4&C1&D2 Logicode, Quicktel M2400X ATE1Q0V1X4&C1&D2 Logicode, Quicktel 9624LH ATE1Q0V1X4&C1&D2 Logicode, Quicktel 9624LX ATE1Q0V1X4&C1&D2 Logicode, Quicktel M9624LX ATE1Q0V1X4&C1&D2 Logicode, Quicktel 9624LP ATE1Q0V1X4&C1&D2 Logicode, Quicktel M9624LP ATE1Q0V1X4&C1&D2 Logicode, Quicktel 96HV AT&F&C1&D2\N3&K3 Logicode, Quicktel 96XV AT&F&C1&D2\N3&K3 Logicode, Quicktel M96XV AT&F&C1&D2\N3&K3 Logicode, Quicktel 9696HV AT&F&C1&D2\N3&K3 Logicode, Quicktel 9696XV AT&F&C1&D2\N3&K3 Logicode, Quicktel M9696XV AT&F&C1&D2\N3&K3 Logicode, Quicktel 9600 V.32/V.42bis AT&FS0=0 E1L1Q0V1X4 &C1&D2&K3%C0S7=90 Logicode, Quicktel 9624LX AT&F&D0S0=0 Logicode, Quicktel 9624LH AT&F&D0S0=0 Logicode, Quicktel 14.4 AT&F&C1&D2\Q3%C0 Logicode, Quicktel 14.4 AT&F1\N0%C0 Logicode, Quicktel 14.4 AT&D2&C1X4V1Q0S7=70\G0\N6\Q3\J0 Logicode, Quicktel (RPI) 14.4 AT&D2&C1X4V1Q0S7=70W2 Logicode, Quicktel 14.4HV AT&F&C1&D2\N3&K3 Logicode, Quicktel 1414HV AT&F&D0\N3S0=0 Logicode, Quicktel 1414HV AT&FS0=0 E1Q0V1X4 &C1&D2\Q3%C0 Logicode, Quicktel 1414HV AT&F&C1&D2\N3&K3 Logicode, Quicktel 1414LLH (w/WinRPI) AT&F&D0+H3S95=1S0=0 Logicode, Quicktel 1414XV AT&F&D0\N3S0=0 Logicode, Quicktel 1414XV AT&F&C1&D2\N3&K3 Logicode, Quicktel 14.4XV AT&F&C1&D2\N3&K3 Logicode, Quicktel M14.4XV AT&F&C1&D2\N3&K3 Logicode, Quicktel M1414XV AT&F&C1&D2\N3&K3 Logicode, Quicktel 1414LH (w/WinRPI) AT&F&D0+H3S95=1S0=0 Logicode, Quicktel 1414LX (w/WinRPI) AT&F&D0+H3S95=1S0=0 Logicode, Quicktel XEBA 1414 AT&FS0=0 E1L1Q0V1X4 &C1&D2&K3%C0S7=90 Logicode, Quicktel PCMCIA 14.4 AT&F&D0\N3S0=0 Logicode, Quicktel 2814HV-US AT&F&D0\N3S0=0 Logicode, Quicktel 2814X-US AT&F&D0\N3S0=0 Logicode, Quicktel 2814XV AT&F&D0\N3S0=0 Logicode, Quicktel 2814HV AT&F&D0\N3S0=0 Logicode, Quicktel 2814HV-US 28.8 AT\N1%C0 Logicode, Quicktel 2814HV-US 28.8 AT&F&C1&D2\N5S10=60S11=50S95=0+MS=74 Logicode, Quicktel 28.8 / 33.6 AT&F&C1&D2&K3%C0 Logicode, Quicktel Xeba 28.8 AT\N1%C0 Logicode, Quicktel Series AT&FS0=0 E1L1Q0V1X4 &C1&D2&K3%C0S7=90 Logicode, S0=0 E1Q0V1X4 Logicode, 33.6 AT\N1%C0"H0 Logicode, 33.6 HP-CL AT&F&K3&C1&D2%C0 Logicode, 56W-P AT&F&C1&D2&M4S7=90S10=60
105
157 Lucent Lucent, Chipset Modems K56Flex only (V.90 off) S109=0Lucent, Chipset Modems K56flex or V.90 S109=1Lucent, Chipset Modems V.90 only (K56Flex off) S109=2Lucent Technologies, 56k Flex AT&F&C1Lucent Technologies, LT Winmodem 56kflex AT&D2&C1X4V1Q0S7=70W1\N3&Q5&K3S38=0Lucent Technologies, LT WinModem AT&FXLucent Technologies, LT WinModem 56Kflex AT&FLucent Technologies, LT WinModem 56Kflex AT&F1&W^MLucent Technologies, LT Winmodem 56Kflex AT&FS=S10Lucent Technologies, LT Winmodem 56Kflex Enabled S38=1Lucent Technologies, LT Winmodem 56Kflex Disabled S38=0Lucent Technologies, LT Winmodem Limit Upstream S37=14Lucent,Technologies, LT Winmodem V.90 Enabled -V90=1Lucent,Technologies, LT Winmodem V.90 AT&F\N3%C1 Lucent,Technologies, LT Winmodem V.90 AT&FS=S10 Lucent,Technologies, LT Winmodem V.90 AT&F&C1&D2%C0\N3Lucent,Technologies, LT Winmodem V.90 AT&FX&C1&D2S95=1Lucent,Technologies, LT Winmodem V.90 AT&F&C1&D2L3S95=3S11ULucent,Technologies, LT Winmodem V.90 AT&F&C1&D2&K3%C0-V90S37=0S38=8Lucent,Technologies, LT Winmodem V.90 AT&D2&C1X4V1Q0S7=70W1\N3&Q5&K3S38=0Lucent Technologies, LT Winmodem V.90 Enabled AT&FX-v90=1S38=0S28=1Lucent Technologies, LT Winmodem V.90 Enabled AT&FX&C1&D2S38=0Lucent Technologies, LT Winmodem V.90 Disabled -V90=0Lucent Technologies, LT Winmodem Limited to 33.6 AT&FX-v90=0S38=0S28=1
105
158 Mac, Macintosh, Apple Apple Express, AT&F\N3&K3 Apple Express, AT&F&D0\N3S0=0 Apple Express, AT&F&Q5 Apple Express, AT&F\N3&K3 Apple Express, AT&F&D0 Apple Express, 14.4 AT&F&Q0 Apple Express, 28.8 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Apple Express /Geoport, AT&F&D0&Q0 Apple, GeoPort AT&FS37=11N0M0 Apple, GeoPort AT&F&D0\N3S0=0 Apple, GeoPort 14.4 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3\J0 Apple Powerbook 3400, Int 33.6 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Best Data, 9624FXMAC AT&F&C1&D2S11=60L3 Best Data, 1442VLXMAC AT&F&C1&D2S11=60L Best Data, 1442FLXMAC AT&F&C1&D2S11=60L3 Best Data, 1442FLXMAC AT&F&C1&D2S11=60L3 Best Data, 1442FXMAC AT&F&C1&D2S11=60L3 Best Data, Smart One 2834FLXMAC AT&F&D0&K3&Q5S0=0 Best Data, Smart One 1442FLXMAC AT&F&D0&K3&Q5S0=0 Best Data, Smart One 1442VLXMAC AT&F&D0&K3&Q5S0=0 Best Data, Smart One 2834VLXMAC AT&F&D0&K3&Q5S0=0 Best Data, Smart One 336FLX Mac AT&F0L1 Best Data, 2834FLXMAC AT&F&C1&D2S11=60L3 Best Data, 2834VLXMAC AT&F&C1&D2S11=60L3 Best Data, 2834FXMAC AT&F&C1&D2S11=60L3 Boca, V.34 Fast Mac AT&F&D0S0=0 Boca, V.34 Fast Mac AT&F&C1&D2&K3%C1%E1S95=47 Digicom, Eagle 9600/Scout Plus AT&F&D FastMac, AT&F&C1&D0&K3&Q5S0=0S95=3S10=35 Geoport, AT&FE0 Geoport, AT%C0S46=136 Geoport, AT&FE0&Q0 Geoport, AT&F\N3 GeoPort, 14.4 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3\J0 Global Village, Gold 14.4 AT&FV1Q0X3&C1&D2%C0\N3 Global Village, Bronze AT&F%C0\N0 Global Village, TelePort Bronze AT&F Global Village, Teleport Silver AT&F1&D0S0=0 Global Village, TelePort Silver AT\J0\N3%C0&C1&D2\Q3\V1 Global Village, TelePort Silver AT\J0\N3%C1&C1&D0\Q3\V1 Global Village, TelePort Silver AT&F1S11=60 Global Village, Teleport Silver AT&F1%C0\N0 Global Village, TelePort Silver AT&D2&C1X4V1Q0S7=70W2\N3&K3 Global Village, TelePort Gold AT&F1 Global Village, Teleport Gold AT&F1&D0S0=0 Global Village, Teleport Gold AT&F1S95=44 Global Village, Teleport Gold AT&F1S95=44 Global Village, Teleport Gold AT&F1S95=44 Global Village, TelePort Gold 9600 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Global Village, TelePort Gold II AT&F1&K3 Global Village, TelePort Gold II AT&F1&K3 Global Village, Teleport Gold II AT&F1&D0&K3S0=0 Global Village, TelePort Gold II 14.4 AT&D2&C1X4V1Q0S7=70W1S95=0\N3&K3 Global Village, Teleport Gold IIv AT&F1&D0&K3S0=0 Global Village, Teleport Gold IIv AT&F1%C1&K3 Global Village, TelePort Mercury AT&F1 Global Village, TelePort Mercury AT&F1&K3 Global Village, Teleport Mercury AT&F1&D0\Q3S0=0 Global Village, TelePort Mercury 19.2 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Global Village, TelePort Mercury AT&F1&K3 Global Village, TelePort Platinum AT&F1W1S95=44 Global Village, TelePort Platinum AT&F1W1S95=44 Global Village, Teleport Platinum AT\N0%C0 Global Village, TelePort Platinum AT&F1%C0 Global Village, TelePort Platinum AT&F&C1&D2&K3%C0 Global Village, TelePort Platinum AT&F1+MS=74 Global Village, TelePort Platinum AT&F1+MS=74%C0 Global Village, TelePort Platinum 28.8 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Global Village, TelePort Platinum 33.6 AT&F1E0W2S95=45S0=0&D3S7=60\13 Global Village, TelePort Platinum V Int (Performa 6300CD) AT&F1%C1&K3 Global Village, Powerport Silver AT&F1&D0S0=0 Global Village, Platinum AT&F1&D0S0=0S95=44 Global Village, PowerPort Gold/Silver AT&F\J0\Q3\N7%C0\V2W1 Global Village, PowerPort Gold/Silver AT&F\J0\Q3\N7%C1\V2W1 Global Village, PowerPort Gold PC AT&F1%C0\N0 Global Village, PowerPort Silver& Gold AT&F\J0\Q3\N7\V2W1%C0\N0 Global Village, PowerPort Gold AT&F\J0\Q3\N7&C1\V2W1 Global Village, Powerport Gold AT&F1&D0S0=0 Global Village, Powerport Mercury (PowerBook 1xx) AT&F1&D0\Q3S0=0 Global Village, Powerport Mercury (PowerBook Duo/2&5xx) AT&F&D0S0=0 Global Village, PowerPort Mercury (100 Series) AT&F1 Global Village, PowerPort Mercury (200/500 Series) AT&F Global Village, PowerPort Mercury (200/500 Series) AT&F%C0\N0 Global Village, PowerPort Mercury (100 Series Mac) AT&F1 Global Village, PowerPort Mercury (200/500 Series Mac) AT&F Global Village, PowerPort Mercury (200/500 series Mac) AT&F\N2%C1 Global Village, PowerPort Mercury (200/500 series Mac) AT&F%C0\N0 Global Village, PowerPort Mercury AT&F%C0\N0 Global Village, PowerPort Silver AT&F\J0\Q3\N7&C1\V2W1 Global Village, PowerPort Platinum AT&F1W1S95=44%C0\N0 & Platinum/Platinum PRO PC card AT&F1W1S95=44%C0\N0 Global Village, PowerPort Platinum Pro PC Card AT&F0W1-K2-SEC=0 Global Village, PowerPort Platinum Pro PC Card AT&F1W1W2S95=44S11=50 Global Village, 33.6 Internet Edition AT&F1W1S95=44 Global Village, K56flex PC card AT&F1W1S95=44 Global Village, Teleport 56 X2 AT&F1E0Q0V1&C1&D2S0=0 Global Village, Teleport 56Kflex AT&F1W2S95=44 Global Village, TelePort 56k AT&D2&C1X4V1Q0S7=70&K1&M4S15=0 Hayes, Accura 144+Fax/Mac AT&F&D0&K3&Q5S0=0 Hayes, Optima 144+Fax/Mac AT&F&D0&K3&Q5S0=0 Hayes, Accura 28.8 / 33.6 ATE1Q0V1X4&C1&D2&K3&Q5S0=0S36=7 Hayes, Accura 288 + Fax AT&F&D0&K3&Q5S0=0 Hayes, Optima 288 Business AT&F&D0&K3&Q5S0=0 Hayes, Optima 288+Fax AT&F&D0&K3&Q5S0=0 iMAC 56k modem AT&FE0Q0V1X4&C1&K3S95=1S7=75S0=0 iMAC 56k modem AT&FE0Q0V1X4&C1&K3S95=1S7=75S0=0+MS=11/1 Mac v.34 AT&F1 Mac v.34 Line Link 14.4 E AT&F&C1 Mac v.34 PowerUser 14.4 E AT&F&C1 Macintosh, Int AT&F\N3&D3&Q5 Macintosh, Express AT&F&D0&Q5\N3S0=0 Macintosh, Express AT&F\N3&D3&Q5A Motorola, 33600 AT&F*DC0*FL3 MultiTech, MT1432MU, MT1432MU AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT1432BA/MT1432BAI/MT1432BA AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT1932PCS, MT1932PCS AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT932BA/MT932BAI/MT932BA AT&F0&D0&E2&E4&E13&E15S0=0 Prometheus, ProModem 144e AT&FW1L3&C1S7=90 Supra, Express 14.4 Plus AT&F1&C1&D2&K3\N3%C0 Supra, Express 14.4 Plus AT&F1&C1&D2&K3%C0 Supra, Express 14.4 Plus AT&F1S0=0 Supra, Express 28.8 Mac AT&F1&C1&D2&K3\N3%C0 Supra, Express 28.8 Mac ext AT&F1S0=0 Supra, Express 28.8 / 33.6 Mac AT&F1X3 Supra, FAXModem v.32bis Mac ext AT&F1S0=0 Supra, FAXModem 28.8 / 33.6 Mac ext AT&F1S0=0 USRobotics, Mac & Fax AT&F&D0&H1 USRobotics, Mac & Fax AT&F1&D0&H1&K2&M5 USRobotics, Mac & Fax AT&F&C1&D2&H1&R2&K0 USRobotics, Mac & Fax AT&F&D2&H1 USRobotics, Mac & Fax AT&D0&F1&H1&K2&M5 USRobotics, Sportster 14.4 Mac&Fax AT&F1&D0S0=0 USRobotics, Sportster 28.8 v.34 Mac&Fax AT&F1&D0S0=0 Zoom, PCMCIA 14.4C Fax AT&F&D0&K3&Q5S0=0 Zoom, PCMCIA v.34C Fax AT&F&D0&K3&Q5S0=0 Zoom, PKT 14.4 Pocket AT&F&D0&K3&Q5S0=0 Zoom, VFX v.32bis FaxM AT&F&D0&K3&Q5S0=0 Zoom, V.34X Fax (Model 460) AT&F&D0&K3&Q5S0=0 Global village info: Select the Port Speed: 2400 for Bronze 9,200 for Silver 38,400 for Gold or Gold II 57,600 for Mercury and Platinum
105
159 Macronix, Maestro, Magic, Magnavox, MatraCom, Maxwell, Marlow Macronix &F&C1&D2&K3&Q0N0 Macronix, ATS36=7&Q5%C0&C1&D2 Macronix, ATS36=7&Q5%C1&C1&D0&K3 Macronix, MX-14.4 AT&FW2&C1&D2\N3&K3&Q5S95=46 Macronix, MaxFax 14.4 &F&C1&D2&K3&Q0N0 Macronix, MaxFax 96 &F&C1&D2&K3&Q0N0 Macronix, MaxFax atF &F&C1&D2&K3&Q0N0 Macronix, MaxFax II &F&C1&D2&K3&Q0N0 Macronix, MaxFax Series &F&C1&D2&K3&Q0N0 Macronix, Maxlite Fax 9696 AT&F&C1&D2&K3%C0 Macronix, MaxLite &F&C1&D2&K3&Q0N0 Macronix, MaxLite 14.4 &F&C1&D2&K3&Q0N0 Macronix, Maxlite 14.4 AT&F&C1&Q9\N3 Macronix, MX Stealth 14.4 AT&F&C1&D2&K3%C0 Maestro, Data Optimiser AT&F&C1&D2\Q3\N0 Maestro, 9600 AT&D2&C1W2 Maestro, 9600 AT&F&C1&D2&R1%E1W2 Maestro, 9600FM AT&F&C1&D2&K3%C0 Maestro, 14.4 AT&FE2W2 Maestro, 14.4 (plastic cased) AT&F&D2%E1W2 Maestro, 14.4 (metal cased) AT&F&C1&D2&R1%E1W2 Maestro, 14.4 AT&F&C1&D2&R1%E1W2 Maestro, 14.4FM AT&F&C1&D2&K3%C0 Maestro, 28.8 AT&D2&C1W2 Maestro, 28.8FM AT&F&C1&D2&K3%C0 Maestro, 28.8 AT&F%E1W2 Maestro, 28.8 AT&F&D2%E2W2 Maestro, 28.8 AT&F&D2%E2S95=45 Maestro, Companion 9.6/14.4/28.8 AT&D2&C1X4V1Q0S7=70W2 Maestro, Executive 33.6 AT&F&D2 Maestro, Super Executive AT&F&C1&D2&K3%C0 Magic, 14.4 v.32bis AT&F&C1 Magnavox, Codex 3260 S0=0 E1Q0V1X4&K3 Magnavox, S0=0 E1Q0V1X4 Marlow Data Systems, V.34 28.8 AT&D2&C1X4V1Q0S7=70 Matra Com 814 V14e 57600 (ISDN) ATZ Maxwell, S0=0 E1Q0V1X4
105
160 Magnum Magnum, 14.4 AT&F1&K3 Magnum, 14.4 AT&F&K3&C1&D2%C0 Magnum, 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Magnum, 144 External Fax AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47 Magnum, 144 Internal Fax AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47 Magnum, 28.8 AT&FE0&C1&D0 Magnum, 28.8 AT&F1&D0S0=0 Magnum, 28.8 AT&F&C1&D2S95=3W2 Magnum, 28.8 AT&F&C1&D2S95=3W2&Q5 Magnum, 28.8 AT&F&C1&D2S95=3W2&Q6 Magnum, 28.8 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Magnum, 28.8 External Fax AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47 Magnum, 28.8 Internal Fax AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47 Magnum, 28.8 / 33.6 AT&F&K3&C1&D2%C0
105
161 Maxtech MaxTech, 14.4 AT&FS0=0 E1Q0V1X4 &C1&D2&K3 MaxTech, 14.4 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3\J0 Maxtech, 14.4 PCMCIA AT&F&C1&D2\Q3%C0 Maxtech, PCM28800R PCMCIA AT&F&C1&D2\Q3%C0 Maxtech, PCM33600R PCMCIA AT&F&C1&D2\Q3%C0 Maxtech, XM28800 AT&F&C1&D2\Q3%C0 Maxtech, XM33600 AT&F&C1&D2\Q3%C0 Maxtech, XPVS14400I AT&F&C1&D2\Q3%C0 Maxtech, XPVS28800I AT&F&C1&D2\Q3%C0 Maxtech, XPVS33600I AT&F&C1&D2\Q3%C0 Maxtech, XVM14400 AT&F&C1&D2\Q3%C0 Maxtech, XVS14400I AT&F&C1&D2\Q3%C0 Maxtech, 28.8 AT&F&E1l1\N6 MaxTech, 28.8 AT&D2&C1X4V1Q0S7=70\G0\N6\Q3\J0 MaxTech, Netpacer 33.6 AT&D2&C1X4V1Q0S7=70&M4&B1&H1&R2
105
162 Megahertz Megahertz, CC324FM 2400 AT&D2&C1X4V1Q0S7=70&Q5&K3 Megahertz, EasyTalk 2400 AT&D2&C1X4V1Q0S7=70 Megahertz, P224FMV 2400 AT&D2&C1X4V1Q0S7=70 Megahertz, XJ124FM 2400 AT&D2&C1X4V1Q0S7=70&Q5&K3\J0 Megahertz, 9600 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Megahertz, 9600 AT&D2&C1X4V1Q0S7=70&Q5&K3\J0 MegaHertz, V.32bis ATS36=7&Q5%C1&C1&D0&K Megahertz, 14.4 AT&F&M0&K0 Megahertz, 14.4 AT&F&C1&D0 Megahertz, 14.4 PCMCIA for Dell AT&F&C1&D2&K3%C0 Megahertz, EM144T PCMCIA 14.4 AT&F&C1&D2&K3%C0 MegaHertz, AR196FM AT&F&C1&D2\J0\N3\Q3\V1 Megahertz, A2144 S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, v.32 ATS36=7&Q5%C1&C1&D0&K3 Megahertz, EM1144T Ether/Modem S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, IC196FM S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, S0=0 E1Q0V1X4 MegaHertz, P224FMV AT&F&C1&D2&Q5&K3S95=42 Megahertz, P224FMV (AA Batteries) AT&F&D0\G0\N3\Q3\J0%C1S0=0 Megahertz, P224FMV (9V Battery) AT&F&D0&Q5&K3&S1S0=0S95=18 Megahertz, P2144 AT&F&C1&D0 Megahertz, P2144 AT&F&C1&D2\Q3%C0 Megahertz, P2144 AT&F&C1&D2\Q3S46=136 Megahertz, P2144 S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, P2144 AT&D2&C1X4V1Q0S7=70W2%E0N1&Q5&K3\J0 Megahertz, P2144 Pocket AT&F&C1&D2&Q5%C0 MegaHertz, P2144 (AA Battery Version) AT&F1&C1&D2\Q3W2\V2%B14400%C1 MegaHertz, P2144 (9-Volt Battery Version) AT&F&C1&D2\N3&Q5&K3%C3 Megahertz, P2144 (9V Battery) AT&F&D0&Q5&K3&S1S0=0S95=18 Megahertz, P2144 FAX/Modem AT&F&C1&D3%C1\J0\N7\Q2\V2S7=60 Megahertz, P2144FMV (AA Batteries) AT&F&D0\G0\N7\Q3\J0%C1S0=0 MegaHertz, P296FMV (AA Battery Version) AT&F&C1&D2\N3\J0\Q3%C1 MegaHertz, P296FMV (9-Volt Battery Version) AT&F&C1&D2\N3&Q5&K3%C3 Megahertz, P296FMV S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, P296FMV S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, P296FMV (9V Battery) AT&F&D0&Q5&K3&S1S0=0S95=18 Megahertz, P296FMV (AA Batteries) AT&F&D0\G0\N7\Q3\J0%C1S0=0 Megahertz, P296FMV Pocket AT&F&C1&D2&K3%C0 Megahertz, P296FMV Pocket AT&F&C1&D2\Q3%C0 Megahertz, T224SFM S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, T3144 S0=0 E1Q0V1W0X4 &C1&D2&K3 MegaHertz, T3144 AT&F&C1&D2W2\J0\N7\Q3%C1\V2%B14400 Megahertz, T3144 AT&F&D0\G0\N7\Q3\J0%C1S0=0 Megahertz, T3144 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Megahertz, T3144 internal AT&F&C1&D3%C1\J0\N3\Q2\V2S7=60 Megahertz, T324FM AT&F&D0\G0\N3\Q3\J0%C1S0=0 Megahertz, T396FM AT&F&D0\G0\N7\Q3\J0%C1S0=0 Megahertz, T396FM S0=0 E1Q0V1W0X4 &C1&D2&K3 MegaHertz, T396FM AT&F1&C1&D2\Q3%C1&S1 Megahertz, T396FM - for Toshiba notebooks S0=0 E1Q0V1W0X4 &C1&D2&K3 MegaHertz, XJ1144 AT&F&C1&D2\N3&Q5&K3%C3 Megahertz, XJ1144 AT&F&D0&Q5&K3&S1S0=0S95=18 Megahertz, XJ144 Gold PCMCIA AT&FW2X4&K3&D0 Megahertz, XJEM1144 AT&F&D0&Q5&K3&S1S0=0S95=18 Megahertz, XJEM1144 PCMCIA 14.4 AT&F&C1&D2&K3%C0 Megahertz, XJ1144 PCMCIA AT&FW2&C1&D2&K3&Q5%C3\N3S7=60S95=47 Megahertz, XJ1144 PCMCIA 14.4 AT&F\N3&C1&D2%C0&K3 Megahertz, XJ1144PCMCIA S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, XJ1144 PCMCIA 14.4 AT&D2&C1X4V1Q0S7=70W2%E0N1&Q5&K3\J0 Megahertz, XJ196FM PCMCIA S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, XJ2144 S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, XJ2144 PCMCIA S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, XJ2288 V.34 Q0V1X4&C1&D2\Q3%C0S0=0 Megahertz, XJ2288 V.34 E1Q0V1X4 &C1&D2\Q3%C0 S0=0 Megahertz, XJ2288 AT&F\N Megahertz, XJ28 PCMCIA AT&FW2X4&K3&D0 Megahertz, XJ28 PCMCIA AT&FW2X4&K3&D0\N3%C1 Megahertz, XJ28 PCMCIA AT&FW2X4&K3&D0\N1%C0 Megahertz, XJ2144 PCMCIA 14.4 AT&F&C1&D2&K3%C0 Megahertz, XJ2144 (Motorola Cellular MNP10) AT&F&D2-K1*H1:E0-Q1 {M18\N5S0=0 Megahertz, XJ2144 (Cellular v.42bis) AT&F&D0L3-KF6%E2:E0S10=46S0=0 Megahertz, XJ196FM AT&F&D0&Q5&K3&S1S0=0S95=18 Megahertz, XJ124FM AT&F&D0&Q5&K3&S1S0=0S95=18 MegaHertz, XJ124FM AT&F&C1&D2\N3&Q5&K3%C3 Megahertz, XJ2144 (Landline MNP10) AT&F&D0-K1S95=47S0=0 Megahertz, XJ2288 AT&F&D0S0=0 Megahertz, XJ2288 PCMCIA 28.8 AT&F&C1&D2&K3%C0 Megahertz, XJ2288 PCMCIA 28.8 AT&FW2&C1&D2&K3\J0\N3\Q3\V1%C1"H3S7=60 Megahertz, XJ2288 PCMCIA 28.8 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Megahertz, XJ2144 AT&F&D0&Q5&K3&S1S0=0S95=18 Megahertz, XJ2144 (Spectrum Cellular MNP10) AT&F&D2-K1*H1:E0-Q1 {M10\N5S0=0 Megahertz, XJ2144 (Landline v.42bis) AT&F&D0\N3%E2S0=0 Megahertz, Z3144 AT&F&D0\G0\N7\Q3\J0%C1S0=0 Megahertz, Z3144 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Megahertz, Z396FM AT&F&D0\G0\N7\Q3\J0%C1S0=0 Megahertz, Z324FM AT&F&D0\G0\N3\Q3\J0%C1S0=0 Megahertz, Z3144 S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, Z396FM S0=0 E1Q0V1W0X4 &C1&D2\Q3 Megahertz, EM1144-T AT&F&D0&Q5&K3&S1S0=0S95=18 Megahertz, A2144 AT&F&D0&Q5&K3&S1S0=0S95=18 Megahertz, A9696 V.42bis AT&F&C1&D2\Q3%C0 Megahertz, A9696 V.42bis ATQ0V1X4&C1&D2W1\A3\Q0\J1\N1 Megahertz, CC3144 AT&F&D0&Q5&K3&S1S0=0S95=18 Megahertz, CC324FM AT&F&D0&Q5&K3&S1S0=0S95=18 Megahertz, CCEM1144 AT&F&D0&Q5&K3&S1S0=0S95=18 Megahertz, C424FM (Compaq LTE 386 Notebook) S0=0 E1Q0V1W0X4 &C1&D2 Megahertz, C5144 Compaq Internal S0=0 E1Q0V1W0X4 &C1&D2 MegaHertz, C5144 Fax AT&F1&C1&D2W2&R2\C1\Q3%C1\V2 Megahertz, C5144 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3 MegaHertz, C524FM AT&F3&C1&D2\J0\N3\Q3 MegaHertz, C596FM AT&F&C1&D2W2\J0\N7\Q3%C1\V2%B9600 Megahertz, C596FM S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, C596FM Compaq Internal S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, C5144 for the Compaq LTE AT&F&C1&D2\Q3%C0 Megahertz, C5144 for the Compaq LTE AT&F0&R1&C1&D2%C0 Megahertz, CC3144 PCMCIA S0=0 E1Q0V1W0X4 &C1&D2&K3 MegaHertz, CC3144 AT&F&C1&D2\N3&Q5&K3%C3 Megahertz, CC3144 PCMCIA card AT&F&C1&D3&K3&Q5%C3\N3S7=60S38=7S46=138S48=7S95=47 Megahertz, CC3144 14.4 AT&F&C1&D2&K3%C0 Megahertz, CC3144 PCMCIA AT&FL1&C1&D2&K3%C0 Megahertz, CC2288 V.34 Q0V1X4&C1&D2\Q3%C0S0=0 Megahertz, CC2288 V.34 E1Q0V1X4 &C1&D2\Q3%C0 S0=0 MegaHertz, CC3288 AT&F&C1&D2&K3\Q3 Megahertz, CC3288 AT&F&D0S0=0 Megahertz, CC3288 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Megahertz, CC3288 PCMCIA AT&FX4&B1&H1&R2&K0 Megahertz, CC396FM PCMCIA S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, CC4144 PCMCIA 14.4 AT&F&C1&D2&K3%C0 Megahertz, CC4144 Series AT&F&D0&Q5&K3&S1S0=0S95=18 Megahertz, CC4144 (Landline MNP10) AT&F&D0-K1S95=47S0=0 Megahertz, CC4144 (Cellular v.42bis) AT&F&D0L3-KF6%E2:E0S10=46S0=0 Megahertz, CC4144 (Spectrum Cellular MNP10) AT&F1&D0 {M10S0=0 Megahertz, CC4144 (Motorola Cellular MNP10) AT&F1&D0 {M18S0=0 Megahertz, CC4144 (Landline v.42bis) AT&F&D0\N3%E2S0=0 Megahertz, CC4144-NEC (Cellular MNP10) AT&F1&D0S0=0 Megahertz, CC4144-NEC (Landline MNP10) AT&F1&D0S0=0 Megahertz, CC4144-NEC (Landline v.42bis) AT&F&D0\N3%E2S0=0 Megahertz, CC4144-NEC (Cellular v.42bis) AT&F&D0L3-KF6%E2:E0S10=46S0=0 Megahertz, CC4144-MIT (Cellular MNP10) AT&F1&D0S0=0 Megahertz, CC4144-MIT (Cellular v.42bis) AT&F&D0L3-KF6%E2:E0S10=46S0=0 Megahertz, CC4144-MIT (Landline v.42bis) AT&F&D0\N3%E2S0=0 Megahertz, CC4144-MIT (Landline MNP10) AT&F1&D0S0=0 Megahertz, CC4144-NOK (Landline v.42bis) AT&F&D0\N3%E2S0=0 Megahertz, CC4144-NOK (Landline MNP10) AT&F1&D0S0=0 Megahertz, CC4144-NOK (Cellular v.42bis) AT&F&D0L3-KF6%E2:E0S10=46S0=0 Megahertz, CC4144-NOK (Cellular MNP10) AT&F1&D0S0=0 Megahertz, CC4144 Cellular Modem S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, CC4144-MIT S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, CC4144-NEC S0=0 E1Q0V1W0X4 &C1&D2&K3 Megahertz, CC396FM AT&F&D0&Q5&K3&S1S0=0S95=18 Megahertz, C596FM AT&F&D0\G0\N7\Q3\J0%C1S0=0 Megahertz, C524FM AT&F&D0\G0\N3\Q3\J0%C1S0=0 Megahertz, C5144 AT&F&D0\G0\N7\Q3\J0%C1S0=0 Megahertz, CruiseCard AT&F&D0M0V1&K3&B1S11=50S0=0 Megahertz, 28.8 for Dell AT&F&C1&D2&K3%C0 Megahertz, 33.6 AT&F&C1&D2&K3%C0 Megahertz, 33.6 AT&D2&C1X4V1Q0S7=70&M4&B1&H1&R2 Megahertz, 33.6 AT&D2&C1X4V1Q0S7=70W2%E0N1&Q5&K3\J0 Megahertz, XJ1560 PCMCIA 56k X2 AT&D2&C1X4V1Q0S7=70&M4&B1&H1&R2 Megahertz, ISDN ISDNU PCMCIA 1 B-Channel 640 AT&D2&C1%A2=95 Megahertz, ISDN ISDNU PCMCIA 2 B-Channels 12 AT&D2&C1%A2=96 105
163 Mercury, Metricom, Micc, Micro, Microdirect, Mitsubishi Mercury, Technologies 9600/14.4 AT&FS0=0 E1Q0V1X4 &C1&D2&K3%C0Mercury, Technologies S0=0 E1Q0V1X4Metricom, Ricochet AT&C1&K1Metricom, Wireless, 9600 AT&F&C1&D2Micc, 4824 V.42 AT&F&C1&D2\Q3Micro Integrated Communications S0=0 E1Q0V1X4Microdirect, 14.4 AT&D2&C1X4V1Q0S7=70$X2$E3$F4$S0Mitsubishi, Cellular Data Link 9600 AT&D2&C1X4V1Q0S7=70*H0S36=7S48=7\N3&K3
105
164 Microcom Microcom, AX9624C AT&F&D0\Q3S0=0 Microcom, AX2400 AT&F&D0\Q3S0=0 Microcom, AX/2400 MNP4 AT&F\J0\Q3\N3 Microcom, AX/2400c MNP5 AT&F&C1&D2M1\G0\J0\Q3\N3 Microcom, AX/9600 Plus AT&F\J0\N3\Q3\V1S7=54 Microcom, AX/9612c AT&F\J0\Q3\N3 Microcom, AX/9624c AT&F\J0\Q3\N3 Microcom, AX9624 AT&F&D0\Q3S0=0 Microcom, Cellular AT&F&C1&D2\Q3%C0 Microcom, Cellular AT&F&C1&D2\Q3 MicroCom, Deskporte AT&F&C1&D2\Q3%C0 MicroCom, Deskporte AT&F&C1&D2\Q3 Microcom, DeskPorte 14.4S AT&F&C1&D2&K3%C0 Microcom, DeskPorte 14.4S v.32bis AT&F&D0\Q3S0=0 Microcom, DeskPorte/QX/4232 bis AT&F&D0 Microcom, DeskPorte 28.8P AT&F&D0\Q3S0=0 Microcom, DeskPorte 28.8S AT&F&C1&D2&K3%C0 Microcom, DeskPorte 28.8S AT&D2&C1X4V1Q0S7=70W2\N3&Q5&K3 Microcom, DeskPorte 28.8S v.34 (internal) AT&F&D0\Q3S0=0 Microcom, DeskPorte 28.8S v.34 (external) AT&F&D0\Q3S0=0 Microcom, DeskPorte 28.8S ext AT&FW2&K3&D0X4 Microcom, DeskPorte 28.8S ext AT&FW2&K3&D0X4\N3%C2 Microcom, DeskPorte 28.8S ext AT&FW2&K3&D0X4\N0%C0 Microcom, DeskPorte 28.8P /33.6P AT&F&C1&D2\Q3%C0 Microcom, DeskPorte V.32bis AT&F&C1&D3%C3%G0\J0-M0\N6\Q2\V2S7=60 Microcom, Desk Porte/QX/4232bis AT&F&D0 Microcom, DeskPorte FAST+ AT&F&D0\Q3S0=0 Microcom, DeskPorte FAST AT&FL1%C0 Microcom, DeskPorte FAST AT&F&D0\Q3S0=0 Microcom, DeskPorte FAST AT&F&C1&D3%C3%G0\J0-M0\N6\Q2\V2S7=60 Microcom, DeskPorte FAST AT&F&C1&D2\J0\Q3\N3%C3\V1*W Microcom, DeskPorte FAST 28.8 S0=0 E1Q0V1X4 &C1&D2\Q3%C0 Microcom, DeskPorte FAST 28.8 AT&D2&C1X4V1Q0S7=70\N3\Q3\J0 Microcom, DeskPorte FAST ES 14.4 ATS0=0 E1Q0V1X4&C1&D2&K3%C0 Microcom, DeskPorte FAST EP AT&F&D0\Q3S0=0 Microcom, Deskporte Fast EP 28.8 AT&F&C1&D2\Q3%C0 Microcom, DeskPorte FAST EP 28.8 ATS0=0 E1Q0V1X4&C1&D2\Q3%C0 Microcom, DeskPorte Fast EP 28.8 AT&F&C1&D2\J0\Q3\N3*W Microcom, DeskPorte FAST ES 28.8 AT&FW2&C1&D3&K3&Q5%C3\N3S7=60S95=47 Microcom, DeskPorte FAST ES 28.8 AT&FL1%C0&C1&D2 Microcom, DeskPorte FAST ES 28.8 AT&F&C1&D2&K3%C0 Microcom, DeskPorte FAST ES 28.8 ATS0=0 E1Q0V1X4&C1&D2&K3%C0 Microcom, DeskPorte FAST ext AT&FW2\Q3&D0X4 Microcom, DeskPorte FAST ext AT&FW2\Q3&D0X4%N3%C2%B28800 Microcom, DeskPorte FAST ext AT&FW2\Q3&D0X4%N0%C0%B28800 Microcom, DeskPorte FAST (57600 BPS) AT&F$B57600&C1&D3%C3%G0\J0-M0\N6\Q2\V2S7=60 Microcom, DeskPorte FAST (115200 BPS) AT&F$B115200&C1&D3%C3%G0\J0-M0\N6\Q2\V2S7=60 Microcom, QX2400t AT&F&D0\Q3S0=0 Microcom, QX2400t AT&F&C1&D2\Q3\N3\V1%C3\C1\J0 Microcom, QX3296 AT&F&C1&D2\Q3%C0 Microcom, QX3296 AT&F&C1&D2\Q3 Microcom, QX4232hs AT&FL1%C0 Microcom, QX4232hs AT&F&C1&D2\Q3%C0 Microcom, QX4232hs AT&F&D0\Q3S0=0 Microcom, QX4232hs AT&F&C1&D2\J0%C2%G0\N3\Q3\V2*W Microcom, QX4232hs ATS0=0 E1Q0V1X4&C1&D2\Q3%C0 MicroCom, QX4232bis AT&F&C1&D2\Q3%C0 MicroCom, QX4232bis AT&FL1%C0 Microcom, QX4232bis AT%C0\N0 Microcom, QX4232bis AT&F\J0E1Q0 Microcom, QX4232bis ATS0=0 E1Q0V1X4&C1&D2\Q3%C0 Microcom, QX4232bis AT&D2&C1X4V1Q0S7=70\G0\N3\Q3\J0 Microcom, QX4232bis AT&F&C1&D2\J0%C2%G0\N3\Q3\V2*W Microcom, QX4232bis AT&F&C1&D3\J0%C3\N3\Q2-K0\V2W2S7=60 Microcom, QX4232bis+ AT&F&D0\Q3S0=0 Microcom, QX4232bis+ AT&F&C1&D3\J0%C3\N3\Q2-K0\V2W2S7=60 Microcom, QX4232bis+ AT&F&C1&D2\J0%C2%G0\N3\Q3\V2*W Microcom, QX4232bis+ ATS0=0 E1Q0V1X4&C1&D2\Q3%C0 Microcom, QX12K AT&F&D0\Q3S0=0 Microcom, QX v.32c AT&F&D0\Q3S0=0 Microcom, QX v.32c AT&F\J0\Q3\N3%C3-Q2*W Microcom, QX v.32c AT\Q5%C3&C1&D0\J0\Q3 Microcom, TravelPorte AT&F&C1&D2\Q3%C0 Microcom, TravelPorte AT&F&C1&D2\Q3 Microcom, TravelPorte FAST AT&F&C1&D2\Q3%C0 Microcom, TravelPorte FAST AT&F&C1&D2\Q3 Microcom, TravelPorte FAST AT&F&C1&D3%C3%G0\J0-M0\N6\Q2\V2S7=60 Microcom, TravelPorte FAST AT&F&D0\Q3S0=0 Microcom, TravelPorte FAST V.34 AT&F&C1&D2\Q3%C0 Microcom, TravelPorte FAST V.34 AT&F&C1&D2\Q3 Microcom, TravelCard 288P PCMCIA AT&F&D0X4\Q3%G1 Microcom, TravelCard 288P PCMCIA AT&F&D0X4\Q3%G1%N3%C2 Microcom, TravelCard 288P PCMCIA AT&F&D0X4\Q3%G1%N0%C0 Microcom, TravelCard 288P PCMCIA AT&F%U2\V1X4E0V1 Microcom, TravelCard 28.8P AT&F&D0\Q3S0=0 MicroCom, TravelCard FAST 28.8 AT&F&C1&D2\Q3 MicroCom, TravelCard FAST 28.8 AT&F&C1&D2\Q3%C0 Microcom, TravelPorte FAST 28.8 AT&FS0=0E1Q0V1X4&C1&D2\J1\Q3W1 Microcom, TravelCard FAST AT&F&D0\Q3S0=0 Microcom, TravelCard FAST AT&F&C1&D3%C3%G0\J0-M0\N6\Q2\V2S7=60 Microcom, TravelCard FAST 33.6 AT&F&C1&D2\Q3%C0 Microcom, TravelCard FAST 33.6 AT&F&C1&D2\Q3 Microcom, v.34 (to TeleBlazer v.34) ATZ&C1&D2+MS=11%E1 Microcom, MicroPorte ATS0=0 E1Q0V1X4&C1&D2&K3%C0 Microcom, MicroPorte 4232bis AT&F&C1&D2\Q3%C0 Microcom, MicroPorte 4232bis AT&F&C1&D2\Q3 Microcom, MicroPorte 4232bis AT&F&C1&D3%C3%G0\J0-M0\N6\Q2\V2S7=60 Microcom, MicroPorte 4232bis AT&F&C1&D3\J0%C3\N3\Q2-K0\V2W2S7=60 Microcom, MP4232BIS S0=0 E1Q0V1X4 &C1&D2\Q3%C0 Microcom, S0=0 E1Q0V1X4
105
165 Modem Blaster (Creative Labs) Creative Labs, Phone Blaster AT&F&C1&K3Creative Labs, Phone Blaster AT&F&D0L3&R1S38=0S7=60S11=60S46=138S48=7Creative Labs, Phone Blaster 14.4 AT&F0&C1&D2&K3%C0Creative Labs, Phone Blaster 28.8 AT&F0&C1&D2&K3%C0Creative Labs, Phone Blaster 28.8 DSVD AT&F0&C1&D2&K3%C0Creative Labs, Modem Blaster AT&F&D0&K3\N5S0=0Creative Labs, Modem Blaster AT&FW2&D0X4S95=3Creative Labs, Modem Blaster AT&FW2&D0X4S95=3\N3%C1Creative Labs, Modem Blaster AT&FW2&D0X4S95=3\N0%C0Creative Labs, Modem Blaster AT&Fl3S10=250M2Creative Labs, Modem Blaster 14.4 PCMCIA AT&FCreative Labs, Modem Blaster 14.4 AT\N0Creative Labs, Modem Blaster 14.4 AT&F0&C1&D2\Q3%C0Creative Labs, Modem Blaster 14.4 AT&F&C1&D2&K3%C0Creative Labs, Modem Blaster 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3Creative Labs, Modem Blaster 14.4 AT&D2&C1X4V1Q0S7=70\N3\Q3\J0Creative Labs, Modem Blaster 19.2 AT&FCreative Labs, Modem Blaster 28.8 AT&F&C1&D2\N3S95=1Creative Labs, Modem Blaster 28.8 AT&FCreative Labs, Modem Blaster 28.8 AT&F0&C1&D2&K3%C0Creative Labs, Modem Blaster 28.8 ATS48=0S30=0Creative Labs, Modem Blaster 28.8 AT&D2&C1X4V1Q0S7=70&K3Creative Labs, Modem Blaster 28.8 int AT&Fl3S10=250M2S11=45Creative Labs, Modem Blaster 28.8 DSVD AT&F0&C1&D2&K3%C0Creative Labs, WS-2814IM4 AT&FL3s10=250M2
105
166 Mr Modem, Microgate, MicroFax, Midisoft, Miracom, Mitrex, Montery, Mosaic, MTEZ Microcomputer Research Mr. Modem, MR-96 AT&F2&C1&D2 Microcomputer Research Mr. Modem, MR-144 AT&F2&C1&D2 MR. Modem, 14.4 AT&F&C1&D2\Q3%C0 MicroGate, MG96 AT&F&C1&D2&K3%C0 MicroGate, MG144 AT&F&C1&D2&K3%C0 Microfax, 14.4 AT&F Midisoft, 28.8 /33.6 AT&F&C1&D2&K3%C0 Miracom, Courier HST ATS0=0 Q0 V1 S7=58 X6&B1&H1&R2 Miracom, Keycard 3000 ATS0=0 Q0 V1 S7=58 X6&B1&H1&R2 Miracom, ATS0=0 E1Q0V1X4 Miracom, Courier 2400PC AT&FX6&B7&H1&R2 Miracom, Courier 2400e/ 2400e/ps AT&FX6&B6&H1&R2 Miracom, Sportster 9600/PC AT&FX4&B1&C1&D2&H1&K3&R2 Miracom, Courier HST AT&FX6&B1&H1&R2 Miracom, Courier HST V.42 AT&FX6&B1&H1&R2&M4&A3 Miracom, Courier HST-ASL AT&F&H1&R2&K3&B1&A3X7 Miracom, V.32 AT&FX6&H1&R2&B1 Miracom, V.32bis-ASL AT&F&H1&R2&K3&B1&A3X7 Miracom, Dual Standard AT&FX6&B1&H1&R2 Miracom, Dual Standard V.32bis-ASL AT&F&H1&R2&K3&B1&A3X7 Miracom, Sportster 14.4 AT&FX4&B1&C1&D2&H1&K3&R2 Miracom, WS4000/PC ATS0=0 Q0 V1 S7=58 X6&B1&H1&R2 Mitrex, 14.4 AT&F&C1&D2\Q3%C0 Monterey, 14.4 AT&F&C1&D2&K3%C0 Mosaic, Marathon CX AT&F&D2&C1\N3&K3%C0 MTEZ, AT&F&C1&D2\N3&Q5&K3%C3
105
167 Motorola Motorola, S0=0 E1Q0V1X4 Motorola, FasTalk 2400 AT&D2&C1X4V1Q0S7=70 Motorola, Codex 225x 4800 AT&D2&C1X4V1Q0S7=70*SC0*MF0 Motorola, FasTalk 9600 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3\J0 Motorola, FasTalk 14.4 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3\J0 Motorola, 14.4 Pocket AT&F&C1&D2\Q3%C0 Motorola, 14.4 Pocket AT&F&C1&D2\Q3 Motorola, 14.4 Cellular Pocket AT&F1&C1&D2\Q3%C0 Motorola, 14.4 Cellular Pocket AT&F&C1&D2\Q3%C0 Motorola, CELLect 14.4 PCMCIA AT&F&C1&D2\Q3%C0 Motorola, CELLect 14.4 PCMCIA AT&F1&C1&D2\Q3 Motorola, 28.8 Ext AT&F&G2%C*A Motorola, TA210 S0=1 &F3 %A2=95 E1Q0V1X4 Motorola, 3400 AT&F&G2%C*A&G2 Motorola, 326x Series AT&F&D0*FL3S0=0 Motorola, 326X AT&F&C1&D2*FL3*DC0 Motorola, Codex 226x 9600 AT&D2&C1X4V1Q0S7=70*SC0*MF0 Motorola, Codex 326X Series AT&F&C1&D3*FL3*MF0*SM3*TT2*XC2S7=60 Motorola, Codex 326x 14.4 AT&D2&C1X4V1Q0S7=70*DE12*SC1*MF0*SM3*FL3 Motorola, Codex 326x 28.8 AT&D2&C1X4V1Q0S7=70*DE15*SC1*MF0*SM3*FL3 Motorola, Codex 326XFAST (57.6K) AT&F&C1&D2*XC2*FL3*CD3*AA5*DE16 Motorola, Codex 326XFAST (115.2K) AT&F&C1&D2*XC2*FL3*CD3*AA5*DE21 Motorola, Codex 2260 AT&F&C1&D2*DL0&R0 Motorola, Codex 2264 AT&F&C1&D2*FL3*XC1*PT0&R0 Motorola, Codex 2264 S0=0 Q0 V1 *DC0 Motorola, Codex 3220 AT&F&D0*DC0*FL3S0=0 Motorola, Codex 3220 AT&F&C1&D2*XC2*RS0*FL3*MD0*MF0L3S10=50 Motorola, Codex 3220 S0=0 E1Q0V1X4 &C1&D2&R1&S1 *FL3 *DC0 Motorola, Codex 3220 Plus AT&F&C1&D3*DC1*EC0*MF0*SM3*XC2S7=60 Motorola, Codex 3260 Series AT&F&C1&D2*XC2*RS0*CT0*FL3*MD0*MF0L3S10=50 Motorola, Codex 3260 S0=0 E1Q0V1X4 &C1&D2 *FL3 Motorola, Codex 3220 Plus AT&F&C1&D3*DC1*EC0*MF0*SM3*XC2S7=60 Motorola, Codex 326X Series AT&F&C1&D3*FL3*MF0*SM3*TT2*XC2S7=60 Motorola, Codex PCMCIA Pwer 14.4 AT&F1&C1&D2\Q3 Motorola, BitSURFR Pro AT%A2=95 Motorola, BitSURFR Pro Ext AT&F&C1&D0\Q3%A2=2%A4=1 Motorola, BitSURFR Pro Ext AT&F&C1&D0\Q3%A2=3&M@B0=2%A4=1 Motorola, BitSURFR Pro Ext AT&F&C1&D0\Q3%A2=95@B0=2%A4=1 Motorola, BitSurfr/BitSurfr PRO 57.6k(ML-PPP) AT&F&C1&D3\Q3%A2=95%A4=1 Motorola, BitSurfr/BitSurfr PRO 57.6k(V.120) AT&F&C1&D3\Q3%A2=2%A4=1 Motorola, BitSurfr/BitSurfr PRO 64k(ML-PPP) AT&F&C1&D3\Q3%A2=95%A4=0 Motorola, BitSurfr/BitSurfr PRO 64k(V.12) AT&F&C1&D3\Q3%A2=2%A4=0 Motorola, BitSurfr PRO 115.2k(ML-PPP) AT&F&C1&D3\Q3%A2=95%A4=1@B0=2 Motorola, BitSurfr PRO 128k(ML-PPP) AT&F&C1&D3\Q3%A2=95%A4=0@B0=2 Motorola, BitSurfr PRO AT%A2=2&C1&D2 Motorola, BitSurfr PRO AT%A2=2C1&D0 Motorola, BitSurfr PRO AT&F2&C1&D2 Motorola, BitSurfr PRO AT%A2=95&C1&D2@B0=2 Motorola, BitSurfr PRO AT%A2=95&C1&D0 Motorola, BitSurfr PRO (ML-PPP) (Mac and Win) AT%A2=95&C1&D2@B0=2 Motorola, Lifestyle Series 14.4 PCMCIA AT&F&C1&D2\Q3\N7%C1H3S7=60 Motorola, LifeStyle Series AT&F&D0\Q3S0=0 Motorola, Lifestyle/Power 14.4 / 28.8 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3\J0 Motorola, Lifestyle 14.4 PCMCIA AT&F&C1&D2\Q3%C0 Motorola, Lifestyle 14.4 PCMCIA AT&F&C1&D0\Q3\V3 Motorola, Lifestyle 14.4 PCMCIA AT&F&C1&D2\Q3\N7%C1H3S7=60 Motorola, Lifestyle 28.8 and PowerClass 28.8 AT&F&C1&D2\Q3 Motorola, Lifestyle 28.8 AT&F&C1&D2\Q3 Motorola, Lifestyle 28.8 AT&F&C1&D2\Q3X4%C0 Motorola, Lifestyle 28.8 Int AT&F&C1&D0\Q3\V3 Motorola, Lifestyle Series 28.8 Data/Fax AT&F1V1&C3&D3%C1\N7S7=60 Motorola, Lifestyle 28.8 AT&F&C1&D3\Q3%R3\V2S7=60 Motorola, Lifestyle 28.8 PCMCIA AT&F&C1&D2\Q3%C0 Motorola, Lifestyle 28.8 AT&F&C1&D0\Q3\N%C s7=45so=0v1\n6\q3\j0\v1%c1x4 Motorola, Lifestyle 28.8 AT&FS0=0V1X3&D2\V2\Q3 Motorola, V.34R AT&F&C1&D3*CM1*DC1*EC0*FL3*SC1*SM3S7=60 Motorola, V.34R AT&D2&C1X4V1Q0S7=70W2\N7\Q3\J0 Motorola, V.34R Ext AT&F&D0X4W2/Q3 Motorola, V.34R Ext AT&F&D0X4W2/Q3*MM12\N7%C1%B16 Motorola, V.34R Ext AT&F&D0X4W2/Q3*MM12\N0%C0%B16 Motorola, Mariner PCMCIA 28.8 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Motorola, Montana PCMCIA 28.8 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Motorola, 33.6(Macintosh) AT&F*DC0*FL3 Motorola, ModemSurfr 28.8 / 33.6 AT&F\C1E0-J"H Motorola, ModemSurfr 28.8 / 33.6 AT&F&C1&D2\Q3 Motorola, ModemSurfr 28.8 / 33.6 AT\N0%C0 Motorola, ModemSurfr 28.8 / 33.6 AT&F&C1&D2\Q3%C0 Motorola, ModemSurfr 28.8 / 33.6 AT&F&C1&D0\Q3\V3 Motorola, ModemSurfr 28.8 / 33.6 AT&D2&C1X4V1Q0S7=70W2%C0\N3\Q3\J0 Motorola, ModemSurfr 56k AT&F&C1&D2\K3 Motorola, ModemSurfr 56k AT&F&C1&D2&K3\V1\N3L1S0=0 Motorola, ModemSurfr 56k AT&D2&C1X4V1Q0S7=70W2\N3&K3 Motorola, Power 14.4 PCMCIA AT&F&D0\Q3S0=0 Motorola, Power 14.4 PCMCIA AT&F&C1&D2\Q3%C0 Motorola, Power 14.4 PCMCIA AT&F&C1&D0\Q3\V3 Motorola, Power 28.8 AT&F&C1&D3\Q3%R3\V2S7=60 Motorola, Power 28.8 AT&F&D0\Q3\V4\N7S0=0 Motorola, Power 28.8 AT&F%C0 Motorola, Power 28.8 AT\N%C0 Motorola, Power 28.8 Ext AT&F\V4&C1&D0&X4\Q3 Motorola, Power 28.8 Ext AT&F\V4&C1&D0&X4\Q3%C1\N7 Motorola, Power 28.8 Ext AT&F\V4&C1&D0&X4\Q3%C0\N0 Motorola, Premier 33.6 AT&F\Q3&C1&D2%C0 Motorola, UDS Ext AT&F&D0&S0\V\G\Q3W2%L6 Motorola, UDS Ext AT&F&D0&S0\V\G\Q3W2%L6*MM12\N7%C1%B16 Motorola, UDS Ext AT&F&D0&S0\V\G\Q3W2%L6*MM12\N0%C0%B16 Motorola, UDS V.3227 9600 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3\J0 Motorola, UDS Fastalk 14.4 AT&F1\N0%C0 Motorola, UDS UTA 220K (ISDN) AT&F&D3&K3&C1@P3=N Motorola, VoiceSURFR External 14.4 AT&F&C1&D0\Q3\V3 Motorola, VoiceSurfr 28.8 AT&F&C1&D2\Q3 Motorola, Voicesurfer 56k AT&F&C1&D2\K3 or AT&F&C1&D2&K3\V1\N3L1S0=0 Motorola, SM56 AT&F%B18 Motorola, SM56 AT&F&C1&D2 Motorola, SM56 AT&F&C1&D2\KS10=200S15=125 Motorola, SM56 AT%B40 Motorola, SM56 AT&F&C1&D2*MM15 Motorola, SM56 AT%B27%L18*MM15 Motorola, SM56 AT&F&C1&D2\KS10=200S15=125 Motorola, SM56 (k56flex enabled) AT&F&C1&D2*MM14 Motorola, SM56 (limited to 33.6) AT&F%B18To disable 56k FLEX on a flex Motorola user: +ms=11,0,9600,33600Motorola SM 56k Info - Minimum System Requirements 150MHz Pentium Processor w/256K L2 cache. Windows® 95/98 with 16 Mbytes RAM Windows® NT 4.0 with 32 Mbytes RAMThe Motorola SM 56k modem is an HSP based modem. How to Disable v.90 at*mm15 kflex at*mm14 v.34 at*mm11 v.34 at*mm12
105
168 MultiTech MultiTech, 2400 AT&D2&C1X4V1Q0S7=70 MultiTech, 9600 / 14.4 AT&D2&C1X4V1Q0S7=70$SB96&E1$BA0 MultiTech, MultiModem 224E/V.32 AT&E1&E15&C1&D0&E4$BA0 MultiTech, MultiModem MT696 AT&F&C1&D2&E4&E1&E14 MultiTech, MultiModem MT932 AT&F&C1&D2&E4&E1&E14 MultiTech, MultiModem MT932 AT&F&C1&D2&E4&E14 MultiTech, Systems 932EA S0=0 E1Q0V1X4 &C1&D2&E4&E14 Multitech, MT 932 Series AT&F&D0&E4 MultiTech, Systems MultiModem II MT932BA S0=0 E1Q0V1X4 F1&E4&E14 MultiTech, Systems MultiModem MT1432 series S0=0 E1Q0V1X4 F1&E4&E14 MultiTech, Systems MultiModem MT1932 series S0=0 E1Q0V1X4 F1&E4&E14 MultiTech, Systems MultiModem MT932 series S0=0 E1Q0V1X4 F1&E4&E14 MultiTech, Systems S0=0 E1Q0V1X4 Multitech, MT1432 Series AT&F&D0&Q1&E11 MultiTech, MultiModem MT1432BA AT&F&C1&D2&RF1&E4X1 MultiTech, MultiModem MT1432 AT&F&E4&E14&D2&C1 MultiTech, MultiModem MT1432 AT&F&C1&D2&E4&E1&E14 MultiTech, MultiModem MT1432 AT&F&C1&D2&E4&E14 MultiTech, MT1432MR AT&F0&D0&E2&E4&E13&E15S0=0 Multitech, MT1432ZDX AT&F&D0 MultiTech, MT1432MU, MT1432MU-Mac AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT1432LT AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT1432BR/MT1432BLR AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT1432BA/MT1432BAI/MT1432BA-MAC AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT1432BC AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT1432ZDX/ZDXI/ZDXK AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MultiModem MT1932 AT&F&C1&D2&E4&E1&E14 MultiTech, MultiModem MT1932 AT&F&C1&D2&E4&E14 MultiTech, MultiModem MT1932ZDX AT&F&C1&D2&RF1&E4X1 MultiTech, MultiModem MT2834 AT&F&C1&D2&E4&E1&E14 MultiTech, MultiModem MT2834 AT&F&C1&D2&E4&E14 MultiTech, MultiModem MT2834ZDX AT&F&C1&D2&RF1&E4X1 Multitech, MT2834ZDX AT&F0 Multitech, MT2834ZDX AT&D0&E4&E6 Multitech, MT2834ZDX/ZDXI/ZDXK AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT2834MR/MT2834MRK/MT2834MRI AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT2834LT/LTI AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT2834ZPX AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT2834BR/MT2834BLR AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT2834BC AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT2834PCS/MT2834PCS/c AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT2834BA/MT2834BL AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT1932ZDX/ZDXI/ZDXK AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT1932ZPX AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT1932BL AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT1932PCS, MT1932PCS-Mac AT&F0&D0&E2&E4&E13&E15S0=0 Multitech, MT932 Series AT&F&D0&E4 MultiTech, MT932BC AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT932BR AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MT932BA/MT932BAI/MT932BA-MAC AT&F0&D0&E2&E4&E13&E15S0=0 MultiTech, MultiModem V.32 AT&F&C1&D2B0&E1&E4&E7&E13X4 MultiTech, MultiModem V.32 EAB V.42bis AT&F&C1&D2B0&E1&E4&E7&E13X4 Multitech, MultiModem 224E/v.32 AT&E1&E15&C1&D0&E4$BA0 MultiTech, MultiModem 224/224PC ATE1Q0V1X4&C1&D2 MultiTech, MultiModem 224E/224EC AT&FQ0V1&C1&D2&E1&E4&E7&E13 MultiTech, MultiModem 696E AT&F&C1&D2X4&E1&E4&E7&E13&E14&R0 MultiTech, MultiModem 224E7 V.42bis AT&F&C1&D2Q0&E1&E4&E7&E13X4 MultiTech, MultiModem II MT224 AT&F&C1&D2&RF1&E4X4 MultiTech, MultiModem II MT932BA AT&F&C1&D2&RF1X4 MultiTech, MultiModem II MT1432 AT&FX4&C1&D3#A0$BA0&E1&E4&E15#L0S7=60 MultiTech, MultiModem II MT1432 AT&F&C1&D2&RF1X4 MultiTech, MultiModem II MT2834BA AT&F&C1&D3#A0$BA0E1&E1&E15#L0V1X4S7=60 MultiTech, Multimodem LT PCMCIA AT&F&C1X1E0V1S7=60 MultiTech, Multimodem MT2834ZDXI AT&F&C1&D2&E14M1 MultiTech, Multimodem 28.8 / 33.6 AT&D2&C1X4V1Q0S7=70$SB384&E1$BA0 MultiTech, PCMCIA 28.8 AT&D2&C1X4V1Q0S7=70$SB384&E1$BA0
105
169 Mwave (IBM) IBM, PS/2 Data/Fax AT&F&C1&D2\Q3\N3\J0\V1IBM, 9600 7855 AT&D2&C1X4V1Q0S7=70\G0\N3\Q3 IBM, 9600 Internal PS/1 AT&D2&C1X4V1Q0S7=70 IBM, 9600 Internal ThinkPad AT&D2&C1X4V1Q0S7=70W2\G0\N3\Q3 IBM, N51 Laptop 9600 AT&F&C1&D2\J0\N7\Q3\V2%C1IBM, 12000 7855 AT&D2&C1X4V1Q0S7=70\G0&A8\N3\Q3 IBM, 14.4 Int AT&F&C1&D2%C0IBM, 14.4 Int AT&F&C1&D2IBM, 14.4 Int AT&D2&C1X4V1Q0S7=70W1\N3&Q5&K3IBM, 14.4 7851-001 AT&D2&C1X4V1Q0S7=70W2\G0&Q5&K3\J0 IBM, 14.4 7851-002 AT&D2&C1X4V1Q0S7=70W2\N3&K3 IBM, 14.4 7852-001 (SOHO) AT&D2&C1X4V1Q0S7=70W2\N3&K3 IBM, 14.4 Internal (ISA) AT&D2&C1X4V1Q0S7=70W2\N3&K3 IBM, 14.4 Internal (Microchannel) AT&D2&C1X4V1Q0S7=70W2&Q5&K3 IBM, 14.4 Internal ThinkPad AT&D2&C1X4V1Q0S7=70W2\G0\N3\J0 IBM, 14.4 Mwave (Generic) AT&D2&C1X4V1Q0S7=70\N7\Q3 IBM, 14.4 Mwave AT&F&C1&D2&K3IBM, 14.4 Mwave WindSurfer (old) AT&D2&C1X4V1Q0S7=70\N3\Q3 IBM, 14.4 PS/55 note Data/Fax AT&D2&C1X4V1Q0S7=70\N3&K3 IBM, 14.4 DataFax Highspeed AT&F&C1&D2\J0\N3&K3&Q5%C3W1IBM, 14.4 Easy Options AT&FW2&C1&D3&K3&Q5%C3\N3S7=60S95=47 IBM, 14.4 N51 Laptop AT&F&C1&D2\J0\N7\Q3\V2%C1IBM, 14.4 NC400 AT&F&C1&D2&K3%C0IBM, 14.4 Options AT&F&C1&D2&K3%C0IBM, 14.4 Options PCMCIA AT&F&C1&D2&K3%C0IBM, 14.4 Options PCMCIA AT&F&C1&D2&K3IBM, 14.4 PCMCIA (Integrated DAA) AT&D2&C1X4V1Q0S7=70W2\G0%E2\N3&K3 IBM, 14.4 PCMCIA (Original) AT&D2&C1X4V1Q0S7=70W2\G0%E1\N3&K3 IBM, 14.4 PCMCIA AT&F&C1&D2&K3%C0IBM, Aptiva 14.4 Int AT&D2&C1X4V1Q0S7=70\G0\N3\Q3\J0 IBM, Aptiva 14.4 Int AT&F&C1&D2\Q3%C0IBM, 19.2 7857 AT&D2&C1X2V1Q0S7=70&E1&K2&U4&I1 IBM, 28.8 7852-010 AT&D2&C1X4V1Q0S7=70W2\N3&K3 IBM, 28.8 7852-013 AT&D2&C1X4V1Q0S7=70W2\N3&K3 IBM, 28.8 Internal (ISA) AT&D2&C1X4V1Q0S7=70W2\N3&K3IBM, Mwave ATS0=0Q0V1&C1&D2MIBM, Mwave 28.8 / 33.6 AT&C1&D0W2\N4IBM, Mwave 28.8 / 33.6 AT&F&D0&N0\N3%C1%E2S0=0 IBM, Mwave 28.8 / 33.6 AT&F&D0X4W2IBM, Mwave 28.8 / 33.6 AT&F&D0X4W2\N4IBM, MWave 28.8 / 33.6 AT&F&K0\N0 IBM, Mwave 28.8 / 33.6 AT&F&C1&D2&K3IBM, Mwave 28.8 / 33.6 AT&FV1&D0W2X4IBM, Mwave 28.8 / 33.6 AT&D2&C1X4V1Q0S7=70\N7\Q3 IBM, Mwave 28.8 / 33.6 AT&F&D3\N5\Q3IBM, Mwave 28.8 / 33.6 ATS28=18IBM, Mwave 28.8 / 33.6 AT"H%C\N*TH8IBM, Mwave 28.8 / 33.6 AT"H%C\NS28=18IBM, MWave WindSurfer AT&F\N0%C0 IBM, 28.8 PCMCIA (Integrated DAA) AT&D2&C1X4V1Q0S7=70W2\G0%E2\N3&K3 IBM, 7851 14.4Kbps External Data/Fax AT&FW2&C1&D3&K3&Q5%C3\N3S7=60S36=7S46=138S95=47 IBM, 7855 Model 10 AT&F&C1&D2&AL8&B8N1&I0&M0\D0\IBM, Data/Fax PCMCIA AT&F&C1&D3&K3&Q5%C3\N3S7=60S38=7S46=138S48=7S95=47 IBM, ThinkPad 701C/701CS Int AT&FW2&C1&D3&K3&Q6%C1S7=60 IBM, ThinkPad Internal V.32terbo AT&F&C1&D2&K3%C0IBM, ThinkPad Internal V.32terbo AT&F&C1&D2&K3IBM, Data/Fax 56k X2 AT&D2&C1X4V1Q0S7=70&M4&B1&H1&R2 IBM, PCMCIA 56k X2 AT&D2&C1X4V1Q0S7=70&M4&B1&H1&R2IBM, WaveRunner (ISDN) HDLC Async to Sync AT&FV1X4Y0&D3%C1 IBM, WaveRunner (ISDN) V.120 AT&FV1X4Y0&D3%C1IBM, X2 56K Limited to 33.6 S32=32IBM, X2, V.90 Limited to 33.6 S32=64
105
170 NCR, NEC, NewComm, Newmedia NCR, S0=0 E1Q0V1X4 NCR, Enhanced 14.4 Fax AT&F&C1&D2\J0\N7\Q3\V2 NCR, Safari 3170 - E14400 Fax Cellular S0=0 E1Q0V1X4 NEC, AT\N0%C0 NEC, 14.4 Kbps Data/Fax AT&F&C1&D2X6\D1\N7\Q3S85=1 NEC, UltraLite 14.4 Data/Fax AT&F&C1&D3&K3&Q4\J0\N7\Q2W2%C1S7=60 NEC, PC-20-66 14.4 Data/Fax AT&F&C1&D2&K3\J0\N7\Q3\V2%C1 NEC, 9631 AT&F&C1&D2\Q3%C0 NEC, 9631 AT&F&C1&D2\Q3 NEC, 9631 AT&F&C1&D2&R0\N3\Q3\V1 NEC, N2431/2431C AT&F&C1&D2&E0 NEC, America 2431C S0=0 E1Q0V1X4&C1&D2&K3&M0&Q0%C0 NEC, 9635E Plus AT&F&C1&D2\Q3%C0 NEC, 9635E Plus AT&F&C1&D2\Q3 NEC, America 9635E Plus S0=0 Q0 V1 \K0\Q1%C0 NEC, America Laptop S0=0 Q0 V1 \K0\Q1%C0 NEC, N2431 AT&F&C1&D2\Q3%C0 NEC, N2431 ATQ0V1X4&C1&D2&E1 NEC, N2431/2431C 14.4 AT&D2&C1X4V1Q0S7=70 NEC, N2431E AT&F&C1&D2\Q3%C0 NEC, N2431E AT&FV1Q0X3&C1&D2&E0 NEC, N2435 AT&F&C1&D2&R0\Q3\N6\J0\V1 NEC, America N2431 S0=0 Q0 V1 \K0\Q1%C0 NEC, America S0=0 E1Q0V1X4 NEC, PCMCIA 14.4 AT&F&C1&D2\Q3%C0 NEC, PCMCIA 14.4 AT&F&C1&D2\Q3 NEC, America DataComm S0=0 E1Q0V1X4 &C1&D2&K3&M0&Q0 %C0 Newcom, 14,400efx Data/Fax AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47 Newcom, 28.8 / 33.6 ATZ%C0 Newcom, 28.8 / 33.6 AT&FW1%C0 Newcom, 28.8 / 33.6 AT&F&C1&D2&K3%C0 Newcom, 28.8 Data/Fax AT&F0Q0W2&C1&K3&R0\N0\G0%C3 New Media Corporation, S0=0 E1Q0V1X4 New Media Corporation, PCMCIA 144 Fax/Data S0=0 E1Q0V1X4 New Media, PCMCIA 14.4/14.4 Data/Fax AT&F&C1&D3\J0\N3\Q3%C1S7=60 New Media, WinSurfer 14.4 PCMCIA AT&F&C1&D2&K3%C0 New Media, PCMCIA 14.4/14.4 Data/FAX AT&F&C1&D3\J0\N3\Q3%C1S7=60
105
171 Netcomm Netcomm, 9600 / 14.4 AT&D2&C1X4V1Q0S7=70\N3&K3 Netcomm, 14.4 / 28.8 AT&D2&C1X3S7=70 Netcomm, Pocket Rocket PA 9600 AT&D2&C1X3S7=70 NetComm, Roadster 14.4 AT&F&D2&K3X3-K0&W Netcomm, Roadster 14.4 AT&F&D2&K3X3-K0%E2 NetComm, Roadster 14.4 (win3.1 and winsock) AT&F&D2&K3X3-K0&W NetComm, Roadster 14.4 AT&F&D2&K3X3-K0 NetComm, Roadster 28.8 AT&F&C1&D2 Netcomm, Roadster 28.8 AT&F%E2&C1&D2S0=0S7=60K0 Netcomm, Roadster 28.8 AT&F%E2&C1&D2S0=0S7=60-K0 NetComm, Roadster 28.8 AT&F&D2&K3%E2-K0&W NetComm, Roadster 28.8 (win3.1 and winsock) &FS0=0S7=60-K0X3&C1&D2%E2 NetComm, PCMCIA V32bis CM1700 AT&F\N3%C0&K3&D2 Netcomm, CardModem Range AT&F&D2&K3%E2-K0&W NetComm, M11F 28.8 AT&FQ0V1X5&C1&D2&E2&K3&R0\J0\N3%C3%T0S7=60 Netcomm, M7F AT&e&k0b0\v0x4&d2\n1\q0#j0#q9%c0 Netcomm, M34F AT&K3&D3&C1Q2 NetComm, Socket Rocket Range AT&F&D2&K3S106=0&W NetComm, SmartModem M11F 28.8 AT&FQ0V1X5&C1&D2&E2&K3&R0\J0\N3%C3%T0S7=60 NetComm, SmartModem M11F 28.8 (win3.1) AT&F&K3S0=0S7=60#C0#K0X3&C1&D2 NetComm, SmartModem Range AT&F&D2&K3&W NetComm, Other SmartModems (win3.1) AT&F&K3S0=0S7=60#C0#K0X3&C1&D2 NetComm, VoiceMaster 33.6 AT&F&D2&K3&W NetComm, VoiceMaster 33.6 AT&F&D2X3 NetComm, 33.6 AT&F&W
105
172 New Media, New World, Nokia, Noteworthy, Novafax, Novation, Nuvotel New Media Corporation, S0=0 E1Q0V1X4 New Media Corporation, PCMCIA 144 Fax/Data S0=0 E1Q0V1X4 New Media, PCMCIA 14.4/14.4 Data/Fax AT&F&C1&D3\J0\N3\Q3%C1S7=60 New Media, PCMCIA 14.4 AT&D2&C1X4V1Q0S7=70\N3\Q3\J0 New Media, WinSurfer 14.4 PCMCIA AT&F&C1&D2&K3%C0 New Media, PCMCIA 14.4/14.4 Data/FAX AT&F&C1&D3\J0\N3\Q3%C1S7=60 New World, AT&FX3l2&C1&D2&P1S0=0 Nokia, Cellular DTP-2 PCMCIA 9600 AT&D2&C1X5V1Q0S7=70 Nokia, ECM 4896M TRELLIS V.32 ATZ%C0/N0 Noteworthy, T144NW AT&F&C1&D3&K3&Q6\J0\N3W2%C3S7=60S95=47 Noteworthy, T144NWX AT&FW2&C1&D3&Q5\N3\Q3\V2%C3S7=60S36=7S46=138S48=7 Noteworthy, T144NWX Fax AT&F&C1&D2&K3%C0 Noteworthy, PCMCIA 14.4 AT&F&C1&D2&K3%C0 Noteworthy, PCMCIA 28.8 /33.6 AT&F&C1&D2&K3%C0 NovaFax, 14.4 AT&F&C1&D2&K3\N3%C0 NovaFax, 14.4 AT&F&C1&D2\Q3\N3%C0 Novation, S0=0 E1Q0V1X4 Nuvotel, 9600 I AT&F&C1&D2&K3&Q5S95=41 Nuvotel, 9600 IFX AT&F&C1&D2&K3&Q5S95=41 Nuvotel, 96424IFX AT&F&C1&D2&Q5\N3&K3 Nuvotel, 14.4 IFX AT&F&C1&D2&K3%C0 Nuvotel, 14.4 I AT&F&C1&D2&K3&Q5S95=41 Nuvotel, 14.4 IFX AT&F&C1&D2&K3&Q5S95=41 Nuvotel, Pegasus 9600E AT&F&C1&D2&K3&Q5S95=41 Nuvotel, Pegasus 14.4 E AT&F&C1&D2&K3&Q5S95=41
105
173 Octocom, Okidata, Okitel, Omnitel, Omron, Online, Orion, Ositech Octocom, OSI 8196A AT&F&C1&D2&I1*E1&E1&K2 Octocom, 8224 AT&F&C1&D2&K3*E0 Octocom, OSI 8324A AT&F&C1&D2&I1*E1&E1&K2 Octocom, 8396 AT&F&C3&D2&K3*E0 Octocom, 8596 AT&F&C1&D2&K3*E0 Octocom, OSI 8396A AT&F&C1&D2&I1*E1&E1&K2 Okidata, 2400 AT&D2&C1X4V1Q0S7=70 Okidata, Okitel 2400 Plus AT&F&C1&D2\V1\N3\Q3\J0\C1&Y0 Okidata, AT\N0%C0 Okidata, CLP 296 S0=0 Q0 V1 \V1\N3X4&B0&K0S27=128 Okidata, CLP 296 AT&F&C1&D2\V1\Q3\J0\C1&Y0 Okidata, Okitel 9600 S0=0 Q0 V1 \V1\N3X4&B0&K0S27=128 Okidata, Okitel 9600 AT&F&C1&D2\C1\J0&K3\N3\Q3 Okidata, 9600 AT&D2&C1X4V1Q0S7=70\N3\Q3\J0 Okidata, S0=0 E1Q0V1X4 Okitel, 9600 AT&F&C1&D2\Q3%C0 Okitel, 9600 AT&F&C1&D2\Q3 Omnitel, S0=0 E1Q0V1X4 Omron Office Automation Products S0=0 E1Q0V1X4 Omron, MD-144XT-10V 14.4 AT&D2&C1X4V1Q0S7=70 Omron, Impala 14.4 AT&D2&C1X4V1Q0S7=70\G0%E0&M4\Q3\J0 Online, 14.4 AT&D2&C1X4V1Q0S7=70W2\G0%E0N1&Q5&K3\J0 Orion, 14.4 AT&D2&C1X4V1Q0S7=70W2&Q5&K3 Ositech, LapTALK Plus 14.4K AT&FW2&C1&D3&K3&Q5\N3%C3S7=60S95=47 Ositech, Trumpcard AT&F&C1&D2&Q5&K3&S1W2S95=18 Ositech, Jack of Diamonds Trumpcard 14.4 AT&D2&C1X4V1Q0S7=70W2&Q5&K3 Ositech, Jack of Diamonds Trumpcard 33.6 AT&D2&C1X4V1Q0S7=70W2&Q5&K3
105
174 Pace Pace, Micro Comm. Eurolink S0=0 Q0 V1 E1 S53=2 Pace, Micro Comm. Linnet V32 Quad S0=0 Q0V1 &K3 \P1 F6 Pace, Micro Comm. Microlin fx Pocket Fax S0=0 Q0 V1 E1 S53=2 Pace, Micro Comm. Other S0=0 E1Q0V1X4 Pace, Micro Comm. Series Four S0=0 Q0 V1 E1 S53=2 Pace, Micro Comm. Ultralink 32 S0=0 Q0 V1 E1 S53=2 Pace, Micro Comm. V32 &F &C1 &D2 &K2 \P0 Pace, Micro Technology Microlin fx S0=0 E1Q0V1X4 Pace, Micro Technology Other S0=0 E1Q0V1X4 Pace, MicroLin Fx AT&F&C1&D2\N3%C3&K3S7=58S95=41 Pace, MicroLin Fx 32 Plus AT&F&C1&D3&K3\J0\N3%C3S7=60S36=7S95=47 Pace, MicroLin Quad Fax AT&F&C1&D2\N3%C3&K3S7=58S95=41 Pace, Linnet Quad 32 AT&F&C1&D2&A1&I1&K1\C5\N0\P2\Q0S11=75 Pace, Ultralink Quad AT&F&A1&E2&I1&K1\C4\N0\P1\Q0 Pace, Ultralink 32 AT&F&A1&E2&I1&K1\C4\N0\P1\Q0 Pace, Ultralink 32+ AT&FQ0V1X4S0=0S2=255&C1&D2&Y0
105
175 PC-Tel PC-Tel, ATN0S37=12PC-Tel, 28.8 AT&F&C1&D2&K3%C0PC-Tel, 28.8 / 33.6 AT&D2&C1X4V1Q0S7=70W2\N3&K3PC-Tel, HSP Deluxe 33.6 AT&F&C1&D2&K3W1PC-Tel, MicroModem AT&F&C1&D2&K3W1HSP Deluxe 33.6 AT&F&C1&D2&K3W1%N0 Dynamic CPU loading disabled %N1 Dynamic CPU loading not to exceed 10% %N2 Dynamic CPU loading not to exceed 20% %N3 Dynamic CPU loading not to exceed 30% %N4 Dynamic CPU loading not to exceed 40% %N5 Dynamic CPU loading not to exceed 50% %N6 Dynamic CPU loading not to exceed 60% %N7 Dynamic CPU loading not to exceed 70% %N8 Dynamic CPU loading not to exceed 80%%N9 Dynamic CPU loading not to exceed 90%
105
176 Packard Bell, Panasonic, PC Logic, PDI, PC-Link, PCSI Packard Bell, S0=0 E1Q0V1X4 Packard Bell, 144AM/144AMSP AT&F&C1&D2&K3%C0 Packard Bell, 14.4 Internal &F S0=0 E1Q0V1X4 &C1&D2\Q3%C0 Packard Bell, F-114 14.4 Fax AT&F&C1&D2\Q3%C0 Packard Bell, PB-144 AT&F&C1&D2&K3%C0 Packard Bell, Sound144AM AT&F&D0&K3&Q5S0=0 Packard Bell, Sound144AM/SP AT&F&D0&K3&Q5S0=0 Packard Bell, 28.8 Voice/Fax AT&F&C1&D2&K3%C0 Packard Bell, 33.6 Voice/Fax AT&F&C1&D2&K3%C0 Panasonic, CF-BM87ACF-BM87A S0=0 E1Q0V1X4\G1&K3 Panasonic, TO-703B 14.4 AT&D2&C1X4V1Q0S7=70 PC Logic, 96I AT&F&C1&D2&K3&Q5\N3%C1S95=34 PC Logic, 14.4 AT&Q6 PC Logic, 14.4 AT&D2&C1X4V1Q0S7=70W2&Q5&K3 PC Logic, 14.4/Fax AT&F&C1&D2&K3&Q9\N3%C1S95=34 PC Logic, AT\N0%C0 PC Logic, 19200/Fax AT&F&C1&D2\J0&K3\N3%C1\V1 PC-Link, 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3 PCSI, Ubiquity Cellular 9600 / 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3 PDI-1000 AT&F&C1&D2&K3
105
177 Penril, PerfectData, Piiceon, Pine, PNB, POwerUser, Powercom Penril, 2332 ATQ0V1X4&C1&D2&S1\V1\Q1\N0 Penril, AT&D2&C1X4V1Q0S7=70\N3\Q1\B0 Penril, Alliance V.32 Series AT&F\D1\C4 Penril, Alliance v.32 AT&F\Q3 Penril, Alliance v.32 AT&FL1\B1\C4\M1\Q3 Penril, DataComm Networks DX144 S0=0 E1Q0V1X4 &C1&D2&Q0&R0&S0 \Q1\M1 Penril, DataComm Networks Other S0=0 E1Q0V1X4 Penril, DLX V.32M AT&F&C1&D2\Q1\V1 Penril, DLX 14.4 AT&F&C1&D2\Q1\V1 PerfectData, S0=0 E1Q0V1X4 PerfectData, 9600 AT&F&C1&D2\N3%C1\V2\Q3 0 PerfectData, 14.4 AT&F&C1&D2\N3%C1\V2\Q3 Piiceon, 96/96 V.32 Medium Range Fax S0=0 E1Q0V1X4 Piiceon, Dispatcher 9696 AT&F1&C1&D2\N7W2\V2%C1\Q3\J0 Piiceon, Dispatcher Data 14.4 & Fax 14.4 S0=0 E1Q0V1X4 Piiceon, S0=0 E1Q0V1X4 Piiceon, Dispatcher 14.4 AT&F1&C1&D2\N7W2\V2%C1\Q3\J0 Piiceon, Dispatcher (V.42bis) AT&F&C1&D3&K3&Q5%C3\J0\N3S7=60S36=7S48=7S95=47 Pine, AT&Q6 Pine, 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Pine, (RPI) 14.4 AT&D2&C1X4V1Q0S7=70W2 Pine, 28.8 AT&D2&C1X4V1Q0S7=70W2\N3&K3 PNB, S0=0 E1Q0V1X4 PowerUser, 14.4E AT&F&C1 Powercom, 14.4 AT&F&C1&D2&K3%C0
105
178 Practical Peripherals Practical Peripherals, AT\N0%C0 Practical Peripherals, AT&Q6 Practical Peripherals, S0=0 E1Q0V1X4 Practical Peripherals, 2400SA V.42bis AT&F&C1&D2 Practical Peripherals, 2400SA MNP AT&FX4&C1&D2\Q3\N3\J0\V10 Practical Peripherals, PM2400FX96SA AT&F&D0&K3&Q5S0=0 Practical Peripherals, PM2400EFXSA AT&F&D0&K3&Q5S0=0 Practical Peripherals, FXMT 9600 AT&D2&C1X4V1Q0S7=70W2&Q5&K3 Practical Peripherals, PM9600 AT&FX4&C1&D2&K3S46=136 Practical Peripherals, PM9600 AT&F&C1&D2&K3&Q5S46=0 Practical Peripherals, PM9600 AT&FC1&D2&K3&Q5S46=138 Practical Peripherals, PM9600FX AT&F1&C1&D2&K3S46=0 Practical Peripherals, PM9600FX AT&F1L1S46=0 Practical Peripherals, PM9600FXMT AT&F&D0&K3&Q5S0=0 Practical Peripherals, PM9600FXMT AT&F&C1&D2&Q5&K3S95=45 Practical Peripherals, PM9600HC II &FS0=0 E1Q0V1X4 &C1&D2&K3 Practical Peripherals, PM9600MT II AT&F&D0&K3&Q5S0=0 Practical Peripherals, PM9600MT II &FS0=0 E1Q0V1X4 &C1&D2&K3 Practical Peripherals, PM9600SA ATS36=7&Q5&C1&D&K3 Practical Peripherals, PM9600SA AT&F1&C1&D2&K3L1S46=0 Practical Peripherals, PM9600SA AT&F&D0&K3&Q5S0=0 Practical Peripherals, PM9600SA V.32 AT&F&C1&D2S95=44&Y0 Practical Peripherals, 9600SA/14400SA ATS36=7&Q5&C1&D&K3 Practical Peripherals, 14400FX V.32bis ATZS46=0&Q0&D2 Practical Peripherals, 14400FXMT AT&F&C1 Practical Peripherals, 14400FXSA AT&F&C1N0 Practical Peripherals, PM144FXMT ATZS46=0&Q0&D2 Practical Peripherals, PM144FXMT ATS46=0&Q0&K0&D2 Practical Peripherals, MC144MT AT&F&L1S46=0 Practical Peripherals, MC144MT AT&F1&Q6 Practical Peripherals, MC144MTII AT&F1&C1&D0 Practical Peripherals, MC144T2-EZ AT&F3\Q3\N3S0=0 Practical Peripherals, PC144T2-EZ AT&F1&D0\Q3\N3S0=0 Practical Peripherals, PC144T2-EZ AT&F1&C1&D2&K3S46=0 Practical Peripherals, PC144LCD AT&F1&D0\Q3\N3S0=0 Practical Peripherals, PC144HC AT&F1&D0\Q3\N3S0=0 Practical Peripherals, PC144MT AT&F1&D0\Q3\N3S0=0 Practical Peripherals, PM144 PS/2 AT&F&D0&K3&Q5S0=0 Practical Peripherals, PM144FX AT&F1&C1&D2&K3S46=0 Practical Peripherals, PM144FX PS/2 AT&FS0=0 E1Q0V1X4 &C1&D2&K3 Practical Peripherals, PM144FXHC AT&F1&C1&D2&K3L1S46=0 Practical Peripherals, PM144FXMT AT&F&D0&K3&Q5S0=0 Practical Peripherals, PM144FXMT AT&F1&C1&D2&K3L1S46=0 Practical Peripherals, PM144FXMT AT&F&C1&D2&K3&Q5W2S95=41 Practical Peripherals, PM144FXMT AT&FS0=0 E1Q0V1X4 &C1&D2&K3 Practical Peripherals, PM144FXPMT AT&FS0=0 E1Q0V1X4 &C1&D2&K3 Practical Peripherals, PM144FXPPM AT&F1&C1&D2&K3L1S46=0 Practical Peripherals, PM144FXSA AT&FS0=0 E1Q0V1X4 &C1&D2&K3 Practical Peripherals, PM144FXSA AT&F1&C1&D2&K3L1S46=0 Practical Peripherals, PM144FXSA AT&F&C1&D2W1S95=41 Practical Peripherals, PM144FXSA AT&F&C1N0 Practical Peripherals, PM144FXSA AT&FW2&C1&D3&K3&Q5S7=60S36=7S46=2S48=7S95=47 Practical Peripherals, PM144FXSA V.32 AT&FS0=0 E1Q0V1X4 &C1&D2&K3 Practical Peripherals, PM144FXSAC AT&F1&C1&D2&K3L1S46=0 Practical Peripherals, PM144HC AT&F1&C1&D2&K3L1S46=0 Practical Peripherals, PM144HC II AT&FW2&C1&D3&K3&Q5S7=60S36=7S46=2S48=7S95=47 Practical Peripherals, PM144HC II AT&FS0=0 E1Q0V1X4 &C1&D2&K3 Practical Peripherals, PM144HC II AT&F&D0&K3&Q5S0=0 Practical Peripherals, PM144MT II AT&F&D0&K3&Q5S0=0 Practical Peripherals, PM144MT II AT&FS0=0 E1Q0V1X4 &C1&D2&K3 Practical Peripherals, PM144MT AT&F1L1S46=0 Practical Peripherals, PM144MT AT&F1&Q6 Practical Peripherals, PM144MT II AT&F1L1S46=0 Practical Peripherals, PM144MT II AT&FW2&C1&D3&K3&Q5S7=60S36=7S46=2S48=7S95=47 Practical Peripherals, PM144MT II AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=2S48=7S95=47 Practical Peripherals, PM144MT II AT&F&C1&D2&K3S95=3W2X4 Practical Peripherals, PM144SA ATS&K336=7&Q5&C1&D Practical Peripherals, PM288 V.34 AT&F&K3&D2&C1S46=0 Practical Peripherals, PCMCIA 28.8 AT&D2&C1X4V1Q0S7=70W2&Q5&K3 Practical Peripherals, 33.6 AT&D2&C1X4V1Q0S7=70W2&Q5&K3 Practical Peripherals, PM288FXHC AT&F&K3&D2&C1S46=0 Practical Peripherals, PM288HC AT&F&K3&D2&C1S46=0 Practical Peripherals, PM288MT AT&F&K3&D2&C1S46=0 Practical Peripherals, PM288MT AT&F&C1&D2&K3&Q5W2S95=41 Practical Peripherals, PM288MT II AT&FW2&C1&D3&K3&Q5S7=60S36=7S46=2S48=7S95=47 Practical Peripherals, PM288HC II AT&F&K3&D2&C1S46=0 Practical Peripherals, PM288PKT AT&F1&C1&D2&K3S46=0 Practical Peripherals, PM288PKT AT&F1L1S46=0 Practical Peripherals, PM288PKT V.FC AT&FW2&C1&D3&K3&Q5S7=60S36=7S46=2S48=7S95=47 Practical Peripherals, MC144MT II AT&F3\Q3\N3S0=0 Practical Peripherals, PM14400FXSA AT&F&D0&K3&Q5S0=0 Practical Peripherals, PC144T2 AT&F1&D0\Q3\N3S0=0 Practical Peripherals, PM14400 PKT (Pocket Edition) AT&F&D0&K3&Q5S0=0 Practical Peripherals, PM14400FXMT AT&F&C1 Practical Peripherals, PM144FXHC Int AT&F&C1&D2S95=3W2 Practical Peripherals, PractiCard 144 AT&F&C1&D3&K3&Q5S7=60S36=7S46=2S48=7S95=47 Practical Peripherals, Practicard 144 S0=0 E1Q0V1X4 S46=0 &C1&D2&K3 Practical Peripherals, 28.8 v.FAST AT&K3&D0&C1 Practical Peripherals, MC288LCD AT&F1&C1&D2&K3s46=0 Practical Peripherals, MC288LCD AT&F3 Practical Peripherals, MC288T2-EZ v.34 AT&F3\Q3\N3S0=0 Practical Peripherals, MC288T2 v.34 AT&F3\Q3\N3S0=0 Practical Peripherals, MC288LCD v.34 AT&F3\Q3\N3S0=0 Practical Peripherals, MC288MT AT&F&C1&D2&K3 Practical Peripherals, MC288MT AT&F1&C1&D2&K3S46=0 Practical Peripherals, MC288MT II v.34 AT&F3\Q3\N3S0=0 Practical Peripherals, MC288MT II v.34 AT&F3 Practical Peripherals, MC288MT II v.34 AT&F&C1&D0 Practical Peripherals, PC288FXMT AT&F1&C1&D2&K3S46=0 Practical Peripherals, PC288HC v.34 AT&F1&D0\Q3\N3S0=0 Practical Peripherals, PC288HC AT&F1&C1&D2&K3S46=0 Practical Peripherals, PC288MT v.34 AT&F1&D0\Q3\N3S0=0 Practical Peripherals, PC288T2-EZ v.34 AT&F1&D0\Q3\N3S0=0 Practical Peripherals, PC288T2 v.34 AT&F1&D0\Q3\N3S0=0 Practical Peripherals, PC288LCD V.FC AT&FW2&C1&D3&K3&Q5S7=60S36=7S46=2S48=7S95=47 Practical Peripherals, PC288MT AT&F1&C1&D2&K3L1S46=0 Practical Peripherals, PC288MT AT&F1L1S46=0 Practical Peripherals, PC288MT V.FC AT&FW2&C1&D3&K3&Q5S7=60S36=7S46=2S48=7S95=47 Practical Peripherals, PC288MT AT&F&C1&D2&K3S95=3W2X4 Practical Peripherals, PC288MT AT&F&C1&D2&K3S95=3W2X4&Q5 Practical Peripherals, PC288MT AT&F&C1&D2&K3S95=3W2X4&Q6 Practical Peripherals, PC288MT AT&FW2&C1&D3&K3&Q5S7=60S36=7S46=2S48=7S95=47 Practical Peripherals, PC288SA V.FC AT&FW2&C1&D3&K3&Q5S7=60S36=7S46=2S48=7S95=47 Practical Peripherals, PC288LCD AT&F1&C1&D2&K3S46=0 Practical Peripherals, PC288LCD AT&F1L1S46=0 Practical Peripherals, PC288LCD AT&F&C1&D2&W Practical Peripherals, PC288LCD v.34 AT&F1&D0\Q3\N3S0=0 Practical Peripherals, PC288LCD AT&F&C1&D2S95=2W2 Practical Peripherals, PC288LCD AT&F&C1&D2S95=2W2&Q5 Practical Peripherals, PC288LCD AT&F&C1&D2S95=2W2&Q6 Practical Peripherals, PC288LCD AT&FW2&C1&D3&K3&Q5S7=60S36=7S46=2S48=7S95=47 Practical Peripherals, PC288SA AT&F1&C1&D2&K3L1S46=0 Practical Peripherals, PC288SA AT&F1&C1&D2&Q5&K3S46=0 Practical Peripherals, PC288SA AT&F1&C1&D2&K3S46=0 Practical Peripherals, PC288SA AT&FW2&C1&D3&K3&Q5S7=60S36=7S46=2S48=7S95=47 Practical Peripherals, PM288HC AT&F&C1&D3&K3S95=3W2X4 Practical Peripherals, PM288HC AT&F&C1&D3&K3S95=3W2X4&Q5 Practical Peripherals, PM288HC AT&F&C1&D3&K3S95=3W2X4&Q6 Practical Peripherals, PM288HC II v.34 AT&F&D0&K3&Q5S0=0 Practical Peripherals, PM288MT II v.34 AT&F&D0&K3&Q5S0=0 Practical Peripherals, PM288HC II V.34 AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=2S48=7S95=47 Practical Peripherals, PM288MT II V.34 AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=2S48=7S95=47 Practical Peripherals, PM288PKT V.FC AT&FW2&C1&D3&K3&Q5S7=60S36=7S46=2S48=7S95=47 Practical Peripherals, PC288T2EZ AT&F1&C1&D2&K3L1S46=0 Practical Peripherals, PC288T2EZ PCMCIA AT&F&D0S95=3W2&K3X4 Practical Peripherals, PC288T2EZ PCMCIA AT&F&D0S95=3W2&K3X4&Q5S110=6 Practical peripherals, PC288T2EZ PCMCIA AT&F&D0S95=3W2&K3X4&Q6S110=6 Practical Peripherals, ProClass 28800 V.FC AT&F&C1&D3E1Q0X4&K3S7=60 Practical Peripherals, 33.6 AT&F&K3&D2&C1S46=0 Practical Peripherals, 144FX Pocket AT&FS0=0 E1Q0V1X4 &C1&D2&K3 Practical Peripherals, PC-HSSP S0=0 E1Q0V1X4 S46=0 &C1&D2&K3 Practical Peripherals, PC144HC S0=0 E1Q0V1X4 S46=0 &C1&D2&K3 Practical Peripherals, PC144LCD S0=0 E1Q0V1X4 S46=0 &C1&D2&K3 Practical Peripherals, PC144MT S0=0 E1Q0V1X4 S46=0 &C1&D2&K3 Practical Peripherals, PC288HC V.FC S0=0 E1Q0V1X4 S46=0 &C1&D2&K3 Practical Peripherals, PC288LCD V.FC S0=0 E1Q0V1X4 S46=0 &C1&D2&K3 Practical Peripherals, PC288MT V.FC S0=0 E1Q0V1X4 S46=0 &C1&D2&K3 Practical Peripherals, PC288SA V.FC S0=0 E1Q0V1X4 S46=0 &C1&D2&K3 Practical Peripherals, PM288 PKT II V.FC AT&FS0=0 E1Q0V1X4 &C1&D2&K3&Q5W2 S95=44 Practical Peripherals, PM288 PKT V.FC AT&FS0=0 E1Q0V1X4 &C1&D2&K3 Practical Peripherals, PM288HC II V.FC AT&FS0=0 E1Q0V1X4 &C1&D2&K3 Practical Peripherals, ProClass 28800 V.FC AT&F&C1&D3E1Q0X4&K3S7=60
105
179 Prometheus Prometheus, 9600 Plus AT&F*F3 Prometheus, Ultima 9600 S0=0 E1Q0V1 \N0\Q0\J0 Prometheus, ProModem 9600 AT&F&C1&D2\Q3%C0 Prometheus, ProModem 9600 AT&F&C1&D2\Q3 Prometheus, ProModem 144 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Prometheus, ProModem 144e AT&F&D0&M0%E0&K3&R0&Q5\N7S0=0 Prometheus, ProModem 144e AT&FW2&C1&D2&K3&Q5\N6\Q3\V1%C1S7=60 Prometheus, ProModem 144e AT\N0%C0 Prometheus, ProModem 144e AT&F&C1&D0&K3 Prometheus, ProModem 144e AT&F0V1&Q6&C1&D2Q0E1X4&K3%C0&R0\G1\N6\V1 Prometheus, ProModem 144e AT&FW2&C1&D2&K3&Q5\N6\Q3\V1%C1S7=60 Prometheus, ProModem 144e (mac) AT&FW1L3&C1S7=90 Prometheus, ProModem 144i ATE0L0Q0V1X4&C1&D3\N6S7=60 Prometheus, ProModem 144i AT&F0V1&Q6&C1&D2Q0E1X4&K3%C0\G1\N6\V1 Prometheus, ProModem 144i AT&F&D0&K3\Q3S0=0 Prometheus, ProModem 144i AT&FE1Q0V1X1&K3\Q3S37=11 Prometheus, Promodem 14.4 AT&F&C1&D2&K3%C0 Prometheus, Line Link 14.4 AT&F&C1&D2&K3%C0 Prometheus, Ultima/Home Office AT&F%C0&C1&D2\Q3 Prometheus, Ultima/Home Office AT&F&C1&D2\Q3 Prometheus, Ultima/Home Office AT\N3%C1&C1&D0\J0\V1\Q3 Prometheus, Ultima/Home Office S0=0 Q0V1 \J0\N0\V1\Q1\X1 Prometheus, Ultima/Home Office AT&F&C1&D2\Q3\J0\N3\V1%C1 Prometheus, ProModem Ultima AT&F&D0 Prometheus, ProModem Ultima AT&F&C1&D2\Q3 Prometheus, ProModem Ultima AT&F&C1&D2\Q3%C0 Prometheus, ProModem Ultima AT&F&C1&D3*E9*F3*S1S7=60 Prometheus, ProModem Ultima AT&F*S1*N6*F3*M1 Prometheus, ProModem Ultima AT&F&D0 Prometheus, ProModem Ultima AT&F&C1&D3*E9*F3*S1S7=60 Prometheus, V.32bis AT&F\Q3&C1&D2 Prometheus, V.32bis AT&F&C1&D2\Q3%C0 Prometheus, V.32bis 14.4 AT&C1&D2 Prometheus, V.32/V.32bis AT&F&C1&D2\Q3 Prometheus, V.32/V.32bis AT&F&C1&D2*E1*F3*S1 Prometheus, v.32/v.32bis AT&C1&D0*E1*F3*S1 Prometheus, 28.8 AT&F&C1&D2\Q3%C0 Prometheus, CyberPort 28.8 v.34 AT&F&C1 Prometheus, CyberPhone M288evsp AT&F&C1&D0\N3&W Prometheus, Cyberphone 28.8 AT&F&C1&D2\Q3%C0 Prometheus, CyberPhone 28.8 ATS10=15S9=16S11=55M0V1E&C10&D0%C0\Q3 Prometheus, Cyberphone 33.6 AT&F&C1&D2\Q3%C0 Prometheus, Home Office 144i S0=0 Q0V1 \J0\N0\V1\Q1\X1 Prometheus, Home Office Fax S0=0 Q0V1 \J0\N0\V1\Q1\X1 Prometheus, S0=0 E1Q0V1X4 Prometheus, ProModem Ultima Home Office S0=0 Q0V1 \J0\N0\V1\Q1\X1
105
180 PreMax, Prolink, Prodigy, Psion, PureData PreMax, 14.4 PCMCIA Fax AT&F&C1&D2\J0\N3\Q3%C1"H3S7=60 PreMax, 14.4 PCMCIA AT&D2&C1X4V1Q0S7=70\N3\Q3\J0 Prodigy, 14.4 AT&D2&C1X4V1Q0S7=70\N6\Q3\J0 Prolink, AT&F&Q6%C0&C1&D2&K3B0F10 Prolink, 14.4 AT&F0B0N1%C0&D0&Q6 PSI S0=0 E1Q0V1X4 PSI Comstation 2 S0=0 E1Q0V1X4 PSI Comstation V AT&F PSI Comstation V AT&F&C1&D2&K3&Q5\N3 PSI Comstation 5 S0=0 E1Q0V1X4 PSI PowerModem II/IV AT&F PSI PowerModem II/IV AT&Q5%C0&C1&D2&K3 Psion, Dacom AT&K0%C0 Psion, Dacom Gold PC3 AT&FF3X4&C1&D2&I1&J2&K2&R0 Psion, Dacom Gold PC4 AT&FF3X4&C1&D2&I1&J2&K2&R0%C1 Psion, Dacom Gold PC4 Fax AT&FF3X4&C1&D2&I1&J2&K2&R0%C1 Psion, Dacom PDM 3 AT&FF3X4&C1&D2&I1&J2&K2&R0 Psion, Dacom PDM 4 AT&FF3X4&C1&D2&I1&J2&K2&R0%C1 Psion, Dacom PDM 4 Fax AT&FF3X4&C1&D2&I1&J2&K2&R0%C1 Psion, Dacom PDM30 AT&FF3X4&C1&D2&I1&J2&K2&R0 Psion, Dacom PDM40 AT&FF3X4&C1&D2&I1&J2&K2&R0%C1 Psion, Dacom PDM40F AT&FF3X4&C1&D2&I1&J2&K2&R0%C1 Psion, Dacom PDM50F AT&FF8X4&C1&D2&Q5&K3&R0\N3%C3W2 Psion, Dacom PDM60F AT&FF8X4&C1&D2&Q5&K3&R0\N3%C3W2 Psion, Dacom Quad B0 F3 &K1 V1E1Q0 Psion, Advanced D-Series S0=0 E1Q0V1X4 Psion, Gold Card S0=0 E1Q0V1X4 Psion, S0=0 E1Q0V1X4 PureData, PDMCIA 2400 AT&F\V2 PureData, SatisFAXtion 400i / 400e AT&FL1\J0%C0"H0
105
181 QVC, QfaxModem, Quantum, Quickcomm, Quicktel QVC, 14.4 AT&F2&C1&D2%C1\J0\N6\Q3\V1 QfaxModem, 14.4 AT&F1X3 Quantum, Active S0=0 E1Q0V1X4 Quantum, Active 9624F, 2400V42 and 9624B/V42 AT&F&D2&C1E0 Quantum, Active 144 S0=0 E1Q0V1X4 Quantum, Active 144UF+ and 144UB+ AT&F&D2&C1E0W1S95=47 Quantum, Active 144PCi, 144PCi/V and 144Ce/V AT&F&D2&C1E0 Quantum, Active 336FDV, 28.8 AT&F&D2&C1E0W1S95=47 Quantum, Active 336FDV, 28.8 AT&F&D2&C1E0W1/V0S95=47 Quickcomm, S0=0 E1Q0V1X4 QuickComm, 14.4 AT&F*F3 Quickcomm, Spirit II S0=0 E1Q0V1 *E0*F1 QuickComm, Spirit II AT&F&C1&D2X4*E9*F3*N6 Quickcomm, Sprint II AT&F*Q0*E0S9=6 Quickcomm, Sprint II AT&F%C0\N0 Quickcomm, Spirit II V32 Terbo 19.2 AT&F*N8*E0&D2&C1 Quickcomm, Spirit II V32bis 14.4 AT&F*N6*E0&D2&C1 Quickcomm, Spirit SMI Int AT&F%C0\N0 Quickcomm, Spirit SMI V32bis , V32Terbo AT&F&C1&D2&K3S0=0V1X4 Quickcomm, Spirit Thunder AT&F*Q0*E0*N6S9=6 Quickcomm, Spirit Viper 28.8 AT&FX3&K3&D2 Quickcomm, V.32 S0=0 E1Q0V1 *E0*F1 Quicktel, Xeba 14.4 AT&F&C1 Quicktel, Xeba 14.4 AT&F&C1&D2\Q3\N3%C0 Quicktel, Xeba 14.4 AT&F&C1&D2&K3\N3%C0 Quicktel, Xeba 9600 LH AT&F&C1&D2\Q3%C0 Quicktel, Xeba 9600 LH AT&F&C1&D2\Q3 Quicktel, Xeba 9600 LP AT&F&C1&D2\Q3%C0 Quicktel, Xeba 9600 LP AT&F&C1&D2\Q3 Quicktel, Xeba 9600 LX AT&F&C1&D2\Q3%C0 Quicktel, Xeba 9600 LX AT&F&C1&D2\Q3 Quicktel, Xeba 9600 XV AT&F&C1&D2\Q3\N3%C0 Quicktel, Xeba 9600 XV AT&F&C1&D2&K3\N3%C0 Quicktel, 2814XVR 28.8 AT&F&C1&D2S7=90S10=60S95=1 Quicktel, 28.8 S0=0 E1Q0V1X4&K3 Quicktel, 28.8 AT&D2&C1X4V1Q0S7=70W2&Q5&K3\J0 Quicktel, S0=0 E1Q0V1X4
105
182 Racal Racal, ALM 3223 AT&F&D0 Racal, ALM 3223 AT&F&D2 Racal, ALM 3223 AT&F&C1&D2&K3\N3%C0 Racal, ALM 3226 AT&F&C1&D2&K3\N3%C0 Racal, ALM 3226 v.32 AT&F&C1 Racal, Datacom RMD 2412 AT&F&C1&D2X4*C1*D1*E1*L1 Racal, Datacom RMD 2412/2 AT&F&C1&D2X4*C1*D1*E1 Racal, Datacom RMD 3221 AT&FX9&C1&D2*F2 Racal, Datacom ALM 3223 AT&F&C1&D3\M0\N3\P2\Q1\V1S7=60 Racal, Datacom ALM 3223 AT&F&C1&D2\Q1L1 Racal, Datacom ALM 3223 AT&F&C1&D3\M0\N3\P2\Q1\V1S7=60 Racal, Datacom ACL 3223 14.4 AT&D2&C1X4V1Q0S7=70 Racal, Datacom ALM 3226 AT&F&C1&D3\N3W1S7=60S24=0S95=1 Racal, Datacom ALM 3226 AT&F&C1&D2W2L2 Racal, Datacom ALM 3239 AT&F&C1&D3\M0\N3\P2\Q1\V1S7=60 Racal, Datacom RMD 3264 AT&F&C1&D3\M0\N3\P2\Q1\V1S7=60 Racal, Datacom ALM 3264 AT&F&C1&D2\Q1L1 Racal, Datacom ALM 3268 AT&F&C1&D3\M0\N3\P2\Q1\V1S7=60 Racal, Datacom Excalibur Dual Modec AT&F&C1&D3\M0\N3\P2\Q1\V1S7=60 Racal, Datacom, S0=0 E1Q0V1X4 Racal, GSM w/ Hayes Ultra AT&F&C1&D2&K3&Q5S46=136 Racal, GSM w/ Hayes Ultra AT&F&C1&D2&K3S46=136 Racal, Milgo S0=0 E1Q0V1X4 Racal, Milgo RMD 3221 S0=0 E1Q0V1X4&K3 Racal, Milgo RMD 3221 14.4 AT&D2&C1X4V1Q0S7=70 Racal, Milgo RMD 3222 S0=0 E1Q0V1X4&K3 Racal, Milgo RMD 3222 AT&FX4&C1&D2\N3\Q1\B1 Racal, RMD 2422 AT&F&C1&D2*E1*F2*D1 Racal, RMD 2422 AT&F&C1&D2*F2*D1 Racal, RMD 3221 AT&F&C1&D2*F2*E1*D0 Racal, RMD 3221 AT&F&C1&D2*F2*D0 Racal, RMD 3222 AT&F&C1&D2\Q1\N3\M1\C4 Racal, RMD 3222 AT&F&C1&D2\Q1\M1\C4 Racal, RMD 3223 AT&F&C1&D2\Q1\N3\M1\C4 Racal, RMD 3223 AT&F&C1&D2\Q1\M1\C4 Racal, RMD 3226 AT&F&C1&D2&K3\N3%C0 Racal, RMD 3226 AT&F&C1&D2&K3%C0 Racal, RMD 9632PA AT&F&C1&D2\Q1\N3\C4 Racal, RMD 9632PA AT&F&C1&D2\Q1\C4 Racal, RMD 9642PA AT&F&C1&D2\Q1\N3\C4 Racal, RMD 9642PA AT&F&C1&D2\Q1\C4 Racal, Vadic S0=0 E1Q0V1X4 Racal, Vadic 1200PA AT&F&C1&D2 Racal, Vadic 2400/PS AT&F*F2&C1&D2*E1&Y0 Racal, Vadic 2400LC AT&F&C1&D2*E1*F2*P1&Y0 Racal, Vadic 2400PA Model 2 AT&F&C1&D2X4*E1*L1*Q1*F2*P1 Racal, Vadic 2400VP AT&F&C1*C1&D2*E1*F2Y1*Q1 Racal, Vadic 9600VP AT&F&C1*C1&D2*F2Y1*Q1 Racal, Vadic 9600VP S0=0 E1Q0V1X4&K3 Racal, Vadic 9632PA AT&F&C1&D2 Racal, Vadic 9632PA S0=0 E1Q0V1X4&K3 Racal, Vadic 9600 AT&D2&C1X4V1Q0S7=70 Racal, Vadic VA212 S0=0 E1Q0V1X4&K3 Racal, Vadic VA3451 S0=0 E1Q0V1X4&K3
105
183 Radicom, Reveal Radicom, 28.8 AT&F&C1&D2%C0B0Reveal, 14.4 AT&F1&C1&D2\Q3%C0ReveaL, 14.4 AT&FX1&D2&C1E1&K3\N3%C0Reveal, 14.4 AT&D2&C1X4V1Q0S7=70\N3\Q3\J0Reveal, DATAFAX PM700 V.34 28.8 AT&F&C1&D2&K3%C0Reveal, DATAFAX PM700 V.34 33.6 AT&F&C1&D2&K3%C0Reveal, PM800 28.8 Fax AT&F&C1&D2%C0Reveal, PM800 33.6 Fax AT&F&C1&D2%C0Reveal, PM500 AT\N1%C0Reveal, PM700 AT&F0&D0B1&K3&L0%C3S0=0 Reveal, 28.8K V.34 AT&FX1&C1&D2&K3\N3E1%C0
105
184 Rockwell (Now Conexant) Generic, Rockwell Chipset AT&F&D0&K3&Q5S0=0Generic, Rockwell RPI Chipset AT&F&D0&K3+H3S95=1S0=0Generic, Rockwell RPI Chipset AT&F&C1&D2&K3+H11S95=1Generic, Rockwell RPI Chipset AT&F&C1&D2+H11S95=1Generic, Rockwell RPI Chipset AT&F&C1&D2&K3+H11S95=1Generic, Rockwell RPI Chipset AT&F&C1&D2&K3+H11Y0S95=1Generic, Rockwell RPI Chipset AT&F&C1&D2&K3E1V1+H11Y0S95=1Generic, Rockwell RPI Chipset AT&F&C1&D2&K3&Q5E1V1Q0X4+H11S95=1Generic, Rockwell RPI Chipset AT&F&C1&D0&K3&Q5E1V1Q0+H11Y0S7=75S95=1Generic, Rockwell RPI+ Chipset AT&F\N0&K3&C1&D2Generic, Rockwell RPI+ Chipset AT&F&C1&D2&Q6&K3Generic, Rockwell RPI+ Chipset AT&F&D0&K3+H11S0=0Rockwell based 14.4 AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47 Rockwell based 14.4 PCMCIA AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47 Rockwell based 14.4 RPI AT&FW2&C1&D2&Q6&K3S7=60 Rockwell based 28.8 V.34/V.FC AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47Rockwell based 56k V.90 (flex enabled) +MS=12,1Rockwell based 56k V.90 AT&F%E1Rockwell based 56k V.90 (flex and V.34 disabled) +MS=12,1,34667,56000Rockwell based 56k flex only +MS=56,1Rockwell based 56k flex only +MS=56,1,34000,56000Rockwell based 56k flex, disabled, V.34 only +MS=11,0,9600,33600Rockwell based 56k flex, disabled, V.34 only +MS=11,1Rockwell Based 56k V.90 AT&F&W&W1E0X4W2Rockwell based 56k HCF V.90 +MS=v90Rockwell based 56k HCF 56kflex +MS=k56flexRockwell based 56k HCF 33.6 mode +MS=v34Rockwell Based 56k HCF V.90 AT&FE0V1S0=0&C1&D2W0 Rockwell Based 56k HCF V.90 AT&FE0V1S0=0&C1&D2W0
105
185 Rockwell RPI Generic, Rockwell Chipset AT&F&D0&K3&Q5S0=0 Generic, Rockwell RPI Chipset AT&F&D0&K3+H3S95=1S0=0 Generic, Rockwell RPI Chipset AT&F&C1&D2&K3+H11S95=1 Generic, Rockwell RPI Chipset AT&F&C1&D2+H11S95=1 Generic, Rockwell RPI Chipset AT&F&C1&D2&K3+H11S95=1 Generic, Rockwell RPI Chipset AT&F&C1&D2&K3+H11Y0S95=1 Generic, Rockwell RPI Chipset AT&F&C1&D2&K3E1V1+H11Y0S95=1 Generic, Rockwell RPI Chipset AT&F&C1&D2&K3&Q5E1V1Q0X4+H11S95=1 Generic, Rockwell RPI Chipset AT&F&C1&D0&K3&Q5E1V1Q0+H11Y0S7=75S95=1 Generic, Rockwell RPI+ Chipset AT&F\N0&K3&C1&D2 Generic, Rockwell RPI+ Chipset AT&F&C1&D2&Q6&K3 Generic, Rockwell RPI+ Chipset AT&F&D0&K3+H11S0=0 Amquest, 14.4 (RPI) AT&F&D0&K3+H3S95=1S0=0 Amquest, 14.4 (RPI) ATAT&D2&C1X4V1Q0S7=70W2 Best Data, 14.4 (RPI) AT&D2&C1X4V1Q0S7=70W2 Best Data, Smart One 1442FQ - Int AT&F&D0&K3+H3S95=1S0=0 Best Data, Smart One 9624FQ - Int AT&F&D0&K3+H3S95=1S0=0 Cardinal, 14.4 (RPI) AT&D2&C1X4V1Q0S7=70W2 Logicode, Quicktel (RPI) 14.4 AT&D2&C1X4V1Q0S7=70W2 Logicode, Quicktel 1414LLH AT&F&D0+H3S95=1S0=0 Pine, (RPI) 14.4 AT&D2&C1X4V1Q0S7=70W2 Rockwell based 14.4 RPI AT&FW2&C1&D2&Q6&K3S7=60 Smart One, (RPI) 14.4 AT&D2&C1X4V1Q0S7=70W2 USRobotics, Sportster Si 14.4 PC AT&F&D0&K3+H3S95=1S0=0 USRobotics, Sportster Si 14.4 Ext AT&F&D0&K3+H3S95=1S0=0 Zoom, 14.4EX FaxModem AT&F&D0&K3+H3S95=1S0=0
105
186 SAI, S.A.T., Seda, Sierra, Signature Series SAI Systems & Laboratories S0=0 E1Q0V1X4S.A.T. 3202S V110 38400 (ISDN) AT&FC2E1Q0V1X1&R0&C1S0=2S.A.T. 3202S V14e 57600 (ISDN) AT&FC2E1Q0V1X1&R0&C1S0=2Seda, S0=0 E1Q0V1X4Seda, 28.8 S0=0 E1Q0V1X4&K3Sierra, 28.8 /33.6 Data Wave Fax AT&F&C1&D2&K3%C0Signature Series SS1414i Internal Card AT&FW2&C1&D2&Q6&K3S7=60Signature Series SS1414P PCMCIA AT&F&C1&D2\J0\N3\Q3%C1"H3S7=60
105
187 SIIG SIIG, S0=0 E1Q0V1X4SIIG, 14.4 /28.8 /33.6 AT&F&C1&D2&K3%C0SIIG, SI-1414i S0=0 E1Q0V1X4&K3SIIG, SI-1414i AT&F&D0&E0$C1$E4$F4S0=0SIIG, SI-1414Ai Int Fax AT&FW2&C1&D2&Q6&K3S7=60SIIG, SI-1414RI Int Fax AT&F&K3\J0\N5\Q3%C1S7=60S36=7S46=138SIIG, SI-1414RI AT&F&C1&D2&K3\Q3\N3S95=1SIIG, DASH 14.4i Int Fax AT&FW2&C1&D2&Q6&K3S7=60SIIG, DASH 28.8i-V.34 Int Fax AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47
105
188 Simple Simple Technologies AT&F1%C0SimpleModem, 96F / 144F AT&F&C1&D2&K0\N3%C0B0&P1SimpleModem, 96d / 144d AT&F&C1&D2&K3B0&P1SimpleModem, 14.4 AT&D2&C1X4V1Q0S7=70\N3&K3Simplemodem, 144F AT&FB0X3SimpleModem, 28.8 AT&D2&C1X4V1Q0S7=70\N3&K3Simplemodem, 288vi AT&FX3&C1&D2%C0SimpleModem, 28.8F AT&F&C1&D2&K3\N3%C0B0&P1Simplemodem, 288F AT&F%C0S95=3D0W2Simplemodem, 28.8 / 33.6 AT&F&P1W1-K0-Q0SimpleComputing, S0=0 E1Q0V1X4
105
189 Shiva, Smartlink, Starlit, Smart One, Smarty, Sonix, Spartan, SpectraCom, Spectrum, Spirit Shiva, v.32bis Modem Module (PC Dial-In; ARA 2.x) AT&F&D3&K3&Q5&S1%C3\N3S95=255S0=0 Shiva, S0=0 E1Q0V1X4 Shiva, v.32bis Modem Module (ARA 1.0) AT&F&D3&K3&Q0&S1S95=47S0=0 Shiva, v.34 Modem Module (ARA 1.0) AT&F&D3&K3&Q0&S1S95=47S0=0 Shiva, v.34 Modem Module (PC Dial-In; ARA 2.x) AT&F&D3&K3&Q5S0=0&S1%C3\N3S95=47S0=0 Shiva, NetModem/E S0=0 E1Q0V1X4&K3 Shiva, NetModem/E AT&FS12=1 SmartLink, 9600UM AT&FX4&C1&D2&R0&Y0&M5%C1\J0\N5\Q3 Starlit Designer, 9600 AT&F1X4&C1&D2&R0&Y0&M5%C1\J0\N3\Q3W1&K3 Smart One, 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Smart One, (RPI) 14.4 AT&D2&C1X4V1Q0S7=70W2 Smart One, 28.8 AT&D2&C1X4V1Q0S7=70W2\N3&K3 Smarty, 14.4 AT&F&C1&D2\Q3%C0 Smarty, 14.4 AT&F&C1&D2\Q3\N3%C0 Sonix, Canzona AT&FE0V1S0=0S95=47Q3 Spartan, 9600 AT&D2&C1X4V1Q0S7=70W2\N3&K3 SpectraCom, Pocket 14.4 AT&F SpectraCom, V.32bis PocketFax AT&Q3S36=7%C0&C1&D2&K SpectraCom, v.32bis PocketFax AT&Q3S36=7%C1&C1&D0&K3 Spectrum, 9600 ATX2V1Q0S7=70W0F1 Spectrum, Mwave DSP 14.4 AT&D2&C1X4V1Q0S7=70\N7\Q3 Spirit, 9600 AT&D2&C1X4V1Q0S7=70 Spirit, 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3
105
190 Supra (Diamond Multimedia) Supra, AT\N Supra, AT&F2&C1&D2&K3 Supra, AT&F1\N Supra, S0=0 E1Q0V1X4 Supra, AT&F2&D2&C1 Supra, AT&F0S46=136%C0 Supra, ext AT&K&Q&D\N1 Supra, 2400 MNP AT&F2&C1%C0 Supra, 2400 v.42bis AT&Q5S36=7%C1&C1&D0&K3 Supra, 2400/9600 Fax AT&F&C1&D2+H1 Supra, 2400 Plus (V.42bis) AT&F2&C1%C0\V2 Supra, 9600 AT&F&C1&D2\Q3\N3\J0\V1\C1%C0 Supra, FaxModem 9600 &FS0=0 E1Q0V1X4 \N0&C1&D2&K3%C0 Supra, COMCard PCMCIA AT&F2&D0S0=0 Supra, ComCard 14.4 AT&F2&C1&D2&K3\N3%C0 Supra, ComCard 14.4 AT&F2&C1&D2&K3 Supra, ComCard PCMCIA 14.4 &F2%C0 Supra, 14.4 V.32bis AT&fS46=136&Q0&D2 Supra, 14.4 V.32bis AT&K&Q&D\N1 Supra, 14.4 LC AT&F1 Supra, Express 14.4 Int AT&F2&C1&D2&K3%C0 Supra, Express 14.4i Plug and Play int AT&F2&D0S0=0 Supra, Express 14.4i AT&FS0=0 E1Q0V1X4 \N0&C1&D2&K3L0 Supra, Express 14.4 Plus MAC AT&F1&C1&D2&K3\N3%C0 Supra, Express 14.4 Plus MAC AT&F1&C1&D2&K3%C0 Supra, Express 14.4 Plus Mac AT&F1S0=0 Supra, Express 14.4 Plus ext AT&F2&D0S0=0 Supra, Express 14.4 Plus AT&F2L1%C0 Supra, Express 14.4 Plus AT&F2&C1&D2&K3\N3%C0 Supra, Express 14.4 Plus AT&F2W2&C1&D2&K3&Q5\N3%C3S7=60S95=47 Supra, Express 14.4i Plus AT&F2W2&C1&D2&K3&Q5\N3%C3S7=60S95=47 Supra, Express 14.4i PnP AT&F2L1%C0 Supra, Express 14.4i PnP AT&F2&C1&D2&K3 Supra, Express 288iPNP Fax AT&F2&KV0E0&D2S0=0S7=45 Supra, Express 288iPNP int AT&F2&D0S0=0 Supra, Express 28.8iPnP AT&F2L1%C0 Supra, Express 28.8 Mac AT&F1&C1&D2&K3\N3%C0 Supra, Express 28.8 Mac ext AT&F1S0=0 Supra, Express 28.8 / 33.6 Mac AT&F1X3 Supra, Express 28.8 / 33.6 AT&F2&C1&D2%C Supra, Express 28.8 / 33.6 AT&F2L1%C0 Supra, Express 28.8 / 33.6 AT&F2&C1&D2&K3\N3%C0 Supra, Express 28.8 / 33.6 ext AT&F2&D0S0=0 Supra, Express 56i AT&F2+MS=56 Supra, Express 56i Sp AT&F2&C1&D2S11=60L3+ms=56 Supra, FaxModem 14.4LC AT&F2&D0S0=0 Supra, FaxModem 14.4i int AT&F2&D0S0=0 Supra, FaxModem 14.4i &FS0=0 E1Q0V1X4 \N0&C1&D2&K3%C0 Supra, FaxModem 14.4 AT&F2W1S95=41 Supra, FaxModem 14.4 ATN0%CS37=9S46=136&Q0&D2&K Supra, FaxModem 14.4 PCMCIA AT&FS95=3X4&D0&K3 Supra, FAXModem 14.4i &FS0=0 E1Q0V1X4 \N0&C1&D2&K3%C0 Supra, FAXModem 14.4PB (S/B PowerBook 1.XX Series) AT&F1S0=0 Supra, FaxModem 14.4 AT&F2L1%C0 Supra, FaxModem 14.4LC AT&F2L1%C0 Supra, FaxModem 14.4LC AT&FN1W2&C1&D1&K3&Q5\N3%C1S7=60S36=7S48=7S95=45 Supra, FaxModem V.32 AT&F2L1%C0 Supra, FaxModem V.32 AT&F2&C1&D2&K3 Supra, FAXModem V.32 AT&FS=0 E1Q0V1X4 \N0&C1&D2&K3%C0 Supra, FAXModem v.32 AT&F2&D0S0=0 Supra, FaxModem V.32bis AT&F2L1%C0 Supra, FAXModem v.32bis AT&F1 Supra, FAXModem V.32bis AT&FS0=0 E1Q0V1X4 \N0&C1&D2&K3%C0 Supra, FaxModem v.32bis AT%C0&K0&Q6&D2\N0 Supra, FAXModem V.32bis AT&FS0=0 E1Q0V1X4 \N0&C1&D2&K3%C0 Supra, FAXModem V.32bis AT&FN1W2&C1&D1&K3&Q5\N3%C1S7=60S36=7S48=7S95=45 Supra, FAXModem v.32bis ext AT&F2&D0S0=0 Supra, FAXModem v.32bis Mac ext AT&F1S0=0 Supra, FAXModem 28.8 / 33.6 Mac ext AT&F1S0=0 Supra, FAXModem 28.8 / 33.6 AT&F1 Supra, FAXModem 28.8 / 33.6 AT&F1%C0 Supra, FAXModem 28.8 / 33.6 AT&F1&K4%C0 Supra, FAXModem 28.8 / 33.6 AT&FW2&C1&D2&K3&Q5\N3%C3S7=60S95=47 Supra, FAXModem 28.8 / 33.6 &F2S0=0 E1Q0V1X4 \N0&C1&D2&K3%C0 Supra, FaxModem 28.8 / 33.6 AT&F2M1N1%C0 Supra, FAXModem 28.8 / 33.6 AT&FW2&C1&D2&K3&Q5\N3%C3S7=60S95=47 Supra, FaxModem 28.8 / 33.6 AT&F1&W&W1Z Supra, FAXModem 288i AT&FW2&C1&D2&K3&Q5\N3%C3S7=60S95=47 Supra, FAXModem 288i ext AT&F2&D0S0=0 Supra, FAXModem 288i int AT&F2&D0S0=0 Supra, FaxModem 288i Int AT&FS95=3X4&D0&K3 Supra, FaxModem 288i Int AT&FS95=3X4&D0&K3&Q5 Supra, FaxModem 288i Int AT&FS95=3X4&D0&K3&Q6 Supra, FaxModem 288i PnP AT&F2L1%C0 Supra, FaxModem 288i PnP AT&F2&C1&D2&K3\N3%C0 Supra, FAXModem 288i PnP AT&F2&D0S0=0 Supra, FaxModem 28.8 PCMCIA AT&FE1S95=3X4 Supra, FaxModem 28.8 PCMCIA AT&FE1S95=3X4&Q5 Supra, FaxModem 28.8 PCMCIA AT&FE1S95=3X4&Q6 Supra, FAXModem 288PB (S/B PowerBook 1.XX Series) AT&F1S0=0 Supra, FAXModem Plus AT&F2&D0S0=0 Supra, Sonic 33.6v+ AT&F1 Supra, 33.6 AT&F1\N3&K3&Q5&D0 Supra, 56k Flex AT&F2W2 Supra, 56k Flex AT&F1%C0S202=32 Supra, 56K (56kFlex) +ms=56,1,19200,56000,1,0 Supra, 56K 56k Flex AT&F&C1&D0&C0+ms=56,1,19200,56000 Supra, 56K 56KFlex Limited to 33.6 +ms=11,0,9600,33600 Supra, 56K 56KFlex Limited to 33.6 +ms=11,1 Supra, 56K 56KFlex Limited to 33.6 AT&F+MS=11,1,300,33600 Supra, 56K V.90 Limited to 33.6 AT&F+MS=V34 Supra, 56K V.90 Limited to 56KFlex AT&F+MS=k56flex Supra, 56K V.90 AT&F+MS=V90 Supra, Max 56i Disable V.90 -V90=0
105
191 Stowaway, Swann Synappsys, Sysdyne Stowaway, 14.4 AT&D2&C1X4V1Q0S7=70W2\N3&K3Swann, S0=0 E1Q0V1X4Swann, Xtrum V.34 AT&FX3&C1&D2&K3\N3%C0Synappsys, 14.4 AT&F2&C1&D2%C1\J0\N6\Q3\V1Sysdyne, S0=0 E1Q0V1X4
105
192 Taicom, Tandata, Tandy, TDK, Technology Concepts Taicom, V.32bis Fax AT&F&D2%C0Tandata, S0=0 E1Q0V1X4Tandata, TM500 Z &C1&D2 E1V1Q0X1Tandy, S0=0 E1Q0V1X4TDK DF1414 14.4 PCMCIA AT&F&C1&D2&K3%C0TDK DF1414 14.4 Data/Fax PCMCIA AT&FW2&C1&D2&K3\J0\N3%C1%H3S7=60S95=47TDK DF2814 Cellular 28.8 PCMCIA AT&F&C1&D2\Q3%C0TDK DF2814 PCMCIA AT&F&D0X4/Q3%G1TDK DF2814 PCMCIA AT&F&D0X4/Q3%G1\N3%C2%B28800$B57600TDK DF2814 PCMCIA AT&F&D0X4/Q3%G1\N0%C0%B28800$B57600Technology Concepts Fax AT&F&C1&D2&K3%C0Technology Concepts LineLink 14.4 AT&F&C1&D2&K3%C0
105
193 Telebit Telebit, AT&F X4 &C1 &D2 S2=255 S58=2 S61=0 Telebit, Internal PC Card w/ MNP AT&F~S51=5~S58=2~S66=1~S95=2 Telebit, T1000 AT&F&D0 S50=0 S51=5 S52=1 S53=1 S58=2 S66=1 X3 S0=0 Telebit, T1000 ATQ0V1X2&C1&D2&K3&S1&Q Telebit, T1000 AT&FX14S52=1S53=1S54=3S55=3S58=2S66=1S95=2S96=0 Telebit, T1000 AT&FS53=1S52=1S58=0S55=3S54=3S7=55 Telebit, T1000 AT&F~S51=5~S52=1~S54=2~S58=2~S66=1~S68=2~S95=2 Telebit, T1500 AT&F&D0 S50=0 S51=5 S52=1 S53=1 S58=2 S66=1 X3 S0=0 Telebit, T1500 AT&F&C1&D2S58=2S68=255S98=0 Telebit, T1500 AT&FX13S131=1S52=1S55=3S58=2S68=255S98=0 Telebit, T1500 or T2500 - V.42 mode AT&F~S51=254~S52=1~S131=1~S58=2~S66=1~S97=1~S106=1 Telebit, T1500 or T2500 - MNP mode AT&F~S50=6~S51=254~S52=1~S131=1~S58=2~S66=1~S95=2 Telebit, T1600 AT&F9&D0 T X12 S0=1 S51=253 S59=15 S0=0 Telebit, T1600 ATS180=2S190=1S51=252S58=2S68=2 Telebit, T1600 AT&F&C1&D2S58=2S190=0 Telebit, T1600 AT&F9 Telebit, T1600 AT&FX1&C1&D3&R3S7=60S51=6S58=0S59=15S68=2S180=2S190=1 Telebit, T1600 AT&F9X4S2=255S61=0 Telebit, T1600 AT&F~S51=253&C1&D2L1X12~S58=2~S59=15 Telebit, T2000 AT&FX14S52=1S53=1S54=3S55=3S58=2S66=1S95=2S96=0 Telebit, T2000 AT&F&D0 S50=0 S51=5 S52=1 S53=1 S58=2 S66=1 X3 S0=0 Telebit, T2000 AT&F~S51=5~S52=1~S53=1~S58=2~S66=1~S68=2~S95=2~S110=1 Telebit, T2500 AT~&FX1S7=60S51=5S52=2S66=1S68=2S97=1S98=3S106=1S131=1 Telebit, T2500 AT&F&D0 S50=0 S51=5 S52=1 S53=1 S58=2 S66=1 X3 S0=0 Telebit, T2500 AT&FX14S52=1S53=1S54=3S55=3S58=2S66=1S95=2S96=0S97=1S106=1 Telebit, T2500 High Speed AT&F&D0X14S52=0S53=1S54=3S58=2S66=1S95=2S96=0S97=1S106=1S0=0 Telebit, T3000 AT&F9X2 Telebit, T3000 AT&FX1&C1&D3S51=6S58=2S59=7S68=2S7=60 Telebit, T3000 ATS180=2S190=0S51=252S58=2S68=2 Telebit, T3000 AT&F9&D0TX12S0=1S51=253S59=15S0=0 Telebit, T3000 AT&F&C1&D2S58=2S68=255S190=0 Telebit, T3000 AT&F9X4S2=255S61=0 Telebit, T3000 AT&FS51=253&C1&D2L1X12S58=2S59=15 Telebit, T3000 (38.4K baud) AT&FS51=253&C1&D2L1X12S58=2S59=15 Telebit, T3000 (57.6K baud) AT&FS51=7&C1&D2L1X12S58=2S59=15 Telebit, FastBlazer AT&FX4&I2&D2&C1*Y2S2=255&K2&U3 Telebit, FastBlazer AT&F&D0 X4 &I2 *Y2 S2=255 &K2 &U3 S0=0 Telebit, Other AT&F&D0 X4 S2=255 S58=2 S61=0 S0=0 Telebit, QBlazer AT&FX1&C1&D3S59=7S68=2S7=60 Telebit, QBlazer AT&FS58=2S180=1S190=0 Telebit, QBlazer AT&F&C1&D2S58=2S190=0 Telebit, QBlazer AT&FS0=0S7=60&D2S58=2S180=2S181=1V1Q0E1 Telebit, QBlazer AT&F&D0 T X4 S0=1 S58=2 S59=15 S0=0 Telebit, QBlazer AT&FS58=2S180=1S190=0 Telebit, QBlazer AT&F &D2 X4 S2=255 S58=2 S61=0 Telebit, QBlazer AT&FS51=252&C1&D2L1X4S58=2S59=15 Telebit, QBlazer Plus AT&F&D2S58=2S59=15 Telebit, QBlazer Plus AT&FX1&C1&D2S7=60S59=7S68=2S180=2S190=1 Telebit, QBlazer Plus AT&F&D0 X4 S2=255 S58=2 S61=0 S0=0 Telebit, QBlazer Plus AT&F &D2 X4 S2=255 S58=2 S61=0 Telebit, QBlazer/T3000 ATS180=2S190=1S51=252S58=2S68=2 Telebit, TeleBlazer V.34 AT&FX1&D2&K3 Telebit, TrailBlazer AT&F&D0 X4 S52=0 S53=1 S54=3 S58=2 S95=20 S0=0 Telebit, TrailBlazer AT&FX4S52=1S53=1S54=3S55=3S58=2S95=20 Telebit, TrailBlazer AT&FS0=0S7=60S58=2S66=1V1Q0E1 Telebit, Trailblazer / Trailblazer Plus AT&FS131=1S51=5S52=1S53=1S58=2S66=1 Telebit, TrailBlazer Plus AT&F&D0 S50=0 S51=5 S52=1 S53=1 S58=2 S66=1 X3 S0=0 Telebit, TrailBlazer Plus AT&FS52=4S131=3S58=2S68=255S98=0S110=0 Telebit, TrailBlazer Plus ATS52=4S131=3S58=2S68=255S98=0S110=0 Telebit, TrailBlazer Plus AT&FX14S52=1S53=1S54=3S55=3S58=2S66=1S95=2S96=0S97=1S106=1 Telebit, WorldBlazer AT&F9X2 Telebit, Worldblazer AT&F9X4S2=255S61=0 Telebit, WorldBlazer AT&F&C1&D2S58=2S68=255S190=0 Telebit, Worldblazer AT&F9X12&C1&D2S59=15S50=0S51=7S190=1 Telebit, WorldBlazer AT&F9&D0 T X12 S0=1 S51=253 S59=15 S0=0 Telebit, Worldblazer AT&FS0=0S7=60&D2S58=2S180=2S181=1V1Q0E1
105
194 Telecraft, Teleglobe, Telsat Telecraft Industries, S0=0 E1Q0V1X4Telecraft, Pocket Genius 14.4 AT&F2Teleglobe, S0=0 E1Q0V1X4Telenetics, S0=0 E1Q0V1X4Telsat, 12/2472 MNP AT&FE1Q0V1X4&C1&D2\N3&K2&R2&M0Telsat, 12/2482 AT&FE1Q0V1X4&C1&D2\N0&K2&R2&M0&MATTelsat, 12/2482 MNP AT&FE1Q0V1X4&C1&D2\N3&K2&R2&M0Telsat, 12/2492 AT&FE1Q0V1X4&C1&D2\N0&K2&R2&M0Telsat, 12/2492 MNP AT&FE1Q0V1X4&C1&D2\N3&K2&R2&M0Telsat, 9662 AT&FE1Q0V1X4&C1&D2Telsat, 9662 MNP AT&FE1Q0V1X4&C1&D2\N3&K3Telsat, 9682/D AT&FE1Q0V1X4&C1&D2Telsat, 9682/D MNP AT&FE1Q0V1X4&C1&D2\N3&K3Telsat, 9692/D AT&FE1Q0V1X4&C1&D2&R0Telsat, 9692/D MNP AT&FE1Q0V1X4&C1&D2&R1\N3&K3
105
195 Texas Instruments TI 14.4 Fax AT&F&C1&D2\Q3%C0TI RK28800 w/ 33.6 AT&FX4&B1&H1&R2&K0TI TravelMate V.32bis AT&F&C1&D2\Q3%C0TI TravelMate V.32bis AT&FX4&B1&H1&R2&K0Texas Instruments, S0=0 E1Q0V1X4Texas Instruments, V.32bis AT&F&C1&D2W2\V1%C1\J0\N7\Q3Texas Instruments, V.32bis Int AT&F&C1&D3%C1\J0\N7\Q2\V2S7=60Texas Instruments, 9600 V.32/V.42bis AT&F&C1&D2W2\V1%C1\J0\N7\Q3Texas Instruments, TI 4000 Notebook v.32 S0=0 E1Q0V1X4Texas Instruments TI-144 LMS PCMCIA Data/Fax S0=0 E1Q0V1X4Texas Instruments V.32bis Int AT&F&C1&D3%C1\J0\N7\Q2\V2S7=60
105
196 The Complete, Topline, Toshiba, Touchbase The Complete PC, S0=0 E1Q0V1X4Topline, 1428 VQE AT&C1&D2&YS95=255B0X4Toshiba, S0=0 E1Q0V1X4Toshiba, AT&F+C61B0X1&C1&P1S6=4V1S0=0S7=60Toshiba, T24D/X AT&F&C1&D2W1X4&K3&Q5&R0\G0\N3%C1Toshiba, 1234 V42Bis AT&FS0=0S7=60X3&K3&D2Toshiba, T144D S0=0 E1Q0V1X4&K3Toshiba, T144 D/F AT&F&C1&D2\N7\J0\Q3\V2Toshiba, T144P/F SR FAX V.42bis AT&F0&C1&D2W2%C0Toshiba, T144PF4 PCMCIA AT&F0W2&C1&D2%C0Toshiba, T144 NWX PCMCIA AT&F&C1&D2W2X4&Q5\G0\N3\Q3\V2%C1Touchbase, Worldport V.32 Pocket AT&F&C1&D2\N3\Q3\J0\V1
105
197 Tricom TriCom, S0=0 E1Q0V1X4 TriCom, Business Administrator AT&FS0=0Q0V1X1TriCom, Pearl AT&FS0=0Q0V1X1TriCom, Tempest Quin S0=0 Q0V1E1TriCom, Tempest Sixfax S0=0 Q0V1E1Tricom, Tempest 14.4 AT&F&C1&D2&K3%C0Tricom, Tempest 14.4 AT&F&C1&D2&K3Tricom, Tempest 28.8 V.34 AT&F&C1&D2&K3%C0Tricom, Tempest 28.8 V.34 AT&F&C1&D2&K3Tricom, Tempest 28.8 V.FC AT&F&C1&D2&K3%C0Tricom, Tempest 28.8 V.FC AT&F&C1&D2&K3TriCom, Tornado 12/42 E1V1 Q0%C0\N4&C1&D2TriCom, Tornado 28/42 E1V1 Q0%C0\N4&C1&D2TriCom, Tornado 5/42 AT&F\N2\J0\V1\Q3E0&C1&D2S0=1Tricom, Tornado 28.8 AT&F&C1&D2\Q3%C0Tricom, Tornado 28.8 AT&F&C1&D2\Q3Tricom, Traveller 28.8 AT&F&C1&D2\Q3%C0Tricom, Traveller 28.8 AT&F&C1&D2\Q3Tricom, Traveller 28.8 V.FC AT&F&C1&D2\Q3%C0Tricom, Traveller 28.8 V.FC AT&F&C1&D2\Q3
105
198 TurboModem, TurboSparan, Twincom, Twinhead, TyIN Turbomodem, S0=0 E1Q0V1X4TurboSpartan, FM14400 V.42bis/MNP5 AT&F&C1&D2\Q3%C0Twincom, 14.4 AT&F&C1&D2&K3%C0Twincom, 14.4 AT&F&C1&D2&K3Twincom, 9600 AT&F&C1&D2&K3%C0Twincom, 9600 AT&F&C1&D2&K3Twinhead, 2400 V.42bis AT&F&C1&D2X4\N3%C2W2&Q5S36=7S46=138S48=7TYIN, S0=0 E1Q0V1X4TyIN, 2000 AT&F&C1&D2&K3\N6%C0TyIN, 2000 AT&F&C1&D2&K3TyIN, 4000 AT&F&C1&D2&K3\N6%C0TyIN, 4000 AT&F&C1&D2&K3TyIN, 4000 S0=0 E1Q0V1X4&C1&D2&K1%C0
105
199 Universal Data Systems/UDS UDS, ATS0=0E1Q0V1X4 UDS, 14.4 AT&F\N1\Q0UDS, 14.4 AT&F&C1&D2\N7\Q3\J0\G0UDS, 14.4 AT&FS0=0S2=255V1X4&C1&D2UDS, CELLect 14.4 AT&F&C1&D2\Q3UDS, CELLect 14.4 AT&F&C1&D2\Q3%C0UDS, V.3227 AT&F&C1&D2\J0\M0\N7\Q2%C1S7=60UDS, V.3229 AT&F&C1&D3\J0\M0\N7\Q2%C1S7=60UDS, Fastalk AT\N0%C0UDS, FasTalk 32bx AT&F&C1&D2\Q3&R0UDS, FasTalk v.32 bx AT&F&C1\Q3UDS, Fastalk V.32 bx AT&F&C1\N3\Q3UDS, FasTalk FAX32bx AT&F&C1&D2\Q3&R0UDS, FasTalk Fax32bx/v.3225 AT\N3%C1&C1&D0\G0\J0\V1\Q3UDS, Fastalk V.32/V.42 AT&F&C1&D2%B9600C%C1\C1\J0\N3\Q3&YUDS, FasTalk V.32/42b AT&F&C1&D3\J0\M0\N7\V1\Q2%C1S7=60UDS, Motorola S0=0E1Q0V1X4 UDS, Motorola v.3225L/v.3229L AT&F&C1\Q3UDS, Motorola CELLect 14.4 AT&F&C1&D2\Q3%C0UDS, Motorola CELLect 14.4 AT&F&C1&D2\Q3UDS, Motorola FasTalk II AT&F&C1&D2\Q3%C0UDS, Motorola FasTalk II AT&F&C1&D2\Q3UDS, Motorola FasTalk V.32/42bis AT&F&C1&D2\Q3%C0UDS, Motorola FasTalk V.32/42bis AT&F&C1&D2\Q3 UDS, Motorola Fastalk V.32 AT&F&C1&D2\Q3 UDS, Motorola Fastalk V.32 AT&F&C1&D2\Q3%C0UDS, Motorola FasTalk 32bx S0=0E1Q0V1X4&C1&D2\Q3%CUDS, Motorola FasTalk V.32/42 S0=0Q0V1X4&C1\J0\N7\V1\Q3%C0UDS, Motorola V.3224/V.3225 S0=0Q0V1X4&C1\J0\N7\V1\Q3%C0UDS, Motorola V.3224/V.3225 AT&F&C1&D2%B6\N3\C1\J0\Q3%C0\V1UDS, Motorola V.3225 AT&F&C1&D2\Q3UDS, Motorola V.3225 AT&F&C1&D2\Q3%C0UDS, Motorola V.3225L/V.3229L AT&F&C1\Q3UDS, Motorola V.3227 AT&F&C1&D2\Q3%C0UDS, Motorola V.3227 AT&F&C1&D2\Q3UDS, Motorola V.3227 AT&F&C1&D2%B6\N7\C1\J0\Q3\V1UDS, Motorola V.3227 S0=0Q0V1X4&C1\J0\N7\V1\Q3%C0UDS, Motorola V.3227 AT&F&C1&D2\J0\M0\N7\Q2%C1S7=60UDS, Motorola V.3229 AT&F&C1&D2\Q3%C0UDS, Motorola V.3229 AT&F&C1&D2\Q3UDS, Motorola V.3229 AT&F&C1&D3\J0\M0\N7\Q2%C1S7=60UDS, Motorola V.3257 AT&F&C1&D2\Q3%C0UDS, Motorola V.3257 AT&F&C1&D2\Q3 UDS, Motorola V.3257 / V.3257L S0=0Q0V1X4&C1\J0\N7\V1\Q3%C0UDS, Motorola V.34 AT&FQ0V1W1X4&C1&D2\N7\Q3%C1%E1\J0%P=D S0=0S2=255S95=44UDS, Motorola V.34 AT&F&C1&D2\Q3%C0UDS, Motorola V.34 AT&F&C1&D2\Q3 UDS, Sync-Up V.32/5 AT&F&C1&D2&R0%B9600C%C1\N3\J0\Q3
105
200 Unisys, USA General, UST Unisys, 9600 AT&F&C1&D2%C1\J0\N3\Q3\V1Unisys, FastTalk v.32 (19200) AT&FB2X4&C1&D2&R0&S1&T5\C1\N3\J0%C1Unisys, MDM 9600 AT&F&C1&D2\Q3%C0Unisys, MDM 9600 ATB3E1V1%B2400\V0\G0&C1&D2\Q3%C0Unisys, 9600 v.32 AT&F&C1&D2\G1\N3\Q3\V1\X1%F1\J1USA General, 14.4FX AT&F&C1&D2W1S95=410UST, S0=0E1Q0V1X4
105
201 US Robotics USRobotics, S0=0E1Q0V1X4USRobotics, AT&M4&K1B0&A3&B1&D0&H1&I0&N0&R2USRobotics, 2400PC MNP AT&FX4&K0&H1&R2USRobotics, 14.4 AT&F&A0&K0&M0USRobotics, 14.4 AT&K0&H0&D0&I0&R1USRobotics, 14.4-Internal 1/2 Card AT&N6&B0&M0&K0&H0&I0&R1&A0S27=32USRobotics, 14.4-Internal 1/2 Card AT&M0&N6&K0&H0USRobotics, 14.4-Internal 1/2 Card AT&F&A0&M0&K0USRobotics, 14.4-Internal 1/2 Card AT&f&ho&b0&m0&d2&a0&k0&n6USRobotics, Mac & Fax AT&F&D0&H1USRobotics, Mac & Fax AT&F1&D0&H1&K2&M5USRobotics, Courier AT&F1&K0&M0USRobotics, Courier 2400e/ 2400e/ps AT&FX6&B6&H1&RUSRobotics, Courier 2400PC AT&FX6&B7&H1&R2USRobotics, Courier HST AT&FX6&B1&H1&R2USRobotics, Courier HST Dual AT&F&C1&D0USRobotics, Courier HST V.42 AT&FX6&B1&H1&R2&M4&A3USRobotics, Courier HST-ASL AT&F&H1&R2&K3&B1&A3X7USRobotics, Courier V.32 AT&FX6&H1&R2&B1USRobotics, Courier V.32 bis/as AT&F&D0&H1&K2USRobotics, Courier V.32bis-ASL AT&F&H1&R2&K3&B1&A3X7USRobotics, Courier 14.4 HST AT&FX4&B1&H1&R2&K0USRobotics, Courier 28.8 AT&FX4&B1&H1&R2&K0USRobotics, Courier 28.8 Ext & Int AT&F&B1&D0&A1&S0USRobotics, Courier 28.8 Ext & Int AT&F&B1&D0&A1&S0&K2&M5USRobotics, Courier 28.8 Ext & Int AT&F&B1&D0&A1&S0&K2&M0USRobotics, Courier 28.8 PCMCIA AT&F&A3&B1&H1&R2X4Q0M1USRobotics, Courier 28.8 PCMCIA AT&F&A3&B1&H1&R2X4Q0M1&K2&M5S54=32USRobotics, Courier 28.8 PCMCIA AT&F&A3&B1&H1&R2X4Q0M1&K0&M0S54=32USRobotics, Courier Dual AT&FX4&B1&H1&R2&K0USRobotics, Courier HST Dual Standard AT&F&C1&D0USRobotics, Courier HST Dual Standard AT&FB0X4&A3&C1&D2&M4&H1&K1&B1&R2USRobotics, Courier HST AT&FX4&B1&H1&R2&K0USRobotics, Courier HST AT&F&C1&DUSRobotics, Courier HST D.S. AT&F1S0=0Q0V1X4B0F1&K0USRobotics, Courier HST D.S. with ASL AT&FS0=0Q0V1E1X4&H1I0&K0USRobotics, Courier HST Dual 28.8 AT&FX4&B1&H1&R2&K0USRobotics, Courier PS/2 FAX AT&F1S0=0Q0V1X4B0F1&K0USRobotics, Courier V.32 AT&FX4&B1&H1&R2&K0USRobotics, Courier V.32bis AT&FX4&B1&H1&R2&K0USRobotics, Courier V.32bis AT&F&D2&H1&K2USRobotics, Courier V.32bis AT&F&D0&H1&K2USRobotics, Courier V.32bis ATS0=1S7=60E1Q0V1&C1&D2&H0&K0&M0&N6&A3USRobotics, Courier V.32bis FAX AT&F1S0=0Q0V1X4B0F1&K0USRobotics, Courier V.32bis AT&FX4&A3&C1&D2&M4&H1&K1&B1&R2USRobotics, Courier V.32bis/V.34 AT&FX4&B1&H1&R2&K0USRobotics, Courier D.S. V.32 terbo Data/FAX AT&F1S0=0Q0V1X4B0F1&K0 USRobotics, Courier Dual Standard v.34 AT&F&B1&H1&K3&R2S56=128USRobotics, Courier Dual Standard v.34 AT&F&B1&H1&K3&R2S56=128&N12USRobotics, Courier v.Everything v.34 Int AT&F1&D0S0=0 USRobotics, Courier v.Everything v.34 Ext AT&F1&D0S0=0 USRobotics, Courier DS v.34 PCMCIA AT&F1&D0S0=0 USRobotics, Courier HST Dual Standard AT&FB0X4&A3&C1&D2&M4&H1&K1&B1&R2USRobotics, Courier HST/DS 16.8k ATX4B0&A0&B0&H2&I0&K0&M0&N6aUSRobotics, Courier HST Dual Standard V.34 Fax AT&FB0X4&A3&C1&D2&M4&H1&K1&B1&R2S7=60USRobotics, Courier V.FC/V.34 AT&FB0X4&A3&C1&D2&M4&H1&K1&B1&R2S7=60USRobotics, Courier D.S. V.34 Data/FAX AT&F1S0=0Q0V1X4B0F1&K0USRobotics, Courier V.Everything AT&FX4&B1&H1&R2&K0USRobotics, Courier 56K X2 on V.90 off s58=32USRobotics, Courier 56K X2 off V.90 on s58=1USRobotics, Courier 56K V.34 s58=33USRobotics, Courier 56K V.90 and X2 s58=0USRobotics, Courier 56K V.90 and X2 AT&F&C1&D2s58=1USRobotics, Courier I-Modem ISDN/v.34 Int AT&F1&D0S0=0 USRobotics, Courier I-Modem ISDN/v.34 Ext AT&F1&D0S0=0 USRobotics, Courier I Modem ISDN AT&F1*V2=5USRobotics, Mac & Fax AT&F&C1&D2&H1&R2&K0USRobotics, Mac & Fax AT&F&D2&H1USRobotics, Mac & Fax AT&D0&F1&H1&K2&M5USRobotics, V.32bis with ASL &A3 AT&F&C1&B1&H1H0&T0E1Q0V1X6S7=255 USRobotics, Dual Standard AT&FX6&B1&H1&R2USRobotics, Dual Standard V.32bis-ASL AT&F&H1&R2&K3&B1&A3X7USRobotics, D.S. AT&FS0=0Q0V1X4B0F1S27=128&K0USRobotics, D.S. AT&FS0=0Q0V1X4B0F1&K0USRobotics, DS v.32bis v.42bis ext AT&M0&N6&A0&R1&H0&K0&I0&S0&B1X1USRobotics, D.S. UK S0=0E1Q0V1F1B0&M0&K0USRobotics, Dual Standard 16.8 AT&F&C1&D2&H1&R2&K3&B1&A3X7USRobotics, 16.8 Dual Standard AT&A0&M0&K0&N6B0S0=0X7USRobotics, Dual Stardard V.34 FAX AT&F1S0=0E1Q0V1X4&C1&D2&H1&I0&K0USRobotics, Dual Standard V.32 Terbo AT&F&C1&D2&H1&R2&K3&B1&A3X7USRobotics, Sportster S0=0E1Q0V1X4&B1&C1&D2&H1&K0&N0USRobotics, Sportster AT&H1&R2&I0USRobotics, Sportster 2400 V.42bis AT&FX4&B1&C1&D2&H1&K1&R2USRobotics, Sportster 14.4 Mac&Fax AT&F1&D0S0=0USRobotics, Sportster 28.8 v.34 Mac&Fax AT&F1&D0S0=0USRobotics, Sportster AT&F1&K0&M0USRobotics, Sportster AT&FX4&B1&C1&D2&H1&K3&R2&IUSRobotics, Sportster 9600 AT&FX4&B1&C1&D2&H1&K3&R2USRobotics, Sportster 9600 AT&F&H1USRobotics, Sportster 9600 AT&FX4&B1&H1&R2&K0USRobotics, Sportster 9600 AT&F&H1USRobotics, Sportster 9600 AT&M0&K0&N6USRobotics, Sportster 9600 Fax S0=0E1Q0V1X4&B1&C1&D2&H1&K0&N0USRobotics, Sportster 14.4 AT&F1&H1&C1&D0X4USRobotics, Sportster 14.4 AT&FX4&B1&H1&R2&K0USRobotics, Sportster 14.4 AT&F&H1&C1&D2X4USRobotics, Sportster 14.4 AT&FX4&A3&B1&D2&H1&I0&K1&M4&R2S7=60USRobotics, Sportster 14.4 AT&FX4&B1&C1&D2&H1&K3&R2USRobotics, Sportster 14.4 AT&F1&D0S0=0USRobotics, Sportster 14.4 Ext AT&F1&D0S0=0USRobotics, Sportster 14.4 Ext AT&F&A1&B1&D0&S0X4USRobotics, Sportster 14.4 Fax S0=0E1Q0V1X4&B1&C1&D2&H1&K0&N0USRobotics, Sportster 14.4 Fax ATS0=1S7=60E1QOV1&C1&D2&K0&N6&A3USRobotics, Sportster 14.4 Fax ATS0=1S7=60E1Q0V1&C1&D2&K0&N6&A3USRobotics, Sportster 14.4 V.FC Data/Fax AT&F&I0&H1&R2&B1&C1&D2&M0&K0&A3E1X4Q0V1USRobotics, Sportster Si 14.4 PC (w/WinRPI) AT&F&D0&K3+H3S95=1S0=0USRobotics, Sportster Si 14.4 Ext(w/WinRPI) AT&F&D0&K3+H3S95=1S0=0USRobotics, Sportster Vi 14.4 PC AT&F1&D0S0=0USRobotics, Sportster 14.4 PCMCIA AT&F1&D0S0=0USRobotics, Sportster 14.4 PCMCIA AT&FX4&B1&H1&R2&K0USRobotics, Sportster V.34 AT&F&A3&B1&H1&R2&D0&C1X4S7=90USRobotics, Sportster V.34 AT&F0&A3&B1&H1&K3&R2&S1X4S40=2 USRobotics, Sportster Vi 28.8, v.34 Ext AT&F1&D0S0=0USRobotics, Sportster Vi 28.8, v.34 AT&F1&D0S0=0USRobotics, Sportster 28.8 VFC AT&FX4&B1&H1&R2&K0USRobotics, Sportster 28.8 VFC AT&F1USRobotics, Sportster 28.8 V.34 AT&F1&D0S0=0USRobotics, Sportster 28.8 V.34 AT&FX4&B1&H1&R2&K0USRobotics, Sportster 28.8 V.34 AT&F&A3&B1&H1&R2&D2&C1X4S=0S7=90USRobotics, Sportster 28.8 V.34 AT&F&I0&H1&R2&B1&C1&D2&M0&K0&A3E1X4Q0V1 USRobotics, Sportster 28.8 V.34 Ext AT&F1&D0S0=0USRobotics, Sportster 28.8 V.34 PCMCIA AT&F1&D0S0=0USRobotics, Sportster 28.8 V.34 PCMCIA AT&F&A1&B1&D0&S0X4 USRobotics, Sportster 28.8 V.34 PCMCIA AT&FX4&B1&H1&R2&K0USRobotics, Sportster 28.8 V.34 PCMCIA AT&F&A1&B1&D0&S0X4&K2&M5USRobotics, Sportster 28.8 V.34 PCMCIA AT&F&A1&B1&D0&S0X4&K0&M0USRobotics, Sportster 28.8 / 33.6 Winmodem AT&FX4&B1&H1&R2&K0USRobotics, Sportster 28.8 / 33.6 AT&F&A3&B1&H1&R2&D0&C1X4S7=90USRobotics, Sportster 28.8 / 33.6 AT&FX4&B1&H1&R2&K0USRobotics, Sportster 28.8 / 33.6 AT&FX4&B1&C1&D2&H1&K3&R2USRobotics, Sportster 28.8 / 33.6 AT&FX4&A3&B1&D2&H1&I0&K1&M4&R2S7=60 USRobotics, Sportster 28.8 / 33.6 AT&F1S15=12USRobotics, Sportster 28.8 / 33.6 AT&F&B1&H1&R2X4Q0V1E0M1S27=24S56=128USRobotics, Sportster 28.8 / 33.6 AT&F1&B1&D2&H1&I0&K1&M4S13=1S27=48USRobotics, Sportster 28.8 / 33.6 AT&F&B1&H1&R2&A2&K2X4S11=50USRobotics, Sportster 28.8 / 33.6 Int and Ext AT&F&A1&B1&D0&S0X4USRobotics, Sportster 28.8 / 33.6 Int and Ext AT&F&A1&B1&D0&S0X4&K2&M5USRobotics, Sportster 28.8 / 33.6 Int and Ext AT&F&A1&B1&D0&S0X4&K0&M0USRobotics, Sportster(pre-Jan/96 ROM) AT&F1&K0&M0S56=128USRobotics, Sportster (spiral of death) AT&F1S15=128USRobotics, Sportster (spiral of death) AT&F1&K0S15=128USRobotics, Sportster 56K X2 (disables X2) AT&F1&D0S15=128S32=34USRobotics, Sportster 56K X2 AT&FX4&B1&H1&R2&K0USRobotics, Sportster 56K X2 AT&F1&B1&D2&H1&I0&K1&M4S7=60USRobotics, Sportster 56K X2 AT&F1&K0&I0S33=32S15=128S27=64USRobotics, Sportster 56K X2 AT&F1&C1&D2S10=20S15=128S27=64USRobotics, Sportster 56K X2 AT&F1&K3USRobotics, Sportster 56K X2 AT&&C1&D2S15=128S32=98 If user has Bell Call Answer, change X4 to X3 in above USR stringsUSRobotics, Sportster 56K X2 on V.90 off s32=66USRobotics, Sportster 56K X2 off s32=32USRobotics, Sportster 56K X2 off V.90 on s32=34USRobotics, Sportster 56K V.90 connect at V.34 s32=98USRobotics, Sportster 56K V.90 and X2 s32=2USRobotics, V.90 Winmodem AT&FS13=64S32=34&K0USRobotics, V.90 Winmodem s25=100USRobotics, V.90 Winmodem s10=200USRobotics, V32bis Quad Digital AT&FX4&B1&H1&R2&K0USRobotics, WorldPort 9600 MNP5 AT&F&C1&D2\Q3%C0USRobotics, WorldPort 9600 MNP5 AT&FL1%C0\J0\Q3USRobotics, WorldPort 9600 S0=0E1Q0V1X4\N3\J0\Q3\V1&C1&D2USRobotics, WorldPort 9696 Fax AT&F&A3X4&B1&C1&D2&H1&K1&R2USRobotics, WorldPort 14.4 AT&FX4&A3&B1&C1&D3&H1&K1&M4S7=60 USRobotics, WorldPort 14.4 AT&FX4&B1&H1&R2&K0USRobotics, WorldPort 14.4 AT&FX4&B1&C1&D2&H1&K1&R2USRobotics, WorldPort 14.4 Pocket AT&F1&D0S0=0 USRobotics, WorldPort 14.4 FAX PCMCIA S0=0B0E1Q0V1X6&B1&C1&D2&H1&R2USRobotics, WorldPort 14.4 PCMCIA AT&FX4&B1&H1&R2&K0USRobotics, WorldPort 14.4 FAX PCMCIA Norway ATF0&K3\N3%C3\G0\J1USRobotics, WorldPort 14.4 V.42bis FAX S0=0B0E1Q0V1X6&B1&C1&D2&H1&R2USRobotics, Worldport V.32 Pocket AT&F&C1&D2\N3\Q3\J0\V1USRobotics, WorldPort FAX/Data PCMCIA 2.0 AT&FX4&C1&D3&K3\J0\N3%C3S7=60S95=47USRobotics, WorldPort D.S. Cellular FAX PCMCIA AT&F1S0=0Q0V1X4B0F1&K0USRobotics, WorldPort Palmtop FAX AT&F1S0=0Q0V1X4B0F1&K0USRobotics, ISDN AT&F1*V2=5S67=0S68=0S69=0USRobotics, ISDN AT*V2=5USRobotics, X2 56K Limited to 33.6 S32=32USRobotics, X2, V.90 Limited to 33.6 S32=64
105
202 Ven-Tel Ven-Tel, S0=0E1Q0V1X4Ven-Tel, 2400 Plus II AT&F&C1&D2\N3\Q3%C1\C1\G0\J0\V1Ven-Tel, EC2400-33 (MNP) AT&F&C1&D3%C1\J0\N3\Q2S7=60Ven-Tel, PCM2400E AT&F&C1&D2X4E1\N3\Q1\G1\V1ATVen-Tel, 9600 Plus AT&F&C1&D2\N3\Q3%C0Ven-Tel, 9600 Plus AT&F&C1&D2\Q3Ven-Tel, 9600 Plus / Plus II ATS0=0E1Q0V1X4&K3Ven-Tel, 9600 Plus / Plus II AT&F&C1&D2*S0%F2\N3\Q3%C1\V1&Y11Ven-Tel, 9600 Plus II AT&F&C1&D2\N3\Q3%C0Ven-Tel, 9600 Plus II AT&F&C1&D2\Q3Ven-Tel, 9600 Plus II S0=0E1Q0V1X4&K3Ven-Tel, PCM 9600 Plus (MNP) AT&FB0&C1&D3\N3\Q3%B0%C1%F1S7=60Ven-Tel, EC V.32bis II AT&F&C1&D2\Q3%C0Ven-Tel, EC V.32bis II AT&F&C1&D2\Q3Ven-Tel, 14.4 Fax AT&F&C1&D2&K3%C0Ven-Tel, MCM 14.4 AT&F&C1&D2&K3&Q5Ven-Tel, Halfcard ATS0=0E1Q0V1X4&K3Ven-Tel, Pathfinder ATS0=0E1Q0V1X4&K3Ven-Tel, Pathfinder AT&FS51=5S52=1S53=1S58=2S66=1Ven-Tel, Pathfinder AT&FS51=5S52=1S53=1 S58=2S66=1\D\D\DATS68=2S95=2S110=1Ven-Tel, TrailBlazer (19200) AT&FQ0V1S50=0S51=5S58=2S66=1S111=255X1
105
203 Viking Components Viking, Components 28.8 PCMCIA AT&F&C1&D2W2Viking, Net Link 28.8 PCMCIA AT&FW2&C1&D3X4\Q3%C1"H3\N3S7=50Viking, 56k V.90 AT-v90=0Viking, PCMCIA 56k V.90 AT&F&C1&D2S7=55S37=17Viking, PCMCIA w/Powerbook 5300c AT&F&C1&D2S7=55S37=17Rockwell based Viking V.90 Modems:Viking, 56k V.90 AT&F+MS=V90,1Viking, 56k V.90 (locked in 56kFlex) AT&F+MS=K56,1Viking, 56k V.90 (locked in 56kFlex) AT&FW2+MS=56,1Viking, 56k V.90 (locked in 56kFlex) AT&FW2+MS=56,1,34000,56000Viking, 56k V.90 (locked in v.34/33.6) AT&F+MS=V34Viking, 56k V.90 (locked in v.34/33.6) AT&FW2+MS=11,1Lucent based Viking V.90 Modems:Viking, 56k V.90 AT&FW2-V90=0S37=19S38=14Viking, 56k V.90 AT&FW2-V90=1S38=0Viking, 56k V.90 (locked in v.34/33.6) AT&FW2-V90=0S38=0
105
204 Viva Viva, AT%C0Viva, AT&F&C1&D2Viva, AT&F0&D2&C1ViVa, 24m AT&F\J0\N3\V1\Q3ViVa, 24m AT&F&C1&D2S95=1ViVa, 24m AT&FE1QV1&D2X4&C1\N3ViVa, 24im AT&F&C1&D2ViVa, 24im AT&FQ0V1X4S0=0S2=255\N3\Q3\V1\X1\J1%C1&C1&D2ViVa, 2442i AT&F\J0\V1\Q3ViVa, 24& 2496if AT&F\J0\N3\V1\Q3ViVa, 24i AT&FB0Q0V1X4S0=0S2=255&C1&D2&Y0ViVa, 2400 bps AT&FViVa, 2400 bps AT&F&C1&D2ViVa, 2400 bps AT&F&C1S0=1E1ViVa, 2400 bps AT&F&C1&D2N0S37=6%C0E1Q0V1X4\N1ViVa, 2400 bps Ext AT&F2%C\C1M0S2=1ViVa, 2400 bps Ext ATH0Q0V1E0M0S0=0S2=1X1&C1&D2\N3\Q3\V1Viva, 9600 AT&F&C1&D2&K3&Q5%C0Viva, 9600 AT&F&C1&D2&K3%C0ViVa, 9642e AT&F&C1&D2S36=7S38=0S95=44ViVa, 9642e AT&F&C1&D3&K3&Q5\N3%ViVa, 9642e AT&F&C1&D3&K3&Q5\N3%C3S7=60S36=7S46=138S48=7S95=47ViVa, 9642e AT&FQ0V1X4S0=0S2=255\N3&C1&D2&K3&R0&S1ViVa, 9642i AT&F&C1&D2S95=1ViVa, 9642i AT&F&C1&D2\J0S36=7S38=0S95=44Viva, 9642i 9600 int AT&F2V1%C0\G0\N0\Q0\V0Viva, 14.4 AT&F&C1Viva, 14.4 AT&F&C1$D2Viva, 14.4 AT&F&C1$D2Viva, 14.4 AT&F&C1&D2&K3%C0Viva, 14.4 AT&F&C1&D2\Q3%C0ViVa, 14.4 AT&F&Q6\N0%C0&D2N0S37=9Viva, 14.4 AT&F2W1S95=41\RViva, 14.4 AT&F&C1&D2&R1\C2Viva, 14.4 AT&F&C1S0=1E1Viva, 14.4/FAX AT&F&C1&D2\Q3\N3\J0%C1"H3S7=60Viva, 14.4/FAX AT&F&C1&D2\Q3\N3\J0%C1"H3S7=50ViVa, 14.4/FAX AT&F&C1&D2ViVa, 14.4/FAX AT&F&C1&D2S95=1ViVa, 14.4/FAX AT&F&C1&D2&K3&Q5\N3%C3S7=60S36=7S46=138S48=7S95=47ViVa, 14.4/FAX (pre-1994) AT&F&C1&D2&K3S36=7S38=0S95=44ViVa, 14.4 Internal Data/Fax/Voice AT&F&C1&D2\Q3\N3\J0%C1"H3S7=60L2ViVa, 14.4 Ext AT&FQ0V1X4S0=0S2=255&C1&D2&R0&S1\N3S95=44S48=7S36=7S46=138ViVa, 14.4 Ext AT&FQ0V1X4S0=0S2=255&C1&D2%C1\V1\Q3\N6ViVa, 28800E AT&F&C1&D2S95=1ViVa, 28800I AT&F&C1&D2S95=1ViVa/33.6LC-V (or 336VL)ViVa/56LC-V (or 56VL)ViVa/56LC-S (or 56SL)ViVa/56LC-SM (or 56SLM)ViVa/56LC-SX (or 56SLX)
105
205 Wang Wang, ATS0=0E1Q0V1X4Wang, 2400 AT&FWang, 2400e AT&FS0=0S2=0S7=60Wang, 14.4 AT&F&C1&D0Wang, 14.4 AT&F&C1&D2S95=1Wang, 14/14i AT&F&C1&D0Wang, 14/14i AT&F&C1&D2&K3&Q5\N3Wang, 14/14i Data Fax Modem AT&F&C1&D2 Wang, 14/14i Data Fax Modem AT&F&C1&D2&K3&Q5\N3 Wang, 14/14i Data Fax Modem AT&F&C1&D3&K3&Q5\N3%C1S7=60S36=7 S46=138S48=7S95=37 Wang, 14400 Internal/External AT&FW1&C1&D2\N3%E1&Q5S0=0S2=255 S36=7S48=7S46=138S95=44
105
206 WebExcel 105
207 Wisecom Wisecom, AT&F&C1&D2Wisecom, AT&F&C1&D2%C0Wisecom, AT&F&C1&D2%C0%E0Wisecom, 1414 VH AT&FX4 Wisecom, 1428 VQE AT&FX4S95=1 Wisecom, 1428 VQH AT&FX4S95=1 Wisecom, WS-2814 S38=3 Wisecom, 56kflex (to disable 56k Flex) +ms=11,0,9600,33600Wisecom, 56kflex (to disable 56k Flex) +ms=11,1
105
208 Xircom Xircom, S0=0E1Q0V1X4Xircom, ATS0=0E1Q0V1X4 Xircom, AT&FS30=255S91=11 Xircom, AT&FQ8Q2W2S95=47S37=34 Xircom, PCMCIA Faxmodem AT&F&C1&D2S7=55 Xircom, 14.4 AT&F&D2&Q5S95=1W2Xircom, 14.4 PCMCIA AT&F&D2&Q5S95=1W2Xircom, Creditcard PCMCIA ATE0V1&D2%G1Xircom, Creditcard PCMCIA AT&FS30=255S91=11Xircom, EtherNet/Modem CEM10BT 144 (V.42bis) AT&F&C1&D3%C1%E1&K3N1\N3Q0\Q3S7=60S36=7Xircom, EtherNet/Modem CEM2-10BT 144 (V.42bis) AT&FE1&C1&D3%C1%E1&K3N1\N3Q0\Q3S7=60S36=7Xircom, CreditCard Modem 28.8 AT&FS46=0 Xircom, CreditCard Modem 28.8 AT\N0%C0 Xircom, CreditCard Modem 28.8 AT&F&D2&C1&K3%C0Xircom, CreditCard Modem 28.8 AT&FW2&C1&D3&K3%C1%E1N1\N3Q0\Q3S7=60S36=7 Xircom, CreditCard Modem 28.8 AT&F%C1&D2&K3W2X4B80"H3-J1\N3\Q3Q0S37=15S7=50 Xircom, CreditCard Ethernet 28.8 AT&F&C1&D2&K3%C0Xircom, CreditCard Ethernet 28.8 AT&FW2&C1&D3&K3%C1%E1N1\N3Q0\Q3S7=60S36=7 Xircom, CreditCard Ethernet 28.8 AT&FX4&C1&D3&Q9Q0S7=60S36=7S95=1Xircom, CreditCard Ethernet 28.8 AT&FQ0V1W2&C1&D2\Q3X4&B2%E0N1\N3"H3%C1S7=55 Xircom, CreditCard Ethernet 33.6 AT&F&C1&Q5&D3-J1&K3%C1W2Xircom, Ethernet+Modem 28.8 AT\N0%C0 Xircom, PCMCIA (28.8 33.6) AT&F&D2&Q5S95=1W2%C0Xircom, CreditCard Ethernet 33.6 AT&F&C1&D2&K3%C0Xircom, CreditCard Ethernet 33.6 AT&F%C1&D2&K3W2X4B80"H3-J1\N3\Q3Q0S37=15S7=55 Xircom, CreditCard Ethernet 33.6 AT&F&C1&Q5&D3-J1&K3%C1W2\N3"H3S37=20S46=2Xircom, CEM-10BT (AM) Creditcard Ethernet S0=0E1Q0V1X4&K3Xircom, CEM2-10BT (RF) Creditcard Ethernet AT&F&C1&D2S7=55 Xircom, CreditCard Modem 33.6 AT&F&D2&C1&K3%C0Xircom, CreditCard Token Ring+Modem 33.6 AT&FW2X4\J0&C1&Q5&D3&K3%C3\N3S7=60Xircom, CreditCard Ethernet+Modem II AT&F&C1&D2Xircom, CreditCard Ethernet+Modem II AT&F&C1&D3&K3%C1%E1N1\N3Q0Xircom, CreditCard Ethernet+Modem II AT&F&C1&D3&K3%C1%E1N1\N3Q0\Q3S7=60S36=7 Xircom, CreditCard Ethernet+Modem II AT&FQ0V1W2&C1&D2\Q3X4&B2%E0N1\N3"H3%C1S7=55 Xircom, CreditCard Ether 10/100 + 56K AT&FW2X4&C1&D3&K3&Q5\J0\N3\Q3%C3S7=60Xircom, 56k CM-56 and CM-33U +MS=K56,,,32000Xircom, 56k CM-56 and CM-33U +MS=K56,,,34000Xircom, 56k CM-56 and CM-33U +MS=K56,,,36000Xircom, 56k CM-56 and CM-33U +MS=K56,,,38000Xircom, 56k CM-56 and CM-33U +MS=K56,,,40000Xircom, 56k CM-56 and CM-33U +MS=K56,,,42000Xircom, 56k CM-56 and CM-33U +MS=K56,,,44000Xircom, 56k CM-56 and CM-33U +MS=K56,,,46000Xircom, 56k CM-56 and CM-33U +MS=K56,,,48000Xircom, 56k CM-56 and CM-33U +MS=K56,,,50000Xircom, 56k CM-56 and CM-33U +MS=K56,,,52000Xircom, 56k CM-56T, CM-56G, RM56G, RM56V1, CEM56, REM56G, CBEM56, RBEM56, RBM56G ATS109=0 - disables v.90 and forces k56flex. ATS109=1 - auto-negotiates between v.90 and k56flex ATS109=2 - disables k56flex and forces v.90
105
209 X-Link, Xircom, Xstreama X-Link, ATE1Q0&C1&D2
105
210 Xpresso Xpresso, 8396A (v.32bis) AT&F*D3&E1*E1F0%H1Q0%S12S7=40
105
211 Xstreama Xstreama, 28.8 AT&F0Xstreama, 28.8 / 33.6 AT&F&C1&D2
105
212 Xtend Xtend, Chamelion 14.4 AT&F\N3Xtend, Chamelion 14.4 AT&F\N3&S1
105
213 XyComm Systems Inc. XyComm Systems Inc ATS0=0E1Q0V1X4
105
214 ZAT, Zenith, Zeos, Zuckerboard ZAT Modem 14.4/14.4-7 AT&F&C1+C1&D3\N3\Q3+Q3%C1+PC1S7=60ZAT Modem 14.4/14.4-7 AT&F&C1+C1&D3\N3\Q3+Q3%C1+PC1S7=60ZAT Modem 14.4/14.4-7 AT&F&C1&D3Zenith Data Systems, S0=0E1Q0V1X4Zenith Data Systems, Z3144A Laptop S0=0E1Q0V1X4Zeos, S0=0E1Q0V1X4Zeos, Notebook S0=0E1Q0V1X4&K3Zeos, Notebook AT&F&C1&D2X3\Q3\N3\J0\V1\C1%C1Zuckerboard, Model ZCom24/AT 2400 AT&C1&D2&T5M0V1E0Q0X1S2=1S0=0
105
215 Zoltrix Zoltrix, AT&Q6 Zoltrix, S0=0E1Q0V1X4Zoltrix, 2400 (No MNP) AT&FE1Q0V1X4&C1&D2Zoltrix, 96/24 V.42bis AT&FE1Q0V1X4&C1&D2\Q3\N9Zoltrix, 9600 V.42bis AT&F1X4&C1&D2&M5&K3&R0&Y0%C1\J0\N3\Q3W1Zoltrix, 96/14.4 AT&F&C1&D3&R0&Y0S36=7S95=43\Q3\N9Zoltrix, 96/96 AT&F&C1&D2&Y0S95=43Zoltrix, 9600 Fax AT&F&D2%C0Zoltrix, 14.4 AT&F&C1&D0Zoltrix, 14.4 AT&F&C1&D2&K3%C0Zoltrix, 14.4 AT&F&C1&D2&K3%C0Zoltrix, 14.4 AT&F&C1&D2&K3+H3S95=1Zoltrix, 14.4 Data/Fax AT&FX1&C1&D2S95=3Zoltrix, 14.4 Fax AT&F&C1&D2W2Zoltrix, FM-1414i AT&FE1Q0V1X4&C1&D2S95=3Zoltrix, ZX 1848 AT&FE1Q0V1X4&C1&D2S95=3Zoltrix, ZX 1896 AT&FE1Q0V1X4&C1&D2Zoltrix, ZX 1896S AT&FE1Q0V1X4&C1&D2S95=3Zoltrix, Fax/Modem (V.42bis) AT&FW2&C1&D3&K3%C1X4S7=60S36=7Zoltrix, High-Speed Models (non-RPI) AT&F&D0&K3&Q5S0=0 Zoltrix, FM-288SI AT&FW2&C1&D2&K3&Q5S7=60S36=7S46=138S48=7S95=47 Zoltrix, FM-VOC336I AT&F&C1&D2S95=3Zoltrix, FMVSP-336I AT&F&C1&D2S95=3Zoltrix, FMHSP33.6 AT&F&C1&D2&K3N3%C0W1Zoltrix, 28.8 / 33.6 AT&F&C1&D2Zoltrix, 28.8 / 33.6 AT&F&C1&D2&K3%C0Zoltrix, 28.8 / 33.6 AT&F&C1&D2N0S37=12Zoltrix, 28.8 / 33.6 AT&Q6W1%C0S95=05S11=50 Zoltrix, 28.8 / 33.6 AT&F&C1&D2&K3W1Zoltrix, FMVSP56i 56K Flex AT&F&C1&D2Zoltrix, 56k HCF V.90 +ms=v90Zoltrix, 56k HCF 56kflex +ms=k56flexZoltrix, 56k HCF 33.6 mode +ms=v34Zoltrix, 56k HCF V.90 (to disable V.90) +MS=V34,0,19200,33600Zoltrix, FMHCF56i Spirit 56K AT&F&C1&D2+MS=v90,0Zoltrix, FMHCF56i Spirit 56K AT&F&C1&D2&K3+MS=v90,0Zoltrix, FMHCF56i Spirit 56K AT&F&C1&D2s10=200+MS=v90,Zoltrix, FMHCF56i Spirit 56K (force 33.6) AT&F&C1&D2+MS=v34Zoltrix, FMHCF56i Spirit 56K (force 33.6) AT&F&C1&D2Zoltrix, FMHCF56i Spirit 56K AT&F&C1&D2s95=3Zoltrix, FMHCF56i Spirit 56K AT&F&C1&D2W2Zoltrix, FM56e Rainbow 56K AT&F1Zoltrix, FM56e Rainbow 56K AT&F2Zoltrix, FM56e Rainbow 56K AT&F&C1&D2Zoltrix, FM56e Rainbow 56K AT&FW2 (shows real connections speed)Zoltrix, FM56e Rainbow 56K AT&F&C1&D2W2Zoltrix, FM56e Rainbow 56K AT&F&C1&D2+MS=12Zoltrix, FM56e Rainbow 56K AT&F&C1&D2s95=3Zoltrix, FM56e Rainbow 56K AT&F&C1&D2+MS=v90,0Zoltrix, FM56e Rainbow 56K AT&F&C1&D2&K3+MS=v90,0Zoltrix, FM56e Rainbow 56K AT&F&C1&D2s10=200+MS=v90,1Zoltrix, FM56e Rainbow 56K AT&F&C1&D2s10=200s25=100Zoltrix, FM56e Rainbow 56K AT&F&C1&D2s10=200s25=100s91=10Zoltrix, FM56e Rainbow 56K AT&F&C1&D2s10=200s25=100s91=13Zoltrix, FM56e Rainbow 56K AT&F&C1&D2s10=200s25=100s30=0Zoltrix, FM56e Rainbow 56K (force 33.6) +MS=11Zoltrix, FM56e Rainbow 56K (force 33.6) AT&F&C1&D2+MS=11Zoltrix, FM56e Rainbow 56K (force 33.6) AT&F&C1&D2&K3+MS=11Zoltrix, FM56e Rainbow 56K (force 33.6) AT&F&C1&D2+MS=v34Zoltrix, FM56e Rainbow 56K (force 33.6) AT&F&C1&D2&K3+MS=v34Zoltrix, FMPCM56f 56k PCMCIA -v90=0Zoltrix, FMPCM56f 56k PCMCIA -v90=1Zoltrix, FMPCM56f 56k PCMCIA S38=0Zoltrix, FMPCM56f 56k PCMCIA S38=1
105
216 Zoom Zoom, S0=0E1Q0V1X4 Zoom, S0=0E1Q0V1X4S46=136&C1&D2&K3 Zoom, Ext AT&F0W0&C1&D2%C2 Zoom, OEM AT&Q6S37=9N0&K0 Zoom, 2400 V.42bis (no fax) AT&F&C1&D2S36=7S95=43&Y0 Zoom, 2400/V.42bis AT&F&C1&D3S7=30S36=7 Zoom, 2400 v.42bis AT&Q5%C1W1&C1&D0S36=7&K3 Zoom, 2400 FCV/FXV Fax AT&F&C1&D2&Y0 Zoom, 2400 AMC/AMX (no fax) AT&FX4&C1&D2 Zoom, 2400 AMC/AMX/PKT Fax AT&FX4&C1&D2 Zoom, VFDI/VFDX 2400 AT&F&C1&D2&Q5%C3\J0S95=43 Zoom, VP/VX 9600 AT&F&C1&D2&K3S95=43 Zoom, 9600 S0=0E1Q0V1X4S46=128&c1&d2&K3 Zoom, VFXV.32 9600 AT&FS0=0E1Q0V1X4\N0%C0&C1&D2&K3 Zoom, AFC S0=0E1Q0V1X4\N3&C1&D2&K3S46=128 Zoom, V.32 turbo AT&FW1&C1&D3&K3&Q5%C1\N3S7=60S36=7S46=138S48=7S95=47 Zoom, V.32 Turbo AT&F&C1&D2&K3S95=43 Zoom, V.32 AT&F&C1&D2&K3&Q5%C0 Zoom, V.32bis AT&F&C1&D2&Q5&K3%C0 Zoom, 14.4 V32bis Fax AT&Q6S37=0\N0 Zoom, 14.4 AT&F&C1&D0 Zoom, 14.4 AT&F&C1&D2&K3%C0 Zoom, 14.4 S0=0E1Q0V1X4S46=136&C1&D2&K3 Zoom, 14.4 VP V.32bis AT&FS0=0E1Q0V1X4\N0%C0&C1&D2&K3 Zoom, 14.4 V.32/V.32 bis AT&F&C1 Zoom, 14.4EX FaxModem (w/WinRPI) AT&F&D0&K3+H3S95=1S0=0 Zoom, 14.4PC FaxModem (w/WinRPI) AT&F&D0&K3+H3S95=1S0=0 Zoom, VP/VX 14.4 AT&F&C1&D2&K3W2S95=43 Zoom, ComStar 14.4 (Model 610) AT&F&D0&K3&Q5S0=0 Zoom, PBK 14.4 AT&F&C1&D2&K3%C0 Zoom, PCMCIA 14.4 AT&F&C1&D2&K3%C0 Zoom, PCMCIA V.34C AT&F&C1&D2&K3%C0 Zoom, PCMCIA 14.4C S0=0E1Q0V1X4S46=136&C1&D2&K3 Zoom, PCMCIA 14.4C Fax (PC) AT&F&D0&K3&Q5S0=0 Zoom, PCMCIA 14.4C Fax (Mac) AT&F&D0&K3&Q5S0=0 Zoom, PCMCIA v.34C Fax (PC) AT&F&D0&K3&Q5S0=0 Zoom, PCMCIA v.34C Fax (Mac) AT&F&D0&K3&Q5S0=0 Zoom, PKT 14.4 AT&F&C1&D2&K3%C0 Zoom, PKT 14.4 AT&FS0=0E1Q0V1X4\N0%C0&C1&D2&K3 Zoom, PKT 14.4 Pocket (PC) AT&F&D0&K3&Q5S0=0 Zoom, PKT 14.4 Pocket (Mac) AT&F&D0&K3&Q5S0=0 Zoom, Pocket Fax S0=0E1Q0V1X4S46=136&C1&D2&K3 Zoom, VFC 19.2 AT&F&C1&D2&K3%C0 Zoom, Comstar 28.8 AT&F&C1&D2&K3%C0 Zoom, ComStar 28.8 (Model 620) AT&F&D0&K3&Q5S0=0 Zoom, V.Fast 28.8 AT&Q0N0S37=9%C0&K3S36=1S46=136S48=128 Zoom, V.32bis Fax Int S0=0E1Q0V1X4\N3&C1&D2&K3S46=128 Zoom, V.32/V.32bis AT&Q5S36=7%C1&C1&D0&K3 Zoom, V.32 9600 fax S0=0E1Q0V1X4\N3&C1&D2&K3S46=128 Zoom, VFP AT\N0%C0 Zoom, VFP 14.4 AT&F&C1&D2&K3%C0 Zoom, VFP 14.4 AT&F&C1&D2 Zoom, VFP 14.4 S0=0E1Q0V1X4S46=136&C1&D2&K3 Zoom, VFP 14.4V Voice Fax (Model 180) AT&F&D0&K3&Q5S0=0 Zoom, VFP 14.4VH HotScan Voice Fax AT&F&D0&K3&Q5S0=0 Zoom, VFP v.32bis Fax (Model 85) AT&F&D0&K3&Q5S0=0 Zoom, VFP 24000 AT&F&C1&D2&K3%C0 Zoom, VFP 24000 S0=0E1Q0V1X4S46=136&C1&D2&K3 Zoom, VFP 28.8 AT&FL1&C1&D2&Q6 Zoom, VFP 28.8 AT&F&C1&D2&K3%C0 Zoom, VFP 28.8 AT&FS0=0E1Q0V1X4\N0%C0&C1&D2&K3 Zoom, VFP 28.8 Fax AT&FW2X4&C1&D3&S1%C3\N3S7=60S36=7S95=1 Zoom, VFP V32 S0=0E1Q0V1X4S46=136&C1&D2&K3 Zoom, VFX 14.4V Voice Fax AT&F&D0&K3&Q5S0=0 Zoom, VFX 14.4 AT&F&C1&D2&K3%C0 Zoom, VFX 14.4 S0=0E1Q0V1X4S46=136&C1&D2&K3 Zoom, VFX 14.4 AT&Q6S37=9N0%C0\N0 Zoom, VFX 14.4 AT&Q6S37=11N0%C&K0 Zoom, VFX 14.4 AT&K0&Q6S37=9N0%C\N0 Zoom, VFX 14.4 (ARA 1.0) AT&FS7=90E0&K3&D0&Q6W2L1S37=15 Zoom, VFX 24000 S0=0E1Q0V1X4S46=136&C1&D2&K3 Zoom, Fax 14.4 PC AT&F&C1&D3&K3S7=60S36=7S46=138S48=7S95=47 Zoom, VFX v.32bis FaxM (Mac) AT&F&D0&K3&Q5S0=0 Zoom, VFX V.32bis Fax AT&F&D0&K3&Q5S0=0 Zoom, VFX V.32bis AT&FL1&C1&D2&K3%C0 Zoom, VFX V.32bis AT&FL1&C1&D2&Q6 Zoom, VFX V.32bis AT&FS0=0E1Q0V1X4\N0%C0&C1&D2&K3 Zoom, VFX V.32bis 14.4 AT&FS0=0E1Q0V1X4\N0%C0&C1&D2&K3 Zoom, VFX V.32bis 14.4 AT&F&C1&D3&K3&Q5%C3\N3S7=60S36=7S46=138 Zoom, Fax VFX 24K and VFX V.32bis AT&F&C1&D3&K3&Q5%C3\N3S7=60S36=7S46=138S48=7S95=47 Zoom, VFX28.8 AT&FS0=0E1Q0V1X4\N0%C0&C1&D2&K3X3 Zoom, VFX28.8 AT&FS0=0E1Q0V1X4\N0%C0&C1&D2&K3 Zoom, V.34 28.8 AT&FS0=0E1Q0V1X4&C1&D2&K3%C0 Zoom, V.34I Fax (Model 275) AT&F&D0&K3&Q5S0=0 Zoom, V.34X Fax (Model 450 for PC) AT&F&D0&K3&Q5S0=0 Zoom, V.34X Fax (Model 460 for Mac) AT&F&D0&K3&Q5S0=0 Zoom, VD series S0=0E1Q0V1X4S46=136&C1&D2&K3 Zoom, V.32bis (V.42bis) AT&FW1&C1&D3&K3&Q9%C1\N3S7=60S36=7S95=47 Zoom, V.32 turbo AT&FW1&C1&D3&K3&Q5%C1\N3S7=60S36=7S46=138S48=7S95=47 Zoom, V.34X 450 Ext AT&F&C1&D2S95=3W2 Zoom, V.34X 450 Ext AT&F&C1&D2S95=3W2&Q5MS=11 Zoom, V.34X 450 Ext AT&F&C1&D2S95=3W2&Q6MS=11 Zoom, V.34X+ AT&F&C1&D2%C0&Q6A3N3L1&S1%E3^M Zoom, AT&Q6 Zoom, AT\N0%C0 Zoom, Fax 28.8 / 33.6 AT&F&C1&D2&K3%C0 Zoom, FaxModem 56K Flex AT&FS202=32 Zoom, 56K (56kFlex) +ms=56,1,19200,56000,1,0 Zoom, 56K 56k Flex AT&F&C1&D0&C0+ms=56,1,19200,56000 Zoom, 56K 56KFlex Limited to 33.6 +ms=11,0,9600,33600 Zoom, 56K 56KFlex Limited to 33.6 +ms=11,1 Zoom, 56k V.90 Limited 33.6 mode +ms=v34 Zoom, 56k V.90 Limited 56kflex +ms=k56flex Zoom, 56k V.90 Limited 56kflex +ms=k56 Zoom, 56K V.90 Limited 56kflex AT&F&C1&D2W2S7=255+MS=K56,1,34000,56000 Zoom, 56k V.90 +ms=v90 Zoom, 56K AT&F+MS=11,1,300,33600&W2 Zoom, 56K AT&F&C1&D2%C3S7=255W2 Zoom, 56K AT&F&C1&D2%C3S7=255W2\A2 Zoom, 56K AT&F&C1&D2%C3S7=255W2\A2\N5 Zoom, 56K AT&F&C1&D2W2S7=255+MS=V90,0,34000,56000 Zoom, 56K AT&F+MR=2;+MS=V90,1,28800,33600,36000,56000 Zoom, 56K AT&F&C1W2+MS=V90,1,28800,33600,36000,56000 Zoom, 56K AT&F&C1&D2%C0W2 +MS=V90,1,28800,33600,36000,56000 Zoom, 56K AT&F&C1&D2%C1W2 +MS=V90,1,28800,33600,36000,56000 Zoom, 56K AT&F&C1&D2%C1 +MR=2;+MS=V90,1,28800,33600,36000,56000 Zoom, 56K AT&F&C1&D2\N5%C1W2 +MS=V90,1,28800,33600,36000,56000 Zoom, 56K AT&F+MR=2;+MS=V90 Zoom, 56K AT&F%C1W2+MS=V90 Zoom, 56K AT&F&C1&D2%C1\N5W2+MS=V90 Zoom, 56K AT&F&C1&D2\N5%C1+MR=2;+MS=V90 Zoom, 56K AT&F&C1&D2\N5%C1W2+MS=V90 Zoom, 56K AT&F+MR=2;S7=255S10=200+MS=V90 Zoom, 56K AT&F%C1\N5W2S7=255S10=200+MS=V90 Zoom, 56K AT&F&C1&D2%C0W2S7=255S10=200+MS=V90 Zoom, 56K AT&F&C1&D2%C1\N5W2S7=255S10=200+MS=V90 Zoom, 56K AT&F&C1&D2%C1\N2+MR=2;S7=255S10=200+MS=V90 Zoom, 56K AT&F&C1&D2%C1W2S7=255S10=200+MS=V90 Zoom, 56K AT&FW2S7=255S10=200+MS=V90 Zoom, 56K AT+MR=2;+MS=V90,1,28800,33600,36000,56000 Zoom, 56K AT&C1W2+MS=V90,1,28800,33600,36000,56000 Zoom, 56K AT&C1&D2%C0W2 +MS=V90,1,28800,33600,36000,56000 Zoom, 56K AT&C1&D2%C1W2 +MS=V90,1,28800,33600,36000,56000 Zoom, 56K AT&C1&D2%C1+MR=2; +MS=V90,1,28800,33600,36000,56000 Zoom, 56K AT&C1&D2\N5%C1W2 +MS=V90,1,28800,33600,36000,56000 Zoom, 56K AT+MR=2;+MS=V90 Zoom, 56K AT&FW2+MS=V90 Zoom, 56K ATW2+MS=V90 Zoom, 56K AT%C1W2+MS=V90 Zoom, 56K AT&C1&D2%C1\N5W2+MS=V90 Zoom, 56K AT&C1&D2\N5%C1+MR=2;+MS=V90 Zoom, 56K AT&C1&D2\N5%C1W2+MS=V90 Zoom, 56K AT+MR=2;S7=255S10=200+MS=V90 Zoom, 56K AT%C1\N5W2S7=255S10=200+MS=V90 Zoom, 56K AT&C1&D2%C0W2S7=255S10=200+MS=V90 Zoom, 56K AT&C1&D2%C1\N5W2S7=255S10=200+MS=V90 Zoom, 56K AT&C1&D2%C1\N2+MR=2;S7=255S10=200+MS=V90 Zoom, 56K AT&C1&D2%C1W2S7=255S10=200+MS=V90 Zoom, 56K ATW2S7=255S10=200+MS=V90 Zoom, 56K Zoom, 56K
105
217 Zyxel ZyXEL, AT&K4&G2 ZyXEL, AT&FE0X6&K4ZyXEL, ATS0=0E1Q0V1X4ZyXEL, V.32bis AT&C1&D0&H3&K4&N0ZyXEL, Elite 28/64analog AT&K0ZyXEL, Elite 2864 AT&F&C1&D2&K3ZyXEL, Elite 2864 AT&FE0X6&K4ZyXEL, Elite 2864 AT&F&D0&H3&K4&N0S0=0ZyXEL, Elite 2864 AT&FX4&C1&D3&H3&K3&N0S7=60ZyXEL, Elite 2864I AT&F&D0&H3&K4&N0S0=0 ZyXEL, Omni 288P AT&F&D0&H3&K4&N0S0=0 ZyXEL, Omni 288S AT&F&D0&H3&K4&N0S0=0 ZyXEL, Omni 288S AT&FE0X6&K4ZyXEL, Omni 288S AT&FX6&D3&H3&K4&B1&C1S7=50ZyXEL, Omni 288S AT&FX6&D3&H3&K4&B1&C1&N0S7=60ZyXEL, U-1496 AT&F&D0ZyXEL, U-1496 AT&F&C1&D2&K3ZyXEL, U-1496 AT&F&D2ZyXEL, U-1496 AT&FE0X6&K4ZyXEL, U-1496 AT&F&D2&R0&T5ZyXEL, U-1496 ATS0=0E1Q0V1X4&K3ZyXEL, U-1496 (V.42bis) AT&FX6&B1&C1&D2&N0&K4&H3S7=60ZyXEL, U-1496 Plus AT&F&D0&H3&K4&N0S0=0ZyXEL, U-1496 Plus AT&FX4ZyXEL, U-1496 Plus ATS0=0E1Q0V1X4&K3ZyXEL, U-1496B ATS0=0E1Q0V1X4&K3ZyXEL, U-1496B AT&F&D0&H3&K4&N0S0=0ZyXEL, U-1496B Plus AT&F&D0&H3&K4&N0S0=0ZyXEL, U-1496B Plus ATS0=0E1Q0V1X4&K3ZyXEL, U-1496E AT&F&D0&H3&K4&N0S0=0ZyXel, U-1496E+ ATZ&N4&K0ZyXEL, U-1496E Plus AT&F&D0&H3&K4&N0S0=0ZyXEL, U-1496E Plus v.32bis AT&FQ0V1X7S0=0S2=255*E0 &B1&C1&D2&H3&B1&K4&M0S40.2=1ZyXEL, U-1496P AT&F&D0&H3&K4&N0S0=0ZyXEL, U-1496P ATS0=0E1Q0V1X4&K3ZyXEL, U-1496R ATS0=0E1Q0V1X4&K3ZyXEL, U-1496R AT&FX4ZyXEL, U-1496RE AT&FX4ZyXEL, U-1496R AT&F&D0&H3&K4&N0S0=0ZyXEL, U-1496RE plus AT&FX4ZyXEL, U-1496RE/U-1496RE Plus AT&F&D0&H3&K4&N0S0=0ZyXel, U-1496S ATS0=0E1Q0V1X4&K3ZyXel, U-1496S ATS0=0E1Q0V1X4&K3=255ZyXEL, v.32bis AT&C1&D0&H3&K4&N0ZyXEL, V.32bis AT&C1&D2&H3&K3&N0ZyXEL, V.32bis AT&FE0X6&K4ZyXEL, 2864IU (ISDN) 128000 (MLPPP) ATB40&J3X5S124=5JAKAS10JS10KSM1
105
218 Modem String Placement and Info Windows 95/98
- Go to My Computer,
- then to Dial-Up Networking, [Screenshot]
- Right click on your connection icon, & select Propeties (or highlight the icon and goto File then Properties).
- Click on the Configure button at the bottom of that screen
- Then click on the Connection tab.
- Then click on the Advanced button.
- You will see an extra settings box on this screen. This is where you can put the initstring. [Screenshot]
Windows 3.1 Trumpet Winsock
- Open Trumpet Winsock
- Goto Dialer, down to Edit Scripts
- Here you might have a number of different scripts.
- If you have modem.cmd, click on it which brings up notepad. Here look for the line $modeminit="&f&c1&d2" (&f&c1&d2 is the current init, if you want to change it, just replace it with thecorrect string)
- If you don't have modem.cmd click on login.cmd and this again brings up notepad and again you just findthe line $modeminit="&f&c1&d2" and replace the init with whatever init string you want.
- After you have changed the init string, select File and Save before you exit notepad.
Windows NT4.0
- Go to Start, Settings, Control Panel
- In the Control Panel, double click on Modems
- Highlight your modem, and click on Properties
- Then click on the Connection tab.
- Then click on the Advanced button.
- Under Extra Settings, you can put in the desired Init String[Screenshot]
Config PPP
- Go to the apple menu, to the control panel to Config PPP.
- Click on the CONFIG button. On this screen you will see the box marked modeminit, and this is where you can put in your init string.
FreePPP
- Open FreePPP setup. Click on the Accounts tab. Click on your connection you use, then clickon edit.
- Now click on the connections tab.
- On this screen you can see the init string box which is where you put in your init strings.
OT/PPP
- You CANNOT change the modem init string in OT/PPP.- You will need Apple's Modem Script Generator ver 1.0a1 (Not supported by Apple).- To install these new modem scripts (CCL's) you downloaded from your modem manufacturer (recomended) or createdyourself you:
1) open the System Folder, then
2) open the Extension Folder
3) put the CCL (Modem Script) in the Modem Scripts folder
4) then select Modem in the control panel and select your modem from the list.
ARA Apple Remote Access
Apple's New Apple Remote Access Client(shipping with iMac's and OS8.5). Remote Access is actually a newer OT/PPP and ships with Mac OS 8.5 and OpenTransport 2.1. This uses ARA 3.0
OS/2 WARP
- open the dialer
- click on the Modem Info tab
- Here you can change the init string and port speed in the labeled fields
105
219 Microsoft Dial-Up Networking (DUNS) Error codes 600 - An operation is pending.601 - The port handle is invalid.602 - The port is already open.603 - Caller's buffer is too small.604 - Wrong information specified.605 - Cannot set port information.606 - The port is not connected.607 - The event is invalid.608 - The device does not exist.609 - The device type does not exist.610 - The buffer is invalid.611 - The route is not available.612 - The route is not allocated.613 - Invalid compression specified.614 - Out of buffers.615 - The port was not found.616 - An asynchronous request is pending.617 - The port or device is already disconnecting.618 - The port is not open.619 - The port is disconnected.620 - There are no endpoints.621 - Cannot open the phone book file.622 - Cannot load the phone book file.623 - Cannot find the phone book entry.624 - Cannot write the phone book file.625 - Invalid information found in the phone book.626 - Cannot load a string.627 - Cannot find key.628 - The port was disconnected.629 - The port was disconnected by the remote machine.630 - The port was disconnected due to hardware failure.631 - The port was disconnected by the user.632 - The structure size is incorrect.633 - The port is already in use or is not configured for Remote Access dialout.634 - Cannot register your computer on the remote network.635 - Unknown error.636 - The wrong device is attached to the port.637 - The string could not be converted.638 - The request has timed out.639 - No asynchronous net available.640 - A NetBIOS error has occurred.641 - The server cannot allocate NetBIOS resources needed to support the client.642 - One of your NetBIOS names is already registered on the remote network.643 - A network adapter at the server failed.644 - You will not receive network message popups.645 - Internal authentication error.646 - The account is not permitted to log on at this time of day.647 - The account is disabled.648 - The password has expired.649 - The account does not have Remote Access permission.650 - The Remote Access server is not responding.651 - Your modem (or other connecting device) has reported an error.652 - Unrecognized response from the device.653 - A macro required by the device was not found in the device .INF file section.654 - A command or response in the device .INF file section refers to an undefined macro655 - The macro was not found in the device .INF file section.656 - The macro in the device .INF file section contains an undefined macro657 - The device .INF file could not be opened.658 - The device name in the device .INF or media .INI file is too long.659 - The media .INI file refers to an unknown device name.660 - The device .INF file contains no responses for the command.661 - The device .INF file is missing a command.662 - Attempted to set a macro not listed in device .INF file section.663 - The media .INI file refers to an unknown device type.664 - Cannot allocate memory.665 - The port is not configured for Remote Access.666 - Your modem (or other connecting device) is not functioning.667 - Cannot read the media .INI file.668 - The connection dropped.669 - The usage parameter in the media .INI file is invalid.670 - Cannot read the section name from the media .INI file.671 - Cannot read the device type from the media .INI file.672 - Cannot read the device name from the media .INI file.673 - Cannot read the usage from the media .INI file.674 - Cannot read the maximum connection BPS rate from the media .INI file.675 - Cannot read the maximum carrier BPS rate from the media .INI file.676 - The line is busy.677 - A person answered instead of a modem.678 - There is no answer.679 - Cannot detect carrier.680 - There is no dial tone.681 - General error reported by device.682 - ERROR WRITING SECTIONNAME683 - ERROR WRITING DEVICETYPE684 - ERROR WRITING DEVICENAME685 - ERROR WRITING MAXCONNECTBPS686 - ERROR WRITING MAXCARRIERBPS687 - ERROR WRITING USAGE688 - ERROR WRITING DEFAULTOFF689 - ERROR READING DEFAULTOFF690 - ERROR EMPTY INI FILE691 - Access denied because username and/or password is invalid on the domain.692 - Hardware failure in port or attached device.693 - ERROR NOT BINARY MACRO694 - ERROR DCB NOT FOUND695 - ERROR STATE MACHINES NOT STARTED696 - ERROR STATE MACHINES ALREADY STARTED697 - ERROR PARTIAL RESPONSE LOOPING698 - A response keyname in the device .INF file is not in the expected format.699 - The device response caused buffer overflow.700 - The expanded command in the device .INF file is too long.701 - The device moved to a BPS rate not supported by the COM driver.702 - Device response received when none expected.703 - ERROR INTERACTIVE MODE704 - ERROR BAD CALLBACK NUMBER705 - ERROR INVALID AUTH STATE706 - ERROR WRITING INITBPS707 - X.25 diagnostic indication.708 - The account has expired.709 - Error changing password on domain.710 - Serial overrun errors were detected while communicating with your modem.711 - RasMan initialization failure. Check the event log.712 - Biplex port is initializing. Wait a few seconds and redial.713 - No active ISDN lines are available.714 - Not enough ISDN channels are available to make the call.715 - Too many errors occurred because of poor phone line quality.716 - The Remote Access IP configuration is unusable.717 - No IP addresses are available in the static pool of Remote Access IP addresses.718 - PPP timeout.719 - PPP terminated by remote machine.720 - No PPP control protocols configured.721 - Remote PPP peer is not responding.722 - The PPP packet is invalid.723 - The phone number, including prefix and suffix, is too long.724 - The IPX protocol cannot dial-out on the port because the computer is an IPX router.725 The IPX protocol cannot dial-in on the port because the IPX router is not installed.726 - The IPX protocol cannot be used for dial-out on more than one port at a time.727 - Cannot access TCPCFG.DLL.728 - Cannot find an IP adapter bound to Remote Access.729 - SLIP cannot be used unless the IP protocol is installed.730 - Computer registration is not complete.731 - The protocol is not configured.732 - The PPP negotiation is not converging.733 - The PPP control protocol for this network protocol is not available on the server.734 - The PPP link control protocol terminated.735 - The requested address was rejected by the server.736 - The remote computer terminated the control protocol.737 - Loopback detected.738 - The server did not assign an address.739 - The remote server cannot use the Windows NT encrypted password.740 - The TAPI devices configured for Remote Access failed to initialize or were not installed correctly.741 - The local computer does not support encryption.742 - The remote server does not support encryption.743 - The remote server requires encryption.744 - Cannot use the IPX net number assigned by the remote server. Check the event log.745 - An essential file is missing. Re-install Dial-Up Networking751 - The callback number contains an invalid character. Only the following characters are allowed: 0 to 9, T, P, W, (,), -, @, and space.752 - A syntax error was encountered while processing a script. 753 - The connection could not be disconnected because it was created by the multi-protocol router.754 - The system could not find the multi-link bundle.755 - The system cannot perform automated dial because this entry has a custom dialer. specified.756 - This connection is already being dialed.757 - Remote access services could not be started automatically. Additional information is provided in the event log.758 - Internet connection sharing is already enabled on the connection.760 - An error occurred while routing capabilities were being enabled.761 - An error occurred while Internet connection sharing was being enabled for the connection.763 - Internet connection sharing cannot be enabled. There are two or more LAN connections in addition to the connection to be shared.764 - No smart card reader is installed.765 - Internet connection sharing cannot be enabled. A LAN connection is already configured with the IP address required for automatic IP addressing.766 - The system could not find any certificate.767 - Internet connection sharing cannot be enabled. The LAN connection selected on the private network has more than one IP address configured. Reconfigure the LAN connection with a single IP address before enabling Internet connection sharing.768 - The connection attempt failed because of failure to encrypt data.769 - The specified destination is not reachable.770 - The remote machine rejected the connection attempt.771 - The connection attempt failed because the network is busy.772 - The remote computer's network hardware is incompatible with the type of call requested.773 - The connection attempt failed because the destination number has changed.774 - The connection attempt failed because of a temporary failure. Try connecting again.775 - The call was blocked by the remote computer.776 - The call could not be connected because the destination has invoked the Do Not Disturb feature.777 - The connection attempt failed because the modem (or other connecting device) on the remote computer is out of order.778 - It was not possible to verify the identity of the server.779 - To dial out using this connection, you must use a smart card.780 - An attempted function is not valid for this connection.781 - The encryption attempt failed because no valid certificate was found.782 - Network Address Translation (NAT) is currently installed as a routing protocol, and must be removed before enabling Internet Connection Sharing.783 Internet Connection Sharing cannot be enabled. The LAN connection selected as the private network is either not present, or is disconnected from the network. Please ensure that the LAN adapter is connected before enabling Internet Connection Sharing.784 You cannot dial using this connection at logon time, because it is configured to use a user name different than the one on the smart card. If you want to use it at logon time, you must configure it to use the user name on the smart card.785 You cannot dial using this connection at logon time, because it is not configured to use a smart card. If you want to use it at logon time, you must edit the properties of this connection so that it uses a smart card.786 The L2TP connection attempt failed because there is no valid machine certificate on your computer for security authentication.787 The L2TP connection attempt failed because the security layer could not authenticate the remote computer.788 The L2TP connection attempt failed because the security layer could not negotiate compatible parameters with the remote computer.789 The L2TP connection attempt failed because the security layer encountered a processing error during initial negotiations with the remote computer.790 The L2TP connection attempt failed because certificate validation on the remote computer failed.791 The L2TP connection attempt failed because security policy for the connection was not found.792 - The L2TP Connection Attempt failed because security negotiation timed out.793 - The L2TP connection attempt failed because an error occurred while negotiating security.794 - The Framed Protocol RADIUS attribute for this user is not PPP.795 The Tunnel Type RADIUS attribute for this user is not correct.796 - The Service Type RADIUS attribute for this user is neither Framed nor Callback Framed.797 - The modem could not be found.798 - A certificate could not be found that can be used with this Extensible Authentication Protocol.799 - Internet Connection Sharing (ICS) cannot be enabled due to an IP address conflict on the network. ICS requires the host be configured to use 192.168.0.1. Please ensure that no other client on the network is configured to use 192.168.0.1.800 - Unable to establish the VPN connection. The VPN server may be un-reachable, or security parameters may not be configured properly for this connection.801 This connection is configured to validate the identity of the access server, but Windows cannot verify the digital certificate sent by the server.900 The router is not running.901 The interface is already connected.902 The specified protocol identifier is not known to the router.903 The Demand-dial Interface Manager is not running.904 An interface with this name is already registered with the router.905 An interface with this name is not registered with the router.906 The interface is not connected.907 The specified protocol is stopping.908 The interface is connected and hence cannot be deleted.909 The interface credentials have not been set.910 This interface is already in the process of connecting.911 An update of routing information on this interface is already in progress.912 The interface configuration in invalid. There is already another interface that is connected to the same interface on the remote router.913 A Remote Access Client attempted to connect over a port that was reserved for Routers only.914 A Demand Dial Router attempted to connect over a port that was reserved for Remote Access Clients only.915 The client interface with this name already exists and is currently connected.916 The interface is in a disabled state.917 The authentication protocol was rejected by the remote peer.918 There are no authentication protocols available for use.919 The remote computer refused to be authenticated using the configured authentication protocol. The line has been disconnected.920 The remote account does not have Remote Access permission.921 The remote account has expired.922 The remote account is disabled.923 The remote account is not permitted to logon at this time of day.924 Access was denied to the remote peer because username and/or password is invalid on the domain.925 There are no routing enabled ports available for use by this demand dial interface.926 The port has been disconnected due to inactivity.927 The interface is not reachable at this time.928 The Demand Dial service is in a paused state.929 The interface has been disconnected by the administrator.930 The authentication server did not respond to authentication requests in a timely fashion.931 The maximum number of ports allowed for use in the multilinked connection has been reached.932 The connection time limit for the user has been reached.933 The maximum limit on the number of LAN interfaces supported has been reached.934 The maximum limit on the number of Demand Dial interfaces supported has been reached.935 The maximum limit on the number of Remote Access clients supported has been reached.936 The port has been disconnected due to the BAP policy.937 Because another connection of your type is in use, the incoming connection cannot accept your connection request.938 No RADIUS servers were located on the network.939 An invalid response was received from the RADIUS authentication server. Make sure that the case sensitive secret password for the RADIUS server is set correctly.940 You do not have permission to connect at this time.941 You do not have permission to connect using the current device type.942 You do not have permission to connect using the selected authentication protocol.943 BAP is required for this user.944 The interface is not allowed to connect at this time.945 The saved router configuration is incompatible with the current router.946 RemoteAccess has detected older format user accounts that will not be migrated automatically. To migrate these manually, run XXXX. 948 The transport is already installed with the router.949 Received invalid signature length in packet from RADIUS server.950 Received invalid signature in packet from RADIUS server.951 Did not receive signature along with EAPMessage from RADIUS server.952 Received packet with invalid length or Id from RADIUS server.953 Received packet with attribute with invalid length from RADIUS server.954 Received invalid packet from RADIUS server.955 Authenticator does not match in packet from RADIUS server. Note: Errors #753 and higher are applicable only to Windows 2000 & higher.
104
220 Save Space in Outlook Express Outlook Express cleans up after itself only when it notices 20% wasted space. If you want to have Outlook Express clean itself more often, select the "Tools" menu at the top of the Outlook Express window, then select "Options." Next, select the "Advanced" tab. Under "Compact files when there is XXX percent wasted space," lower this number from 20 to whatever percentage you prefer. 12
221 Faster Modem Dialing Modem dialing to slow? Here is how to speed it up. Double-click on the modems in Control Panel. Click the Properties button. Select the Connection tab. Click on the Advance button. In the Extra Settings text box, type S11=50. This is an instruction to your modem to speed up the dial tone from 100 milliseconds (the default) to 50 milliseconds. Note: 50 is about the maximum. This setting will not change anything if your modem does not support the faster dialing. 11
222 Dual Boot Windows XP Here is Microsoft's instructions for dual-booting Windows XP.
Click here 3
223 Shortcut Keys To undo typing CTRL+Z or ALT+BACKSPACE
To Undo changes Hit ESC once for current field, ESC twice for current record
To insert the current date CTRL+SEMICOLON (;)
To insert the current time CTRL+COLON (:)
To insert the default value for a field CTRL+ALT+SPACEBAR
To insert the value from the same CTRL+APOSTROPHE (') field in the previous record
To add a new record CTRL+PLUS SIGN (+)
To delete the current record CTRL+MINUS SIGN (-)
To recalculate the fields in the window F9 10
224 "Field 'field name' can't contain a null value" When you set the Required property of a field to Yes, you must have an entry for that field or Access will not let you save the record. Either input a record into that field or set the Required property to No. 10
225 All Possible Windows Codes and Error Messages 1-1006 | Code No. | Error Message |
| 0 | The operation completed successfully. |
| 1 | Incorrect function. |
| 2 | The system cannot find the file specified. |
| 3 | The system cannot find the path specified. |
| 4 | The system cannot open the file. |
| 5 | Access is denied. |
| 6 | The handle is invalid. |
| 7 | The storage control blocks were destroyed. |
| 8 | Not enough storage is available to process this command. |
| 9 | The storage control block address is invalid. |
| 10 | The environment is incorrect. |
| 11 | An attempt was made to load a program with an incorrect format. |
| 12 | The access code is invalid. |
| 13 | The data is invalid. |
| 14 | Not enough storage is available to complete this operation. |
| 15 | The system cannot find the drive specified. |
| 16 | The directory cannot be removed. |
| 17 | The system cannot move the file to a different disk drive. |
| 18 | There are no more files. |
| 19 | The media is write protected. |
| 20 | The system cannot find the device specified. |
| 21 | The device is not ready. |
| 22 | The device does not recognize the command. |
| 23 | Data error (cyclic redundancy check) |
| 24 | The program issued a command but the command length is incorrect. |
| 25 | The drive cannot locate a specific area or track on the disk. |
| 26 | The specified disk or diskette cannot be accessed. |
| 27 | The drive cannot find the sector requested. |
| 28 | The printer is out of paper. |
| 29 | The system cannot write to the specified device. |
| 30 | The system cannot read from the specified device. |
| 31 | A device attached to the system is not functioning. |
| 32 | The process cannot access the file because it is being used by another process. |
| 33 | The process cannot access the file because another process has locked a portion of the file. |
| 34 | The wrong diskette is in the drive. Insert %2 (Volume Serial Number: %3) into drive %1. |
| 36 | Too many files opened for sharing. |
| 38 | Reached end of file. |
| 39 | The disk is full. |
| 50 | The network request is not supported. |
| 51 | The remote computer is not available. |
| 52 | A duplicate name exists on the network. |
| 53 | The network path was not found. |
| 54 | The network is busy. |
| 55 | The specified network resource or device is no longer available. |
| 56 | The network BIOS command limit has been reached. |
| 57 | A network adapter hardware error occurred. |
| 58 | The specified server cannot perform the requested operation. |
| 59 | An unexpected network error occurred. |
| 60 | The remote adapter is not compatible. |
| 61 | The printer queue is full. |
| 62 | Space to store the file waiting to be printed is not available on the server. |
| 63 | Your file waiting to be printed was deleted. |
| 64 | The specified network name is no longer available. |
| 65 | Network access is denied. |
| 66 | The network resource type is not correct. |
| 67 | The network name cannot be found. |
| 68 | The name limit for the local computer network adapter card was exceeded. |
| 69 | The network BIOS session limit was exceeded. |
| 70 | The remote server has been paused or is in the process of being started. |
| 71 | No more connections can be made to this remote computer at this time because there are already as many connections as the computer can accept. |
| 72 | The specified printer or disk device has been paused. |
| 80 | The file exists. |
| 82 | The directory or file cannot be created. |
| 83 | Fail on INT 24 |
| 84 | Storage to process this request is not available. |
| 85 | The local device name is already in use. |
| 86 | The specified network password is not correct. |
| 87 | The parameter is incorrect. |
| 88 | A write fault occurred on the network. |
| 89 | The system cannot start another process at this time. |
| 100 | Cannot create another system semaphore. |
| 101 | The exclusive semaphore is owned by another process. |
| 102 | The semaphore is set and cannot be closed. |
| 103 | The semaphore cannot be set again. |
| 104 | Cannot request exclusive semaphores at interrupt time. |
| 105 | The previous ownership of this semaphore has ended. |
| 106 | Insert the diskette for drive %1. |
| 107 | Program stopped because alternate diskette was not inserted. |
| 108 | The disk is in use or locked by another process. |
| 109 | The pipe has been ended. |
| 110 | The system cannot open the device or file specified. |
| 111 | The file name is too long. |
| 112 | There is not enough space on the disk. |
| 113 | No more internal file identifiers available. |
| 114 | The target internal file identifier is incorrect. |
| 117 | The IOCTL call made by the application program is not correct. |
| 118 | The verify-on-write switch parameter value is not correct. |
| 119 | The system does not support the command requested. |
| 120 | This function is only valid in Win32 mode. |
| 121 | The semaphore timeout period has expired. |
| 122 | The data area passed to a system call is too small. |
| 123 | The filename, directory name, or volume label syntax is incorrect. |
| 124 | The system call level is not correct. |
| 125 | The disk has no volume label. |
| 126 | The specified module could not be found. |
| 127 | The specified procedure could not be found. |
| 128 | There are no child processes to wait for. |
| 129 | The %1 application cannot be run in Win32 mode. |
| 130 | Attempt to use a file handle to an open disk partition for an operation other than raw disk I/O. |
| 131 | An attempt was made to move the file pointer before the beginning of the file. |
| 132 | The file pointer cannot be set on the specified device or file. |
| 133 | A JOIN or SUBST command cannot be used for a drive that contains previously joined drives. |
| 134 | An attempt was made to use a JOIN or SUBST command on a drive that has already been joined. |
| 135 | An attempt was made to use a JOIN or SUBST command on a drive that has already been substituted. |
| 136 | The system tried to delete the JOIN of a drive that is not joined. |
| 137 | The system tried to delete the substitution of a drive that is not substituted. |
| 138 | The system tried to join a drive to a directory on a joined drive. |
| 139 | The system tried to substitute a drive to a directory on a substituted drive. |
| 140 | The system tried to join a drive to a directory on a substituted drive. |
| 141 | The system tried to SUBST a drive to a directory on a joined drive. |
| 142 | The system cannot perform a JOIN or SUBST at this time. |
| 143 | The system cannot join or substitute a drive to or for a directory on the same drive. |
| 144 | The directory is not a subdirectory of the root directory. |
| 145 | The directory is not empty. |
| 146 | The path specified is being used in a substitute. |
| 147 | Not enough resources are available to process this command. |
| 148 | The path specified cannot be used at this time. |
| 149 | An attempt was made to join or substitute a drive for which a directory on the drive is the target of a previous substitute. |
| 150 | System trace information was not specified in your CONFIG.SYS file, or tracing is disallowed. |
| 151 | The number of specified semaphore events for DosMuxSemWait is not correct. |
| 152 | DosMuxSemWait did not execute; too many semaphores are already set. |
| 153 | The DosMuxSemWait list is not correct. |
| 154 | The volume label you entered exceeds the label character limit of the target file system. |
| 155 | Cannot create another thread. |
| 156 | The recipient process has refused the signal. |
| 157 | The segment is already discarded and cannot be locked. |
| 158 | The segment is already unlocked. |
| 159 | The address for the thread ID is not correct. |
| 160 | The argument string passed to DosExecPgm is not correct. |
| 161 | The specified path is invalid. |
| 162 | A signal is already pending. |
| 164 | No more threads can be created in the system. |
| 167 | Unable to lock a region of a file. |
| 170 | The requested resource is in use. |
| 173 | A lock request was not outstanding for the supplied cancel region. |
| 174 | The file system does not support atomic changes to the lock type. |
| 180 | The system detected a segment number that was not correct. |
| 182 | The operating system cannot run %1. |
| 183 | Cannot create a file when that file already exists. |
| 186 | The flag passed is not correct. |
| 187 | The specified system semaphore name was not found. |
| 188 | The operating system cannot run %1. |
| 189 | The operating system cannot run %1. |
| 190 | The operating system cannot run %1. |
| 191 | Cannot run %1 in Win32 mode. |
| 192 | The operating system cannot run %1. |
| 193 | %1 is not a valid Win32 application. |
| 194 | The operating system cannot run %1. |
| 195 | The operating system cannot run %1. |
| 196 | The operating system cannot run this application program. |
| 197 | The operating system is not presently configured to run this application. |
| 198 | The operating system cannot run %1. |
| 199 | The operating system cannot run this application program. |
| 200 | The code segment cannot be greater than or equal to 64KB. |
| 201 | The operating system cannot run %1. |
| 202 | The operating system cannot run %1. |
| 203 | The system could not find the environment option that was entered. |
| 205 | No process in the command subtree has a signal handler. |
| 206 | The filename or extension is too long. |
| 207 | The ring 2 stack is in use. |
| 208 | The global filename characters, * or ?, are entered incorrectly or too many global filename characters are specified. |
| 209 | The signal being posted is not correct. |
| 210 | The signal handler cannot be set. |
| 212 | The segment is locked and cannot be reallocated. |
| 214 | Too many dynamic link modules are attached to this program or dynamic link module. |
| 215 | Can't nest calls to LoadModule. |
| 230 | The pipe state is invalid. |
| 231 | All pipe instances are busy. |
| 232 | The pipe is being closed. |
| 233 | No process is on the other end of the pipe. |
| 234 | More data is available. |
| 240 | The session was cancelled. |
| 254 | The specified extended attribute name was invalid. |
| 255 | The extended attributes are inconsistent. |
| 259 | No more data is available. |
| 266 | The Copy API cannot be used. |
| 267 | The directory name is invalid. |
| 275 | The extended attributes did not fit in the buffer. |
| 276 | The extended attribute file on the mounted file system is corrupt. |
| 277 | The extended attribute table file is full. |
| 278 | The specified extended attribute handle is invalid. |
| 282 | The mounted file system does not support extended attributes. |
| 288 | Attempt to release mutex not owned by caller. |
| 298 | Too many posts were made to a semaphore. |
| 299 | Only part of a Read/WriteProcessMemory request was completed. |
| 317 | The system cannot find message for message number 0x%1 in message file for %2. |
| 487 | Attempt to access invalid address. |
| 534 | Arithmetic result exceeded 32 bits. |
| 535 | There is a process on other end of the pipe. |
| 536 | Waiting for a process to open the other end of the pipe. |
| 994 | Access to the extended attribute was denied. |
| 995 | The I/O operation has been aborted because of either a thread exit or an application request. |
| 996 | Overlapped I/O event is not in a signalled state. |
| 997 | Overlapped I/O operation is in progress. |
| 998 | Invalid access to memory location. |
| 999 | Error performing inpage operation. |
| 1001 | Recursion too deep, stack overflowed. |
| 1002 | The window cannot act on the sent message. |
| 1003 | Cannot complete this function. |
| 1004 | Invalid flags. |
| 1005 | The volume does not contain a recognized file system. Please make sure that all required file system drivers are loaded and that the volume is not corrupt. |
| 1006 | The volume for a file has been externally altered such that the opened file is no longer valid. < 104
226 All Possible Windows Codes and Error Messages 1007-1356 | Code No. | Error Message | |
| 1007 | The requested operation cannot be performed in full-screen mode. | | 1008 | An attempt was made to reference a token that does not exist. | | 1009 | The configuration registry database is corrupt. | | 1010 | The configuration registry key is invalid. | | 1011 | The configuration registry key could not be opened. | | 1012 | The configuration registry key could not be read. | | 1013 | The configuration registry key could not be written. | | 1014 | One of the files in the Registry database had to be recovered by use of a log or alternate copy. The recovery was successful. | | 1015 | The Registry is corrupt. The structure of one of the files that contains Registry data is corrupt, or the system's image of the file in memory is corrupt, or the file could not be recovered because the alternate copy or log was absent or corrupt. | | 1016 | An I/O operation initiated by the Registry failed unrecoverably. The Registry could not read in, or write out, or flush, one of the files that contain the system's image of the Registry. | | 1017 | The system has attempted to load or restore a file into the Registry, but the specified file is not in a Registry file format. | | 1018 | Illegal operation attempted on a Registry key which has been marked for deletion. | | 1019 | System could not allocate the required space in a Registry log. | | 1020 | Cannot create a symbolic link in a Registry key that already has subkeys or values. | | 1021 | Cannot create a stable subkey under a volatile parent key. | | 1022 | A notify change request is being completed and the information is not being returned in the caller's buffer. The caller now needs to enumerate the files to find the changes. | | 1051 | A stop control has been sent to a service which other running services are dependent on. | | 1052 | The requested control is not valid for this service | | 1053 | The service did not respond to the start or control request in a timely fashion. | | 1054 | A thread could not be created for the service. | | 1055 | The service database is locked. | | 1056 | An instance of the service is already running. | | 1057 | The account name is invalid or does not exist. | | 1058 | The specified service is disabled and cannot be started. | | 1059 | Circular service dependency was specified. | | 1060 | The specified service does not exist as an installed service. | | 1061 | The service cannot accept control messages at this time. | | 1062 | The service has not been started. | | 1063 | The service process could not connect to the service controller. | | 1064 | An exception occurred in the service when handling the control request. | | 1065 | The database specified does not exist. | | 1066 | The service has returned a service-specific error code. | | 1067 | The process terminated unexpectedly. | | 1068 | The dependency service or group failed to start. | | 1069 | The service did not start due to a logon failure. | | 1070 | After starting, the service hung in a start-pending state. | | 1071 | The specified service database lock is invalid. | | 1072 | The specified service has been marked for deletion. | | 1073 | The specified service already exists. | | 1074 | The system is currently running with the last-known-good configuration. | | 1075 | The dependency service does not exist or has been marked for deletion. | | 1076 | The current boot has already been accepted for use as the last-known-good control set. | | 1077 | No attempts to start the service have been made since the last boot. | | 1078 | The name is already in use as either a service name or a service display name. | | 1100 | The physical end of the tape has been reached. | | 1101 | A tape access reached a filemark. | | 1102 | Beginning of tape or partition was encountered. | | 1103 | A tape access reached the end of a set of files. | | 1104 | No more data is on the tape. | | 1105 | Tape could not be partitioned. | | 1106 | When accessing a new tape of a multivolume partition, the current blocksize is incorrect. | | 1107 | Tape partition information could not be found when loading a tape. | | 1108 | Unable to lock the media eject mechanism. | | 1109 | Unable to unload the media. | | 1110 | Media in drive may have changed. | | 1111 | The I/O bus was reset. | | 1112 | No media in drive. | | 1113 | No mapping for the Unicode character exists in the target multi-byte code page. | | 1114 | A dynamic link library (DLL) initialization routine failed. | | 1115 | A system shutdown is in progress. | | 1116 | Unable to abort the system shutdown because no shutdown was in progress. | | 1117 | The request could not be performed because of an I/O device error. | | 1118 | No serial device was successfully initialized. The serial driver will unload. | | 1119 | Unable to open a device that was sharing an interrupt request (IRQ) with other devices. At least one other device that uses that IRQ was already opened. | | 1120 | A serial I/O operation was completed by another write to the serial port. (The IOCTL_SERIAL_XOFF_COUNTER reached zero.) | | 1121 | A serial I/O operation completed because the time-out period expired. (The IOCTL_SERIAL_XOFF_COUNTER did not reach zero.) | | 1122 | No ID address mark was found on the floppy disk. | | 1123 | Mismatch between the floppy disk sector ID field and the floppy disk controller track address. | | 1124 | The floppy disk controller reported an error that is not recognized by the floppy disk driver. | | 1125 | The floppy disk controller returned inconsistent results in its registers. | | 1126 | While accessing the hard disk, a recalibrate operation failed, even after retries. | | 1127 | While accessing the hard disk, a disk operation failed even after retries. | | 1128 | While accessing the hard disk, a disk controller reset was needed, but even that failed. | | 1129 | Physical end of tape encountered. | | 1130 | Not enough server storage is available to process this command. | | 1131 | A potential deadlock condition has been detected. | | 1132 | The base address or the file offset specified does not have the proper alignment. | | 1140 | An attempt to change the system power state was vetoed by another application or driver. | | 1141 | The system BIOS failed an attempt to change the system power state. | | 1150 | The specified program requires a newer version of Windows. | | 1151 | The specified program is not a Windows or MS-DOS program. | | 1152 | Cannot start more than one instance of the specified program. | | 1153 | The specified program was written for an older version of Windows. | | 1154 | One of the library files needed to run this application is damaged. | | 1155 | No application is associated with the specified file for this operation. | | 1156 | An error occurred in sending the command to the application. | | 1157 | One of the library files needed to run this application cannot be found. | | 1200 | The specified device name is invalid. | | 1201 | The device is not currently connected but it is a remembered connection. | | 1202 | An attempt was made to remember a device that had previously been remembered. | | 1203 | No network provider accepted the given network path. | | 1204 | The specified network provider name is invalid. | | 1205 | Unable to open the network connection profile. | | 1206 | The network connection profile is corrupt. | | 1207 | Cannot enumerate a non-container. | | 1208 | An extended error has occurred. | | 1209 | The format of the specified group name is invalid. | | 1210 | The format of the specified computer name is invalid. | | 1211 | The format of the specified event name is invalid. | | 1212 | The format of the specified domain name is invalid. | | 1213 | The format of the specified service name is invalid. | | 1214 | The format of the specified network name is invalid. | | 1215 | The format of the specified share name is invalid. | | 1216 | The format of the specified password is invalid. | | 1217 | The format of the specified message name is invalid. | | 1218 | The format of the specified message destination is invalid. | | 1219 | The credentials supplied conflict with an existing set of credentials. | | 1220 | An attempt was made to establish a session to a network server, but there are already too many sessions established to that server. | | 1221 | The workgroup or domain name is already in use by another computer on the network. | | 1222 | The network is not present or not started. | | 1223 | The operation was cancelled by the user. | | 1224 | The requested operation cannot be performed on a file with a user mapped section open. | | 1225 | The remote system refused the network connection. | | 1226 | The network connection was gracefully closed. | | 1227 | The network transport endpoint already has an address associated with it. | | 1228 | An address has not yet been associated with the network endpoint. | | 1229 | An operation was attempted on a non-existent network connection. | | 1230 | An invalid operation was attempted on an active network connection. | | 1231 | The remote network is not reachable by the transport. | | 1232 | The remote system is not reachable by the transport. | | 1233 | The remote system does not support the transport protocol. | | 1234 | No service is operating at the destination network endpoint on the remote system. | | 1235 | The request was aborted. | | 1236 | The network connection was aborted by the local system. | | 1237 | The operation could not be completed. A retry should be performed. | | 1238 | A connection to the server could not be made because the limit on the number of concurrent connections for this account has been reached. | | 1239 | Attempting to login during an unauthorized time of day for this account. | | 1240 | The account is not authorized to login from this station. | | 1241 | The network address could not be used for the operation requested. | | 1242 | The service is already registered. | | 1243 | The specified service does not exist. | | 1244 | The operation being requested was not performed because the user has not been authenticated. | | 1245 | The operation being requested was not performed because the user has not logged on to the network. The specified service does not exist. | | 1246 | Return that wants caller to continue with work in progress. | | 1247 | An attempt was made to perform an initialization operation when initialization has already been completed. | | 1248 | No more local devices. | | 1300 | Not all privileges referenced are assigned to the caller. | | 1301 | Some mapping between account names and security IDs was not done. | | 1302 | No system quota limits are specifically set for this account. | | 1303 | No encryption key is available. A well-known encryption key was returned. | | 1304 | The NT password is too complex to be converted to a LAN Manager password. The LAN Manager password returned is a NULL string. | | 1305 | The revision level is unknown. | | 1306 | Indicates two revision levels are incompatible. | | 1307 | This security ID may not be assigned as the owner of this object. | | 1308 | This security ID may not be assigned as the primary group of an object. | | 1309 | An attempt has been made to operate on an impersonation token by a thread that is not currently impersonating a client. | | 1310 | The group may not be disabled. | | 1311 | There are currently no logon servers available to service the logon request. | | 1312 | A specified logon session does not exist. It may already have been terminated. | | 1313 | A specified privilege does not exist. | | 1314 | A required privilege is not held by the client. | | 1315 | The name provided is not a properly formed account name. | | 1316 | The specified user already exists. | | 1317 | The specified user does not exist. | | 1318 | The specified group already exists. | | 1319 | The specified group does not exist. | | 1320 | Either the specified user account is already a member of the specified group, or the specified group cannot be deleted because it contains a member. | | 1321 | The specified user account is not a member of the specified group account. | | 1322 | The last remaining administration account cannot be disabled or deleted. | | 1323 | Unable to update the password. The value provided as the current password is incorrect. | | 1324 | Unable to update the password. The value provided for the new password contains values that are not allowed in passwords. | | 1325 | Unable to update the password because a password update rule has been violated. | | 1326 | Logon failure: unknown user name or bad password. | | 1327 | Logon failure: user account restriction. | | 1328 | Logon failure: account logon time restriction violation. | | 1329 | Logon failure: user not allowed to log on to this computer. | | 1330 | Logon failure: the specified account password has expired. | | 1331 | Logon failure: account currently disabled. | | 1332 | No mapping between account names and security IDs was done. | | 1333 | Too many local user identifiers (LUIDs) were requested at one time. | | 1334 | No more local user identifiers (LUIDs) are available. | | 1335 | The subauthority part of a security ID is invalid for this particular use. | | 1336 | The access control list (ACL) structure is invalid. | | 1337 | The security ID structure is invalid. | | 1338 | The security descriptor structure is invalid. | | 1340 | The inherited access control list (ACL) or access control entry (ACE) could not be built. | | 1341 | The server is currently disabled. | | 1342 | The server is currently enabled. | | 1343 | The value provided was an invalid value for an identifier authority. | | 1344 | No more memory is available for security information updates. | | 1345 | The specified attributes are invalid, or incompatible with the attributes for the group as a whole. | | 1346 | Either a required impersonation level was not provided, or the provided impersonation level is invalid. | | 1347 | Cannot open an anonymous level security token. | | 1348 | The validation information class requested was invalid. | | 1349 | The type of the token is inappropriate for its attempted use. | | 1350 | Unable to perform a security operation on an object which has no associated security. | | 1351 | Indicates a Windows NT Server could not be contacted or that objects within the domain are protected such that necessary information could not be retrieved. | | 1352 | The security account manager (SAM) or local security authority (LSA) server was in the wrong state to perform the security operation. | | 1353 | The domain was in the wrong state to perform the security operation. | | 1354 | This operation is only allowed for the Primary Domain Controller of the domain. | | 1355 | The specified domain did not exist. | | 1356 | The specified domain already exists. | | | | Code No. | Error Message | |
| 1357 | An attempt was made to exceed the limit on the number of domains per server. | | 1358 | Unable to complete the requested operation because of either a catastrophic media failure or a data structure corruption on the disk. | | 1359 | The security account database contains an internal inconsistency. | | 1360 | Generic access types were contained in an access mask which should already be mapped to non-generic types. | | 1361 | A security descriptor is not in the right format (absolute or self-relative). | | 1362 | The requested action is restricted for use by logon processes only. The calling process has not registered as a logon process. | | 1363 | Cannot start a new logon session with an ID that is already in use. | | 1364 | A specified authentication package is unknown. | | 1365 | The logon session is not in a state that is consistent with the requested operation. | | 1366 | The logon session ID is already in use. | | 1367 | A logon request contained an invalid logon type value. | | 1368 | Unable to impersonate via a named pipe until data has been read from that pipe. | | 1369 | The transaction state of a Registry subtree is incompatible with the requested operation. | | 1370 | An internal security database corruption has been encountered. | | 1371 | Cannot perform this operation on built-in accounts. | | 1372 | Cannot perform this operation on this built-in special group. | | 1373 | Cannot perform this operation on this built-in special user. | | 1374 | The user cannot be removed from a group because the group is currently the user's primary group. | | 1375 | The token is already in use as a primary token. | | 1376 | The specified local group does not exist. | | 1377 | The specified account name is not a member of the local group. | | 1378 | The specified account name is already a member of the local group. | | 1379 | The specified local group already exists. | | 1380 | Logon failure: the user has not been granted the requested logon type at this computer. | | 1381 | The maximum number of secrets that may be stored in a single system has been exceeded. | | 1382 | The length of a secret exceeds the maximum length allowed. | | 1383 | The local security authority database contains an internal inconsistency. | | 1384 | During a logon attempt, the user's security context accumulated too many security IDs. | | 1385 | Logon failure: the user has not been granted the requested logon type at this computer. | | 1386 | A cross-encrypted password is necessary to change a user password. | | 1387 | A new member could not be added to a local group because the member does not exist. | | 1388 | A new member could not be added to a local group because the member has the wrong account type. | | 1389 | Too many security IDs have been specified. | | 1390 | A cross-encrypted password is necessary to change this user password. | | 1391 | Indicates an ACL contains no inheritable components | | 1392 | The file or directory is corrupt and non-readable. | | 1393 | The disk structure is corrupt and non-readable. | | 1394 | There is no user session key for the specified logon session. | | 1395 | The service being accessed is licensed for a particular number of connections. No more connections can be made to the service at this time because there are already as many connections as the service can accept. | | 1400 | Invalid window handle. | | 1401 | Invalid menu handle. | | 1402 | Invalid cursor handle. | | 1403 | Invalid accelerator table handle. | | 1404 | Invalid hook handle. | | 1405 | Invalid handle to a multiple-window position structure. | | 1406 | Cannot create a top-level child window. | | 1407 | Cannot find window class. | | 1408 | Invalid window, belongs to other thread. | | 1409 | Hot key is already registered. | | 1410 | Class already exists. | | 1411 | Class does not exist. | | 1412 | Class still has open windows. | | 1413 | Invalid index. | | 1414 | Invalid icon handle. | | 1415 | Using private DIALOG window words. | | 1416 | The listbox identifier was not found. | | 1417 | No wildcards were found. | | 1418 | Thread does not have a clipboard open. | | 1419 | Hot key is not registered. | | 1420 | The window is not a valid dialog window. | | 1421 | Control ID not found. | | 1422 | Invalid message for a combo box because it does not have an edit control. | | 1423 | The window is not a combo box. | | 1424 | Height must be less than 256. | | 1425 | Invalid device context (DC) handle. | | 1426 | Invalid hook procedure type. | | 1427 | Invalid hook procedure. | | 1428 | Cannot set non-local hook without a module handle. | | 1429 | This hook procedure can only be set globally. | | 1430 | The journal hook procedure is already installed. | | 1431 | The hook procedure is not installed. | | 1432 | Invalid message for single-selection listbox. | | 1433 | LB_SETCOUNT sent to non-lazy listbox. | | 1434 | This list box does not support tab stops. | | 1435 | Cannot destroy object created by another thread. | | 1436 | Child windows cannot have menus. | | 1437 | The window does not have a system menu. | | 1438 | Invalid message box style. | | 1439 | Invalid system-wide (SPI_*) parameter. | | 1440 | Screen already locked. | | 1441 | All handles to windows in a multiple-window position structure must have the same parent. | | 1442 | The window is not a child window. | | 1443 | Invalid GW_* command. | | 1444 | Invalid thread identifier. | | 1445 | Cannot process a message from a window that is not a multiple document interface (MDI) window. | | 1446 | Popup menu already active. | | 1447 | The window does not have scroll bars. | | 1448 | Scroll bar range cannot be greater than 0x7FFF. | | 1449 | Cannot show or remove the window in the way specified. | | 1450 | Insufficient system resources exist to complete the requested service. | | 1451 | Insufficient system resources exist to complete the requested service. | | 1452 | Insufficient system resources exist to complete the requested service. | | 1453 | Insufficient quota to complete the requested service. | | 1454 | Insufficient quota to complete the requested service. | | 1455 | The paging file is too small for this operation to complete. | | 1456 | A menu item was not found. | | 1500 | The event log file is corrupt. | | 1501 | No event log file could be opened, so the event logging service did not start. | | 1502 | The event log file is full. | | 1503 | The event log file has changed between reads. | | 1700 | The string binding is invalid. | | 1701 | The binding handle is not the correct type. | | 1702 | The binding handle is invalid. | | 1703 | The RPC protocol sequence is not supported. | | 1704 | The RPC protocol sequence is invalid. | | 1705 | The string universal unique identifier (UUID) is invalid. | | 1706 | The endpoint format is invalid. | | 1707 | The network address is invalid. | | 1708 | No endpoint was found. | | 1709 | The timeout value is invalid. | | 1710 | The object universal unique identifier (UUID) was not found. | | 1711 | The object universal unique identifier (UUID) has already been registered. | | 1712 | The type universal unique identifier (UUID) has already been registered. | | 1713 | The RPC server is already listening. | | 1714 | No protocol sequences have been registered. | | 1715 | The RPC server is not listening. | | 1716 | The manager type is unknown. | | 1717 | The interface is unknown. | | 1718 | There are no bindings. | | 1719 | There are no protocol sequences. | | 1720 | The endpoint cannot be created. | | 1721 | Not enough resources are available to complete this operation. | | 1722 | The RPC server is unavailable. | | 1723 | The RPC server is too busy to complete this operation. | | 1724 | The network options are invalid. | | 1725 | There is not a remote procedure call active in this thread. | | 1726 | The remote procedure call failed. | | 1727 | The remote procedure call failed and did not execute. | | 1728 | A remote procedure call (RPC) protocol error occurred. | | 1730 | The transfer syntax is not supported by the RPC server. | | 1732 | The universal unique identifier (UUID) type is not supported. | | 1733 | The tag is invalid. | | 1734 | The array bounds are invalid. | | 1735 | The binding does not contain an entry name. | | 1736 | The name syntax is invalid. | | 1737 | The name syntax is not supported. | | 1739 | No network address is available to use to construct a universal unique identifier (UUID). | | 1740 | The endpoint is a duplicate. | | 1741 | The authentication type is unknown. | | 1742 | The maximum number of calls is too small. | | 1743 | The string is too long. | | 1744 | The RPC protocol sequence was not found. | | 1745 | The procedure number is out of range. | | 1746 | The binding does not contain any authentication information. | | 1747 | The authentication service is unknown. | | 1748 | The authentication level is unknown. | | 1749 | The security context is invalid. | | 1750 | The authorization service is unknown. | | 1751 | The entry is invalid. | | 1752 | The server endpoint cannot perform the operation. | | 1753 | There are no more endpoints available from the endpoint mapper. | | 1754 | No interfaces have been exported. | | 1755 | The entry name is incomplete. | | 1756 | The version option is invalid. | | 1757 | There are no more members. | | 1758 | There is nothing to unexport. | | 1759 | The interface was not found. | | 1760 | The entry already exists. | | 1761 | The entry is not found. | | 1762 | The name service is unavailable. | | 1763 | The network address family is invalid. | | 1764 | The requested operation is not supported. | | 1765 | No security context is available to allow impersonation. | | 1766 | An internal error occurred in a remote procedure call (RPC). | | 1767 | The RPC server attempted an integer division by zero. | | 1768 | An addressing error occurred in the RPC server. | | 1769 | A floating-point operation at the RPC server caused a division by zero. | | 1770 | A floating-point underflow occurred at the RPC server. | | 1771 | A floating-point overflow occurred at the RPC server. | | 1772 | The list of RPC servers available for the binding of auto handles has been exhausted. | | 1773 | Unable to open the character translation table file. | | 1774 | The file containing the character translation table has fewer than 512 bytes. | | 1775 | A null context handle was passed from the client to the host during a remote procedure call. | | 1777 | The context handle changed during a remote procedure call. | | 1778 | The binding handles passed to a remote procedure call do not match. | | 1779 | The stub is unable to get the remote procedure call handle. | | 1780 | A null reference pointer was passed to the stub. | | 1781 | The enumeration value is out of range. | | 1782 | The byte count is too small. | | 1783 | The stub received bad data. | | 1784 | The supplied user buffer is not valid for the requested operation. | | 1785 | The disk media is not recognized. It may not be formatted. | | 1786 | The workstation does not have a trust secret. | | 1787 | The SAM database on the Windows NT Server does not have a computer account for this workstation trust relationship. | | 1788 | The trust relationship between the primary domain and the trusted domain failed. | | 1789 | The trust relationship between this workstation and the primary domain failed. | | 1790 | The network logon failed. | | 1791 | A remote procedure call is already in progress for this thread. | | 1792 | An attempt was made to logon, but the network logon service was not started. | | 1793 | The user's account has expired. | | 1794 | The redirector is in use and cannot be unloaded. | | 1795 | The specified printer driver is already installed. | | 1796 | The specified port is unknown. | | 1797 | The printer driver is unknown. | | 1798 | The print processor is unknown. | | 1799 | The specified separator file is invalid. | | 1800 | The specified priority is invalid. | | 1801 | The printer name is invalid. | | 1802 | The printer already exists. | | 1803 | The printer command is invalid. | | 1804 | The specified datatype is invalid. | | 1805 | The Environment specified is invalid. | 104
228 All Possible Windows Codes and Error Messages 1806-6118 | Code No. | Error Message | |
| 1806 | There are no more bindings. | | 1807 | The account used is an interdomain trust account. Use your global user account or local user account to access this server. | | 1808 | The account used is a Computer Account. Use your global user account or local user account to access this server. | | 1809 | The account used is an server trust account. Use your global user account or local user account to access this server. | | 1810 | The name or security ID (SID) of the domain specified is inconsistent with the trust information for that domain. | | 1811 | The server is in use and cannot be unloaded. | | 1812 | The specified image file did not contain a resource section. | | 1813 | The specified resource type can not be found in the image file. | | 1814 | The specified resource name can not be found in the image file. | | 1815 | The specified resource language ID cannot be found in the image file. | | 1816 | Not enough quota is available to process this command. | | 1817 | No interfaces have been registered. | | 1818 | The server was altered while processing this call. | | 1819 | The binding handle does not contain all required information. | | 1820 | Communications failure. | | 1821 | The requested authentication level is not supported. | | 1822 | No principal name registered. | | 1823 | The error specified is not a valid Windows RPC error code. | | 1824 | A UUID that is valid only on this computer has been allocated. | | 1825 | A security package specific error occurred. | | 1826 | Thread is not cancelled. | | 1827 | Invalid operation on the encoding/decoding handle. | | 1828 | Incompatible version of the serializing package. | | 1829 | Incompatible version of the RPC stub. | | 1898 | The group member was not found. | | 1899 | The endpoint mapper database could not be created. | | 1900 | The object universal unique identifier (UUID) is the nil UUID. | | 1901 | The specified time is invalid. | | 1902 | The specified Form name is invalid. | | 1903 | The specified Form size is invalid | | 1904 | The specified Printer handle is already being waited on | | 1905 | The specified Printer has been deleted | | 1906 | The state of the Printer is invalid | | 1907 | The user must change his password before he logs on the first time. | | 1908 | Could not find the domain controller for this domain. | | 1909 | The referenced account is currently locked out and may not be logged on to. | | 2000 | The pixel format is invalid. | | 2001 | The specified driver is invalid. | | 2002 | The window style or class attribute is invalid for this operation. | | 2003 | The requested metafile operation is not supported. | | 2004 | The requested transformation operation is not supported. | | 2005 | The requested clipping operation is not supported. | | 2202 | The specified username is invalid. | | 2250 | This network connection does not exist. | | 2401 | This network connection has files open or requests pending. | | 2402 | Active connections still exist. | | 2404 | The device is in use by an active process and cannot be disconnected. | | 3000 | The specified print monitor is unknown. | | 3001 | The specified printer driver is currently in use. | | 3002 | The spool file was not found. | | 3003 | A StartDocPrinter call was not issued. | | 3004 | An AddJob call was not issued. | | 3005 | The specified print processor has already been installed. | | 3006 | The specified print monitor has already been installed. | | 4000 | WINS encountered an error while processing the command. | | 4001 | The local WINS can not be deleted. | | 4002 | The importation from the file failed. | | 4003 | The backup Failed. Was a full backup done before ? | | 4004 | The backup Failed. Check the directory that you are backing the database to. | | 4005 | The name does not exist in the WINS database. | | 4006 | Replication with a non-configured partner is not allowed. | | 6118 | The list of servers for this workgroup is not currently available | 104
229 Start-up Applications START-UP APPLICATIONSDO YOU REALLY NEED ALL OF THEM? Presentation, format & comments Copyright © Paul Collins, 2001 - 2003Portions Copyright © Peter Forrest, Denny Denham, Sylvain Prevost, Tony KleinSoftware support by John MayerAll rights reserved 102
230 Cdrom Drive Does Not Read Disks Cdrom Drive Does Not Read Disks By: Randy McElveen
Things to try:
1) (If the drive was already installed and working before the problem developed move on to step 2.) If this is a newly installed drive be sure you have the jumpers set correctly on the back of the drive. If the drive does not share the ribbon cable with another drive then set the jumper to MASTER. If it does share the ribbon cable with another drive then you must set the jumper of drive on the end of the cable to MASTER and the jumper of the drive in the middle of the cable to SLAVE.
2) Try more than one CD to make sure it is not a smudge or scratch on the surface of the CD causing the problem.
3) Purchase a can of compressed air from any electronics store or electronics department of any large discount store. Open the tray and blow into the opening to clean dust off of the optics.
4) Use a cdrom drive cleaning kit to clean the drive. This kit will include a cleaning cd with small brushes on the bottom. If you smoke around your computer you may have to clean it many times.
5) If all else fails, remove and disassemble the drive and clean the optics with a cotton swab and distilled water. WARNING: UNPLUG THE COMPUTER BEFORE TAKING OUT THE DRIVE. 106
231 Windows 98's System File Checker Windows 98's System File Checker by: Randy McElveen
Windows 98 comes with a handy utility for checking the system files for corruption or absent files and extracting the needed files from your Windows CD. To use it, click START then RUN then type: "SFC" without the quotation marks. Click OK.
If you know the file you need just choose to extract a single file and enter the name of the file. You can also choose to scan all of Windows for missing or corrupted system files. 108
232 Windows XP's System File Checker Windows XP's System File Checker by: Randy McElveen
Windows XP comes with a handy utility for checking the system files for corruption or absent files and extracting the needed files from your Windows CD. To use it, click START then RUN then type: "SFC" without the quotation marks. Click OK. Let Windows do the rest. Note: If you are asked for your Windows XP install CD, you must insert it. 108
233 Basic Network Troubleshooting Check out this great article on troubleshooting your network. http://www.busan.edu/~nic/networking/tcpip/ch11_01.htm 107
234 History of the Emoticon An emoticon, also called a smiley, is a sequence of ASCII printable characters used to represent a human face and express an emotion. Emoticons that express happy or positive emotions are typically classified as smileys. Emoticons are commonly used in email messages, in bulletin boards, or in chat. Emoticon is a comparative neologism. It is a portmanteau word based on emotion and icon. History The creator of the original ASCII emoticons ":-)" and ":-(" was Scott Fahlman; the original proposal made by Fahlman on CMU CS general board on September 19, 1982 (at 11:44) was retrieved from old backup tapes on September 10 2002 by Jeff Baird. The earliest known non-ASCII emoticons were used in the PLATO IV program as early as 1972, which allowed users to type multiple text characters "on top" of each other. Many combinations of ordinary text characters were known to produce face-like patterns, which were used as emoticons. Purposes Emoticons have developed over the years as a replacement for facial expressions and emotions, as a way to cope with the limitations of being forced to communicate in text only, without misunderstandings due to the lack of information. Books have been written on this subject, with endless listings of a multitude of emoticons. In an Internet forum, emoticons are often automatically replaced with small corresponding images. In some versions of Microsoft Word, the AutoCorrect feature recognizes basic smilies such as :) and :( Western style To more easily recognise them, put your head on either your left or right shoulder, depending on whether the "top" of the emoticon is on the left or the right. Basic examples :-) or :) or =) smile (a smiley) rarely (: never =-) :-( or )-: or :( frown: sadness or sympathy :/ somewhat unhappy/discontent :| serious :-D or :D wide grin :-P or :p tongue sticking out: joke or sarcasm ;-) or (-; or ;) wink B-) or 8-) has (sun)glasses: looking cool :-o or :o expresses surprise :-7 tongue in cheek (rare) XD laugh :\/ big mouth Variants There are endless possibilities, because people are very good at creating and interpreting pictures as faces. See ASCII art. A few people turn the smiley around, a "left handed" smiley (: This left-handed smiley can sometimes cause miscommunication though, since some hardcore netaddicts tend to drop the : representing the eyes [leaving ) instead of :) ] so what you intendend like a smile could be interpreted as a frown. Generally people who communicate this way a lot subconsciously think: "Caption close = smile Caption open = sad face" As more of a joke than anythingbut also as a political statement"frownies", the symbol :-(, were trademarked by Despair, Inc. in U.S. Trademark Serial No. 75502288, Registration No. 2347676. The trademark applies only to "Printed matter namely, greeting cards, posters and art prints". In January 2001 Despair issued a satirical press release in which it was announced that the company would be suing "over 7 million internet users" who had infringed their trademark. They subsequently issued another press release a month later in response to the reaction their claim had generated. Detailed emoticons =8-0 fright =8-@=(&) one with a tapeworm (credited to Dave Barry) d:^) baseball player +-<:-) The pope *<|:o)> or Santa Claus *<|:{ ) 7:^] Ronald Reagan @@@@:^) Marge Simpson (___8(V) or Homer Simpson (_8(I) Head and hands emoticons These emoticons aren't rotated, they include the letter "o" for a human head, and slashes and backslashes for the arms. o/ or \o waving o\ or /o scratching one's head /o\ despair \o/ joy East Asian style Some users from East Asia, North America and Europe also use the "Japanese emoticons", which can be understood without turning one's head to the left. It's usually in the format of ?_?, where the superscripts indicate the eyes, and the in-between character, usually an underscore, is the mouth. When a period is used for the mouth, it is often meant to make the person look cuter. Basic examples ^_^ or ^.^ smiley ~_~ or ~.~ content `_^ or `.^ or ?_^ wink >_< or >.< angry ^o^ excited \^o^/ very excited (raising hands into the air) *_* or *.* starry eyed (amazed) -_- or -.- annoyed (trying to hide annoyance) ;_; or ;.; crying T_T or T.T flowing tears o_O or O_o or O.o or o.O surprise O_O or O.O big surprise @_@ or @.@ confused Complex example =^.^= blushing, or a cat face (mischievous) <<@_@>> drunk with vertigo ...~*.*~... girl with braids ~~~~>_<~~~~ weeping horribly ^_^; or ^.^; small sweatdrop (embarrassed) ^_^U or ^.^U huge sweat drop (anime-like) ^_^a scratching head /*^_^*\ Sailor Moon Kirby series Q(Q) Boxing Kirby O-(Q) Kirby taking a punch O*'Q) Kirby blocking q() Thumbs down Kirby ()b Thumbs up Kirby <^>('.')<^> Kirby giving the two Middle finger Salute <(^ ^)> Happy Kirby (* *) or (x x) Dead Kirby <(o 0)> Confused Kirby t(t) Kirby giving the Middle finger Content Provided by Wikipedia 11
235 What is Spyware? Strictly defined, spyware is computer software that gathers information about a computer user without the user's knowledge or informed consent, and then transmits this information to an organisation that expects to be able to profit from it in some way. Data collecting programs installed with the user's knowledge are not, properly speaking, spyware, if the user fully understands what data is being collected and with whom it is being shared. More broadly, the term spyware is applied to a wide range of related malware products which are not spyware in the strict sense. These products perform many different functions, including the delivery of unrequested advertising (pop-ups in particular), harvesting private information, re-routing page requests to illegally claim commercial site referral fees, and installing stealth phone dialers. Content Provided by Wikipedia 11
236 What is "file sharing" software? File-sharing software is used to directly or indirectly transfer files from one computer to another over the Internet, over a smaller Intranet, or across simple networks following the peer-to-peer (P2P) model. File-sharing programs A variety of file-sharing programs is available on several different networks. Availability depends partly on operating system, and different networks have different features (for example, multiple-source downloads, different sorts of search limiting, and so on). It is common for commercial file sharing clients to contain abrasive advertising software, or spyware. File-sharing dynamics There are several major topics surrounding file sharing. Of them, the two primary dynamics are the benefits and drawbacks of Centralization vs Decentralization and Privacy / Anonymity, especially vs copyright protection and file-sharing legality. As well as the problem of spyware, a method for the companies that produce peer-to-peer programs to make money on their product. It is these pulls which have defined several themes of software. In the early days, client software was protocol-specific, so you had "Napster" clients, and you had "Gnutella" clients. There is an everpresent push towards making the GUI-side of things capable of using multiple protocols. After all, why should a user have to load up several different applications to do what is, in their mind, the same thing? In cases where there is perceived value in collecting, some people will have lots to share and will find themselves surrounded by eager people. This can cause problems when the collector cannot keep up with demand. Decentralization is one means to alleviate this problem, especially in cases where it is possible to ensure that multiple copies of a popular item are available from multiple sources (even simultaneously, as with multi-source downloading). Concepts like hoarding come about where the one centralized person will collect and will not later freely give away what was given. Barter and ratio systems evolve in order to reduce the impact of hoarding. Under these systems, a person will only share when they can expect to get something in return. Privacy concerns The concept of being tagged and tracked is one which has been a reality for some time. Personally identifiable information is legally associated with a person's actions in order to verify their identity. Think credit cards: these have to be associated with the purchaser, otherwise the credit card couldn't send a bill for those purchases. This concept has also entered into the computer world, and many people are fearful of advertisers tracking their virtual "movements". While advertisers claim that this is to target more applicable or interesting ads, many people argue that they never want to see another ad again, and certainly don't want to be tracked without explicit permission. This desire for anonymity has spilled into file sharing such that some clients have encryption and obfuscation functionality to protect their users. Concepts such as decentralization and trust have also been used as a means of hiding the identity of users. Early models for file sharing Napster, originally a centralized service, was the first major file-sharing tool and popularized file sharing for the masses. Napster was an MP3-only sharing system and was successfully shut down by legal attacks from the music industry. It was openly attacked by some artists (notably Dr. Dre, Metallica) and supported by others (Limp Bizkit, Courtney Love, Dave Mathews). Napster was a localized index for MP3 files shared by the users logged into the system. It included IRC-like chat and instant messenger features. Almost all new, major clients now follow its example in design. Even before its legal problems, the community created an alternative: OpenNap. A reverse-engineered version of the Napster protocol, it was released as the open source server alternative for Napster users. These networks continue to exist even after Napster's collapse and many clients using this protocal have appeared, particularly with the help of the Napigator server list - an effort to centralize all of the different servers and networks. Afterwards, Gnutella, a decentralized network, appeared. This service was fully open-source and allowed users to search for almost any file type; users could find more than just MP3s on these networks. It was created/supported in response to threats towards centralized bodies like Napster. The thought behind decentralization is that no one broken link can bring about the downfall of all members. But Gnutella has experienced growing pains since its use skyrocketed. Napster and Gnutella continue to define file sharing today, forming the extreme at both ends of the law in the wake of a series of civil lawsuits filed against computer users by the RIAA (which began in September, 2003). Gnutella, a free and open protocol and service, with it's lawless structure but poor scalability, while Napster having been resurrected as a legal online music service that competes with other such legal services as iTunes and Rhapsody. Most file-sharing systems since have sought to ride the line between these two extremes. File sharing and copyright Anonymous, Internet file sharing (such as Gnutella and Napster) grew in popularity with the proliferation of high speed Internet connections and the (relatively) small and high quality MP3 audio format. Although file sharing is a legal technology with legal uses, some people (in practice, the great majority of users) have used it to download copyrighted materials. This has led to counter-attacks against file sharing in general from some copyright owners. There has been a great discussion over perceived and actual legal issues surrounding file sharing. In circumstances where trading partners are in different countries with different legal codes, there are significant problems to contend with. What if a person in Canada wishes to share a piece of source code which, if compiled, has encryption capabilities? In some countries, a citizen may not request or receive such information without special permission. Throughout the past three years, the entire file-sharing community has been in a state of flux, since record companies and RIAA try to shut down as much of this as possible. Even though they have forced Napster into cooperating against copyright violations, they are way behind, since the community has flourished and produced lots of different clients, though not as many different underlying protocols. The second generation of P2P protocols, such as Freenet are not as dependent as Napster is on a central server, making it much harder to shut down these systems through court actions. Another attempt (used by the maintainers of KaZaA) is to change the company's organization so that it is impossible or useless to attack it legally. Decentralization has been widely pushed over the fear of having a centralized network attacked, either by legal disputes or hostile users. One argues that a decentralized network has no body to attack, only individual ethereal members. While the foundation protocol of the Internet TCP/IP was designed to be robust and withstand concerted attack, file-sharing and peer-to-peer systems are proving even stronger. So today we are left with a slew of clients with functionality designed around making sharing files more effective, both in the real sense of uploading and downloading (like anti-hoarding functions) and in the more ethereal sense of being bulletproof towards legal issues (as with anonymity and decentralization). List of file-sharing utilities FTP File Transfer Protocol Kermit Operating System File-Sharing Protocols Network File System (NFS) Samba or Server message block (SMB) Appleshare Operating System File-Sharing Servers Windows 2000 Server Linux Novell Mac OS Server HTTP Servers Apache HTTP Server IIS Microsoft Internet Information Services User agents Mozilla, IE, Konqueror, etc. User agents Mozilla CuteFTP IRC Depot channels Hotline OpenNap protocol Directory servers OpenNap Server User agents Napster Gnapster WinMX Gnutella BearShare Gnucleus Limewire Morpheus Shareaza XoloX Bit Torrent (decentralized dynamic network of users) Freenet protocol Espra Audiogalaxy iMesh Direct Connect NeoModus Direct Connect DC++ BCDC++ CZDC++ FastTrack protocol KaZaA Grokster OpenFT protocol giFT eDonkey protocol eDonkey2000 eMule mlDonkey Overnet SoulSeek Categories of clients: Centralized Clients: OpenNap Benefits: Faster searching and downloading Negatives: Often more vulnerable to legal and DDOS attacks Decentralized Clients: Gnutella Benefits: Usually more reliable and rarely shut down Negatives: Generally slower than centralized systems Decentralized Tracker-Based Clients: Bittorrent Benefits: Very fast due to concentration of bittorrent networks on a single file, is principally used to offer new, large files for download Negatives: Not centrally searchable, tracker sites are often closed down or fail, not truly anonymous Multi-Network Clients Benefits: allows connection to more than one network, almost always on the client side. Negatives: often playing catch-up to individual networks' changes and updates. Private File-Sharing Networks Communities and external links Portals Peertal - Peertal is a comprehensive, frequently updated news site on P2P-related issues, with a non-technical focus. It uses PHP-Nuke, a Slashdot-like weblog engine. Syndicates infoAnarchy content. Zeropaid.com - Covering file-sharing and copyright issues along with new and established clients by popularity, size, platform, and more. Slyck.com - Covering file-sharing and copyright issues along with new and established clients by popularity, size, platform, and more. Dimension Music - Dimension is a good source for news on digital music and file sharing in general. GnutellaNews - News about new Gnutella clients and general P2P-news. Part of Dimension Music. Gnutella.co.uk - A frequently updated news site specifically for Gnutella clients. Go there if you want to know which ones have been most recently updated. OpenP2P - O'Reilly's Peer-to-Peer portal with news and papers. Interesting for developers and businesses. Hack the Planet - Wes Felter comments frequently on P2P-related issues in his weblog. Viva HX! - All the Hotline-related news you can ask for. ShareReactor - A Web Site that helps download confirmed, public files from the Multisource File Transfer Protocol used by such programs as Edonkey2000 and eMule. Sharelive.com - A Web Site that helps download confirmed, public files from multiple networks. Peer to Peer guide for the Mac with overview of p2p-clients for MacOS X Music Target - List of file-sharing clients InfoAnarchy - File Sharing / Anonymity Tools - Reviews and forums Mailing lists decentralization - Implications of the end-to-end principle - A mailing list exclusively devoted to the architecture of P2P-systems, with a lot of traffic and interesting ideas passed around. Founded by Lucas Gonze, with lots of high-profile subscribers from the P2P field. Open since July 2000, and still running past Nov 2002. The GDF - The Gnutella Developer Forum is a group for discussing extensions of the Gnutella protocol. It is the largest standards body for the Gnutella network, and anyone working on a servant should be a member. P2P Hackers - A general mailing list about peer-to-peer software development. Newsgroups news://alt.gnutella news://alt.internet.p2p news://franklin.oit.unc.edu/bluesky Papers, Articles and Infant Projects A Method of Free Speech on the Internet: Random Pads (by David A. Madore) - Discusses how information can be completely separated from its creators by XORing it with chunks of random data. The resulting "pads" can then be distributed across so-called "pad archives". A pad archive neither knows what it is hosting nor does it host provably controversial data, since the data cannot be distinguished from noise. It's mainly a legal question: If the courts would outlaw hosting random data, it wouldn't work. Other than that, it's pretty safe -- interesting read, and there are already quite a lot of pad archives (thanks to Slashdot). SafeX - Secure and Anonymous File EXchange. Just a draft with many interesting ideas to use in other projects. The Free Haven Project - Similar goals to Freenet, with different solutions. Some interesting papers. Not much code yet. OceanStore - OceanStore is "designed to span the globe and provide continuous access to persistent information". "Data is protected through redundancy and cryptographic techniques. To improve performance, data is allowed to be cached anywhere, anytime. Additionally, monitoring of usage patterns allows adaptation to regional outages and denial of service attacks; monitoring also enhances performance through pro-active movement of data. A prototype implementation is currently under development." Fling | Sourceforge page - An attempt to provide anonymity on the protocol level (i.e. replace TCP/IP). Still in the planning stages as of Nov 2002. Ben Houston's P2P Idea Page - Ben Houston has written a lot of interesting analyses of distributed systems, among them proposals for more efficient, self-organizing and self-optimizing networks. The Eternity Service by Ross Anderson - This paper is a rather simple suggestion for a redundant, anonymous storage system with payment features. Intermemory Project - Aims to create "large-scale, self-organized, survivable, available, and secure widely-distributed storage". See papers. Who's on First Proposal - This page introduces the Who's On First (WOF) anonymous network, which is the working title of a proposal for a more flexible and reliable anonymous communication network than that provided by current Type I and II remailers. JetFile - Proposal for a scalable distributed file system (some parts are centralized). Content Provided by Wikipedia 11
237 What is an "MP3"? MP3 (or, more precisely, MPEG-1/2 Audio Layer 3) is an audio compression algorithm capable of greatly reducing the amount of data required to reproduce audio, while sounding like a faithful reproduction of the original uncompressed audio to the listener. History The MPEG-1/2 Layer 2 encoding started as the Digital Audio Broadcast (DAB) project initiated by Fraunhofer IIS-A. This project was financed by the European Union as a part of the EUREKA research program where it was commonly known as EU-147. EU-147 ran from 1987 to 1994. In 1991 there were two proposals available: Musicam (known as Layer II) and ASPEC (Adaptive Spectral Perceptual Entropy Coding) (with similarities to MP3). Musicam was chosen due to its simplicity and error resistance. A working group around Karlheinz Brandenburg and Jurgen Herre took ideas from Musicam, from ASPEC and own ideas and created MP3, which was designed to achieve the same quality at 128 kbit/s as MP2 at 192 kbit/s. Both algorithms were finalized in 1992 as part of MPEG-1, the first phase of work by MPEG, which resulted in the international standard ISO/IEC 11172-3, published in 1993. Further work on MPEG Audio was finalized in 1994 as part of the second phase, MPEG-2, which resulted in the international standard ISO/IEC 13818-3, originally published in 1995. Compression efficency of lossy encoders is typically defined by the bitrate, because compression rate depends on bit depth and sampling rate of the input signal. Nevertheless there are often published compression rates, which are using the CD parameters as reference (44.1 kHz, 2x16 bit). Sometimes also the DAT SP parameters are used (48 kHz, 2x16 bit). Compression ratio for this reference is higher, which demonstrates the problem of the term compression ratio for lossy encoders. Karlheinz Brandenburg used Suzanne Vega's CD Tom's Diner as his model for the mp3 compression algorithm. This CD was chosen because of its softness and simplicity, making it easier to hear imperfections in the compression format during playbacks. FhG official webpage publish the following compression ratios and data rates for MPEG-1 Layer 1, 2 and 3: Layer 1: 384 kbit/s, compression 4:1 Layer 2: 192...256 kbit/s, compression 6:1...8:1 Layer 3: 112...128 kbit/s, compression 10:1...12:1 These values are more or less public relation values, because the quality depends not only on the encoding file format, but also on the quality of the psycho acoustic of the encoder. Typical layer 1 encoders use a very simple psycho acoustic which result in a higher needed bitrate for transparent encoding. Layer 1 encoding at 384 kbit/s even with this simple psychoacoustic is better than Layer 2 at 192...256 kbit/s Layer 3 encoding at 112...128 kbit/s is worse than Layer 2 at 192...256 kbit/s. More realistic bitrates are: Layer 1: excellent at 384 kbit/s Layer 2: excellent at 256...320 kbit/s, very good at 224...256 kbit/s, good at 192...224 kbit/s, should not be used below 160 kbit/s Layer 3: excellent at 224...256 kbit/s, very good at 192...224 kbit/s, good at 160...192 kbit/s, should not be used below 128 kbit/s Comparing a new file format typically is done by comparing a medium quality encoder of the old format and a highly tuned encoder of the new format. The algorithm of the MP3 format uses, at its heart, a hybrid transform to transform a time domain signal into a frequency domain signal: 32 band polyphase quadrature filter 36 or 12 Tap MDCT, size can be selected independent for subband 0...1 and 2...31 alias reduction postprocessing In terms of the MPEG specifications, AAC from MPEG-2 is to be the successor of the MP3 format. In practice, however, due to numerous patenting and licensing issues with various parts of the MPEG specifications, Ogg Vorbis seems positioned to be the mostly likely successor to MP3 as the popular format for audio interchange. Ogg Vorbis is also the format used for sounds in the Wikipedia. MP2 and MP3 hit the Internet In October 1993, MP2 (MPEG-1 Audio Layer 2) files appeared on the Internet and were often played back using Xing MPEG Audio Player, and later in a program for UNIX by Tobias Bading called MAPlay initially released on Feb 22 1994. (MAPlay was also ported to Microsoft Windows.) Initially the only encoder available for MP2 production was the Xing Encoder, accompanied by the program CDDA2WAV, a CD ripper that copied CD audio to hard disks. Beginning in the first half of 1995, MP3 files, file representations of MPEG-1 Audio Layer III data, began flourishing on the Internet. Its popularity begat such companies and software packages as Nullsoft's Winamp, mpg123 and the now Bertelsmann-owned Napster. Quality of MP3 audio Many listeners accept the MP3 bitrate of 128 kilobits per second (kbit/s) as near enough to CD quality; this provides a compression ratio of approximately 11:1, although listening tests show that with a bit of practice, most listeners can reliably distinguish 128 kbit/s MP3s from CD originals. To many other listeners, 128 kbit/s is unacceptably low quality, which is unfortunate since many commonly-available encoders set this as their default bitrate. Possible encoders: ISO dist10 reference code: Worse quality, invalid MP3 files (all audio blocks are marked as corrupted) Xing: mainly based on ISO code, quality similar to ISO dist10 Blade: quality similar to ISO dist10 FhG: Some of them are good, some have really nasty bugs ACM Producer Pro: Some versions generate annoying artefacts L.A.M.E. (a recursive acronym for "Lame Ain't an MP3 Encoder," founded by Mike Cheng in early 1998) - started life as a GPL'd patch against the dist10 ISO demonstration source, and thus was incapable of producing an mp3 stream or even being compiled by itself. But in May 2000, the last remnants of the ISO source code were replaced, and now LAME is the source code for a fully LGPL'd MP3 encoder, with speed and quality to rival all commercial competitors! Lame development at Sourceforge A Windows frontend for the LAME Encoder can be found at http://jthz.com/mp3/ (the people of JTHZ.com have been working with LAME since 1998) --alt-preset: Alternative presets by Dibrom with good quality at medium bitrates. Dibrom is the nickname of a heavy-metal-music fan, who founded http://hydrogenaudio.org/ and introduced some commandline preferences to the LAME developers (now included in the source-code). Quality of MP3 depends on quality of encoder and the difficulty of the signal which must be encoded. Good encoders gave acceptable quality at 128...160 kbit/s, nearly transparence is achieved at 160...192 kbit/s. Low quality encoders never reach nearly transparence mode, not even at 320 kbit/s. So it is pointless to speak of 128 kbit/s or 192 kbit/s quality. A 128 kbit/s MP3 encoded with a good encoder might sound better than a 192 kbit/s MP3 file encoded with a bad encoder. An important feature of MP3 is that it is lossy -- meaning that it removes information from the input in order to save space. As with most modern lossy encoders, MP3 algorithms work hard to ensure that the sounds it removes cannot be detected by human listeners, by modelling chacteristics of human hearing such as noise masking. However, experienced listeners can tell the difference from the original at 192 kbit/s, and even at 256 kbit/s on some of the less powerful (and obsolete) encoders. If your aim is to archive sound files with no loss of quality, you may be more interested in lossless audio compression such as FLAC, SHN, or LPAC -- these will generally compress a 16-bit PCM audio stream to approximately 50-75% of the original size (depending upon the characteristics of the audio itself). Bit Rate The bit rates, i.e. number of binary digits streamed per second, is variable for MP3 files. The general rule is that the higher the bitrate, the more information is included from the original sound file, and thus the higher is the quality of played back audio. In the early days of MP3 encoding, a fixed bit rate was used for the entire file. Bit rates available in MPEG-1 layer 3 are 32, 40, 48, 56, 64, 80, 96, 112, 128, 160, 192, 224, 256 and 320 kbit/s (103- bits per second), and the available sample frequencies are 32, 44.1 and 48 kHz. 44.1 kHz is almost always used as this is the audio CD frequency, and 128 Kbit is some sort of de facto "good enough" standard. MPEG-2 and (non-official) MPEG-2.5 adds more bitrates: 8, 16, 24, 32, 40, 48, 56, 64, 80, 96, 112, 128, 144, 160 kbit/s. However, audio in MP3 files are divided into chunks called frames, which all have a bitrate marker, so it is possible to change the bitrate dynamically as the file is played. This technique makes it possible to use more bits for parts of the sound with high dynamics (much "sound movement") and less bits for parts with low dynamics. Some encoders utilize this possibility to greater or lesser extent. Design bugs of MP3 There are several flaws in the MP3 file format, which can't be fixed by a good encoder. This flaws are inherent properties of the MP3 file format. time resolution is too low for highly transient signals (AAC, Vorbis) encoder/decoder overall delay is not defined (Vorbis) no scaleband factor for frequencies above 15.5/15.8 kHz (AAC, Vorbis) joint stereo is done on a frame base (AAC, Vorbis) bitrate is limited to 320 kbit/s (AAC, Vorbis) In parentheses are the file formats where this bug is fixed. Encoding of MP3 audio The MPEG-1 standard does not include a precise specification for an MP3 encoder. The decoding algorithm and file format, as a contrast, are well defined. Implementors of the standard were supposed to devise by themselves algorithms suitable for removing parts of the information in the raw audio (or rather its MDCT representation in the frequency domain). This process is typically based on psycho-acoustic coding, i.e., you remove things that a human listener will not notice anyway by modeling our audio perception system (both in our ears and in our brain). As a result, there are many different MP3 encoders available, each producing files of differing quality; as of September 30, 2001, the best encoder at high bitrates (128 kbit/s and up) is LAME, and the better one at low bitrates alledgedly is Fraunhofer's own encoder, although opinions vary. MP3 decoding, however, is carefully defined in the standard. Most decoders are "bitstream compliant", meaning that they will each produce exactly the same uncompressed output from a given MP3 file. ID3 See main article ID3 ID3 is a tagging format that allows information such as the title, artist, album, or track number of the MP3 to be added to the file. Alternatives to MP3 Many other lossy audio codecs exist, including: Ogg Vorbis from the Xiph.org Foundation, a free software codec. mp3PRO from Thomson Multimedia; MPC which uses Huffman coding; MPEG-1/2 Audio Layer 2 (MP2), MP3's predecessor; MP+, a derivative of MP2; MPEG-4 AAC, used by LiquidAudio and Apple Computer's iTunes Music Store; ATRAC, used in Sony's Minidisc; AC-3, used in Dolby Digital and DVD; QDesign, used in QuickTime at high bitrates; Windows Media Audio (WMA) from Microsoft; RealAudio from RealNetworks; mp3PRO, MP3, AAC, and MP2 are all members of the same technological family and depend on roughly similar psychoacoustic models. The Fraunhofer Gesellschaft owns many of the basic patents underlying these codecs, with Dolby Labs, Sony, Thomson Consumer Electronics, and AT&T holding other key patents. There are also some non-lossy (lossless) audio compression methods used on the internet. While they are not similar to MP3, they are good examples of other compression schemes available. These include: SHN FLAC Monkey's Audio MP3, which was designed and tuned for use alongside MPEG-1/2 Video, generally performs poorly on monaural data at less than 48 kbit/s or in stereo at less than 80 kbit/s. Though proponents of newer codecs such as WMA and RealAudio have asserted that their respective algorithms can achieve CD quality at 64 kbit/s, listening tests have shown otherwise; however, the quality of these codecs at 64 kbit/s is definitely superior to MP3 at the same bandwidth. Thomson claims that its mp3PRO codec achieves CD quality at 64 kbit/s, but listeners have reported that a 64 kbit/s mp3PRO file compares in quality to a 112 kbit/s MP3 file and does not come reasonably close to CD quality until about 80 kbit/s. The Xiph.org Foundation, the developers of the Vorbis algorithm used in the new Ogg format, claims that Vorbis somewhat exceeds MP3 and WMA sound quality while infringing no patents, and provides a web page with listening tests to demonstrate this. Licensing and patent issues Thomson Consumer Electronics controls licensing of the MPEG-1/2 Layer 3 patents in countries such as the United States of America and Japan that recognize software patents. Thomson Consumer Electronics has decided to cash in on the patents. In fact Microsoft, the makers of the Windows operating system, chose to move away from MP3 to their own proprietary Windows Media formats to avoid any patent implications. For information about the costs see [1] and [2]. In spite of these threats, the perpetuation of the MP3 format continues; the reasons for this appear to be the network effects caused by: people's familiarity with the format, the large quantity of music now available in the MP3 format, the wide variety of existing software and hardware that takes advantage of the file format that revolutionized the music industry and copyright law. Content Provided by Wikipedia 11
238 What is AOL Instant Messenger or AIM? The AOL Instant Messenger (AIM) is a free instant messaging computer program, published by AOL, which uses the OSCAR instant messaging protocol and the TOC protocol. The most recent software version is AIM 5.5, released in Feburary of 2004. AOL has described this technology as a means of "immediate cross-Internet communication". [1] It allows users to communicate instantly through text to their "buddies" around the world, provided they have the AIM software. AIM has 100 million users, with a large proportion using Internet slang. Advocates claim that it's easy to locate these users by visiting chatrooms that AOL has set up solely for those purposes. Chat topics range from *NSYNC to current affairs. AOL also has a member directory where AIM users can locate others online who share their interests. Since version 2.0, AIM has included person-to-person text messaging, chatroom messaging, and the ability to share files peer-to-peer with your buddies. Unlike Napster, and other peer-to-peer software, there is no directory of files, only direct person-to-person transfer of files, protecting AOL from intellectual property lawsuits. Somewhere in the 4.x series, the AIM client for Microsoft Windows added the ability to play games against one another. Recent (4.3 and later) versions of the client software store your contact information on AOL's servers, so you can talk to up to 200 of your buddies from any computer with Internet access. Stand-alone official AIM client software is available for free (but is not free software in the GNU sense) for Microsoft Windows, Mac OS, Linux, Windows CE, and Palm OS. However, some users stay on the 3.0 series because the software license agreement for 4.0 and later clients includes a clause prohibiting the user from ever using a third-party client program. There is also a client called AIM Express implemented as an applet for the Java platform that runs in your web browser. AIM Express does not have all the features of stand-alone AIM clients (such as file transfer, buddy icons, and away messages), but it still allows the basic functions of person-to-person text messaging. The standard protocol that AIM clients use to communicate is called OSCAR. AIM Express uses another protocol called TOC. TOC has also been made available to the public, in an attempt to throw a bone to third-party client developers and lure them away from OSCAR. This scheme has not been entirely successful. Because AOL wants to be able to serve advertisements to users, AOL has continually changed the details of the OSCAR protocol to keep third-party clients such as Trillian from working properly. This has resulted in a cat-and-mouse game between AOL and the client developers. Apple Computer's iChat AV software for Mac OS X was the first AIM-compatible client to allow for audio and video conferencing over the AIM protocol. It was released in June, 2003. In February, 2004, AIM 5.5 was released, allowing Windows users to video conference with each other and with Mac iChat users. Unfortunately, AIM 5.5 did not allow audio-only chats as iChat AV does. Content Provided by Wikipedia 11
239 What is an e-card or ecard? An E-card is a postcard, sent by means of the Internet, usually through email. A user sending an e-card to a person would select a pre-written card style with image and message, and would add their own personal message, and specify the recipient's email address. On sending the card, the recipient would receive an email with a link to the ecard provider's webpage, and this link would go to the ecard as a webpage, with the sender's personal message and card. Note that the actual card is not usually sent through the email, but only a link to the card hosted as a website. The site BlueMountain.com used to be a free service predominantly for the use of ecards, however it has become commercial. With the changing perceptions and uses for emails, the use of e-cards has fallen somewhat. Content Provided by Wikipedia 11
240 What is a chatroom or chat room? A chat room is an online forum where people can chat online (talk by broadcasting messages to people on the same forum in real time). Sometimes these forums are moderated (where only certain people are allowed to speak), but usually not. Chat systems include Internet Relay Chat (where rooms are called "channels"), Jabber, and several proprietary systems implemented on the Microsoft Windows and Java platforms. Some chat rooms go beyond text messages, and incorporate 2D and 3D graphics and avatars. One example of a 2D chat room is The Palace. Lesser known is the UNIX based talker and the French Minitel. Chat rooms are often confused (especially by the popular media) with discussion groups, which are similar but do not take place in real time and are usually run over the World Wide Web. Content Provided by Wikipedia 11
241 What is a search engine? A search engine is a program designed to help the user access files stored on a computer, for example a public server on the World Wide Web, by allowing to ask for documents meeting certain criteria (typically those containing a given word, a set of words, or a phrase) and retrieving files that match those criteria. Unlike an index document that organizes files in a predetermined way, a search engine looks for files only after the user has entered search criteria. In the context of the Internet, search engines usually refer to the World Wide Web and not other protocols or areas. Furthermore search engines mine data available in newsgroups, large databases, or open directories like DMOZ.org. Because the data collection is automated, they are distinguished from Web directories, which are maintained by people. The vast majority of search engine are run by private companies with the proprietary algorithm and closed database, the most popular currently being Google (with MSN Search and Yahoo! closely behind). There are several attemps to create an open-source search engine, among of which are Htdig, Nutch, Egothor and OpenFTS. [1] How search engines work Web search engines work by storing information about a large number of web pages which they retrieve from the WWW itself. These pages are retrieved by a web crawler -- an automated web browser which follows every link it sees. The contents of each page are then analyzed to determine how it should be indexed (for example, words are extracted from the titles, headings, or special fields called meta tags). This data about the web pages is stored in some form of an index database for use in later queries. Some search engines, such as Google, store all or part of the source page (referred to as a cache) in addition to the information about the web pages. When a user comes to the search engine and makes a query, typically by giving some key words, the engine looks up the index and provides a listing of best-matching web pages according to its criteria, usually with a short summary having at least the document's title and sometimes parts of the text. The usefulness of a search engine to most people is based on the relevance of results it gives back. While there may be millions of Web pages that include a particular word or phrase, often particular pages are more relevant, popular, or authoritative. Most search engines employ methods to rank the results to provide the "best" results first. How a search engine decides which pages are the best matches, and what order the results should be shown in, varies widely from one engine to another. The methods also change over time as Internet usage changes and techniques improve. Most Web search engines are commercial ventures supported by advertising revenue, and as a result some employ the controversial practice of allowing advertisers to pay money to have their listings ranked higher in search results. Internet History The first Web search engine was Lycos which started at Carnegie Mellon University as a research project in 1994. Soon after, many search engines vied for popularity and gained and lost top standing, such as WebCrawler, HotBot, Excite, Infoseek, Inktomi, and AltaVista. In some ways they competed with popular directories such as Yahoo!. Later, the directories integrated or added on search engine technology for greater functionality. Search engines were also known as some of the brightest stars in the Internet investing frenzy that occurred in the late 1990s. Several companies entered the market spectacularly, recording record gains during their initial public offerings. Prior to the Web, there were search engines for other protocols or uses, such as the Archie search engine for anonymous FTP sites and the Veronica search engine for the Gopher protocol. Osmar R. Zaiane's From Resource Discovery to Knowledge Discovery on the Internet details the history of search engine technology prior to the emergence of Google. Recent additions to the list of search engines include AlltheWeb, Ask Jeeves, Gigablast, Teoma, Wisenut, Kartoo, and Vivisimo. Google In around 2001, the Google search engine rose to prominence. Its success was based in part on the concept of link popularity and PageRank. Each page is ranked by how many pages link to it, on the premise that good or desirable pages are linked to more than others. The PageRank of linking pages and the number of links on these pages contribute to the PageRank of the linked page. This makes it possible for Google to first present pages that are highly linked to by quality websites. Another great factor in Google's success, and one aspect which spawned many offsprings, is the simplicity of its user interface. Researchers at NEC Research Institute claim to have improved upon Google's patented PageRank technology by using web crawlers to find "communities" of websites. Instead of ranking pages, this technology uses an algorithm that follows links on a webpage to find other pages that link back to the first one and so on from page to page. The algorithm "remembers" where it has been and indexes the number of cross-links and relates these into groupings. In this way virtual communities of webpages are found. Challenges faced by search engines The web is growing much faster than any present-technology search engine can possibly index (see distributed crawling). Many web pages are updated frequently, which forces the search engine to revisit them periodically. The queries one can make are currently limited to searching for key words, which may results in many false positives. Dynamically generated sites, which may be slow or difficult to index, or may result in excessive results from a single site. Many dynamically generated sites are not indexable by search engines; this phenomenon is known as the invisible web. Some search engines do not order the results by relevance, but rather according to how much money the sites have paid them. Some sites use tricks to manipulate the search engine to display them as the first result returned for some keywords. This can lead to some search results being polluted, with more relevant links being pushed down in the result list. Content Provided by Wikipedia 11
242 What is freeware or free ware? Freeware is computer software which is made available free of charge. Typically freeware is distributed without source code. Freeware usually carries a license that permits redistribution but may have other restrictions, such as limitations on its commercial use. The term was coined by Andrew Fluegelman when he wanted to distribute a communications program named PC-TALK that he had created but for which he did not wish to use traditional methods of distribution because of their cost. Previously, he held a trademark on the term "freeware" but this trademark has since been abandoned. Commercial vendors often release freeware as a loss leader to attract customers to other services or products available for a fee. Others release freeware because other methods of distribution are unlikely to make a profit or because the software is outdated and is no longer worth selling. Freeware is distinct from the following categories of software: Free software and open-source software. The word "free" in "free software" refers to freedom, not price; specifically, it refers to software whose license terms permit its use, modification and redistribution, with or without charge. The word "free" in "freeware" refers only to price. The word "gratisware" as a synonym for "freeware" makes this distinction clearer, but is not in common use. Crippleware, Shareware. Shareware is distributed similarly to freeware except that it requires payment after some trial period or for more features (the "full version"), in the case of crippleware. Adware. Adware is distributed similar to freeware, but it requires the user to view advertisements to use the software. Donationware. The authors of donationware ask that anyone using their software make a donation to the authors or to some third party such as a charity. Because the donation is optional, donationware may also be freeware or fall into some other category. Public domain software. Software in the public domain has no copyright and therefore may be distributed without charge. Freeware is usually copyrighted and its license may restrict certain activities. Abandonware. Abandonware is commercial software that has not been sold for a long time or whose copyright holder is defunct; it has been "abandoned". The licenses of most such software forbid redistribution or require payment, so distributing it violates the author's copyright (though there may be no author around to enforce it). "Legal abandonware" is a misnomer for commercial software that has been re-released by the copyright holder as freeware.] Postcardware. The software is essentially freeware, however the author requests that you send him a post card expressing thanks and enabling him to provide feedback to users. Content Provided by Wikipedia 11
243 What are warez or wares? Warez (a "leet" deformation of the word "wares") are distributions of copyrighted material traded in violation of the its copyright license, commonly found on the Internet, or historically, on the Bulletin board systems. The most common form of warez is computer software, and the act of distributing it is copyright infringement. Warez can also sometimes refer to unauthorized copies of music and/or multimedia, for example documentaries, movies and TV series. Most copyrighted software includes copy protection which is removed or circumvented ("cracking") to allow distribution as warez. The distribution of warez is illegal in many jurisdictions. Mere possession or use of warez are not crimes, although they may subject the user to civil penalties (see software piracy). The deliberate circumvention of software copyright protection is illegal in the United States under the Digital Millennium Copyright Act. People who infringe software copyrights are often called "pirates", figuratively referring to the pirates of ocean commerce. Well organized groups of software pirates in China and Russia have illegally produced millions of copies of copyrighted software, which if sold at retail would be worth several billions of dollars annually - however, it is unlikely that many of the purchasers of pirated software would have paid retail price for a legitimate copy, so the actual economic losses to software producers are far smaller. It must be added that in Russia, the copying of software is explicitly permitted by law when such software is not in the Russian language. In addition to organized groups of pirates who profit from illegal software redistribution, there also exist more or less organized groups of high-school or undergraduate students who also commit software piracy. The morality of software piracy is much more disputed than that of conventional property theft, and many warez groups view their actions as socially positive. Justifications include the alleged impossibility of copyright enforcement and the perceived injustice of not sharing information with those who could not afford to obtain it otherwise. Anti-warez groups like the Business Software Alliance reject those views, although they primarily target copyright violators with commercial interests. Some software companies have even been known to tolerate or encourage some piracy in difficult markets, in order to increase the value of their software through the network effect. Sometimes, in addition to the actual pirated data, the warez dealers distribute Free software and documentation, copyrighted works whose copyright license specifies that the work may be legally redistributed. The free software community generally doesn't have any relation to the warez scene. High school and college age pirates sometimes refer to themselves as 'warez d00dz', while others refer to them derogatorily as 'warez kiddies'. (See script kiddie). Among such groups, distribution of illegally copied programs on the same day as the commercial release ('0-day warez'), or even before ('negative-day warez'), is considered a social accomplishment. Beginning in the early 2000s, feature films have been frequently released by the groups prior to their official release. As of 2001, there were about 8 to 10 major warez networks. Some warez groups have included: DrinkOrDie, subject to raid in December 2001 RAZOR1911 TGW Myth FLT FairLight USA INC BSP FOSI Radium (Providing illegal copies of expensive audio applications) In early 2003, the house of David Rocci, owner of a warez news site called iSONEWS.com, was raided and the domain was taken over. The raid happened because Rocci was advertising the modchips he was selling on the web site; it had nothing to do with the fact that his site featured "releases" by "groups". The raid on the website infuriated many free speech activists. iSONEWS continues to operate at other domains. Content Provided by Wikipedia 11
244 Computer History A computer is any device used to process information according to a well-defined procedure. The word was originally used to describe people employed to do arithmetic calculations, with or without mechanical aids, but was transferred to the machines themselves. Originally, the information processing was almost exclusively related to arithmetical problems, but modern computers are used for many tasks unrelated to mathematics. Within such a definition sit mechanical devices such as the slide rule, the gamut of mechanical calculators from the abacus onwards, as well as all contemporary electronic computers. Terms better suited for such broad meanings ascribed to the word "computer" would be " information processor" or "information processing system." Definitions However, the above definition includes many special-purpose devices that can compute only one or a limited range of functions. When considering modern computers, their most notable characteristic that distinguishes them from earlier computing devices is that, given the right programming, any computer can emulate the behaviour of any other (though perhaps limited by storage capacity and at different speeds), and, indeed, it is believed that current machines can emulate any future computing devices we invent (though undoubtedly more slowly). In some sense, then, this threshold capability is a useful test for identifying "general-purpose" computers from earlier special-purpose devices. This "general-purpose" definition can be formalised into a requirement that a certain machine must be able to emulate the behaviour of a universal Turing machine. Machines meeting this definition are referred to as Turing-complete. While such machines are physically impossible as they require unlimited storage and zero crashing probability, the attribute Turing-complete is sometimes also used in a lax sense for machines that would be universal if they had more (infinite) storage and were absolutely reliable. The first such machine appeared in 1941: the program-controlled Z3 of Konrad Zuse (but its Turing-completeness was shown only much later, namely, in 1998). Other machines followed in a flurry of developments around the world. See the history of computing article for more details of this period. Embedded Computers In the last 20 years or so, however, many household devices, notably including video game consoles but extending to mobile telephones, video cassette recorders, PDA's and myriad other household, industrial, automotive, and other electronic devices, all contain computer-like circuitry capable of meeting the above Turing-completeness requirement (with the proviso that the programming of these devices is often hardwired into a ROM chip which would need to be replaced to change the programming of the machine). These computers inside other special-purpose devices are commonly referred to as "microcontrollers" or "embedded computers". Therefore, many restrict the definition of computers to devices whose primary purpose is information processing, rather than being a part of a larger system such as a telephone, microwave oven, or aircraft (but see: avionics), and can be adapted for a variety of purposes by the user without physical modification. Mainframe computers, minicomputers, and personal computers are the main types of computers meeting this definition. Personal Computers Finally, many people who are unfamiliar with other forms of computers use the term exclusively to refer to personal computers. How Computers Work While the technologies used in digital computers have changed dramatically since the first computers of the 1940s (see History of computing hardware for more details), most still use the von Neumann architecture proposed in the early 1940s by John von Neumann. Von Neumann's architecture describes a computer with four main sections: the Arithmetic and Logic Unit (ALU), the control circuitry, the memory, and the input and output devices (collectively termed I/O). These parts are interconnected by a bundle of wires, a "bus." Memory In this system, memory is a sequence of numbered bytes (like "cells" or "pigeon holes"), each containing a small piece of information. The information may be an instruction to tell the computer what to do. The cell may contain data that the computer needs to perform the instruction. Any byte of memory may contain either, and indeed what is at one time data might be instructions later. In general, memory can be rewritten over millions of times - it is a scratchpad rather than a stone tablet. The size of each cell, and the number of cells, varies greatly from computer to computer, and the technologies used to implement memory have varied greatly - from electromechanical relays, to mercury-filled tubes (and later springs) in which acoustic pulses were formed, to matrices of permanent magnets, to individual transistors, to integrated circuits with millions of capacitors on a single chip. Processing The arithmetic and logical unit, or ALU, is the device that performs elementary operations such as arithmetic operations (addition, subtraction, and so on), logical operations (AND, OR, NOT), and comparison operations (for example, comparing the contents of two bytes for equality). This unit is where the "real work" is done. The control unit keeps track of which bytes in memory contain the current instruction that the computer is performing, telling the ALU what operation to perform and retrieving the information (from memory) that it needs to perform it, and transfers the result back to the appropriate memory location. Once that occurs, the control unit goes to the next instruction (typically located in the next slot (memory address), unless the instruction is a jump instruction informing the computer that the next instruction is located in another location). Input and Output The I/O allows the computer to obtain information from the outside world, and send the results of its work back there. There is an incredibly broad range of I/O devices, from the familiar keyboards, monitors and floppy disk drives, to the more unusual such as webcams. What all input devices have in common is that they encode (convert) information of some type into data which can further be processed by the digital computer system. Output devices on the other hand, decode the data into information which can be understood by the computer user. In this sense, a digital computer system is an example of a data processing system. Instructions The instructions discussed above are not the rich instructions of a human language. A computer only has a limited number of well-defined, simple instructions. Typical sorts of instructions supported by most computers are "copy the contents of cell 123, and place the copy in cell 456", "add the contents of cell 666 to cell 042, and place the result in cell 013", and "if the contents of cell 999 are 0, your next instruction is at cell 345". Instructions are represented within the computer as numbers - the code for "copy" might be 001, for example. The particular instruction set that a specific computer supports is known as that computer's machine language. In practice, people do not normally write the instructions for computers directly in machine language but rather use a "high level" programming language which is then translated into the machine language automatically by special computer programs (interpreters and compilers). Some programming languages map very closely to the machine language, such as assembler (low level languages); at the other end, languages like Prolog are based on abstract principles far removed from the details of the machine's actual operation (high level languages). Architecture Contemporary computers put the ALU and control unit into a single integrated circuit known as the Central Processing Unit or CPU. Typically, the computer's memory is located on a few small integrated circuits near the CPU. The overwhelming majority of the computer's mass is either ancilliary systems (for instance, to supply electrical power) or I/O devices. Some larger computers differ from the above model in one major respect - they have multiple CPUs and control units working simultaneously. Additionally, a few computers, used mainly for research purposes and scientific computing, have differed significantly from the above model, but they have found little commercial application. The functioning of a computer is therefore in principle quite straightforward. The computer fetches instructions and data from its memory. The instructions are executed, the results are stored, and the next instruction is fetched. This procedure repeats until the computer is turned off. Programs Computer programs are simply large lists of instructions for the computer to execute, perhaps with tables of data. Many computer programs contain millions of instructions, and many of those instructions are executed repeatedly. A typical modern PC (in the year 2003) can execute around 2-3 billion instructions per second. Computers do not gain their extraordinary capabilities through the ability to execute complex instructions. Rather, they do millions of simple instructions arranged by clever people, "programmers." Good programmers develop sets of instructions to do common tasks (for instance, draw a dot on screen) and then make those sets of instructions available to other programmers. Nowadays, most computers appear to execute several programs at the same time. This is usually referred to as multitasking. In reality, the CPU executes instructions from one program, then after a short period of time, it switches to a second program and executes some of its instructions. This small interval of time is often referred to as a time slice. This creates the illusion of multiple programs being executed simultaneously by sharing the CPU's time between the programs. This is similar to how a movie is simply a rapid succession of still frames. The operating system is the program that usually controls this time sharing. Operating System The operating system is a sort of catch-all of useful pieces of code. Whenever some kind of computer code becomes sharable by many different types of computer program, over many years, programmers eventually move it into the operating system. The operating system, decides which programs are run, when, and what resources (such as memory or I/O) they get to use. The operating system also provides services to other programs, such as code ("drivers") which allow programmers to write programs for a machine without needing to know the intimate details of all attached electronic devices. Uses of computers The first digital computers, with their large size and cost, mainly performed scientific calculation. ENIAC, an early US computer originally designed to calculate ballistics firing tables for artilery, calculated neutron cross-sectional densities to see if the hydrogen bomb would work properly (this calculation, performed in December 1945 through January 1946 and involving over a million punch cards of data, showed the design then under consideration would fail). The CSIR Mk I, the first Australian computer, evaluated rainfall patterns for the catchment of the Snowy Mountains Scheme, a large hydroelectric generation project. Others were used in cryptanalysis, for example the world's first programmable digital electronic computer, Colossus, built during World War II. However, early visionaries also anticipated that programming would allow chess playing, moving pictures and other uses. People in governments and large corporations also used computers to automate many of the data collection and processing tasks previously performed by humans - for example, maintaining and updating accounts and inventories. In academia, scientists of all sorts began to use computers for their own analyses. Continual reductions in the costs of computers saw them adopted by ever-smaller organizations. Businesses, organizations, and governments often employ a large number of small computers to accomplish tasks that were previously done by an expensive, large mainframe computer. Collections of the smaller computers in one location is referred to as a server farm. With the invention of the microprocessor in the 1970s, it became possible to produce very inexpensive computers. Personal computers became popular for many tasks, including keeping books, writing and printing documents. Calculating forecasts and other repetitive math with spreadsheets, communicating with e-mail and, the Internet. However, computers' wide availability and easy customization has seen them used for many other purposes. At the same time, small computers, usually with fixed programming, began to find their way into other devices such as home appliances, automobiles, aeroplanes, and industrial equipment. These embedded processors controlled the behaviour of such devices more easily, allowing more complex control behaviours (for instance, the development of anti-lock brakes in cars). By the start of the twenty-first century, most electrical devices, most forms of powered transport, and most factory production lines are controlled by computers. Most engineers predict that this trend will continue. The word "computer" Over the years there has been several slightly different meanings to the word computer, and several different words for the thing we now usually call a computer. For instance "computer" was once commonly used to mean a person employed to do arithmetic calculations, with or without mechanical aids. According to the Barnhart Concise Dictionary of Etymology, the word came into use in English in 1646 as a word for a "person who computes" and then by 1897 also for a mechanical calculating machine. During World War II it referred to U.S. and British servicewomen whose job it was to calculate the trajectories of large artillery shells with such machines. Charles Babbage designed one of the first computing machines called the Analytical engine, but due to technological problems it was not built in his lifetime. Various simple mechanical devices such as the slide rule and abacus have also been called computers. In some cases they were referred to as "analog computers", as they represented numbers by continuous physical quantities rather than by discrete binary digits. What are now called simply "computers" were once commonly called "digital computers" to distinguish them from these other devices (which are still used in the field of analog signal processing, for example). In thinking of other words for the computer, it is worth noting that in other languages the word chosen does not always have the same literal meaning as the English language word. In French for example, the word is "ordinateur", which means approximately "organizer", or "sorting machine". The Spanish word is "ordenador" , with the same meaning, although in some countries they use the anglicism computadora. In Italian, computer is "calcolatore", calculator, emphasizing its computational uses over logical ones like sorting. In Swedish, a computer is called "dator" from "data". At least in the 1950s, they were called "matematikmaskin" ("mathematics machine"). In Finnish computer is called "tietokone" which means "information machine". In Chinese, a computer is called "dian now" or an "electric brain". In English, other words and phrases have been used, such as "data processing machine". Content Provided by Wikipedia 11
245 What is a screensaver or screen saver? A screensaver is a computer program originally designed to conserve image quality of computer displays by blanking the screen or filling it with a moving image or pattern when the computer is not in use. Today, screensavers are primarily for entertainment or security purposes. A computer screen is usually a CRT (cathode ray tube). This means that images are generated using electron beams which are "launched" from the back of the monitor and "draw" images continuously on the screen. Most computer programs paint images in the screen. Some of these images (letters, pictures, animations, menus) are usually moving or changing, and never stay in the same place for long. But some portions of the screen (like the Start bar in Microsoft Windows, or the typical upper "score" bar of some videogames) are always in the same place, sometimes for hours or even days or months. Particularly with older CRTs, these sorts of images, continuously drawn in the same place for a long time, could damage the screen because the electron rays are always hitting the same point of the screen. Damage would consist in poor image quality, and those fixed images could remain "burned in" to the same place like "ghost lines" even if the image eventually changes. You could observe this effect in some old classic videogame machines; after some years showing always the same images, many of them feature those "ghost images". Screensaver programs were originally designed to help avoid avoid these effects by automatically changing the images on the screen when the computer is not in use. They can be usually set up to launch automatically, waiting a specified number of minutes after the last keystroke made by a user. Then the screensaver could switch the image to black, or maybe make some animation effects with images and colors, thus avoiding any "fixed" images. The screensaver remains active until a user enters a keystroke or makes a mouse movement. At that moment, the screensaver closes and the former screen contents are restored, to allow the user to work again. Modern computer displays are much less susceptible to burn-in than older models. For this reason, screensavers today primarily are decorative or for entertainment, and usually feature moving images or patterns and sometimes sound effects. Screensaver software also has been adapted to serve some useful purposes. For example, many screensavers can be programmed to ask users for a password for security purposes ("lock the workstation"), before permitting the user to resume work. In addition, some screensavers activate a useful background task, such as a virus scan or a distributed computing application. Screensavers are not to be confused with power management features, which place the computer in a low power state after it has been idle for a specified amount of time. Content Provided by Wikipedia 11
246 What does HTTP stand for? HTTP (for HyperText Transfer Protocol) is the primary method used to communicate information on the World Wide Web. The specification is currently maintained by the World Wide Web Consortium (W3C). HTTP is a request/response protocol between clients and servers. An HTTP client, such as a web browser, typically initiates a request by connecting to TCP/IP port 80, although alternative ports such as 81 and 8080 are also used. The client then sends a request string, such as "GET / HTTP/1.1" (which would request the default page of that web server). The server would then respond with a file (or error message). The file sent by the server is preceded by an HTTP Header, which is a set of ASCII strings containing information about the server and the document being sent. HTTP is defined in RFC 2068. HTTP differs from other TCP-based protocols such as FTP, in that connections are generally torn down once a particular request (or related series of requests) has been completed. This design makes HTTP ideal for the World Wide Web, where pages regularly link to pages on other servers. It can occasionally pose problems for Web designers, as the lack of a persistent connection necessitates alternative methods of maintaining users' "state". Many of these methods involve the use of "cookies". There is a secure version of HTTP called HTTPS that can use any given encryption method as long as it is understood by both sides. Content Provided by Wikipedia 11
247 All about Microsoft Microsoft Corporation, headquartered in Redmond, Washington, is the world's largest software company, trading on the NASDAQ stock market under the symbol 'MSFT'. Microsoft develops, manufactures, licenses and supports a wide range of software products for various computing devices. The company was founded in Albuquerque, New Mexico in 1975 by Bill Gates and Paul Allen to develop and sell BASIC interpreters under the company name Micro-soft. Microsoft products Software Microsoft produces a wide range of software products. Microsoft's "flagship" product is the Windows operating system, produced in many versions, including Windows XP and Windows Server 2003. Almost all IBM compatible personal computers are sold with Windows pre-installed. (See History of Microsoft Windows.) The product which allowed Microsoft to generate its enormous wealth, however, was the MS-DOS operating system. All versions of Windows prior to Windows NT for business systems and Windows XP for home systems were based on an MS-DOS foundation. Microsoft Office is the company's line of office software. It includes Word (a word processor), Microsoft Access (a personal relational database) Excel (a spreadsheet), Outlook (a Windows-only collaborative software, mostly used with the Exchange server), and PowerPoint (presentation software). With the release of Office 2003, a number of other products were brought under the Office banner, including Microsoft Visio, Microsoft Project, Microsoft MapPoint and Microsoft OneNote. Microsoft also produces Microsoft Office for Apple Macintosh computers. The Mac version of Office includes the Mac-only Entourage instead of Outlook. Like Windows, Office has grown to near-monopoly status in many markets. Microsoft Visual Studio is the company's set of programming tools and compilers. It is GUI oriented and links easily with the Windows APIs, but must be specially configured for non-Microsoft libraries. The current version is Visual Studio .NET 2003. Microsoft FrontPage is a WYSIWYG HTML editor. Microsoft sells computer games that run on Windows PCs, such as the Age of Empires and Microsoft Flight Simulator series. Microsoft develops and publishes video games for its XBox video game console. In addition, all "third party" XBox video game publishers, such as Electronic Arts and Activision, pay a licence fee to publish games for Microsoft's XBox system. Microsoft also produces a line of reference works, such as encyclopedias and atlases, under the name Encarta. Microsoft also produces software for Apple Macintosh, through the Macintosh Business Unit. Microsoft PowerPoint, Microsoft Excel and Microsoft Word were first produced for Macintosh. Microsoft did not originate all of its software and many of its products have been bought from former competitors. Products in this category include Microsoft Project - a project management package, and Visio - a charting package. Microsoft also produces the Internet Explorer browser product with which is bundled Outlook Express - an email client. These products are included with Microsoft Windows. Network Services In the mid-1990s, Microsoft began to expand its product line into the networked computer world. It launched its online service MSN (Microsoft Network) on August 24, 1995, which was a direct competitor to AOL. MSN became an umbrella service for all of Microsoft's online services. In 1996, Microsoft and NBC, an American broadcasting network, created MSNBC, a combined 24-hour news television channel and online news service. At the end of 1997, Microsoft acquired Hotmail, the original and most popular webmail service. It was rebranded MSN Hotmail and was used as a platform to boost Passport, a universal login service. MSN Messenger, an instant messaging client, was introduced in 1999 to compete with the popular AOL Instant Messenger (AIM). Training Microsoft has created a number of training initiatives, based on multiple-choice exams, with the intention of creating a pool of low-cost employees with skills relating exclusively to Microsoft products. The best known of these is the MCSE qualification, which stands for "Microsoft Certified Systems Engineer". Another popular certification is the Microsoft Certified Solution Developer (briefly called MCSD.NET). This certification is a developer's qualification, aimed towards developers who can demonstrate with success their skills with Microsoft's development tools and architectures. Hardware Microsoft also produces a number of computing related hardware products. A line of computer input devices, including mouse, keyboard, joystick, gamepads. The company bought WebTV (subsequently renamed MSN TV), a television internet appliance. When Microsoft released the XBox in late 2001, the company entered the multi-billion dollar game console market dominated by Sony and Nintendo. History of Microsoft Formed in 1975, Microsoft started by selling a BASIC interpreter which quickly established a reputation for excellence. As the popularity of Microsoft BASIC grew, other manufacturers adopted Microsoft BASIC's syntax to maintain compatibility with existing Microsoft BASIC implementations. Because of this feedback loop, Microsoft BASIC became a de facto standard, and the company cornered the market. Later, it tried (unsuccessfully) to extend their grip on the home computer market by designing the MSX home computer standard. The name "Micro-soft" (for microcomputer software) was used by Bill Gates in a letter to Paul Allen for the first time on November 29, 1975. "Microsoft" became a registered trademark on November 26, 1976. In late 1980, International Business Machines needed an operating system for its new home computer, the IBM PC. Microsoft licensed Quick and Dirty Operating System, from Tim Patterson's Seattle Computer Products in order to sell it to IBM as the standard operating system for the IBM PC. Microsoft subsequently purchased all rights to QDOS for $10,000, and renamed it MS-DOS (for Microsoft Disk Operating System). It was released as IBM PC-DOS 1.0 with the introduction of the PC in 1981. In contracting with IBM, however, Microsoft had retained the rights to license the software to other computer vendors as MS-DOS. The early 1980s saw a flood of IBM PC clones, and Microsoft were quick to leverage their position to dominate the operating system market. (In the 1990s, Microsoft adopted exclusionary licensing, later determined to be illegal, under which the PC manufacturers were required to pay for an MS-DOS licence even when the system shipped with an alternative operating system.) Software running on PC hardware was not necessarily technically better than the mainframe software that it replaced, but it was much lower cost, empowering billions of people to join the computing revolution. Microsoft's success rode on the PC boom. The now highly profitable and cash rich Microsoft diversified into a wide variety of software products including: compilers and interpreters for programming languages word processors, spreadsheets and other office software Some of these products were successful, and some were not. In most cases, early versions of Microsoft software were buggy, and inferior to competitors, but later versions usually improved rapidly. By the turn of the millennium, many of Microsoft's software products dominated the market in their respective categories. Microsoft has devoted huge amounts of effort to marketing in developing their products and services, as well as to the integration of their software products with one another in an attempt to create a seamless and consistent computing environment for the user. Microsoft has attempted to leverage the powerful Windows brand into many other markets, with products such as Windows CE for PDAs and their "Windows powered" Smartphone products. Business culture The software developer Microsoft has often been described as having a developer-centric business culture. A great deal of time and money is spent each year on recruiting young university-trained software developers meeting very exacting criteria. Resources are continuously invested in measures devised to keep them in the company, year after year. For instance, while many software companies often place an entry level software developer in a cubicle desk within a large office space filled with other cubicles, Microsoft assigns a private or semi-private closed office to every developer or developer duo. In addition, key decision makers at every level are either developers or former developers. In a sense, the software developers at Microsoft are considered the "stars" of the company in the same way that sales staff at IBM are considered the "stars" of their company. Canine nourishment Within Microsoft the expression "eating your own dog food" is used to describe the policy of using Microsoft products as internal tools, above everything else. It seems to be very difficult for management and support staff to get the permission to use software from Microsoft competitors. It seems to be difficult even for the software developers, who are the "stars" of the company, to use software tools made by the competition. This policy is justified by the need to make employees aware of the products. Many have noted that one of the effects of this policy is to constantly push the development of products which software developers find useful for their immediate needs (regardless of the perceived needs of the general market, as stated by others) given the great influence the developers as a whole (but not necessarily individually) have on corporate orientations. Long term wariness Microsoft fosters a general attitude of long term strategic wariness in its managers. Everybody must be ready for anything the competition or the market can throw on the road in any number of years. In this frame of mind being the largest software company in the world is not seen as a form of safety or a guarantee of future success. For instance: Future competitors could rise from related industries which are not now in the software business in a very concentrated way. Giant hardware companies who tower over Microsoft could turn their attention to it in a few years from now and try to crush it. Consumers of vast segments of Microsoft software could decide they do not wish to upgrade anymore, or at least for a few more years than usual. Because of these imponderables Microsoft managers must maintain an unending vigilance and do everything to sustain a dynamic expansion in new markets. Public perceptions For a long time, Microsoft was widely seen as the "good guy" in the computer software market, providing an inexpensive alternative to the expensive systems provided by the major mainframe and UNIX vendors, and it was admired for the large amounts of money it made in doing so. By the 1990s, the perception that Microsoft had become the "bad guy" had increased substantially. It was frequently accused of leveraging its market dominance in desktop computing in order to try to exploit its customers unfairly. Microsoft has rarely failed to own any market it set its sights on; as a result, Microsoft has been able to dampen the future of successful young companies simply by announcing an intention to someday release a competing product. (Though on a few occasions, Microsoft has failed to own a market, such as in the fight between Microsoft Money and Intuit's Quicken, followed by the government's block of Microsoft's attempt to purchase Intuit.) In recent years, Microsoft has been accused of anti-competitive business practices by the US government, the European Union, and Microsoft's competitors; this has generated huge negative perceptions. Microsoft has been called "the Borg" after the fictional race of aliens in the Star Trek universe. The name began to be used in reference to Microsoft soon after the Borg's first appearance in Star Trek: The Next Generation. It reflects Microsoft's tendency to acquire technology from competitors rather than developing it in-house, as well as to Microsoft's ability to adapt to and overwhelm its opponents' strategies by having vastly superior resources. The monopoly question Microsoft's Windows product has an effective monopoly in the desktop operating systems market. Those who make this claim point out that, among other things, almost every PC sold has a copy of Microsoft Windows pre-installed. In a 2003 publication, Dan Geer argued the prevalence of Microsoft products has resulted in a monoculture. This assertion has been responded to directly in a publication sympathetic to Microsoft, MCP Magazine. Some observers claim that the characterization of Microsoft as a monopoly leaves its competitors in a conflict: On the one hand, competitors reject this characterization as negating their own position. In a monopolized market, there exists only one provider of a product or service. Therefore, to competitors, calling Microsoft a monopoly is a defeatist strategy: it denies either their own existence, or their capacity to survive and to compete. On the other hand, competitors favor the characterization of Microsoft as a monopoly because such a characterization benefits them. First, it raises the potential for regulatory intervention. Second, the public relations benefits of being seen as an "underdog" may increase sales. Monopoly or not, there is no doubt that: In most mass-market desktop software application markets, Microsoft is a dominant player. This dominance attracts widespread resentment. This resentment is not restricted to its competitors. Critics of Microsoft have accused it of using its dominance in desktop operating system to try to leverage market share in other sectors of the computer market, such as web browsers (Internet Explorer), server operating systems (Windows NT), office software suites (Microsoft Office), and streaming media (Windows Media). After its bundling of the Internet Explorer web browser into its Windows operating system, Microsoft acquired an extremely large market share in the browser market. Partly as a result of this dominance, Microsoft was convicted by a USA federal court for abusing its monopoly in the desktop operating systems market (see Microsoft antitrust case for more details). In 2003, it emerged that the European Commission was investigating the bundling of media player software into Windows, which rivals complained was destroying the market for their own products. Negotiations with the EC broke down in March 2004 and it was reported that the EC planned to fine the company a record Æ497 million ($613 million) for breaches of EU competition law. Separate investigations into alleged abuses of the server market were also ongoing at the same time. Microsoft has in all of these cases depicted its actions as its response to customer demand. Critics also decry Microsoft's "embrace and extend" strategy of adding proprietary features to open, de facto standards, thereby using its market dominance to gain de facto ownership of standards "extended" in this way. Security By 2002, several of Microsoft's networking- and Internet-related products had become the subject of intense criticism following several high-profile security lapses. Malicious programmers increasingly exploited weaknesses in Microsoft software by creating and distributing worms, viruses, and Trojan horses designed to spread across the Internet and waste computing resources or destroy data. These exploits targeted Microsoft's Outlook and Outlook Express e-mail programs, Internet Information Server (IIS) Web server, and SQL database server software. Microsoft contends that its dominant position in several Internet-related software categories naturally subjects the company's products to more attacks, because the products themselves are so widespread. Critics counter that these attacks also target Microsoft products that do not hold commanding market shares, and suggest that this is because Microsoft products in general are fundamentally less secure than those of the company's competitors. Microsoft's licensing policy has helped somewhat in the success of virus distribution channels, because the first Service pack to Windows XP checked for known pirate keys. However, chief cause in the spread of viruses has been unskilled users failing to apply available patches, sometimes as much as nine months old. Windows XP Service Pack 2 attempts to address this by forcing users to automatically apply patches. Microsoft's practice of designing and configuring software to make it easier to use and less intimidating to novices has facilitated the spread of these viruses and worms. For example, Windows operating systems released since 1995 hide file extensions by default, which can help malicious programmers trick unwitting e-mail recipients into opening dangerous file attachments that masquerade as harmless files with innocuous extensions. (Recent versions of Outlook and Outlook Express disable dangerous file types upon receipt, so that users cannot open them.) Critics charge that this focus on usability and automation has come at the expense of important security considerations. In January 2002, Gates announced the Trustworthy Computing initiative, which he described as a long-term, companywide initiative to find and fix security and privacy vulnerabilities in all of Microsoft's products. The initiative prompted the company to reevaluate and redesign several of its practices and processes, and delayed the release of Windows Server 2003, the successor to the Windows 2000 Server family of operating systems. Reaction to the Trustworthy Computing initiative has been mixed, with observers lauding Microsoft's increased focus on security but charging that the company still has a lot of work to do. In Feburary 2004, the partial source code of Windows NT/2000 was leaked and widely distributed on filesharing networks. The archive contains source code for network protocols, parts of Internet Explorer, certificate handling and kernel code. The potential for hacks and exploits as a result of the leak is an obvious sign that Microsoft's security protocols to protect its intellectual property from abuse has failed. However, to date no known current exploits have been released based on the source code. Advantages of Microsoft software The best general features of Microsoft software that helped it gain the market share it now enjoys: Common user interface -- all Microsoft applications used the same menu commands, short-cuts, and procedures for similar tasks. Interconnectedness -- this applies especially to Microsoft Office, but, in general, the data of one Microsoft application has been more 'usable' by other Microsoft applications. Backward compatibility -- Microsoft generally has done a better job at allowing older code and data to work on newer systems, in comparison with some major manufacturers of hardware-software combinations, until about 1986 periodically would introduce new machines with new operating systems giving little or no compatibility with the previous ones. For instance, a common Microsoft demo is to show Visicalc running on the latest and greatest version of Windows. This is a double edged sword since it means that third party programmers have to go through massive amounts of documentation on the evolution of the Microsoft OS and data standards, whenever they build a general application. These three qualities were important in Microsoft applications being seen as better or safer options that their competitors - if Microsoft's product wasn't the best option at the time, it probably would be in the next version, and there was likely to be support and upgrades for the product for years to come. Microsoft also generally provided third-party programmers with hooks into their software, and the solutions and plugins built by third-party programmers also led to more Microsoft sales. Now the ubiquity of Microsoft software allows the user to benefit from so-called network effects. For example, the large installed base of Microsoft Office makes MS Office files the de-facto standard word-processor format, making a copy of MS Office essential for most business users. In addition, more potential employees having training in MS Office than competing products. Hence using MS Office can result in reduced training requirements, especially in the case of temporary employment. Microsoft software is also designed to be easy to configure, allowing companies to hire lower-paid non-expert systems administrators. Microsoft supporters argue that this results in a lower "total cost of ownership" than competing Unix-based solutions. Microsoft software also represents a "safe" option for IT managers purchasing software systems, in that the ubiquity of Microsoft software allows them to claim that they are following accepted best practices. This is a particularly attractive option for IT managers with limited technical knowledge. Microsoft software makes heavy use of software re-use. This is one of the main reasons the resources of most Microsoft software can be used from most other Microsoft software. This advantage can be misused, however, see below. Disadvantages of Microsoft software Earlier versions of Microsoft products had a security stance of "permitted unless forbidden", which is hard to change, as much Microsoft software relies on this policy. This stance can be taken advantage of to cause security problems. For example, macros embedded in documents or HTML in email can run programs allowing an attacker to take over the user's computer. This is demonstrated in the proliferation of worm and virus programs that attack Microsoft software. This problem is compounded by the very ubiquity of Microsoft software, cited as an advantage above. Once a working virus is released, it is almost certain to spread very widely because almost every computer it comes across is able to replicate and spread the virus. This effect has recently been dubbed the "Microsoft monoculture," by analogy to the problems associated with lack of biodiversity in an ecosystem. As an acknowledgement of the problem, the National Science Foundation on November 25, 2003 announced it had granted US$750,000 (Lemos, 2003) to computer scientists at Carnegie Mellon University and the University of New Mexico to further understand the causes and the (presumably) negative effects of the homogenization of the world's computing platforms (National Science Foundation, 2003). A result of the dominance of Microsoft software is that the advantage mentioned above of being able to hire less highly trained, and therefore cheaper, systems administrators is offset by two factors: Lower base staff competence, cheaper, less reliable software, and software that's easy-to-use, and easy-to-break means you will need to hire more staff. Microsoft shops are liable to security breaches, because reducing computer insecurity requires highly trained systems administrators, regardless of the operating system in use. Detractors argue that users do not own Microsoft software and that therefore Total Cost of Ownership comparisons with open source software do not compare like with like. The Future The open source movement is traditionally at odds with Microsoft for Microsoft's closed standards (e.g. NTFS) that reduce interoperability with open source software what is perceived as the selling of inferior (especially with regards to security, stability and overall quality of enginerring) products at high prices by means of monopolistic practices. Microsoft's supposed spreading of fear, uncertainty, and doubt about open source and other competing software. In recent years Linux has become a popular server OS, particularly for the low-margin, price-sensitive hosting market, with most low-end hosts hosting on the free OS. With the increasing popularity of Linux, with Walmart selling a cheap consumer PC running Lindows, Microsoft CEO Steve Ballmer has stated that Linux is a "tough competitive force... It's non-traditional, it's free and it's cheap. We have to educate people why what they pay for [our offerings] is more than offset by the value we deliver. We used to be the cheap guys. We were cheaper than Novell, cheaper than Oracle. We can't do that with this one." (Reported in CRN.com, June 17, 2002). However, with $50 billion in cash reserves, it is unlikely that Microsoft will lose its position as a major player in the computer market anytime soon. Microsoft is working to leverage its current success in desktop operating systems into new markets such as media players, server software, handheld devices, web services and video games, with varying degrees of success. It is also looking to move towards a "subscription model" for licensing. Microsoft's current revenue scheme depends on users buying upgrades on a periodical basis, but this is becoming increasingly difficult, as many users fail to see the benefits of upgrades and continue to use older packages, such as Windows 98, Windows ME and Windows 2000 instead of the latest Windows XP and Windows Server 2003. Microsoft would like to switch to a subscription basis, whereby users pay an annual fee for software. The success of this strategy partly depends on the proliferation of broadband Internet access, as Microsoft will need to build online licence verifying mechanisms into its programs. At the same time, Microsoft is engaging in a major public relations and branding exercise to try to combat the negative PR associated with the recent accusations regarding its business practices. Microsoft is now positioning PCs running Windows XP Media Center Edition as a home entertainment hub. Based on recent Microsoft management comments, it appears that Microsoft is attempting to move up-market, positioning its products and services as high-value, rather than low-cost. Steve Ballmer was quoted as saying in 2002 "We are actually having to learn how to say, 'We may have a high price on this one, but look at the additional value and how that value actually leads to a lower cost of ownership despite the fact that our price may be higher,'" (Reported in VARbusiness, July 15, 2002). Microsoft .NET initiative The .NET initiative is a major company-wide effort by Microsoft. It has several aspects including: Easing the development of applications that use the Internet Alleviating problems related to managing and installing multiple versions of complex software packages on the same system (see DLL-hell). Providing a more consistent development platform for all Windows applications (see Common Language Infrastructure [CLI]). It will achieve this by using a proprietary extension of XML to link several different devices together to be controlled quickly and easily by other computers. Critics view .NET as yet another Microsoft attempt to leverage its operating system monopoly into a similar monopoly on Internet applications. Furthermore, in regard to the name of the initiative and its components, critics also point out that not only are the terms ".net" and "CLI" in use to mean other things (Microsoft used CLI to stand for Common Language Infrastructure), but that Microsoft regularly overloads generic terms (e.g. "Windows", "Word", "DNS") to refer to its proprietary technology, and then attempts to control them using trademark law and patent law. Microsoft Next-Generation Secure Computing Base initiative Microsoft has now launched the Next-Generation Secure Computing Base, recently renamed from Palladium operating system initiative. This effort is also called Trusted Computing. Microsoft presents this as their solution to computer insecurity. Opponents have characterised it as another exercise in entrenching and extending their monopoly, effectively allowing Microsoft to control all uses of PC technology. In particular, they have accused Microsoft of using it as a way to combat the emergence of free software. The Future of Windows Microsoft has a number of new initiatives: .NET, Palladium and the "Longhorn" operating system (Longhorn is the next home Windows release). Microsoft intends that Longhorn will have many new features such as speech recognition and an enhanced user interface but it is likely that the operating system itself will be an extension of and improvement on Windows XP and Windows Server 2003. References Charles, John. "Indecent proposal? Doing Business With Microsoft". IEEE Software. January/February 1998. pp. 113-117. Clark, Jim with Owen Edwards. Netscape Time: The Making of the Billion Dollar Start-up That Took on Microsoft. New York, Saint martin's Press, 1999 Cusumano, Michael A.; Selby, Richard W. Microsoft Secrets: How the World's Most Powerful Software Company Creates Technology, Shapes Markets and Manages People. New York: Free Press, 1995. Edstrom, Jennifer; Eller, Marlin. Barbarians Led by Bill Gates: Microsoft from inside: How the World's Richest Corporation Wields its Power. N.Y. Holt, 1998. Lemos, Robert. (2003). U.S. funds study of tech monocultures. Retrieved December 20, 2003, from http://news.com.com/2100-7355-5111905.html?tag=nefd_hed Moody, Fred. I Sing the Body Electronic: A Year With Microsoft on the Multimedia Frontier. New York: Viking, 1995. National Science Foundation. (2003). Taking Cues from Mother Nature to Foil Cyber Attacks. Retrieved December 20, 2003, from http://www.nsf.gov/od/lpa/news/03/pr03130.htm See also History of Microsoft Windows Halloween documents Microsoft antitrust case Microsoft Developer's Network External links Microsoft sites Microsoft web site: http://www.microsoft.com/ Microsoft Network (MSN): http://www.msn.com/ Microsoft Xbox: http://www.xbox.com/ Microsoft Encarta encyclopedia: http://encarta.msn.com/ Discussions whether MS is Monopolistic http://wiki.ael.be/index.php/PatentPlayersMicrosoft http://wiki.ael.be/index.php/MsAntitrust FAQ on the Microsoft Antitrust case by The Center for the advancement of Capitalism (a pro-Microsoft site.) Alternatives to Microsoft systems Open Source Intiative website. Free Software Foundation. Just Say No to Microsoft - A site offering alternatives to Microsoft products Financial situation Caution about Microsoft's stock valuation increasing too rapidly during the turn of the millennium's dot-com bubble, with suggestions of other financial mismanagement. Satire MicroSith - A parody of Microsoft and Star Wars, typical of a certain school of criticism of Microsoft Content Provided by Wikipedia 11
248 What is a font? In typography, a typeface is a co-ordinated set of letter designs, making a complete alphabet, and generally intended to be made into a font for printing or use on a computer display. The art of designing typefaces is called type design, being the occupation of a type designer. A font (originally fount, from typefoundry) is a set of glyphs (images) representing the characters from a particular character set in a particular typeface. In digital fonts, the image of each character may be encoded either as a bitmap (in a bitmap font) or by a higher-level description in terms of lines and curves enclosing space (an outline font, also called "vector font"). The term fount has been used for centuries to refer to the contemporary technological device used to print in a particular size and typeface (though in phototype and digital type, it need no longer refer to a specific size). Virtually all founts were cast in various lead alloys from the 1450s until the middle of the 20th century. A few large founts were made of wood, especially in the USA. This is known as wood type. There was a relatively brief overlapping period (ca. 1950s-1990s) where photographic technology, known as phototypesetting, was used; founts came on rolls or discs of film. From the mid-1980s the move to digital typography has been relentless and the American spelling has been almost universally adopted. The term font nowadays almost always refers to a computer file containing scalable, outline letterforms, usually in one of several common formats. Some fonts, such as Microsoft's Verdana are intended primarily for use on computer screens. Content Provided by Wikipedia 11
249 What is shareware or share ware? Shareware is software that is distributed without the tight controls that are often seen for proprietary software. However, a shareware program is sometimes accompanied by a request for payment, and often payment is required per the terms of the license. The term shareware was coined by Bob Wallace to describe his word processor PC-Write in the mid-1980s. Open source software and shareware are similar in that they can be obtained and used without monetary cost. However, shareware differs from open source software in that requests of voluntary "shareware fees" are made, often within the program itself, and in that source code for shareware programs is generally not available in a form that would allow others to extend the program. Sometimes, paying the fee and obtaining a password results in access to expanded features, documentation, or support. In some cases, unpaid use of the software is limited in timein which case the software is vernacularly called crippleware. Shareware programs are now typically utilities running on Microsoft Windows. Shareware is rarely found on non-Macintosh Unix-like operating systems, which may be due to the corporate use of Unix until the advent of Linux, which championed free software as opposed to shareware. In using a shareware approach to distributing a program, a developer forgoes a fixed income stream from license fees, but also reduces the cost of distribution. Users of shareware are encouraged to copy & distribute unregistered versions of the software to friends, co-workers and other acquaintances. The hope is that users will find the program useful or entertaining and will register it (by paying a fee) to unlock a full suite of features. Nowadays, shareware is not found with large complex programs requiring many programmers. In this situation, shareware provides neither the ability to hire programmers using licensing fees as is the case with proprietary software, nor does it allow many different programmers to maintain or extend software, as with open source software. However, Apogee Software, 3D Realms, and id Software offered several games in the early to 1990s via the shareware model. The first part of a trilogy was released as shareware and the other two parts as commercial games (delivered to the user when the shareware version was "registered" by paying for it). These games were cutting-edge software: Wolfenstein 3D is considered by many to be the first great first person shooter, to be later redefined by Doom (also shareware) and Quake (commercial game). Content Provided by Wikipedia 11
250 What is email, e-mail or e mail? E-mail, or email, is short for "electronic mail" (as opposed to conventional mail, in this context also called snail mail) and refers to composing, sending, and receiving messages over electronic communication systems. Most e-mail systems today use the Internet, and e-mail is one of the most popular uses of the Internet. Origins of E-mail Despite common belief, e-mail actually pre-dates the Internet; in fact, existing e-mail systems were a crucial tool in creating the Internet. E-mail started in 1965 as a way for multiple users of a time-sharing mainframe computer to communicate; although the exact history is murky, among the first systems to have such a facility were SDC's Q32 and MIT's CTSS. E-mail was quickly extended to become network e-mail, allowing users to pass messages between different computers. The early history of network e-mail is also murky; the AUTODIN system may have been the first allowing electronic text messages to be transferred between users on different computers, in 1966, but it is possible the SAGE system had something similar some time before. The ARPANET computer network made a major contribution to the evolution of e-mail. There is one report [1] which indicates experimental inter-system e-mail transfers on it shortly after its creation, in 1969. The use of the "@" sign to separate the names of the user and their machine, was initiated by Ray Tomlinson in 1972; the common report that he "invented" email is an exaggeration, although his early e-mail programs SNDMSG and READMAIL were very important. The ARPANet significantly increased the popularity of e-mail, and it became the "killer app" of the ARPANET. Growing popularity As the utility and advantages of e-mail on the ARPANET became more widely known, the popularity of e-mail increased, leading to demand from people who were not allowed access to the ARPANET. A number of protocols were developed to deliver e-mail among groups of time-sharing computers over alternative transmission systems, such as UUCP and IBM's VNET e-mail system. Since not all computers or networks were directly inter-networked, e-mail addresses had to include the "route" of the message, that is, a path between the computer of the sender and the computer of the receivers. E-mail could be passed this way between a number of networks, including the ARPANET, BITNET and NSFNET, as well as to hosts connected directly to other sites via UUCP. The route was specified using so-call "bang path" addresses, specifying hops to get from some assumed-reachable location to the addressee, so called because each hop is signified by a "bang sign", i.e. "!". Thus, for example, the path ...!bigsite!foovax!barbox!me directs people to route their mail to machine bigsite (presumably a well-known location accessible to everybody) and from there through the machine foovax to the account of user me on barbox. Before auto-routing mailers became commonplace, people often published compound bang addresses using the { } convention (see glob) to give paths from several big machines, in the hopes that one's correspondent might be able to get mail to one of them reliably (example: ...!{seismo, ut-sally, ihnp4}!rice!beta!gamma!me). Bang paths of 8 to 10 hops were not uncommon in 1981. Late-night dial-up UUCP links would cause week-long transmission times. Bang paths were often selected by both transmission time and reliability, as messages would often get lost. See the network and sitename. Modern internet e-mail Nowadays, almost all e-mail is delivered directly to Internet-connected hosts, using DNS MX records and SMTP (Simple Mail Transfer Protocol). Very few modern servers allow routing (automatic or manual) any more due the potential for abuse by people sending unsolicited bulk email. Those that do allow it are called open relays. A modern Internet e-mail address is a string of the form jsmith@corporation.com. It should be read as "jsmith at corporation.com". The first part is the username of the person, and the second part is the domain name (hostname) of the computer in which that person has an e-mail account. The format of internet e-mail messages is defined in RFC 2822. Prior to the introduction of RFC 2822 the format was described by RFC 822. Internet e-mail messages typically consist of two major components: Headers - Message summary, sender, receiver, and other information about the e-mail Body - The message itself, usually containing a signature block at the end The headers usually have at least four fields: From - The e-mail address of the sender of the message To - The e-mail address of the receiver of the message Subject - A brief summary of the contents of the message Date - The local time and date when the message was originally sent Note however that the "To" field does not necessarily have the email address of the recipient. The information supplied in the headers on the recipients computer is similar to that found on top of a conventional letter. The actual information such as who the message was addressed to is removed by the mail server after it assigns it to the correct user's mailbox. Also note that the from field does not have to be the real sender of the email. It is very easy to fake the from line and let an email seem to be from any mail address. It is possible to digitally sign an email. This is a lot harder to fake. Other common fields include: Cc - Carbon copy (because typewriters used carbon film to copy what was written on them) Bcc - Blind carbon copy (the recipient of this copy will know who was in the To: field, but the recipients cannot see who is on the Bcc: list) Received - Tracking information generated by mail servers that have previously handled a message Content-Type - Information about how the message has to be displayed, usually a MIME type Messages and mailboxes Messages are exchanged between hosts using the Simple Mail Transfer Protocol with software like Sendmail. Users download their messages from servers usually with either the POP or IMAP protocols, yet in a large corporate environment users are likely to use some proprietary protocol such as Lotus Notes or Microsoft Exchange Server's. Mails can be stored either on the client or on the server side. Standard formats for mailboxes include Maildir and mbox. Several prominent e-mail clients use their own, proprietary format, and require conversion software to transfer email between them. E-mail content encoding E-mail is only defined to carry 7-bit ASCII messages. Although many e-mail transports are in fact "8-bit clean", this cannot be guaranteed. For this reason, e-mail has been extended by the MIME standard to allow the encoding of binary attachments including images, sounds and HTML attachments. Spamming and e-mail worms The usefulness of e-mail is being threatened by two phenomena, spamming and e-mail worms. Spamming is unsolicited commercial e-mail. Because of the very low cost of sending e-mail, spammers can send hundreds of millions of e-mail messages each day over an inexpensive Internet connection. Hundreds of active spammers sending this volume of mail results in many computer users receiving tens or even hundreds of junk e-mails each day. E-mail worms use e-mail as a way of replicating themselves into vulnerable computers. Although the first e-mail worm (the Morris worm) affected early UNIX computers, this problem is today almost entirely confined to the Microsoft Windows oprerating system. The combination of spam and worm programs results in users receiving a constant drizzle of junk e-mail, which reduces the usefulness of E-mail as a practical tool. A number of technology-based initiatives mitigate the impact of spam. Congress has also passed a law, the Can Spam Act of 2003, to regulate such e-mail. Content Provided by Wikipedia 11
251 What is "software cracking"? Software cracking is software hacking in order to remove encoded copy protection. Distribution of cracked software (warez) is generally an illegal (or more recently, criminal) act of copyright infringement. Software cracking is most often done by software reverse engineering. The passage of the Digital Millennium Copyright Act made software cracking, as well as the distribution of information which enables software cracking, illegal in the United States. A good example would be a "No CD" crack, which edits the program so that the CD is no longer needed to execute the program. Another example occurs when businesses break the copy protection of programs that they have legally purchased but that are keyed to particular hardware, so that there is no chance of downtime due to hardware failure. Some groups devoted to developing tools for software cracks and the distribution of cracked software include the Phrozen Crew, UCF, Xpression, and DrinkOrDie. History of Cracking Cracking has been around as long as there has been software to crack, but software cracking started to evolve into a whole underground scene in the early 80s, on the Apple II and Commodore 64 computers. People responsible for cracking started to group themselves up into teams, known as "cracking crews" (commonly referred to simply as "groups"). Cracking crews would be made up of suppliers (the people who would get hold of new software, often before its commercial release, if a beta tester were to be located as a supplier); Coders (programmers who would defeat the copy protection); Traders (people who would then distribute the cracks around the world as fast as possible, either by mail or by uploading the software to as many BBSs as possible); and Sysops (people who would run BBSs to help distribute the software). Programmers started adding "Crack intros" to the cracked software to show which cracking crew was responsible. Crews would compete with each other to get new software distributed faster than their rivals, and to be the ones that provided the most reliable cracks. As these crack intros became more complex, with better graphics and animation, people began to appreciate them in their own right, and groups produced intros without having an associated crack. This was the beginning of the demo scene. Software cracking might become impossible to perform with the release of the Fritz-chip in combination with certain software, like nexus in the next major operating system from microsoft, code-named longhorn. Content Provided by Wikipedia 11
252 What is Windows XP? Windows XP (originally code-named Whistler) is the latest desktop version of the Windows operating system from the Microsoft Corporation. It was made publicly available on October 25, 2001. Microsoft initially released two editions: Home and Professional. Home is targeted at home users, while Professional has additional features designed for businesses such as network authentication and dual-processor support. The letters "XP" originate from the word Experience. Development Before XP, Microsoft produced two separate lines of operating systems. One line, represented by Windows 95, Windows 98 and Windows Me was designed for home desktop computers, while the other line, represented by Windows NT and Windows 2000, was aimed at the corporate and professional market, and also included special server versions. Windows XP is Microsoft's attempt to offer a single operating system for all purposes. Windows XP is based on the Windows 2000 code with a newly developed Graphical User Interface (called Luna), which includes slightly redesigned features. In addition, Windows XP ushered in Microsoft's new "task-based" UI featuring sidebars with access to task-specific functions; marking a shift from the desktop-metaphor used in Mac OS X and most distributions of Linux. However, critics argue that the task-based design only adds visual clutter; as it offers no new functionality over simpler toolbars commonly found in operating systems using the desktop metaphors. Some say that this task-based GUI isn't really that big a change. Others argue that it makes the system more friendly to inexperienced users. It includes a simplified set of the user security features of Windows 2000 and an integrated firewall which was part of a major new effort to secure Microsoft products following a very long history of security issues and vulnerabilities. Criticisms XP has come under intense criticism and scrutiny due to the integration of many user applications for which there has traditionally been a thriving third-party market, such as firewalls, media players (Windows Media Player), instant messengers (Windows Messenger), as well as its close tying to the Microsoft Passport network service, which is seen by many computer experts as a security risk and a potential threat to privacy. These features are also widely believed to be a continuance of Microsoft's traditional anticompetitive behavior. However, it should be noted that Microsoft -- in earlier versions of Windows -- had integrated tools that had large third-party markets like disk defragmenters, graphical file managers and TCP/IP stacks with little protest that they were being anticompetitive. Microsoft believed that these tools had moved from special to general usage and merited inclusion as features in the general operating system for a PC. Microsoft has complied with rulings with relation to its Internet Explorer browser software and other bundled software, in releasing a service pack that allows icons and other links to the bundled software to be removed. However the actual software is not actually removed, merely the appearance of the icons or the links. Microsoft maintains that key Windows functionality is tied to these bundled software (for example, the HTML Help system and Windows desktop), but the fact remains that these products can be removed from Windows, albeit with unwanted consequences. Others argue that the front end browser program (Internet Explorer) could be removed without adversely affecting the core components; this is likely the case. It has also been sharply criticized for its product activation system. Legal action is being considered against Microsoft for one of the features in its task-based GUI: its "Buy Music Online" feature. In the anti-trust lawsuits against Microsoft, Microsoft wasn't punished, but rather a committee was created to watch Microsoft to make sure they don't use any uncompetitive actions against Netscape and other web browsers. Uncompetitive actions defined in the lawsuit included anything making it so that users couldn't completely switch their default browsers. But the "Buy Music Online" feature always uses the browser Internet Explorer. Service Packs Microsoft releases service packs for Windows XP to fix problems and add new features. Service Pack 1 for Windows XP was released on September 9, 2002. SP2 is due to be released in 2004, and will focus on security. Unlike previous service packs from Microsoft, SP2 will add new functionality to Windows XP, including a new firewall, WiFi utility, and pop-up blocker. SP2 will also include a new API to allow third party virus scanners and firewalls to interface with a new security center application which provides a general overview of security on the system. Content Provided by Wikipedia 3
253 What is a "skin"? In computing, skins and themes are custom graphical appearances (GUIs) that can be applied to certain software and websites in order to suit the different tastes of different users. Such software is referred to as being skinnable, and the process of writing or applying such a skin is known as skinning. Applying a skin changes a piece of software's look and feel - some skins merely make the program more aesthetically pleasing, but others can rearrange elements of the interface, potentially making the program easier to use. Although often used simply as a synonym for skin, the term theme normally refers to less complex customisations, such as a set of icons and matching colour scheme for an operating system - notably, this is how the term was used in association with Windows 95. Probably the most popular customised skins are for instant messengers and media players, such as the AOL Instant Messenger, and Winamp, due to the association with fun such programs try to encourage. However, in programs which use a cross-platform GUI toolkit, rather than using the standard interface for the operating system on which they are running, it is relatively easy to add functionality to alter this interface from within the program. For instance, both the Mozilla and Opera web browsers are skinnable because they take advantage of a cross-platform toolkit. In the case of Mozilla, the entire interface is written in XUL, CSS, and JavaScript. Those who know these languages are free to modify both its look and its behavior. Many websites are also skinnable, particularly those which provide some interactive capabilities. Again, some sites offer skins that make primarily cosmetic changes, while some - such as H2G2 - allow major changes to the layout of pages. As with standalone software interfaces, this is facilitated by the underlying technology of the website - the use of XML and XSLT, for instance, facilitates major changes of layout, while CSS can be used to easily produce different visual styles. Wikipedia supports a range of skins that make minor alterations to the visual style of pages. To change the skin in which you view Wikipedia, you need to edit your preferences. The benefit of skinning in user interfaces is disputed. While some find it useful or pleasant to be able to change the appearance of software they use, a changed appearance can complicate technical support and training. A user interface that has been extensively customized by one person may appear totally unfamiliar to another person who knows the same software under a different appearance. Content Provided by Wikipedia 11
254 What is flash memory? Flash memory is a form of EEPROM that allows multiple memory locations to be erased or written in one programming operation. Normal EEPROM only allows one location at a time to be erased or written, meaning that flash can operate at higher effective speeds when the systems using it read and write to different locations at the same time. All types of flash memory and EEPROM wear out after a certain number of erase operations. Flash memory is made in two forms: NOR flash and NAND flash. The names refer to the type of logic gate used in each storage cell. NOR flash was the first type to be developed, invented by Intel in 1988. It has long erase and write times, but has a full address/data (memory) interface that allows random access to any location. This makes it suitable for storage of program code that needs to be infrequently updated, as in digital cameras and PDAs. Its endurance is 10,000 to 100,000 erase cycles. NOR-based flash is the basis of early flash-based removable media; Compact Flash and SmartMedia are both based on it. NAND flash from Toshiba followed in 1989. It has faster erase and write times, higher density, and lower cost per bit than NOR flash, and ten times the endurance. However its I/O interface allows only sequential access to data. This makes it suitable for mass-storage devices such as PC cards and various memory cards, and somewhat less useful for computer memory. NAND-based flash has led to several much smaller removable media formats, MMC, Secure Digital and Memory Stick. Flash memory forms the core of the removable USB interface storage devices known as keydrives. Content Provided by Wikipedia 11
255 What is software? Computer software is a generic term for organized collections of code representing instructions executed by a computer. Software is often written first as source code, and then converted to a binary format that is specific to the device on which the code will be executed. Software for personal computers is often broken into two major categories: system software that provides the basic non-task-specific functions of the computer, and application software used to accomplish specific user-oriented tasks. Programs stored on non-volatile storage on integrated circuits are usually termed firmware. The term was first used in this sense by John W. Tukey in 1957. System software System software is responsible for controlling, integrating, and managing the individual hardware components of a computer system so that other software and the users of the system see it as a functional unit without having to be concerned with the low-level details such as transferring data from memory to disk, or rendering text onto a display. Generally, system software consists of an operating system and some fundamental utilities such as disk formatters, file managers, display managers, text editors, user authentication (login) and management tools, and networking and device control software. Application software Application software, on the other hand, is used to accomplish specific tasks other than just running the computer system. Application software may consist of a single program, such as an image viewer; a small collection of programs (often called a software package) that work closely together to accomplish a task, such as a spreadsheet or text processing system; a larger collection (often called a software suite) of related but independent programs and packages that have a common user interface or shared data format, such as Microsoft Office, which consists of closely integrated word processor, spreadsheet, database management system, etc.; or a software system, such as a database management system, which is a collection of fundamental programs that may provide some service to a variety of other independent applications. Software creation Software is created with programming languages and related utilities, which may come in several of the above forms: single programs like script interpreters, packages containing a compiler, linker, and other tools; and large suites (often called Integrated Development Environments) that include editors, debuggers, and other tools for multiple languages. Content Provided by Wikipedia 11
256 How to make a favicon? A favicon, also known as a page icon, is an icon associated with a particular website. A web designer can create such an icon, and many graphical web browsers - such as recent versions of Internet Explorer, Mozilla, Opera, and Konqueror - can then make use of them. Browsers that support favicons display them in the browser's address bar, next to the site's name in lists of bookmarks, and next to the page's title in a Tabbed Document Interface. The original means of defining a favicon was by placing a file called favicon.ico in the root directory of a webserver. This would then automatically be used in Internet Explorer's favorites (bookmarks) display. Later, however, a more flexible system was created, using HTML to indicate the location of an icon for any given page. This is achieved using a tag of the form <link rel="shortcut icon" href="favicon.ico"> in the <head> section of the page. In this way, any appropriately sized image can be used, and although many still use the .ico format, others use GIF or PNG files. Most modern browsers implement both methods, causing web servers to receive many request for the file "favicon.ico" even if it doesn't exist, causing irritation for administrators looking through their log files. Content Provided by Wikipedia 11
257 What is internet radio or web radio? The term Web radio refers to a radio re-broadcasting service one can receive via the Internet. Because the radio signal is relayed over the Internet through the World Wide Web, it is possible to access the stations from anywhere in the worldfor example, to listen to an Australian radio station from Europe or America. This makes it a popular service for expatriates and for people who have 'niche' interests that may not be adequately catered for by their local radio stations (e.g., country music). Some of the web radio services available via the Internet offer news, sports, talkback, and various genres of musiceverything that is on the radio station being re-broadcast. Not every Web "radio station" has a corresponding traditional radio station. Many web radio stations are completely independent from traditional ("terrestrial") radio stations and broadcast only on the Internet. Broadcasting on the Internet is usually referred to as webcasting. One of the most common ways to distribute Web radio is via streaming MP3 technology, which uses the well-known MP3 music format. The bits are "streamed" over a TCP/IP connection, then reassembled and played within about 2 seconds. Therefore, streaming MP3 radio has about a 2 second lag time. There are three major components to an MP3 stream: audio stream source audio stream repeater (server) audio stream playback There are many methods for creating the audio stream source. One of the easiest and most popular ways to compose this stream is by using the Live365 web service, which allows Internet users with very little technological know-how to begin webcasting legal audio streams in MP3 and mp3PRO formats within minutes. Those more technologically savvy may opt for the SHOUTcast service, which utilizes Winamp and the SHOUTcast DSP plugin to deliver MP3 audio at higher bitrates. Other methods include open source technologies such as Streamcast, stream-db, and IceS. Using open source stream source tools allows for interesting web interface possibilities like phpStreamcast. Two of the most popular Web radio networks are Live365 and Shoutcast. Open source alternatives include Icecast and Xiph.org, which include Ogg Vorbis streamings (that can be played by Winamp and Zinf). Collectively, these Web radio servers list thousands of Internet radio stations covering an ever-expanding variety of genres. The purpose of the server is to repeat the stream source to the audio playback software. Some sort of audio playback software, that is capable of reading HTTP data streams, is needed to listen to streaming MP3 audio. Some popular MP3 players are Winamp for Windows, iTunes for Macintosh and Microsoft Windows, and XMMS on UNIX/Linux. There are also a small number of web radio programs that allow users to rate the songs they are listening to. This allows a user's music listening choices to be correlated against those of others, as with the programs iRATE radio and Last.fm. The first Internet "radio station", Internet Talk Radio, was developed by Carl Malumud in 1993. Malumud's station used a technology called MBONE(IP Multicast Backbone on the Internet). In February, 1995, the first full-time, Internet-only radio station, Radio HK, began broadcasting the music of independent bands. Radio HK was created by Norman Hajjar and the Hajjar/Kaufman New Media Lab, an advertising agency in Marina del Rey, California. Hajjar's method was to use a CU-SeeMe web conferencing reflector connected to a custom created audio CD in endless loop. Later, Radio HK converted to one of the original RealAudio servers. Today, Internet radio stations such as VoyagerRadio utilize the technologies of web services like Live365 to webcast 24 hours a day. Content Provided by Wikipedia 11
258 Troubleshoot the Video Adapter Driver in Safe Mode in Windows XP Locate the Video Adapter in Normal ModeTo locate the video adapter that is used in Normal mode: Click Start, point to Settings, and then click Control Panel .Double-click System, click Hardware, and then click Device Manager. Click the PLUS SIGN to expand Display Adapters. Run the Display Troubleshooter To run the Display Troubleshooter: Follow steps 1 through 3 to find the video adapter adapter. Double-click the video adapter driver. On the General tab, click Troubleshoot. Update, Roll Back, or Uninstall the Video Adapter Driver To view driver details, and to update, roll back, or uninstall the video adapter driver: Follow steps 1 through 3 to find the video adapter adapter. Double-click the video adapter driver.On the Driver tab, click the appropriate button based on the action that you want to perform:Driver Details Update Driver Roll Back Driver Uninstall Troubleshooting When you start the computer in Safe mode, your video adapter resolution and colors may temporarily change in such a way that the windows and icons on your screen become very large, which may make it difficult for some windows to fit. This behavior is dependent on the type of video adapter that you are using. Note: In Safe mode, you may notice an option to stop the VgaSave service if you follow these steps: Open the Display properties. Click Settings. Click Advanced. Click Adapter. Click Properties. Click Driver. Click Settings. Click Advanced. Click Adapter. Click Properties. Click Driver. Click Advanced. Click Adapter. Click Properties. Click Driver. Click Adapter. Click Properties. Click Driver. Click Properties. Click Driver. Click Driver.
The VgaSave service should not be stopped while the computer is in Safe mode because it is a component that allows Windows to display the screen. back to the top 106
259 Troubleshooting Network Connectivity Troubleshooting the Hub If your entire network is down, check your hub/router and see if it has power and that your Cable or DSL modem it online. If everything is working correctly between the Internet and your network hardware has power, you should see activity lights blinking. If there are no lights on, check it's power cords. Is the power cord plugged in correctly? If it is, is there another power outlet close by you can plug the power cords into? If not, do you have something else you can plug into that outlet to check the outlet? What we're trying to do here is establish whether or not the power outlet is dead. If the power outlet is dead, check your circuit breakers. If the power outlet is not dead you probably need to replace the Cable/DSL modem or hub/router or have it serviced. If the problem is only with a few users, trace the cable that runs from their computer to the hub/router. Is the port the cable is plugged into active? If it isn't, is there another port available? If there is, try plugging their cable into another port. If the computer works from another port, then more than likely you have a bad port on the hub. Troubleshooting the Cable If you don't have connectivity, you may have cable testing equipment, test the cable at this time. If you don't have cable testing equipment, take a cable from a working computer and plug it into the computer that is not working. If the computer now works, you've got a bad cable, replace it. If you are going to be supporting a large network, you may want to invest in cable testing equipment. Cable testing equipment is not very expensive and can save you a lot of time. 107
260 How to get into safe mode when using Win95-98. On your screen, locate and click the Start button. From the Start menu, click Shut Down. In the Shut Down Windows dialog box, click Restart the computer, then click OK. The next step depends on whether you are using Windows 95 or Windows 98: If you're running Windows 95, press the F8 key when you see the "Starting Windows 95..." message. If you're running Windows 98 or Windows Me, press and hold down the CTRL key until the Start Menu appears. At the Start Menu, arrow down to Safe Mode, then press ENTER. 108
261 How to get into safe mode when using WindowsXP The technique for forcing Windows XP into Safe mode is, as you've noticed, not the same as for Windows 9x. From the Start menu's Run dialog, enter the command MSConfig. Click on the BOOT.INI tab and check the /SAFEBOOT box. Now when you boot, Windows will go into Safe mode. Naturally, when you no longer need Safe mode, you'll repeat the process and uncheck that box. One caveat: Don't experiment with the other settings on this tab. You could wind up unable to get back into MSConfig to undo your changes. 108
262 Standard Original IBM POST Error Codes 1 short beep Normal POST - system is ok 2 short beeps POST Error - error code shown on screen No beep Power supply or system board problem Continuous beep Power supply, system board, or keyboard problem Repeating short beeps Power supply or system board problem 1 long, 1 short beep System board problem 1 long, 2 short beeps Display adapter problem (MDA, CGA) 1 long, 3 short beeps Enhanced Graphics Adapter (EGA) 3 long beeps 3270 keyboard card 101
263 BIOS Basics The computer POST (Power On Self Test) which tests the computer insuring that it meets the necessary system requirements before booting up. If the computer fails the POST the computer then returns a beep code indicating what is causing the computer not to post the POST. Generally if the computer POSTs properly you will receive a single beep (with some computer BIOS manufacturers it may beep twice). Each time the computer boots up the computer must past the POST. The following is the procedure of the POST: 1. The first step of POST is the testing of the Power Supply to ensure that it is turned on and that it releases its reset signal. 2. CPU must exit the reset status mode and thereafter be able to execute instructions. 3. BIOS must be have readable. 4. BIOS checksum must be valid, meaning that it must be readable. 5. CMOS be accessible for reading. 6. CMOS checksum must be valid, meaning that it must be readable. 7. CPU must be able to read all forms of memory such as the memory controller, memory bus, and memory module. 8. The first 64KB of memory must be operational and have the capability to be read and written to and from, and capable of containing the POST code. 9. I/O bus / controller must be accessible. 10. I/O bus must be able to write / read from the video subsystem and be able to read all video RAM.. If the computer does not pass any of the above tests your computer will receive an irregular POST. An irregular POST is a beep code which is different from the standard which can be either no beeps at all or a combination of different beeps indicating what is causing the computer not to past the POST. 101
264 Macintosh Start Tones TONES ERROR Error Tone. (two sets of different tones) Problem with logic board or SCSI bus. Startup tone, drive spins, no video Problem with video controller. Powers on, no tone. Logic board problem. High Tone, four higher tones. Problem with SIMM. 101
|