to advance communications
USERS MANUAL
HyperACCESS
for Windows
Version 8.3
Information in this manual is subject to change without notice and does not represent a commitment on the part of Hilgraeve
Inc. The software described in this manual is furnished under a license agreement. The software may be used or copied only
in accordance with the terms of the agreement. It is against the law to copy the software on any medium except as specifically
allowed in the agreement. No part of this manual may be reproduced or transmitted in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise, without prior written permission of Hilgraeve Inc.
Use, duplication, or disclosure by the Government is subject to restrictions set forth in paragraph (b)(3)(B) of the Rights in
Technical Data and Computer Software clause of DAR 7-104.9(a). Contractor/Manufacturer is Hilgraeve, Genesis Centre,
111 Conant Avenue, Suite A, Monroe, MI 48161.
TRADEMARKS
HAWin, HyperACCESS/5, HyperPilot, HyperProtocol, HyperGuard, and CommSense are trademarks, and HyperACCESS
is a registered trademark of Hilgraeve Inc. Commercial names of products from other manufacturers or developers that appear
in this manual are registered or unregistered trademarks of those respective manufacturers or developers, which have expressed
neither approval nor disapproval of Hilgraeve products.
HyperACCESS includes HyperGuard antivirus technology, US Patent 5,319,776, and technology licensed under US Patent
4,558,302. It also includes CommSense, which is protected by US Patent 5,553,271.
Copyright Hilgraeve Inc. 1993-2000. All rights reserved. Simultaneously published in the U.S. and Canada. Printed in the
United States of America.
HyperACCESS was designed and created by Chris Baumgartner, Jadwiga Carlson, Bob Everett, Matt Gray, John Hile, Jeff
Hopwood, Vince Jessee, Bob Kundrat, Susan Lewis, John Masters, Dwayne Newsome, Paul Petrillo, Susan Pinson, Sam
Shipley, Mike Thompson, Ron Vorndam, and Mike Ward.
Document and online help written and produced by Mahler Associates, Inc., Ann Arbor, MI
Table of Contents
Introduction
About This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
HyperACCESS Manual Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
Text Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Keyboard Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Using a Mouse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
HyperACCESS Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Hilgraeve Customer Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
1 Introduction to HyperACCESS
What You Will Find in This Chapter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1
HyperACCESS User Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
3 Common Procedures
What You Will Find in This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
General Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Drag and Drop. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Using Pop-up Menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Working With Notebooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11
Adding an Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11
Copying a Notebook Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
Modifying Entry Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16
Moving an Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16
Deleting an Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16
Creating Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17
Creating Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-19
Deleting Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23
Creating Custom Notebooks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-24
Making Calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-24
Calling a Remote System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25
Starting Communications Sessions From a Command File or Prompt . . . . . . . 3-36
Starting Communications Sessions From the Desktop . . . . . . . . . . . . . . . . . . . 3-37
Starting Communications Sessions From Windows Startup . . . . . . . . . . . . . . . 3-38
Starting Communications Sessions Using the Start Menu . . . . . . . . . . . . . . . . 3-39
Using HyperACCESS With a Web Browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-39
Chatting With a User on the Remote PC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-41
Quitting HyperACCESS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-43
Receiving and Sending Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-43
Receiving Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-43
Capturing Text to a File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-45
Printing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-47
Sending Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-50
Changing Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-53
Changing Property Sheet Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-53
Changing File Transfer Protocol Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-53
Changing Terminal Emulator Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-55
Configuring Communications Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-55
Modifying Communications Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-56
Modifying Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-59
Table of Contents v
4 HyperACCESS Reference
What You Will Find in This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
Phonebook Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Phonebook Panel Menu Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3
Phonebook Panel File Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
Phonebook Panel View Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15
Phonebook Panel Notebook Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-19
Phonebook Options Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-21
Phonebook Panel Automation Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-24
Phonebook Panel Window Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-25
Phonebook Panel Help Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-26
Phonebook Panel Buttons. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-26
Properties Sheets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27
Description Properties Sheet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-28
Communications Properties Sheet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-29
Communications Properties Sheet for Modem Connections . . . . . . . . . . . . . . 4-31
Communications Properties Sheet for Direct Cable Connections. . . . . . . . . . . 4-41
Communications Properties Sheet for WinSock(TCP/IP) Connections . . . . . . . 4-43
Terminal Emulator Properties Sheet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-43
ASCII Receiving Properties Sheet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-46
vi Table of Contents
5 Automation Tools
What You Will Find in This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
Automating Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
Macros . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
Automatically Generated Vs. Custom-Written Programs . . . . . . . . . . . . . . . . . . 5-3
Generating Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-5
Recording a Logon Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-5
Recording Other Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-6
Assigning Programs to Keys or Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9
Running Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12
Terminating a Macro or Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12
Editing Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12
Changing Assignment of a Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-13
Adding Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-14
Modifying a Program Assignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-15
Editing a Program Assigned to a Key or Button . . . . . . . . . . . . . . . . . . . . . . . . 5-15
Deleting a Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-15
6 HyperACCESS Host
What You Will Find in This Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
Introduction to HyperACCESS Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
Preparing to Answer Calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2
Defining Security Settings for Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-5
Assigning Passwords and Access Privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-8
File Transfer Properties Sheet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-14
Specifying a Greeting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-16
Automatically Launching HyperACCESS Host . . . . . . . . . . . . . . . . . . . . . . . . . . 6-17
How Callers Access HyperACCESS Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-17
How Callers Connect and Log On . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-18
How Callers Command Your PC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-19
viii Table of Contents
A Glossary
C ASCII Characters
CompuServe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-6
DG210 & DG211 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-6
IBM 3101. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-7
IBM 3278. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-10
SCO ANSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-12
TTY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-12
TV910, TV912, TV920, TV925 and TV950 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-13
VT52, VT100, VT102, VT220, and VT320. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-15
Wyse 50 and Wyse 60 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-20
Index
x Table of Contents
Introduction
Text Conventions
Words and characters shown as ALL CAPITALS in Courier font are folder or file
names. For example, \HAWIN is a folder name; MYPROG.CMD is a filename. Key
names are shown as A, C, E, or H.
Words and characters in bold indicate anything you must type exactly as it appears.
For example, COM1 specifies that you should type the bold characters exactly as
shown. A special bold font identifies push buttons or key words and phrases found in
dialogs. For example, click the Settings... button. In some cases, words and
characters in bold also indicate emphasis.
Words and characters in italics indicate a new term introduced. An explanation
generally follows the italicized term. Appendix A, Glossary, includes many of the
italicized terms. (In this case, as elsewhere in this manual, italics also indicate
references to specific chapter or section titles.)
Mnemonic command letters used in menus and dialogs (e.g., F for File menu) appear
in bold with an underline to be consistent with the screen displays. References to menu
selections appear as File/Open. This means that you should select the Open menu
item from the File menu.
Keyboard Commands
Keyboard commands, key combinations, and key sequences are described as follows:
Keystroke(s) Description
KEY1+KEY2 A plus sign (+) between key names
means to press and hold the first key
(KEY1) and type the second key
(KEY2). For example, A+4 means to
hold down the A key, type the 4 key,
and then release both the A and 4 keys.
KEY1, KEY2 A comma (,) between key names means
to type the keys in the sequence shown.
For example, if youre instructed to type
R, e, you would type the letter R fol-
lowed by the e key.
xiv Introduction
Using a Mouse
A mouse is highly recommended, but not required, for running HyperACCESS. You
normally make choices and selections using the standard left mouse button (also called
button 1), unless you are using a left-hand mouse or have remapped the mouse to use
the right button.
You use the right mouse button (also called button 2) to display pop-up menus and to
drag and drop objects. You can also remap this button for a left-hand mouse.
HyperACCESS Help
There are several techniques for obtaining help from HyperACCESS select Help
from the menu bar, click on a Help button, or press 1.
Regardless of the technique you use, you obtain context-sensitive help whenever
possible. This means that HyperACCESS automatically displays information about
the current window or dialog box. Once this information appears on your screen, in
its own window, procedures for browsing and using help are the same.
Figure i-1 illustrates the Help menu you see when you select Help from the menu bar.
Figure i-1.
The Help menu lets
you select topics from
a list of contents and
view information
about HyperACCESS.
The Help/Help Topics menu item displays an alphabetical list of all Help topics for
HyperACCESS. You can also display Help Contents by pressing 1 from the main
HyperACCESS window with no entries selected. The other Help menu items are:
Using Help Opens a Help window and displays instructions for using
Help.
About Displays important information about HyperACCESS, such
HyperACCESS as the copyright and version.
To locate specific information about HyperACCESS simply click on Help and then
Help Topics. Youll also find that some Help topics refer to other topics. You can view
Hilgraeve Customer Support xv
these related items by clicking on underlined words or phrases. Words with a dotted
underline appear in the glossary, displaying a pop-up that disappears when you press
any key or click anywhere with your mouse.
For additional information on using Help, see your Windows 95 or NT documentation
or Help/Using Help.
If you have a question about HyperACCESS and cant find the answer in this manual
or in the HyperACCESS Help system, you can reach us by:
Internet
You can reach the Hilgraeve BBS through the Internet using telnet access. The address
is: HBBS.hilgraeve.com or 216.197.24.14. Set your terminal type to ANSI.
To send e-mail to Hilgraeve Customer Support via the Internet, use the address:
support@hilgraeve.com.
You can also communicate with Hilgraeve via our World Wide Web page. Find out
about our latest products and product enhancements, send e-mail to Hilgraeve Cus-
tomer Support, find out more about Hilgraeve, and link to other interesting sites. Use
the address: http://www.hilgraeve.com
Hilgraeve BBS
Call the Hilgraeve BBS at (734) 243-5915 (or through the Internet see above), and
send a message to our Customer Support staff. For your convenience, the
HyperACCESS Phonebook already contains the Hilgraeve BBS telephone number
and correct settings, and Chapter 2 explains what you can expect to see in Placing
Your First Call on page 2-19. We will try to respond to you on the BBS within one
business day, so you can call back at your convenience to get the answer. Asking
questions on our BBS is easy and confidential messages exchanged with our
Customer Support staff are private and never seen by other callers.
xvi Introduction
CompuServe
If you prefer, you can reach Hilgraeve Customer Support through CompuServe. Use
the GO HILGRAEVE command. Youll be sent to the ComVen forum. Then look for
the Hilgraeve section. Send us a message in the category of your choice. You can also
send e-mail to our Customer Support at 71333,31.
Telephone Support
If you need answers quickly, or simply prefer talking to humans, call (734) 243-0576,
between 9:00 am and 6:00 pm Eastern Time. Our Customer Support staff will give
you the advice you need to get the most from HyperACCESS. Before you call, please
register your copy of HyperACCESS by returning the Registration Card or by
accessing the Hilgraeve BBS.
We suggest that you try to duplicate the problem, and as you do so, write down each
step as well as any error messages you see. So that we can provide you with the best
possible customer support, we recommend that you be at your computer when you
call, and try to have the following available:
The version and serial number from the label on the back of the CD-ROM case
or on the your HyperACCESS diskette label.
Windows 95 or NT version number. To display it, do the following:
a) Click the Start button in the task bar to display the start menu.
b) Drag the highlight up (or click on) Settings.
c) Click on Control Panel in the cascade menu.
d) When the Control Panel displays, double-click on the System icon. This
displays the General tab of the System Properties window.
Computer information including type and model of computer, monitor, and
video card. Amount and type of installed memory are also important.
Connection information type of connection (modem, shared port, direct
cable, TCP/IP), physical device (i.e., COM1, COM2).
Modem information brand and model and any custom settings youve
specified.
Hilgraeve Customer Support xvii
Hilgraeve Inc.
Genesis Centre
111 Conant Avenue, Suite A
Monroe, MI 48161
This chapter provides a brief introduction and overview of the major features of
HyperACCESS. Youll find HyperACCESS one of the most exciting new develop-
ments in communications applications. Many of its features and capabilities are not
available in any other communications software and HyperACCESS is easy to
learn and use.
If youre already familiar with previous versions of HyperACCESS, youll find this
version is even better. The most visible improvement is that HyperACCESS takes
full advantage of the 32-bit operating environment and Graphical User Interface
(GUI) of Windows 95, 98, and NT. And the implementation of the GUI adds a whole
new dimension to the benefits youll receive with this software. Among them:
Learn it easily because HyperACCESS follows Windows 95, 98, and NT
GUI standards, youll find that its easier to learn than other communications
programs. Youll be placing your first call within minutes by double-clicking
on an entry instead of wrestling with menus and manuals for hours.
If you ever need help, the context-sensitive online help system is there when
you need it.
Use it quickly you can use a mouse to click your way through a communi-
cations session because HyperACCESS has a logical menu structure. Youll
also find helpful pop-up (context) menus available at the click of a mouse
button.
Shatter performance barriers youll get faster file transfers, faster termi-
nal emulators, and faster system response with HyperACCESS.
Youll be able to see the difference because other Windows 95, 98, and NT
communications software is just plain slow. What makes HyperACCESS
superior? Our hot Modular Communications Engine (MCE) technology deliv-
ers incredible performance. It divides the program into separate threads that
1-2 Introduction to HyperACCESS
handle low-level I/O, file transfer and terminal emulation, and user interface.
All parts of HyperACCESS work together like a relay team to deliver unbeliev-
able performance that sets a new standard for GUI-based communications
software.
Connect to the Internet use the built-in entry files and scripts to connect to
Telnet sites, Internet IP, or shell accounts. Launch your Web browser from
HyperACCESS or use HyperACCESS from within your browser whenever you
click a hypertext link to a Telnet site. HyperACCESS works seamlessly with
Netscape Navigator or Microsoft Explorer.
With Telnet you can explore some of the best sites on the Internet. Telnet lets
you act as a terminal with thousands of host computers using your local Internet
service provider rather than dialing direct and paying for long distance telephone
charges. Telnet is the most common way to access databases, libraries, and run
applications like Archie, Veronica, Gopher, FTP, Lynx, and Pine on
remote host computers.
Use in-place activation, embedding, and linking operations save time
and effort with advanced Windows features that let you use one program from
within another. You can activate your browser from the HyperACCESS terminal
panel, or have HyperACCESS automatically load and run from your browser
when you click on a Telnet address. HyperACCESS supports the new
ActiveDesktop standards defined for Office 97.
Fend off viruses HyperGuardTM antivirus technology (US Pat 5,319,776)
skirts disaster by warning you instantly if files you download contain any of over
80,000 known viruses. Its X-ray Vision even spots viruses hiding in compressed
files. You can download free updates to your virus protection.
Expand Zip files on-the-fly You can expand Zip files or self-extracting
EXE files as you receive them. This saves you the trouble of running the EXE
or a program like PKUNZIP or WinZip after youve received files.
Create unlimited dialing directories youll find that HyperACCESSs
dialing directories, called notebooks, store complete dialing and configuration
information for an unlimited number of systems. HyperACCESS has the most
powerful and extensive dialing support available in any communications soft-
ware. You can even save Web addresses and automatically connect to your
service provider, launch your Web browser, and access a favorite site with a
simple double-click of your mouse button.
HyperACCESS User Benefits 1-3
or pop-up menus. You can read your e-mail in the Backscroll Buffer and quickly
create and send an answer with Message Pad. With Message Pad, you can
eliminate embarrassing spelling errors with the built-in spell checker.
Hundreds of BBS and Internet access numbers provided comes with
BBS and Internet list files that provide access to hundreds of BBSs and Internet
service providers. You can download other lists in this compact format, and add
entries from any list to one or more of your notebooks.
Use pop-up menus and long filenames imple-
ments pop-up menus and long filenames. A pop-up Pop-up menus appear vir-
menu appears next to an object when you click mouse tually everywhere in
HyperACCESS. Just point
button 2 (usually the right button) on the object. The at an object and click
displayed menu items depend on the type and location mouse button 2 to see rel-
of the object, as well as the current task. evant menu selections.
HyperACCESS can handle filenames consisting of up
to 254 characters. Long filenames are case sensitive and can include spaces.
Use drag and drop you can move or create a shortcut to entries from one
notebook to another using drag and drop, and you can create a shortcut to a
notebook entry on your desktop. You can also drag a notebook entry to the
Terminal panel tab to open the entry and initiate connection. You can even drag
an entry from one of our extensive BBS lists to the Terminal panel tab to try out
the BBS.
Do two things at once now you can talk to two or more systems simulta-
neously if you have the right hardware (for example, two or more modems and
communications ports). You can run an instance of HyperACCESS for each
available communications port.
With this feature you can talk to your corporate mainframe in one window and
dial a remote system in another window. You can even cut and paste data
between windows for easy transfer of information from one system to another.
You dont have to worry about whether one computer is compatible with another
because HyperACCESS automatically takes care of that for you.
Get outstanding customer support even advanced users run into tricky
problems once in a while. We take pride in getting you up and running with
HyperACCESS, as well as keeping you up and running with our highly trained
and experienced Customer Support staff.
Chapter 2
Installing HyperACCESS and Placing Your First Call
The first part of this chapter provides installation procedures for HyperACCESS. The
second part instructs you on how to make your first phone call to the Hilgraeve
Bulletin Board. This short tutorial guarantees that your installation is successful, and
it is sufficient for many experienced computer users to begin using HyperACCESS
on a regular basis. It also lets you register your software for future upgrade offers.
All users should read the section below. You can then skip to the installation section
for your situation. If youre installing HyperACCESS for the first time, read Installing
HyperACCESS for the First Time on page 2-2. For network installations, see Network
Installation on page 2-11. If youre replacing a previous installation, see Upgrading
From a Previous Version on page 2-17. There are also sections that deal with
upgrades from HyperACCESS/5 (see page 2-17), HyperACCESS for Windows, and
from Procomm (see page 2-18).
Youll find installing HyperACCESS easy, because our Setup program takes care of
most details for you. Dont try to copy HyperACCESS files from the CD-ROM or
distribution disk(s).
Caution: You must use HyperACCESS Setup to copy all files correctly and properly
update your system files.
Before you begin HyperACCESS installation, we recommend that you first install
your modem. Be sure to follow the manufacturers instructions for installation,
configuration, and testing of your modem. See Appendix B, Modems, Communica-
tions Ports, and Cables, for additional information on installing internal and external
modems.
During the installation process youll provide information about your modem and
communications port.
To install HyperACCESS:
1. Start Windows 95 or NT.
2. Insert the HyperACCESS CD in your CD-Rom drive (usually drive D or E), or
Program Disk #1 into a diskette drive (usually drive A). Windows automatically
starts the setup program when you insert the CD. If youre ready to install
HyperACCESS when you insert the CD, continue with step 4. To install from
diskette or at a later time (after closing the autorun setup program), continue
with the next step.
3. From the desktop, you can either:
Use the Windows Add/Remove Programs option in Control Panel. To do
this:
a. Click the Start menu in the Windows Taskbar. Then select Settings/
Control Panel.
b. In Control Panel, select Add/Remove Programs, then click the
Install... button, and follow instructions provided by the wizard.
Installing HyperACCESS for the First Time 2-3
Figure 2-1.
This Welcome panel
suggests that you exit
all other Windows
applications.
2-4 Installing HyperACCESS and Placing Your First Call
5. Use the Program Directory panel (see Figure 2-2) to select where you want
HyperACCESS installed. By default, the setup program suggests a folder under
Program Files. Use the Browse... button to change the directory or drive.
Figure 2-2.
This Program Direc-
tory panel suggests a
folder for installing
HyperACCESS. Use
the Browse... but-
ton to change the
directory or
drive.
6. Use the Data Directory panel (see Figure 2-2) to select where you want
HyperACCESS to install and look for entries and user programs. By default, the
setup program suggests a folder under the HyperACCESS program folder called
My Files. Use the Browse... button to change the directory or drive.
Figure 2-3.
This Data Directory
panel suggests a
folder for installing
and looking for
entries and user pro-
grams. Use the
Browse... button to
change the directory
or drive.
Note: HyperACCESS creates a LISTS subdirectory under the data directory. This
directory stores list files that contain libraries and on-line systems that you can call
from the Lists panel. The data directory is also the parent of the HOSTDATA directory.
HyperACCESS Host uses this directory as the default home directory for users calling
Installing HyperACCESS for the First Time 2-5
your computer. Finally, the data directory is the default parent for the UPLOAD and
DOWNLOAD directories that you will have a chance to specify in step 17.
7. In the Setup Type panel (see Figure 2-4), select one of the radio buttons and
click Next. If you pick Full or Compact, skip to step 9.
Figure 2-4.
This Setup Type panel
lets you select the
type of installation
you want.
Figure 2-5.
This Select Compo-
nents dialog lets you
select individual com-
ponents you want to
install.
2-6 Installing HyperACCESS and Placing Your First Call
Figure 2-6.
The Ready to Install
panel summarizes
your installation
selections.
10. The setup program then displays progress bars to show how the installation is
proceeding. If necessary, the program displays a dialog requesting the next
diskette. Insert the next diskette in the specified drive, or modify the path (if
necessary) and click OK to continue installation.
11. Finally, the installation program displays a dialog (see Figure 2-7) requesting
permission to reboot Windows so that Windows can update your configuration
information. If you click OK, Windows reboots and automatically executes
HyperACCESS. In either case, HyperACCESS finishes its installation when you
first run it.
Figure 2-7.
HyperACCESS
requests permission
to reboot.
Note: To view changes that the HyperACCESS installation program made to your
system, you can view the INSTALL.LOG file. You will find this file in the data
directory you specified in step 6. Do not delete or modify this file. HyperACCESS
uninstall must use the file if you remove HyperACCESS at some future date.
Installing HyperACCESS for the First Time 2-7
Figure 2-8.
Registration dialog
with sample data.
13. HyperACCESS then presents additional panels to complete the installation and
default configuration. The first panel, shown in Figure 2-9, lets you choose an
existing connection or define a new connection.
Figure 2-9.
Select either existing
or new connection.
14. If you need to define a new connection, click the Define a new connection
radio button, otherwise leave the Choose from among existing connections
radio button selected.
15. Click Next. If you left the Choose from among existing connections radio
button selected, continue with step 16. Otherwise, the installation program
2-8 Installing HyperACCESS and Placing Your First Call
displays the Type of Connection panel shown in Figure 2-10. By default, this
dialog shows the Modem or Modem Pool (TAPI) connection selected. Click the
Run Modem Wizard Now... button to define a new TAPI connection. For more
information on creating connections, see Creating Connections on page 3-19.
Then, for Modem connections, click Back and return to step 14. Otherwise, click
Next and continue with step 17.
Figure 2-10.
Select either existing
or new connection.
16. The Existing Connections panel (see Figure 2-11) displays connections that
youve defined through Windows TAPI, previous versions of HyperACCESS,
or other communications or fax programs. Select the connection you want to use
as the default for HyperACCESS connections. Then click Next.
Figure 2-11.
Existing Connections
panel with sample
data.
17. Use the panel shown in Figure 2-12 to enter default folders that you want
HyperACCESS to use for sending and receiving files. By default,
HyperACCESS lists the data folder you specified earlier in the installation with
Download and Upload subdirectories.
Installing HyperACCESS for the First Time 2-9
Figure 2-12.
Enter default sending
and receiving folders
in this dialog.
18. Use the panel shown in Figure 2-13 to specify the default behavior for
HyperACCESS when you download files. Selecting Yes sets the default to
perform on-the-fly virus detection. Selecting No turns off on-the-fly virus
detection by default. In either case, you can change the default settings using the
Receive dialog (see Receiving Files on page 3-43).
Figure 2-13.
Use this panel to indi-
cate whether you
want HyperACCESS
to perform virus
checking by default.
2-10 Installing HyperACCESS and Placing Your First Call
19. To conclude the installation process, read the final dialog (shown in
Figure 2-14), and click Finish.
Figure 2-14.
Click Finish to end
installation.
HyperACCESS loads and updates defaults and predefined entries for calling remote
systems with the information youve supplied.
If you have either Microsoft Internet Explorer or Netscape Navigator installed on your
system and HyperACCESS isnt defined as the default Telnet application, you see the
dialog shown in Figure 2-15 whenever HyperACCESS loads. You can disable display
of this dialog by selecting the check box before clicking Yes or No.
Figure 2-15.
Selecting the default
telnet application.
Finally, you should check the Readme.txt file, so double-click the HyperACCESS
Readme icon in the HyperACCESS folder.
Figure 2-16.
The HyperACCESS
folder.
Note: If you close the HyperACCESS folder, you can easily reopen it from the Windows
Start menu. Simply select Start/Programs/HyperACCESS/HyperACCESS (folder).
Network Installation
You can install HyperACCESS on a network server. Each user must have a separate
data folder for notebooks and custom settings. Any changes made to one users
notebooks are independent of changes other users make.
Note: Please carefully read the license agreement and make certain that you purchase
the number of licenses required.
This method installs HyperACCESS on the server and provides user access to common
program and data files through either the System or User path. With this technique,
users must have their own data directory.
To perform a server-only installation, follow these steps:
1. On a workstation with access to the server and with a user id with read, write,
and create permission, install HyperACCESS on a network drive using the
normal installation procedures defined in Chapter 2, Installing HyperACCESS
and Placing Your First Call. Make sure you install the program in a network
directory to which users only have read access.
2. Use one of the following two procedures depending on whether you want to give
all users or only some users access to HyperACCESS
Modify the System path if you want all users to have access to
HyperACCESS. To do this, follow these steps:
a. Select Settings/Control Panel and double-click on System.
b. Click on the Environment tab in the System dialog. This displays a
dialog that gives access to the System path.
c. Click on the System path you may have to scroll to find the
statement. Once youve selected the System path statement, you can
use the edit field at the bottom of the dialog to modify it. Make sure
the statement ends in percent, colon (%:) before adding the
HyperACCESS path.
d. Click the Set button. Then click Apply.
e. Users with read access to the HyperACCESS directory can now
execute the program. The first time users run the program from their
workstation, the second phase of the install runs and completes
installation steps beginning with step 12 on page 2-7. This puts an
entry in the Registry file for users on their workstation.
Network Installation 2-13
With this method of network installation, you install HyperACCESS on the server and
perform a silent installation on each workstation. With silent installation, a network
administrator can create an automated installation configuration file, HASETUP.INI,
that installs HyperACCESS on user workstations.
Note: HASETUP.INI is just a suggested filename. Any filename is OK as long as it
has the .INI extension (these filenames are not case sensitive).
During silent installation, HyperACCESS logs all steps of the installation in the
INSTALL.LOG file. This file includes installation prompts, HASETUP.INI file
responses, and any error messages.
The HASETUP.INI file contains the following information:
Pathname of the executable file folder.
Pathname of the data folder.
Shared executable flag.
2-14 Installing HyperACCESS and Placing Your First Call
Figure 2-17.
[HAWIN32] Sample
EXEPATH=J:\PROGRAM FILES\HAWIN32 hasetup.ini file.
A network adminis-
DATAPATH=C:\PROGRAM FILES\HAWIN32\MY FILES trator creates this file
APPKEY=8.0 for user workstation
installations.
This procedure is suitable for large, widely dispersed organizations and permits greater
customization and automation of the workstation install.
The HyperACCESS installation program (H32SETUP.EXE) normally runs on each
user workstation. During installation, users respond to prompts for configuration
information, and the installation program creates two registry key trees. To install
HyperACCESS on user workstations without running H32SETUP.EXE requires
other techniques to create these registry key trees.
The following steps let network administrators setup HyperACCESS on the server
and automate workstation installation without prompting users for configuration
details.
1. Install HyperACCESS on one machine (using administrator rights in Windows
NT). Program files may be installed on a network drive.
Note: Make sure you install the program in a network directory to which users
have read access
2. Reboot and answer prompts regarding default setup parameters. Modify pro-
gram settings as desired.
3. On Each Workstation, run the silent install as described in Server and Worksta-
tion Installation Method on page 2-13.
Make sure you use the /W switch if you want workstations to use program files
on a server. With this switch, the setup program only copies required DLL files
to the workstation WINDOWS\SYSTEM folder. This switch also creates the user
data directory and shortcuts on the user workstation.
2-16 Installing HyperACCESS and Placing Your First Call
Note: The HyperACCESS setup program copies several DLL files to the
WINDOWS\SYSTEM directory (if they are newer than existing versions). In
many cases, these files will already exist (installed by programs such as Internet
Explorer). To check a workstation to see if the required DLLs exist, use the utility
provided on the HyperACCESS CD called DLLCHECK.EXE.
Note: If the data directory is on a server drive, you must create separate data
directories for each user because data files are not sharable.
4. Copy the following registry key from the setup machine to the target machine:
HKEY_CURRENT_USER\Software\Hilgraeve
This registry tree contains configuration information such as notebook entry file
path, notebook entry list, serial number, and several other configuration param-
eters. Export this tree from a machine that is setup as a typical workstation using
Registry/Export Registry file... in the REGEDIT utility. Select the
Hilgraeve key to export the entire branch.
5. Create the following registry key by selecting Registry/Import Registry file...
in the REGEDIT utility. This triggers creation of required connection entries in
the registry.
HKEY_LOCAL_MACHINE\Software\Hilgraeve\HAWin32\8.0
Value Name: Create Default Key
Value Data: <any connection device name> this includes TAPI devices
(such as a modem), WinSock (TCP/IP), or Direct Cabled COM1
(any connection already set up on that machine). For example,
you might have the following modem defined:
Hayes Optima 288 V.34 + FAX. If the specified TAPI
device does not exists on the machine, HyperACCESS will
prompt for setup parameters when started.
6. Run HyperACCESS on the workstation. The program silently completes addi-
tional required registry modifications.
Upgrading From a Previous Version 2-17
You should install HyperACCESS in a new folder. While HyperACCESS for Win-
dows 3.x files are not directly compatible with HyperACCESS 95 and NT, you can
convert their entries.
After installing HyperACCESS, running HyperACCESS Convert creates entries with
the same basic settings as your previous Phonebook entries. These new entries appear
in a HAWin16 Entries notebook (a separate tabbed panel in HyperACCESS).
Convert normally obtains enough information from your previous entries so that you
can place calls immediately. However, because of the requirements of 32-bit imple-
mentation, some of the older features cant be directly translated. If your entries have
user-defined keys, buttons, or recorded scripts, you will have to redefine them for the
new entries. You may also want to assign unique icons to these new entries.
While none of HyperACCESS/5s files are directly compatible, you can convert its
System List entries for use with HyperACCESS. To do this, follow these steps:
1. Export the desired systems from HyperACCESS/5 as described in its manual.
You can export multiple systems at one time.
2. Run HyperAccess Convert included with HyperACCESS to create .HAW files.
The convert program creates entries with the same basic settings and places them
in a HyperACCESS/5 Entries notebook (a separate tabbed panel in
HyperACCESS). HyperACCESS doesnt support HyperPilot scripts, but you
2-18 Installing HyperACCESS and Placing Your First Call
can easily record new scripts in VBScript or JavaScript, or write them with VBS,
C++, or any other programming language that supports calls to an external API.
3. Use the Phonebook panel File/Import... menu item to assign the converted .HAW
file to an entry with an associated icon and host entry name.
To upgrade from Procomm Plus for Windows, Procomm Plus 1.x (DOS), Procomm
Plus 2.x (DOS), or Procomm (DOS shareware) to HyperACCESS, follow these steps:
1. Run Procomm and select Compile/Edit from the Scripts menu.
2. Select the HyperACCESS data directory. (By default this is
C:\PROGRAM FILES\HAWIN32\MY FILES, but you may have specified
a different path during installation.)
3. Open PCW?EXP.WAS where ? is 1, 2, or 3 corresponding to the version of
Procomm you are running.
Note: PCW3EXP.WAS is for Procomm Plus for Windows.
4. Click the Compile and run button.
5. The program will prompt you for a dialing directory to convert. Select the
Procomm .DIR file for the dialing directory you want to convert. The
Placing Your First Call 2-19
Youll find that HyperACCESS is extremely easy to use. To illustrate our point, wed
like to guide you through calling the Hilgraeve Bulletin Board System (BBS). While
youre online, you can register your software so that youll be able to take advantage
of reduced prices on upgrades, enhancements, and new products.
Note: Calling the Hilgraeve BBS is optional. If you prefer, you may register by
returning the enclosed registration card.
If this is your first opportunity to use a bulletin board system, youll find the Hilgraeve
BBS quite easy to use. Its menu driven, so you wont have to memorize any
complicated commands.
If you want to do online registration, be sure that you have the version and serial
numbers that are listed on the HyperACCESS CD-ROM case or distribution diskette.
You can also display the version and serial numbers after youve started
2-20 Installing HyperACCESS and Placing Your First Call
Figure 2-18.
HyperACCESS with
the Main Phonebook
panel visible.
2. Move the mouse pointer to the Hilgraeve BBS icon and double-click the left
mouse button. HyperACCESS displays the Terminal panel, sends modem
initialization commands, and displays the phone number confirmation dialog,
shown in Figure 2-19. You can prevent this dialog from appearing in future calls
to this entry by selecting the Dial without this confirmation dialog check box.
Figure 2-19.
Hilgraeve BBS
Confirm Phone
Numbers dialog.
Placing Your First Call 2-21
3. Click the Dial button and HyperACCESS displays the Connect dialog as shown
in Figure 2-20.
Figure 2-20.
Hilgraeve BBS
Connect dialog.
During this process, you may hear a series of tones, beeps, and high-pitched
squeals as HyperACCESS instructs your modem to dial the phone number
and the modem makes connection. When a connection is firmly established, the
squeal stops and youll see a CONNECT message.
4. HyperACCESS then displays the registration information you entered during
program installation (see Figure 2-21), and lets you correct information on the
screen. When you click OK, it sends your first and last names as responses to
prompts from the BBS. It then requests your password before continuing.
Figure 2-21.
The Hilgraeve BBS
logon script verifies
your registration
information the first
time you log on.
2-22 Installing HyperACCESS and Placing Your First Call
5. When the Password dialog appears (see Figure 2-22), enter any password you
want, and select the Store as permanent value check box if desired. Then press
e, or click OK. HyperACCESS automatically sends the password you enter.
If you store it as a permanent value, HyperACCESS will automatically send it
each time you log on to the Hilgraeve BBS.
Figure 2-22.
The Password dialog
lets you save your
password for future
automatic log on.
6. After logging on, youre transferred to the Hilgraeve BBS main menu. From
here you can download free programs, view product information, or perform
online registration.
7. To register your Hilgraeve product, type R at the prompt. Youll see the
registration screen as shown in Figure 2-23.
Figure 2-23.
HyperACCESS BBS
registration menu.
Removing HyperACCESS From Your System 2-23
8. Follow the instructions on the BBS menus, and youll have no trouble. When
youre finished, just type H on the BBS Main Menu to hang up from the call.
Note: You can generally get back to the Main Menu by pressing E.
9. Select File/Exit, or double-click the system menu icon in the upper-left corner
of the window to quit HyperACCESS.
To remove HyperACCESS from your system, open the Control Panel and click on
Add/Remove Programs, then select HyperACCESS from the list and click the Add/
Remove... button. Uninstalling HyperACCESS performs the following operation:
Deletes the contents of the program folders.
Removes the application key from the registry file.
Removes HyperACCESS from the Taskbars Start menu.
2-24 Installing HyperACCESS and Placing Your First Call
Chapter 3
Common Procedures
This chapter contains procedures to guide you through various HyperACCESS tasks.
They are grouped by general category so that you can find them easily. The categories
are:
General Procedures
Working With Notebooks
Making Calls
Receiving and Sending Files
Changing Settings
Managing Lists
Using Message Pad
Using Advanced Features
For complete, detailed descriptions of menus and dialogs, see Chapter 4,
HyperACCESS Reference.
General Procedures
This section provides some general procedures that you will find handy when using
HyperACCESS.
The term drag and drop refers to the technique of selecting one or more objects,
usually with your mouse, and moving the object(s) somewhere else. Drag and drop
is a technique generally available for various types of objects in most modern GUIs.
3-2 Common Procedures
In HyperACCESS, the term drag and drop refers to your ability to copy, move, and
create shortcuts. HyperACCESS notebooks are analogous to folders in that they are
containers for objects. Unlike folders, which show all files in a given directory,
HyperACCESS notebooks show internally stored collections of objects. Notebook
objects (called entries throughout this manual) represent files that you may store
anywhere on your disk.
Entries are similar to shortcuts. They are images of data-file objects that appear
elsewhere (specifically, in the drive/directory folder where you store .HAW files).
Double-clicking an entry (in a notebook) opens the corresponding .HAW file and
establishes a connection, whereas double-clicking an .HAW file in its folder starts
HyperACCESS and then opens the file and establishes a connection. If
HyperACCESS is already running, double-clicking an .HAW file starts an additional
instance of HyperACCESS.
Since entries are similar to shortcuts, most drag and drop operations are similar to
operations among folders. Dragging .HAW files from folders to notebooks parallels
the effect of dragging and dropping objects from folders to the Windows desktop
(which, like notebooks, mostly houses shortcuts). The following table summarizes
drag and drop operations involving HyperACCESS entries.
Notebook Entry to
File from Folder Notebook Entry to Same or Other
Drag & Drop Operation to Notebook Folder or Desktop Notebook
Move (button 1) Creates new entry that Moves the file to the Moves entry from one
shows icon and name (desktop) folder. notebook to another.
stored in .HAW file.
Copy (C+button 1) Creates a shortcut of the Copies entry to the Creates a copy of the
file in the notebook. (desktop) folder. entry. If in the same
notebook, the entry
name includes Copy
of and is a different
file on disk.
Shortcut (C+S+button 1) Creates new entry that Prompted to Move or Creates a Copy of
shows icon and name Copy at dropped loca- entry if in the same
stored in .HAW file. tion. notebook, otherwise
Creates a Copy of creates a shortcut of the
entry. existing entry.
General Procedures 3-3
Another application of drag and drop in HyperACCESS notebooks is to copy the New
Entry Template to the same or another notebook (using C+button 1). This is the same
as selecting File/New or clicking on the New button in the Toolbar.
You can drag an entry and drop it on the Terminal panel tab. Just like double-clicking
the entry, HyperACCESS displays the Terminal panel and establishes a connection
with the remote system.
From the Lists panel, you can drag an entry from the list and drop it on the Terminal
panel tab. This is the same as selecting File/Place Trial Call or clicking on the Place
Place Trial Call trial call button (see Placing a Trial Call From the Lists Panel on page 3-64). If you
Button
drop the entry on a phonebook tab, HyperACCESS follows the procedure described
in Copying a Notebook Entry From a List File on page 3-14.
Pop-up menus (sometimes called context or shortcut menus) appear near the mouse
pointer when you click mouse button 2 (normally the right button). The term pop-up
menu refers to the fact that the displayed menu appears at the mouse pointer location,
and the menu items depend on location of the pointer, type of window currently active,
and application.
In HyperACCESS, pop-up menus provide an additional technique for performing
commonly used functions. You can access all items in HyperACCESS pop-up menus
through menu bar selections or the Toolbar (if its displayed). The advantage of pop-
up menus is that they are right there at the object youre working with. The pop-
up menu is just one mouse-click away, and it contains only those options pertinent to
your present operation/object.
The following sections describe pop-up menus available in HyperACCESS. Refer to
the applicable section in Chapter 4, HyperACCESS Reference, for a complete descrip-
tion of each menu item.
3-4 Common Procedures
Over an Entry
The pop-up that appears when you hold the mouse pointer over an entry and click (or
press) mouse button 2 displays the following items:
New Create a new notebook entry, see Phonebook Panel File/New
on page 4-4.
Open Displays the Terminal panel, see Phonebook Panel File/Open
on page 4-6.
Connect Displays the Terminal panel, connects the port, and dials the
phone number, see Phonebook Panel File/Connect on
page 4-12.
Connect and Displays the Terminal panel, displays the Recording in
Record Logon Progress window, connects the port, dials the phone number,
and records interaction with the remote system for later
automatic logons (see Phonebook Panel File/Connect and
Record Logon on page 4-14).
Connect but Skip Displays the Terminal panel, connects the port, and dials the
Logon phone number. Use this selection when you have an
automatic logon recorded and dont want to use it (see
Phonebook Panel File/Connect but Skip Logon on
page 4-15).
Properties... Lets you change entry parameters. When selected, displays the
properties notebook.
Copy to Remote Copies selected text to the remote computer (see Terminal
Computer Panel Edit/Copy to/Remote Computer With <Enter> on
page 4-71).
Copy to Remote Copies selected text to the remote computer, sends a CR
Computer with character and, optionally, sends a LF character. (Depending
<ENTER> on ASCII Sending properties sheet.)
Copy to File... Copies selected text to a file you specify using the Copy to
File dialog (see Terminal Panel Edit/Copy to/File on
page 4-71).
Copy to Printer Copies selected text to the printer (see Terminal Panel Edit/
Copy to/Printer on page 4-72).
Copy to Message Copies selected text to the Message Pad (see Terminal Panel
Pad Edit/Copy to/Message Pad on page 4-72).
Find... Displays the Find dialog. The Find What edit field contains
the selected text (see Terminal Panel Edit/Find on
page 4-74).
Shortcut to ... If the selected text is a URL for a Web site, this menu selec-
(where ... is the tion launches your default Web browser and displays that
selected text) Web page at that address.
Anywhere Else
When the mouse pointer is anywhere in the terminal area or Backscroll Buffer, other
than over selected text, the pop-up menu has the following items:
Receive File(s)... Displays the Receive dialog (see Terminal Panel Transfer/
Receive File(s) on page 4-79).
Send File(s)... Displays the Send dialog (see Terminal Panel Transfer/Send
File(s) on page 4-83).
Page Setup... Displays the Page Setup dialog (see Terminal Panel File/
Page Setup on page 4-63).
Print Preview Displays the print preview window(see Terminal Panel File/
Print Preview on page 4-64).
Print... Displays the Print dialog (see Terminal Panel File/Print on
page 4-64).
Capture to Printer Copies received text to the printer (see Terminal Panel File/
Capture to Printer on page 4-64).
General Procedures 3-7
Capture to File Copies received text to a file you specify using the Copy to
File dialog (see Terminal Panel File/Capture to File on
page 4-66).
Paste Sends text in the Clipboard to the remote computer. In
HyperACCESS (see Terminal Panel Edit/Paste on
page 4-72).
Paste from File Copies selected text to the host from a file you specify using
the Paste from File dialog (see Terminal Panel Edit/Paste
from File on page 4-73).
Select Terminal Selects all text in the terminal area of the Terminal panel.
Screen
Select All Selects all text in the terminal area and Backscroll Buffer.
Find... Displays the Find dialog. The Find What edit field contains
the selected text (see Terminal Panel Edit/Find on
page 4-74).
HyperACCESS displays one of two different pop-up menus when you click (or press)
mouse button 2 in the Message Pad window. The menu depends on whether:
The mouse pointer is over selected text.
The mouse pointer is anywhere else in the Message Pad window.
Copy to Displays a cascade menu that lets you copy selected text to
the host, printer, or file (see Terminal Panel Edit/Copy to/
Message Pad on page 4-72).
Paste Replaces selected text with text contained in the Clipboard
(see Terminal Panel Edit/Paste on page 4-72).
Paste from File... Copies selected text from a file you specify using the Paste
from File dialog (see Terminal Panel Edit/Paste from File on
page 4-73).
Clear Deletes the contents of the Message Pad and leaves the
window open.
Page Setup... Displays the Page Setup dialog (see Terminal Panel File/
Page Setup on page 4-63).
Print Preview Displays the print preview window(see Terminal Panel File/
Print Preview on page 4-64).
Print... Displays the Print dialog (see Terminal Panel File/Print on
page 4-64).
Find... Displays the Find dialog. The Find What edit field contains
the selected text (see Terminal Panel Edit/Find on
page 4-74).
Select all Selects all text in the Message Pad.
Close Closes the Message Pad without transmitting or removing its
contents.
Anywhere Else
When the mouse pointer is anywhere in the Message Pad pane other than over selected
text, the pop-up menu has the following items:
Undo Available after a cut or paste operation. Reverses the last
operation.
Paste Inserts text contained in the Clipboard at the current insertion
point (see Terminal Panel Edit/Paste on page 4-72).
Paste from File... Copies selected text from a file you specify using the Paste
from File dialog (see Terminal Panel Edit/Paste from File on
page 4-73).
Check Spelling Select this menu item to run a spell checker on Message Pad
text. This item is unavailable (grayed out) after checking the
General Procedures 3-9
text until you modify the Message Pad text. If the checker
completes without detecting an error, a message box appears.
If the spell checker detects an error, it displays a dialog to help
you correct the error. Click the Help button in the dialog for
more information on using the spell checker.
Chat Mode The term chat mode describes an interactive session with a
remote system. It usually implies that another person is on the
other end of the interaction, and that you want to carry on a
conversation with that person.
The Chat Mode menu item displays a check mark when
selected and enables chat mode. When enabled,
HyperACCESS sends the current Message Pad contents when-
ever you press the e key. After sending the Message Pad
contents in chat mode, HyperACCESS clears the Message Pad
window in preparation for your next message. To disable chat
mode, unselect this menu item.
Word Wrap Word wrap occurs when a text editor or word processor breaks
a line at the end of a word or at punctuation. The term word
wrap usually implies that whole words move to the next line
without hyphenation. HyperACCESS supports word wrap in
the Message Pad for readability and because some systems
have relatively short maximum line lengths (for example, MCI
Mail has a maximum line length of 79 characters).
When selected, Word Wrap... displays the Word Wrap dialog
shown in Figure 3-1. This dialog lets you select either auto-
matic or manual line formatting. With automatic formatting
selected, you can set the maximum line width using the edit
field or its associated spin button. When you send text to the
remote computer from the Message Pad, HyperACCESS sends
all visible line endings, whether typed manually by pressing
e or inserted by automatic formatting.
Figure 3-1.
The Word Wrap dia-
log lets you select a
maximum line width
for viewing and
transmission.
3-10 Common Procedures
Copy... This selection displays the Button dialog (see Terminal Panel
Automation/Buttons on page 4-90) with the current buttons
settings as defaults. You can modify any settings to create a
similar button.
Delete Displays a warning dialog for confirmation, and then deletes
the current button.
Begin a Group Selecting this menu item displays a check mark to indicate that
you want a separator line to appear on the toolbar before this
button. You can remove the separator by unselecting this menu
item.
This section provides procedures for creating and modifying notebook entries.
Adding an Entry
There are several techniques available for creating a new entry. (Also see Copying a
Notebook Entry on page 3-13.) One of the easiest is to:
1. Perform one of the following actions:
You may instead want to
With the mouse pointer over any existing entry, copy an existing entry if it
right-click to display the pop-up menu. Then is similar to an existing one
select New. (see Copying a Notebook
Entry on page 3-13).
Click the New button in the Toolbar.
New Button Select the File/New command.
2. Any of these actions displays the Add Entry Wizard New Entry Description
dialog shown in Figure 3-2.
3. Type an entry name, select an icon, and specify a notebook for the entry.
4. The New Entry Description dialog has a Terminal entry field as shown in
Figure 3-2. Select a terminal emulator type that is appropriate for the remote
system you intend to call.
3-12 Common Procedures
Figure 3-2.
The New Entry
Description dialog
lets you specify an
entry name, select an
icon, enter notes,
place the entry in a
notebook, and select
a terminal to
emulate.
When you click Next, HyperACCESS displays the New Entry Connection
dialog shown in Figure 3-3. This dialog shows the default connection type in
the Connect via group box. You can change the connection type by clicking on
the Change... button and following the procedure in Modifying Connections on
page 3-59.
Figure 3-3.
The New Entry
Connection dialog
lets you select a con-
nection.
Working With Notebooks 3-13
When you click Next, HyperACCESS displays the New Entry Destination
dialog shown in Figure 3-4. The contents of this dialog vary depending on the
type of connection selected (for example, modem or TCP/IP). The illustration
shown in Figure 3-4 shows how the dialog looks with a modem selected. Default
values in this dialog come from the New Entry Template.
Figure 3-4.
New Entry Destina-
tion provides controls
for setting the con-
nection, phone
number(s), and
communications
settings.
To copy an entry (creating a shortcut) from one notebook to another, follow these
steps (to move an entry, see Moving an Entry on page 3-16):
1. Select the tab that displays the notebook with the entry you want to copy.
3-14 Common Procedures
One of the easiest ways to create a new entry that is similar to an existing one is to:
1. Select the tab that displays the notebook with the entry you want to copy.
2. Select an existing entry that has similar characteristics, or select the New Entry
Template entry by clicking on it once.
3. Perform one of the following actions:
With the mouse pointer over the selected entry, right-click to display the
pop-up menu and select Open.
Click the Open button.
Select File/Open.
Any of these actions displays the Terminal panel with the selected entry open.
Open Button 4. Select File/Save As... from the Terminal panel. This displays the Save As dialog
that lets you change the entry name.
5. Accept the suggested filename (based on the current entry name), or enter a new
filename in Save as Filename. (HyperACCESS appends a .HAW extension if
you dont enter it.)
6. Click OK. HyperACCESS saves the current entry parameters in the file speci-
fied, and creates the entry with the icon and entry name specified.
HyperACCESS comes with several lists. In addition, you can download other lists
from various bulletin board systems and online services, or export lists from contact
Working With Notebooks 3-15
programs and personal information managers (PIMs). Some of these lists are very
large (for example, the FIDO list is 3 MB).
To copy one or more entries from a list file to a notebook, you must first define a
template if one doesnt already exist (see Creating List File Templates on page 3-62).
If youre using one of the list files that comes with HyperACCESS, the template
already exists.
Once youve established your list file template, follow these steps:
1. Select the Lists tab to display the Lists panel. HyperACCESS displays the last
list file you selected. If you want to use a different list file, select File/Open...
to display a standard file selection dialog. Use this dialog to open the list file
you want.
2. Select one or more entries in the list using standard mouse or keyboard selection
techniques.
3. To copy the entries to a notebook do one of the following:
Right-click an entry to display the Lists panel pop-up menu. Select Copy
to Notebook... menu item.
Click the Copy to Notebook button.
Copy to Drag the entries onto the notebook tab desired.
Notebook
Button 4. If you use one of the top two options (in Step 3) and you have more than one
notebook defined, HyperACCESS displays the Copy to Notebook dialog.
Select the notebook from the list, and click OK. HyperACCESS copies the entry
to the notebook and saves the entry file.
3-16 Common Procedures
Moving an Entry
To move an entry from one notebook to another, follow these steps (to copy an entry,
see Copying an Entry from One Notebook to Another on page 3-13):
1. Select the tab that displays the notebook panel containing the entry you want to
move.
2. Drag the entry to the tab of the notebook that you want the entry to appear in
(see Drag and Drop on page 3-1). HyperACCESS moves the entry without
displaying the other notebook panel.
Deleting an Entry
3. Perform one of the following actions to display the Delete Entry dialog:
With the mouse pointer over the selected entry, right-click to display the
pop-up menu. Select the Delete... menu item.
Press D.
Select the File/Delete... menu item.
4. In the Delete Notebook Entry dialog, click one of the following push buttons:
Remove from this Removes the entry from the current notebook without
Notebook deleting its file from the disk.
Delete from Disk Removes the entry from the current notebook and
deletes its file from the disk.
Cancel Closes the dialog without removing the entry.
Creating Buttons
You can use a button to issue any combination of key strokes, a menu command, or
to execute a program. You can define buttons for any HyperACCESS panel or entry.
Each panel and entry has its own set of buttons.
From any panel menu bar you can select Automation/
Buttons... to display the Buttons for <panel name> dia- You can use the Toolbar
log. From the Terminal panel, this selection defines buttons pop-up menu to create or
modify buttons. Simply
for the current entry, and the dialog title is Buttons for click mouse button 2 on
<entry>. any button to display the
pop-up menu.
1. From the dialog, select a button in the list and click
Modify..., or New... to create a new button. Either of
these actions displays the Button dialog.
2. Select one of the predefined buttons in the scrollable area.
3. You then assign one of the following actions to the button:
Click the Macro text option button to activate the edit field and let you
enter keystrokes that you want HyperACCESS to output when you click
the button. For example:
2 displays <F2>
S +2 displays <SHIFT-F2>
3-18 Common Procedures
To assign a program that uses the HyperACCESS API (HAPI), simply specify the
path and filename in the Program edit field.
For example, assume you enter the following in the Program edit field:
c:\Program Files\Accessories\Wordpad.exe readme.txt
Pressing the button (or key) associated with this program causes HyperACCESS to
attempt to start Wordpad and have it open the readme.txt file.
Note: You can assign a VBScript or JavaScript file to the Program edit field.
Working With Notebooks 3-19
Creating Connections
Figure 3-5.
The Existing Connec-
tions dialog lets you
define and modify
connections.
You can modify other parameters of a connection, create new connection types,
delete connection types, or select a different connection type for an entry, but
you cant change a connection type once its created. Valid types include:
Direct cable
Modem or Modem Pool (TAPI)
Winsock (TCP/IP)
Figure 3-6.
Select the type of
connection from the
scrollable list.
3. Select a connection type and click OK. What happens next depends on the type
of connection you select. See the appropriate section:
Modem or Modem Pool Connections, see below.
Direct Cable Connections, see page 3-22.
For WinSock (TCP/IP) Connections, see page 3-22.
Figure 3-7.
The standard Win-
dows TAPI Modem
Properties dialog for
creating TAPI
connections.
2. Accept or modify the Default baud rate using the drop-down list. The baud rate
you specify in this dialog is the default for all connections that use this modem
on this port. To modify the baud rate for the current entry, change the setting in
the Communications Settings dialog or properties sheet, see Modifying Com-
munications Settings on page 3-56.
3. You may want to review the Connection tab to verify Connection preferences
and Call preferences. In general, you should set Data bits to 8, Parity to None,
and Stop bits to 1. Check with the system administrator of the remote system
to see if you must change any of these settings.
4. If you need to specify special modem commands, click the Advanced... button
To display the Advanced Connection Settings dialog. Use this dialog to enter
additional modem commands in the Extra settings edit field. You also use this
dialog to modify error and flow control.
Note: Whenever possible, we recommend that you use hardware flow control.
5. Click OK to return to the Existing Connections dialog, and click Close to return
to the New Entry Connection dialog or properties sheet.
3-22 Common Procedures
After clicking either the Modify Connection... or New Connection... button in the
Existing Connections dialog for a direct cabled connection, the Connection dialog
appears and looks like Figure 3-8.
Figure 3-8.
The Connection
dialog for Direct
Cable connections.
Clicking the Change... button in the Connect Via group box of the Connection dialog
displays the dialog shown in Figure 3-9.
Figure 3-9.
The Connect Through
dialog for Direct
Cabled connections.
3. Once youve selected an interface type and port, click OK. HyperACCESS
returns to a dialog that depends on the connection type.
4. Click OK or Close in intermediate dialogs to return to the New Entry Connection
dialog or Communications properties sheet.
Deleting Connections
You can delete a connection when you define a new entry (from the Communications
dialog) or at any other time using the Communications properties sheet. To delete a
connection, follow these steps:
1. From the Communications dialog or the Communications properties sheet,
select the Change... button in the Connect Via group box.
3-24 Common Procedures
2. In the Existing Connections dialog, select the connection you want to delete.
3. Click the Delete button.
4. Click OK when HyperACCESS displays the warning dialog.
Making Calls
There are many ways you can call a remote system using HyperACCESS. The easiest
is to set up an entry for systems you want to call (see Adding an Entry on page 3-11
for procedures to create entries). If you havent used communications software before,
you may also find it helpful to refer to Placing Your First Call on page 2-19.
Calling CompuServe
HyperACCESS comes with a complete logon script for calling CompuServe. To call
CompuServe and add your logon ID and password to the script, follow this procedure:
With the Phonebook panel displayed and active:
1. If you know your local CompuServe telephone num-
ber, enter it by following these first two steps. Other- Your calls to CompuServe
will be cheaper if you use a
wise, skip to step 3. Display the CompuServe
local number instead of the
Communications properties sheet using one of the default 800 number.
techniques described in Changing Property Sheet Set-
tings on page 3-53.
2. In the Phone Number edit field, replace the default 800 number with your local
CompuServe telephone number. Then click OK.
3. To connect to CompuServe perform one of the following actions:
Right-click the CompuServe entry icon to display the pop-up menu. Then
select Connect.
Select the CompuServe entry icon, and click the Connect notebook entry
button in the Toolbar.
Select the CompuServe entry icon, and then File/Connect.
Connect Notebook
Drag the CompuServe entry to the Terminal tab (see Using Drag and Drop
Entry Button to Make Connection on page 3-3).
HyperACCESS opens the Terminal panel, sends modem initialization com-
mands, and dials the number listed in your entry.
4. Once you connect with CompuServe the Enter User ID dialog appears. Type in
your ID, select the Store as permanent value check box, and click OK.
3-26 Common Procedures
HyperACCESS comes with one predefined notebook, called Phonebook. You can add
your own custom notebooks and copy or move entries from one notebook to another.
To select a notebook, click its tab (for information on creating a custom notebook, see
Creating Custom Notebooks on page 3-24).
To call an existing entry, use one of the following techniques:
Double-click
With the proper notebook panel displayed:
If an entry doesnt have a
1. Move the mouse pointer to the icon representing the phone number defined,
system you want to call. and you attempt to dial,
HyperACCESS displays a
2. Double-click the desired entry. dialog to obtain the phone
number.
HyperACCESS displays the Terminal panel, sends modem
initialization commands, and dials the number listed in your
entry.
Connect
With the proper notebook panel displayed:
1. Move the mouse pointer to the entry you want to call.
2. Select it by clicking on it one time.
3. Perform one of the following actions:
Right-click the entry to display the pop-up menu. Then select Connect.
Connect Notebook
Entry Button
Click the Connect notebook entry button in the Toolbar.
Select the File/Connect command.
Making Calls 3-27
Drag the entry to the Terminal panel tab (see Using Drag and Drop to
Make Connection on page 3-3).
HyperACCESS displays the Terminal panel, sends modem initialization commands,
and dials the number listed in your phonebook entry.
Open
With the proper notebook panel displayed:
If you type in the Terminal
1. Move the mouse pointer to the entry you want to call. panel, HyperACCESS auto-
matically opens the com-
2. Select it by clicking on it one time. munications port without
dialing. This lets you type
3. To display the Terminal panel, perform one of the
commands to your
following actions: modem.
Right-click the entry to display the pop-up
menu. Then select Open.
Click the Open button in the Toolbar.
Select File/Open.
4. You can now change any communications parameters, prepare files for transfer,
Open Button
or compose a message in Message Pad before initiating connection.
5. Follow instructions in Connecting From the Terminal Panel on page 3-36.
Connect Notebook
Entry Button
Open Displays the Terminal panel with parameters set for the
selected entry. To make a connection to a remote system, fol-
low instructions in Connecting From the Terminal Panel on
page 3-36.
Open Button
select Shortcut to. This displays your default browser and accesses the Web address
you have selected.
The following sections describe simple procedures to use HyperACCESS to access a
telnet site using a TCP/IP network, dial-up IP account, or dial-up shell account. To
permit one notebook entry to create multiple concurrent sessions with a host system,
select the When I try to open a notebook entry that is already open, create another
window check box in the Startup tab of the Options notebook (see Phonebook Panel
Options/Startup on page 4-23). For information on how to access a telnet site with
HyperACCESS from within your browser, see Using HyperACCESS With a Web
Browser on page 3-39.
Note: When a telnet terminal accesses a telnet server, an invisible exchange of data
occurs that includes the terminal type, or terminal ID. HyperACCESS uses standard
terminal IDs for each of the terminals it emulates. However, some telnet servers dont
recognize standard terminal IDs. If you get a message indicating that the telnet server
doesnt recognize your terminal type, simply change the Telnet terminal entry field
on the Terminal Emulator properties sheet (see Terminal Emulator Properties Sheet
on page 4-43).
c) Generally, you should leave the Remote port number unchanged. Change
this value only if you are specifically instructed to do so by the adminis-
trator of the telnet site you want to access.
d) Click Next in the New Entry Connection dialog and then Finish in the
final dialog of the Add Entry Wizard. This saves the entry and displays it
in the notebook panel you selected.
3. To connect with the telnet site, simply double-click the entry you have just
created.
4. Generally, you will be required to enter a logon ID and password when you
connect to a telnet site. You can automate this logon procedure using
HyperACCESSs recording capability (see Recording a Logon Sequence on
page 5-5).
5. Continue with normal terminal interaction.
b) Enter the IP address or name of the telnet site in the Remote IP address
entry field. The IP address is of the form: 123.12.12.123. Some telnet
sites have names that are recognized by a domain name server. These sites
have names like: HBBS.hilgraeve.com.
c) Generally, you should leave the Remote port number unchanged. Change
this value only if you are specifically instructed to do so by the adminis-
trator of the telnet site you want to access.
3-32 Common Procedures
d) Click Next in the New Entry Connection dialog and then Finish in the
final dialog of the Add Entry Wizard. This saves the entry and displays it
in the notebook panel you selected.
3. Create a SLIP or PPP connection for your Internet service provider (ISP) using
Windows Dial-Up Networking or third-party TCP/IP software. Consult your
ISP and TCP/IP documentation for details. If you are using Windows Dial-Up
Networking, you will need to create a connection for your ISP in the Dial-Up
Networking folder (generally under My Computer in any Explorer window).
To create a new dial-up connection follow these steps:
Note: These instructions are based on Windows Dial-Up Networking in Win-
dows as of the publication date of this manual. You should check your online
Microsoft help if these instructions arent correct for your system.
a) Double-click My Computer on your desktop to open the My Computer
window.
b) Double-click the Dial-Up Networking folder to open it. If this is your first
Dial-Up Network connection, skip to step d.
c) Double-click the Make New Connection icon to display the first dialog
of the Make New Connection Wizard.
d) The first dialog of the Make New Connection Wizard has your default
modem selected. If the wrong modem appears, use the drop-down list to
select the correct modem. Then click on Next.
e) Enter the Area code, Telephone number, and Country code of your
Internet service provider (ISP).
f) Click Finish in the last dialog of the wizard.
g) In the Dial-Up Networking window, select Connections/Settings... to
display the Dial-Up Networking settings dialog.
h) Select the Prompt to use Dial-Up Networking radio button, and click OK.
4. To connect with the telnet site, simply double-click the entry you have just
created in HyperACCESS. HyperACCESS automatically launches the dialer.
You can modify your ISP telephone number and enter user id and password in
the Connect to dialog. If you select the Save password check box Windows
retains your user id and password for later use. However, this may be inappro-
priate in some installations due to the potential to breach security. After Win-
Making Calls 3-33
dows dialer connects to your ISP, you can minimize the connection dialog.
(Youll need to access this task later, so remember that its name is the Dial-Up
Networking connection name you created.) HyperACCESS gains control and
connects to the telnet site you specified.
5. Generally, you will be required to enter a logon ID and password when you
connect to a telnet site. You can automate this logon procedure using
HyperACCESSs recording capability (see Recording a Logon Sequence on
page 5-5).
6. Continue with normal terminal interaction.
CAUTION: Disconnecting from a telnet site by logging off or using any
technique to disconnect from within HyperACCESS does NOT disconnect you
from your ISP. You must manually disconnect from your ISP by opening the task
on the task bar that has your Dial-Up Networking connection name. Then click
the Disconnect button.
Note: By default, Dial-Up Networking connections disconnect after 30 minutes
of inactivity. You can change this default in the connections properties. To
display the connection properties, select My Computer from your desktop. Then
select Dial-Up Networking. In the Dial-Up Networking window, right-click the
connection and select Properties. In the connections properties dialog, click
the Configure... button. Then select the Connection tab. Select the Disconnect
a call if idle more than check box, and enter a time value in the edit field. Finally,
click OK in all dialogs and close the windows.
b) Enter the telephone number for the Internet service provider in the Phone
number entry field. If necessary, use the Dialing Properties dialog to
specify a calling card or other special requirements (see Modifying Dialing
Properties on page 3-61).
c) Click Next in the New Entry Connection dialog and then Finish in the
final dialog of the Add Entry Wizard. This saves the entry and displays it
in the notebook panel you selected.
3. To connect with the telnet site, double-click the entry of the Internet service
provider you have just created.
4. Generally, you will be required to enter a logon ID and password when you
connect to an Internet service provider. You can automate this logon procedure
using HyperACCESSs recording capability (see Recording a Logon Sequence
on page 5-5).
5. At the service provider prompt, type the telnet command followed by the
address of the telnet site, for example, telnet HBBS.hilgraeve.com.
The IP address is of the form: 123.123.123.123. Some telnet sites have
names that are recognized by a domain name server. These sites have names
like: HBBS.hilgraeve.com.
6. Continue with normal terminal interaction.
Note: You can also create a custom entry and/or button by recording your telnet logon.
Start with the telnet command, for example, telnet HBBS.hilgraeve.com,
and continue with your user ID and password following the telnet site prompts. See
Recording a Logon Sequence on page 5-5.
Queued Calling
You can call multiple remote systems in turn using HyperACCESS. When
HyperACCESS connects with an entry, it removes that entry from the queue. After
you disconnect from an entry, HyperACCESS tries the next entry in the queue.
HyperACCESS cycles through the queue until canceled or until it removes all entries.
HyperACCESS removes an entry from the queue upon successful connection or when
it exceeds the number of dialing attempts specified in the entrys Dialing Details
dialog.
Making Calls 3-35
When you complete the call and disconnect, HyperACCESS continues with
queued calling as before.
Once youve opened an entry and displayed the Terminal panel, you can connect to
the remote system using any of the following techniques:
Select File/Connect. This initializes the modem and dials the number listed in
your phonebook entry.
Select the File/Connect and Record Logon command or click the record button
in the Toolbar to have HyperACCESS learn a new logon sequence.
Select the File/Connect but Skip Logon command to connect without using the
entrys logon script.
Click the Connect notebook entry button in the Toolbar. This performs the
same function as File/Connect.
Type in the terminal screen to manually enter dialing commands. (When you
type in the Terminal panel, HyperACCESS automatically opens the communi-
Connect Notebook cations port without dialing.)
Entry Button
modified your config.sys or environment variables and rebooted, you can execute
HyperACCESS by typing:
HAWIN32
and for HyperACCESS Host, you can type:
HAHOST32
Assuming youve modified your PATH or environment variables, you can launch a
specific notebook entry by referencing that entrys path and filename. For example,
HAWIN32 C:\Program Files\HAWin32\My Files\Hilgraeve BBS.haw
or
HAHOST32 C:\Program Files\HAWin32\My Files\Modem Host.hhw
Note: when entering a path with one or more spaces in a folder (directory) name or
filename, you must enclose the entire path in quotes, as shown above.
Generally, when you start HyperACCESS (or HyperACCESS Host) from the Win-
dows Start menu on the Taskbar, HyperACCESS displays the last notebook displayed.
To have the Start menu automatically launch HyperACCESS and begin communica-
tions, follow these steps:
1. If necessary, start HyperACCESS (or HyperACCESS Host) and open an
Explorer window.
2. If necessary, make the Explorer window active (use A+T).
3. Use the folder tree (left side) of the Explorer window to display the
\Windows\Start Menu\Programs\HyperACCESS folder. When you
select this folder, it displays the shortcuts that appear in the Start cascade menu
for HyperACCESS.
4. Make HyperACCESS active (use A+T), and arrange your windows so you
can see the entry that you want in the HyperACCESS notebook and the Explorer
window. In the Explorer window, you need to be able to see the contents of the
HyperACCESS folder (right side) or HyperACCESS folder icon in the folder
tree (left side).
Note: If your display is too small to see both HyperACCESS and the Explorer
window at the same time, minimize the Explorer window.
5. Use C+mouse button 1 to drag a copy of the desired entry to the HyperACCESS
start menu folder (on either the right or left side of the Explorer window).
Note: If you minimized the Explorer window, move the mouse pointer to the
Explorer button on the Taskbar (be careful if you have more than one Explorer
window open). Windows will open the Explorer window and you can drop the
file in the HyperACCESS start menu folder.
The entry icon appears in the Start/Programs/HyperACCESS cascade menu, so you
can directly launch it and begin communications from the Start menu.
HyperACCESS is Web enabled to let you get the most out of communicating through
the Internet. You can launch your Web browser from within HyperACCESS to
connect to Web sites, or you can launch HyperACCESS from your browser to access
telnet sites.
3-40 Common Procedures
If you have more than one Web browser on your system, HyperACCESS launches
the browser defined as the Windows default. You can change the default browser by
launching the non-default browser from Windows and making the appropriate selec-
tion from the dialog that appears.
There are two ways to launch your Web browser from within HyperACCESS:
Click the Launch Browser button on the toolbar. This starts your default browser
in its own window.
Launch Browser
Button Select an address (URL) of a Web site in the Terminal panel. This could be a
URL that appears in e-mail or some other screen of information from a telnet
site. Right-click over the selected URL, and select Shortcut to from the pop-up
menu. This opens your default browser and displays the Web site.
You can launch HyperACCESS from within your Web browser if you have defined
HyperACCESS as the default telnet application (see Making HyperACCESS the
Default Telnet Application, below), and you perform one of the following operations:
Access (click on) a telnet address on a Web page.
Use the history list to access a telnet address.
Use the Open dialog to access a telnet address.
Any of these techniques display HyperACCESS in its own window.
If you had a pre-existing browser when you installed HyperACCESS, you were asked
if you wanted HyperACCESS to be the default telnet application for your browser(s).
If you responded positively, HyperACCESS notified Windows that it is the default
telnet application. If you responded negatively, each time you launch HyperACCESS
(and you have a browser), a dialog appears asking if HyperACCESS should be your
default telnet application.
Making Calls 3-41
You can tell HyperACCESS not to display this dialog by selecting the check box in
the dialog. Later you can re-enable display of this telnet request dialog using the
Options/Startup menu in the Phonebook (see Phonebook Panel Options/Startup on
page 4-23).
HyperACCESS lets you carry on a dialog with the user on the remote PC (chatting).
Procedures for initiating a chat session are similar regardless of whether you are on
the calling or host end of the connection. The following sections provide procedures
for initiating from either end. Additional procedures describe how to carry on the
dialog once initiated.
6. Whenever youre ready to send Message Pad text to the remote system, press
the Send button, A+S, or the e key.
Send Text Button
7. Take turns reading and responding. Use the Terminal panel and your Message
Pad while the host operator uses the Host panel and his/her Message Pad.
Note: Both your messages and the host operators messages appear in the
Terminal panel.
8. Press E or C+C to return both sides to the host prompt.
As a HyperACCESS Host operator, follow these steps to initiate chat mode after the
caller successfully logs on:
1. If HyperACCESS Host is minimized, restore it.
2. In the Host panel, at the host prompt, type chat followed by e.
Note: Only one side (caller or host operator) needs to issue the chat command.
3. If necessary, type C+G (bell) several times to get the callers attention.
4. Open the Message Pad by selecting View/Toolbars... and then Message Pad
from the Toolbars dialog, or click the Message Pad button in the Toolbar.
5. In the Message Pad, select Options/Chat Mode. This automatically sends the
contents of the Message Pad whenever you press the e key.
6. Use the Host panel to view text written by the caller, and use the Message Pad
to type text you want to send to the remote system. You can use normal editing
operations within the Message Pad before sending any message (see Editing
Text with Message Pad on page 3-67).
Note: You can type directly in the Host panel without using the Message Pad,
but you wont have the advantages of Message Pads editing capabilities.
7. Whenever youre ready to send Message Pad text to the remote system, press
the Send button, A+S, or the e key.
Send Text Button
8. Take turns reading and responding. The caller uses the Terminal panel and his/
her Message Pad while you use the Host panel and your Message Pad.
Note: Both your messages and the callers messages appear in the Host panel.
Receiving and Sending Files 3-43
Quitting HyperACCESS
To exit HyperACCESS, select File/Exit, double-click the system menu icon in the
window title bar, or press A+4. If you are connected to a remote system, youll see
a warning message that closing the window also disconnects the communications
session. HyperACCESS automatically saves any changes you have made to the current
entry.
This section describes procedures for transferring files between your PC and the
remote system. It also includes procedures for capturing received data to a file or
printer.
Receiving Files
HyperACCESS supports many different file transfer protocols. This section describes,
generically, how you receive files regardless of file transfer protocol selected. For a
brief description of the protocols and their default settings, see Appendix E, File
Transfer Protocols.
To receive one or more files from a remote system, follow these steps:
1. Use one of the following actions to display the mod-
eless Receive dialog. See Figure 3-10. Modeless dialogs let you
continue to interact with
With the mouse pointer anywhere in the the remote system with
Terminal panel, except over selected text, right- the dialog displayed.
Receive Files
Button
3-44 Common Procedures
Figure 3-10.
Receive is a
modeless dialog.
It can remain on
screen while you
issue commands
to the host
system.
2. The Place received file in the following folder edit field shows the default or
last path used. You can:
Edit the path in the edit field.
Select one of the previously received files from the drop-down history list.
Use the Browse... push button to select an existing directory. (For a
complete description of browse dialogs, see page 4-8.)
3. If necessary, use the Transfer protocol drop-down list box to select a different
file transfer protocol. The sending system must be using the same file transfer
protocol specified.
4. If you need to change settings for the selected file transfer protocol, click the
Settings... push button to see a dialog for the selected protocol. See Appendix E,
File Transfer Protocols, for additional information on these settings.
5. If the file transfer protocol sends filename information, you can select the Use
received file time/date and/or the Use received path information check
boxes; otherwise, the check boxes are dimmed. See Terminal Panel Transfer/
Receive File(s) on page 4-79.
6. Select (or unselect) the options to check received files for viruses using
HyperGuard and to perform on-the-fly unzipping.
Receiving and Sending Files 3-45
7. Select one of the options in the If File Already Exists group box. For more
information on these options, see Terminal Panel Transfer/Receive File(s) on
page 4-79.
8. Type commands to the remote system to send the
file(s). (Commands vary from system to system, so File transfers use multi-
we cant provide detailed instructions in this manual.) threading techniques so
that you can review the
When the remote system is ready, click the Receive Backscroll Buffer and per-
push button. This causes HyperACCESS to enter form other HyperACCESS
receive mode and displays the receive progress dialog. operations while receiv-
ing files.
HyperACCESS gives you two ways to capture text displayed in the terminal area or
Backscroll Buffer. (To capture data directly to the printer, see Printing Incoming
Information as It Arrives on page 3-49, or Printing Information After Its Received on
page 3-50.)
You can copy from the terminal area or Backscroll Buffer to a file.
You can use the File/Capture to File command in the Terminal panel to capture
data as it arrives.
You can copy information from the terminal area or Backscroll Buffer to a file to save
your current interaction. Follow these steps:
1. Use the vertical scroll bar, if necessary, until the beginning or end of the section
you want to capture is visible in the Terminal panel.
2. Select the character(s), word(s), and/or line(s) of text desired. You can double-
click to highlight a single word, and extend in either direction; or position the
mouse pointer anywhere in the text and perform normal text selection.
3. To display the dialog in Figure 3-11, perform one of the following actions:
Select Edit/Copy to File... from the menu bar.
Position the mouse pointer over the selected text and right-click to display
the pop-up menu. Select Copy to File... from the pop-up menu.
3-46 Common Procedures
Figure 3-11.
Copy to File lets you
specify a file and path
for the destination of
the copy.
4. Enter a filename (with path, if necessary), or use the Browse... push button. (For
a complete description of browse dialogs, see page 4-8.)
5. Select Append or Overwrite.
6. Click OK.
Before you can begin capturing incoming text, you must display the Terminal panel.
To capture your interaction with the remote system, follow these steps:
1. Perform one of these actions to display the dialog in Figure 3-12:
Right-click anywhere in the Terminal panel (but not over selected text) to
display the pop-up menu. Then select Start... from the Capture to File
cascade menu.
Click the Capture to file button in the Toolbar.
Select Start... from the File/Capture to File cascade menu.
Figure 3-12.
Capture to File
Capture to File lets
Button
you specify a file
and how it will be
used for saving
your interaction
with the remote
system.
2. If youve defined a default capture file for the entry, that filename appears in the
File edit field. If you dont have a default capture file defined for the entry, either
Receiving and Sending Files 3-47
type a path and filename or click the Browse... push button to help you specify
a capture file. (For a complete description of browse dialogs, see page 4-8.)
3. Select one of the options in the group If File Already Exists. For information
about these options, see Capture to File dialog on page 4-66.
4. Select one of the options in the group Capture Mode. For information about
these options, see Capture to File dialog on page 4-66.
5. Select the Make these the default settings check box if you want all changes
youve made in this dialog to become default settings for future sessions.
6. Click Start to return to the Terminal panel and begin
capturing data according to specified options. To capture a snapshot of
the panel, select the text
7. See Printing on page 3-47, if you want to print text you want captured and use
while youre capturing it to a disk file. the pop-up menu. See Cap-
turing Terminal Area and
Backscroll Buffer Data on
page 3-45.
Stopping, Pausing, and Resuming Text
Capture
Once a capture has been initiated, selecting File/Capture to File displays a cascade
menu with the following choices:
Stop Stops file capture and closes the cur-
rent capture file. If you end the communica-
tions session, or exit with-
Pause Suspends file capture, but doesnt out selecting Stop,
close the current capture file. If cap- HyperACCESS closes the
capture file automatically.
ture is already paused, this menu
item is grayed out (unavailable).
Resume Restarts file capture using the current capture file. If capture is
already active, this menu item is grayed out (unavailable).
Printing
Permit the host to issue print commands (if supported by the terminal emulator).
HyperACCESS supports both continuous and selected printing for applicable
terminal emulators (for example, VTxxx).
Print information from a capture file (see Capturing Text to a File on
page 3-45 for more information) using another application.
You can use the Terminal panel pop-up or File menu to select either Print or Capture
to Printer to initiate printing at any time, even before HyperACCESS connects to the
remote system. However, before actually printing, you should make sure that your
printer is set up properly.
HyperACCESS lets you select a predefined printer using the following techniques
from any panel:
Select File/Print... (or use the C+P shortcut key combination) to display the
Print dialog. In the Print dialog, select the printer from the Name drop-down list.
Select File/Page Setup... to display the Page Setup dialog. In the Page Setup
dialog, click the Printer... button. In the next dialog, select the printer from the
Name drop-down list.
Select File/Print Preview to display the print preview window. In the print
preview window, click the Print... button to display the Print dialog. In the Print
dialog, select the printer from the Name drop-down list.
Click the Print button from any Toolbar to display the Print dialog. In the Print
dialog, select the printer from the Name drop-down list.
Print Button
Change the Windows default printer using the Printers folder. To access the
Printers folder, click the Start button in the Taskbar, then select Settings/
Printers. Right-click on the printer you want to select as the Windows default,
and select Set As Default from the pop-up menu.
Receiving and Sending Files 3-49
HyperACCESS lets you print your interaction with the remote system while youre
online. To initiate this type of printing, follow these steps:
1. Verify that your Printer Setup is defined correctly. See Changing Printer Setup,
above, for more information.
2. Verify that your printer is turned on and has plenty of paper.
3. To start printing, perform one of the following actions to display the Capture
to Printer dialog shown in Figure 3-13.
Click the Capture to printer button.
With the mouse pointer anywhere in the Terminal panel (except over
Capture to Printer
Button selected text), right-click to display the pop-up menu and select the
Capture to printer cascade menu. Then select the Start... option.
Select the File/Capture to printer cascade menu. Then select the Start...
option.
The dialog shows the active printer.
Figure 3-13.
Capture to Printer lets
you control how and
when your remote
system interaction
prints.
4. Select the appropriate option in the Capture Mode group box to specify what
information you want to capture. For more information, see Capture to Printer
dialog on page 4-64.
5. Select the appropriate option in the Print Method group box. For more infor-
mation, see Capture to Printer dialog on page 4-64.
6. You can make your selections the default for all future capture to printer
operations by selecting the Make these the default settings check box.
7. Click the Start push button to print data using the options you selected.
3-50 Common Procedures
To print a section of the terminal area, Backscroll Buffer, or the Message Pad follow
these steps:
1. Verify that your printer is turned on and has plenty of paper, and that your Printer
Setup is defined correctly. See Changing Printer Setup on page 3-48 for more
information.
2. Select the text to be printed in the terminal area, Backscroll Buffer, or Message
Pad. (If you want to print the entire terminal area and Backscroll Buffer, you
dont need to make a selection.)
3. In the Terminal panel, use the Print button, select Edit/Copy to Printer, File/
Print, or use the pop-up menu. When the dialog appears, select either All or
Selected text from the Print Range group box, and click OK. HyperACCESS
will print the range selected.
Print Button
Sending Files
The following sections describe, generically, how you send files regardless of file
transfer protocol selected. For a brief description of the protocols and their default
settings, see Appendix E, File Transfer Protocols.
You can send one file or a group of files, which you select using wildcards, following
these steps:
Note: Most file transfer protocols supported by HyperACCESS can send groups of
files using wildcards (for more information, see Appendix E, File Transfer Protocols).
1. Issue commands to the remote system to receive files from you. (Commands
vary from system to system, so we cant provide detailed instructions in this
manual.)
Note: You can delay this step until just before step 5.
2. Use one of the following actions to display the mod-
eless Send dialog. See Figure 3-14. Modeless dialogs let you
continue to interact with
With the mouse pointer anywhere in the the remote system with
Terminal panel, except over selected text, right- the dialog displayed.
Figure 3-14.
Send is a modeless
dialog. It can remain
on-screen while you
issue commands to
the host system.
5. Click the Send button. This causes HyperACCESS to enter send mode and
displays the send progress dialog.
There are several techniques available to send multiple files with HyperACCESS. You
can:
Use the Browse button to display a file selection dialog. From within a selected
folder, use the S or C key in combination with mouse button 1 to perform
multiple selection within the current folder. All selected files appear in the
Filename edit field.
Note: You cant select files across directories, and you cant specify wildcards
in a filename using this technique. This technique changes your default send
directory.
Enter any number of files in the Filename edit field. Enclose each file (including
its full path if provided) in quotes. Separate filenames with a space. For example,
you could enter:
*.txt d:\uw\exe\win.dbg\download\*.gif file.txt
Note: You can combine this technique with the one above. Remember that you
must use browse selection before adding filenames to the Filename edit field.
Regardless of the technique you use to enter multiple files in the Filename edit field,
the file history list doesnt store the multiple selection.
Changing Settings 3-53
Changing Settings
The properties notebook consists of multiple tabbed panels called sheets. You can
access these sheets using one of the following procedures:
In a notebook, with the mouse pointer over the selected entry, right-click
to display the pop-up menu. Select Properties from the menu. When the
properties notebook appears, select the tab of the sheet you want to display.
Click the Notebook entry settings button. Depending on the panel you
are in, this displays either the Description or Communications properties
sheet. Select the tab of the sheet you want to display.
In the Phonebook panel, select Properties from the File menu. When the
Notebook Entry properties notebook appears, select the tab of the sheet you want to display.
Settings Button
In the Terminal panel, select the desired sheet from the Properties menu.
When you change Transfer Protocol settings from a notebook or Terminal panel,
youre specifying default values. You can also modify these values on-the-fly in the
Receive or Send dialogs.
You can change terminal emulator settings from either a notebook or the Terminal
panel. Regardless of where you make changes to these settings, each entry has its own
uniquely saved values. This means you can access multiple remote systems with the
same basic emulator (for example, VT100), and you can define each entry with its
own combination of setting values.
This section outlines procedures for accessing the Terminal Emulator properties sheet
and emulator-specific dialogs. For details on actual settings and permitted values for
each terminal emulator, see Appendix D, Terminal Emulator Characteristics.
The Terminal Emulator properties sheet has settings that are common to all terminal
emulators, and it provides access to a dialog that has emulator-specific options. To
access this sheet and dialog for any terminal emulator:
1. Display the Terminal Emulator properties sheet using one of the techniques
described in Changing Property Sheet Settings on page 3-53.
2. Select the desired terminal emulator from the Terminal drop-down list.
3. Make selections by clicking on desired radio buttons, or change the number of
rows and columns using the spin buttons (or edit fields).
4. If it is active, click the Settings... push button. This displays an emulator-specific
dialog for additional settings. This button is unavailable (grayed out) if there are
no emulator-specific settings.
5. If applicable, make desired selections from the emulator-specific dialog, and
click OK.
When you exit the properties notebook, HyperACCESS automatically saves all
changes youve made for the current entry.
You can modify communications settings when you define a new entry using the New
Entry Destination dialog (of the New Entry wizard) or at any other time using the
Communications properties sheet. The procedure you use depends on whether you
have a modem or direct cable connection (there are no modifiable settings for WinSock
(TCP/IP) connections).
Figure 3-15.
The General panel of
the TAPI modem prop-
erties dialog.
Changing Settings 3-57
3. The Connection panel, shown in Figure 3-16, of the modem properties dialog
has drop-down lists for Data bits, Parity, and Stop bits. It also has selections
for Call preferences and Port Settings... and Advanced... buttons that display
additional dialogs. For more information on these options, see your Windows
documentation, click the ? in the dialog and select the object on which you need
help, or right-click on a drop-down list, check box, or entry field title and select
Whats this? from the pop-up menu.
Figure 3-16.
The Connection panel
of the TAPI modem
properties dialog.
4. To change flow control, click the Advanced... button and select the appropriate
radio button.
3-58 Common Procedures
5. The Options panel, shown in Figure 3-17, lets you modify, among other param-
eters, the delay time to wait for a credit card tone. For more information on these
options, see your Windows documentation or click the ? in the dialog and select
the object on which you need help, or right-click on a drop-down list, check box,
or entry field title and select Whats this? from the pop-up menu.
Figure 3-17.
The Options panel of
the TAPI modem prop-
erties dialog.
Figure 3-18.
The port properties dia-
log lets you customize
parameters for direct
cable connections.
4. The Flow control drop-down list lets you select between Hardware (RTS/CTS),
Xon/Xoff (software), or None (no) flow control.
5. Click OK in the port properties dialog.
6. Click OK in the New Entry Destination dialog or Communications properties
sheet.
Modifying Connections
You can modify a connection when you define a new entry using the New Entry
Destination dialog (of the New Entry wizard) or at any other time using the Commu-
nications properties sheet. To modify a connection, follow these steps:
1. With the New Entry Destination dialog (of the New Entry wizard) or the
Communications properties sheet open, click the Change... button in the Con-
3-60 Common Procedures
nect Via group box. This displays the Existing Connections dialog shown in
Figure 3-19.
Figure 3-19.
The Existing
Connections dialog
lets you define and
modify connections.
2. Select the connection you want to modify, and click the Modify Connection...
button. What happens next depends on the type of connection you select, but is
similar to the procedure for new connections. For modem or modem pool type
connections, see Modem or Modem Pool Connections on page 3-20. For direct
cable connections, see Direct Cable Connections on page 3-22. For TCP/IP
connections, see For WinSock (TCP/IP) Connections on page 3-22.
Dialing details include options that determine how HyperACCESS places calls. For
example, you can specify how long to wait for a carrier from the remote modem, and
number of dialing attempts. In addition, you can specify global options for all entries,
such as Tone or Pulse dialing and speaker volume.
To modify Dialing details follow these steps:
1. With the Communications dialog or Communications properties sheet open,
click the Dialing Details... button. This displays the Dialing Details dialog.
2. Make desired changes (see Dialing Details on page 4-39).
3. Click OK to close the dialog, and then OK to close the properties notebook.
Changing Settings 3-61
Figure 3-20.
The Dialing Proper-
ties dialog lets you
define multiple loca-
tions and dialing pro-
cedures from each
location.
2. To create a new location, click the New... button and enter a unique name in the
Create New Location dialog. Otherwise, select a current location from the I am
dialing from drop-down list.
3. Enter the area code for the current location in The area code is edit field.
4. Select the country of the current location in the I am in drop-down list.
5. Fill in the edit fields and select check boxes as appropriate in the How I dial
from this location group box. For procedures to create new Calling Card types
or suffixes, see Creating Suffixes on page 3-74.
6. Select either the Tone dialing or Pulse dialing radio button.
7. Click OK to close the dialog, and then OK to close the properties notebook.
3-62 Common Procedures
Managing Lists
This section describes procedures that relate to the Lists panel. You can use entries in
lists to create entries or to place trial calls.
HyperACCESS comes with several list files. You can retrieve updated lists from the
Hilgraeve BBS, and additional lists from other BBS and online services. Some of these
lists are very large.
HyperACCESS users responsible for corporate support may want to create a list file
enumerating PCs in your organization that have HyperAccess Host. This is especially
convenient if the number of PCs is large, and you dont want to use the added space
normal notebook entries would require. You can easily generate this list from a TCP/
IP hosts file or corporate database.
HyperACCESS lets you copy entries from a list file to a notebook or try accessing an
entry prior to copying it. Before you can perform either of these actions, you must
define a template if one doesnt already exist (see Creating List File Templates,
below). If youre using a list file that comes with HyperACCESS, the template already
exists.
To copy one or more list entries to a notebook, see Copying a Notebook Entry From
a List File on page 3-14.
To try a list entry, see Placing a Trial Call From the Lists Panel on page 3-64.
List files are a compact way to obtain and store a large number of phone numbers for
remote systems. HyperACCESS comes with several predefined list files. You can get
additional lists from the Hilgraeve BBS and other sources.
Lists must be ASCII files, and each line must include at least a name and phone
number. Other entries are optional (see list below). Each list file must have a template
so that HyperACCESS can interpret the contents of the list.
When you first open a list file that doesnt have a template defined, HyperACCESS
displays the warning dialog shown in Figure 3-21. The following sections describe
Managing Lists 3-63
the two options for creating a template for a list file from the No Template Found
dialog.
Figure 3-21.
The No Template
Found warning dialog
lets you copy a previ-
ous template, create a
new template, or
cancel.
To create a list file template from the No Template Found dialog, follow these steps:
1. Select the New... push button.
2. Enter a name in the Name edit field.
3. Use the Field separated by drop-down list to indicate how HyperACCESS
determines where fields begin and end. Choices in the drop-down list are:
Comma
Tab
Quote
Column Spacing
Note: In lists using Column Spacing, the first position of the line is
column 1.
4. Use the Name field location edit field to specify the position of the data field
that has the entry name. Enter the field number or column number (depending
on separator selected).
5. Use the Phone number field location edit field to specify the position of the
data field that has the phone number. Enter the field number or column number
(depending on separator selected).
6. Use the Data begins in line number edit field to specify the number of lines to
ignore at the beginning of the list file. This lets you ignore lines at the beginning
of a list file that are headings, notices, or other text, and prevents you from
accidently selecting lines that dont represent remote systems.
3-64 Common Procedures
7. Use the Comment lines begin with edit field to specify a special character that
defines comment lines. Lines that contain comments typically begin with a
specific character (for example, a semicolon) to distinguish them from data lines.
If there arent any comments after the initial header (see Data begins in line
number, above), you can leave this field blank.
8. Click OK to close the dialog.
9. To verify your template settings, select an entry in the list, and click either the
Copy to notebook or Place trial call button (see Using List Files on page 3-62).
Copying a Template
1. Select the Copy... push button from the No Template Found dialog.
HyperACCESS displays the dialog shown in Figure 3-22.
Figure 3-22.
This dialog lets you
select a list file
whose template is
similar to the new
one you want to
create.
2. Select the list file whose template is similar to the one you want to create.
3. Change any settings as required (see procedure, Creating a New Template,
above).
You can place a call from a list file prior to moving it to a notebook. This capability
lets you see if the system is one that you want to use before actually saving it. To try
an entry, follow these steps:
1. Select the Lists panel tab.
2. If necessary, open a list file by selecting File/Open from the Lists panel menu.
Enter the filename, select a file from the file list, or click the Browse... push
Using Message Pad 3-65
By default, the Message Pad appears as a single-line docked window at the bottom of
the HyperACCESS window (above the status bar). You can enlarge the docked
window size; detach it so that it becomes a separate window; and re-dock it to either
to top or bottom of the Terminal panel. This section describes how to perform these
actions with the Message Pad. For more information on dockable toolbars see
Dockable Toolbars and Windows on page 4-59.
3-66 Common Procedures
To enlarge or shrink the Message Pad (as a docked window), follow these steps:
1. Move your mouse pointer over the bar that divides the Message Pad from the
rest of the Terminal panel.
2. When the mouse pointer becomes a double line with opposing pointing vertical
arrows, press mouse button 1.
3. You can drag the separator bar either up or down to increase or decrease the
Message Pad.
4. Release the mouse pointer when the Message Pad is the size you want.
To resize the Message Pad as an undocked window, simply drag a window border or
corner as you would to resize any window.
You can detach the Message Pad so that it becomes a separate, undocked window.
You can then re-dock it on either the top or bottom of the Terminal panel.
HyperACCESS remembers its last location whenever you open Message Pad. To
move the Message Pad, follow these steps:
1. Move your mouse pointer over the bar that divides the
Message Pad from the rest of the Terminal panel. The Message Pad has a
blank area near the Send
2. When the mouse pointer becomes a double line with button. You can also dou-
opposing pointing vertical arrows, double-click ble-click this area or the
sizing edge of the Mes-
mouse button 1. This detaches the Message Pad and sage Pad to undock the
creates a separate window. window.
Youll use the Windows Notepad (or any other text editor) to edit a text file, such as
a file youve captured to disk or a Visual Basic scripting language (VBScript) program
file. You can use Notepad at any time. You may also choose to use Message Pad,
particularly if you intend to prepare a message that youll send as text. The sections
below describe how you use the Message Pad.
The Message Pad provides a convenient scratch pad area for creating text you would
normally type directly to the remote system. The advantage of using Message Pad is
that you can freely move about and edit text using standard Windows techniques. You
dont have to concern yourself with the idiosyncrasies of editing on the remote system.
Using editing techniques described here, along with saving Message Pad text
described in Copying Text From Message Pad on page 3-69, its possible to use the
Message Pad just as you would use any other editor. This gives you complete text
editing capability without ever leaving HyperACCESS. As youll see in the following
sections, pop-up menus make this especially convenient.
Manually editing text in the Message Pad is identical to techniques used in Windows
Notepad and other applications.
3-68 Common Procedures
There are several techniques available to copy text from the terminal area or Backscroll
Buffer to the Message Pad. One technique is:
1. Move the mouse pointer (I-beam) to the place in the Message Pad where you
want to copy the selected text, and click.
2. Select the text in the terminal area and/or Backscroll Buffer that you want to
copy by moving the mouse pointer (I-beam) to the beginning of the text. You
can double-click a word and/or drag the I-beam until youve selected desired
text. (You can select text from anywhere within the terminal area and/or
Backscroll Buffer.)
3. Use the Edit/Copy to/Message Pad command to copy the selected text.
Alternatively, you can:
1. Select the text to be copied by moving the mouse pointer (I-beam) to the
beginning of the text.
2. Double-click a word and/or drag the I-beam until youve selected desired text.
(You can select text from anywhere within the terminal area/Backscroll Buffer.)
3. Select the Edit/Copy command (or C+C copy shortcut key) to copy the selected
text to the Clipboard.
4. Move the mouse pointer (I-beam) to the place in Message Pad where you want
to copy the selected text and click.
5. Paste from the Clipboard to Message Pad using one of the following techniques:
Use the pop-up menu (mouse button 2), and select: Paste.
Using Message Pad 3-69
You can easily save information you enter in the Message Pad following these steps:
1. Select the text to be copied by moving the mouse pointer (I-beam) to the
beginning of the text.
2. Double-click the word and/or drag the I-beam until youve selected the desired
text.
Note: You can select all text in the Message Pad by pressing C+H followed
by C+S+n, or select the Edit/Select All menu item.
3. Copy to the file using one of the following techniques:
Use the pop-up menu (mouse button 2) and select Copy to/File....
Select the Edit/Copy to/File... menu item.
4. Use the dialog to indicate what you want to do if the file exists.
5. Enter the filename, use the drop-down file list, or click the Browse... push button
to select an existing file. (For a complete description of browse dialogs, see
page 4-8.)
6. Click the Copy push button.
3-70 Common Procedures
You can print all text in the Message Pad by following these steps:
1. Click in the Message Pad.
2. Select File/Print to display the Print dialog.
3. Select All radio button in the Print Range group box, and click the Print button.
To print selected text, make your selection and then do one of the following:
Use the Print button.
Select File/Print and specify Selected text in the Print Range group box of the
Print Button Print dialog.
Once youve completed entering and editing text in the Message Pad window, youll
want to send it to the remote system. To do this, click the Send button. This causes
Send Text Button
HyperACCESS to send the contents of the Message Pad as if a very fast typist were
keying the data. Settings specified in the ASCII Sending properties sheet control how
text is sent. (Select Properties/ASCII Sending... in the Terminal panel to view this
sheet.)
Note: The Send button sends selected text or, if no text is selected, sends all text in
the Message Pad.
The text appears in both the Terminal panel and the remote computers Host panel.
To prevent the Host from interpreting text sent from the Message Pad as Host
commands, you should type the Host chat command prior to sending text.
The Message Pad is convenient for chat mode operations when youre communicating
with another individual on the remote system. With Message Pad set to Chat Mode,
you can compose what you want to send while the Terminal panel displays what the
other party sends you. To use Message Pad in Chat Mode, follow these steps:
1. From the Terminal panel, click the Message Pad button or select View/Toolbar
Message Pad and select Message Pad in the Toolbars dialog to display the Message Pad.
Button
Using Advanced Features 3-71
2. From the Message Pad, click mouse button 2 to display the pop-up menu, then
select Chat Mode to enable Chat Mode operations. When selected, Chat Mode
has a check mark.
3. With Chat Mode enabled, the Message Pad transmits the contents of the window
whenever you press e.
For more information on chatting, see Chatting With a User on the Remote PC on
page 3-41.
This section describes procedures the more advanced users may want to use.
Note: If the key combination you enter currently defines a standard Windows
shortcut, HyperACCESS displays a warning dialog, and lets you change the
sequence.
4. You then assign one of the following actions to the combination of keys in the
Key edit field:
Click the Macro text option button. This activates the edit field and lets
you enter keys that you want HyperACCESS to output when you press the
key combination defined in the Key edit field. For example:
2 displays <F2>
S +2 displays <SHIFT-F2>
7. Click OK.
8. In the Keys for <entry> dialog, click OK.
Youre now ready to use the 5 key to issue this host command.
L (selecting text also creates an implicit Scroll Lock). During Scroll Lock, keys
required for terminal emulation revert to Windows.
But suppose you need to use PF1-PF10 for terminal emulation, but also want to be
able to use 1-0, etc., for Windows control without having to press L first. You
can accomplish this by remapping PF1-PF10 to other keys, such as C+S+1 through
C+S+0 along the top row of the keyboard.
As an illustration of the technique required to perform this task, follow these steps to
reassign the PF1 key to C+S+1.
1. Select the entry for the remote system.
2. Use one of the following actions to display the Terminal panel:
With the mouse pointer over the selected entry, right-click to display the
pop-up menu. Select Open.
Click the Open button.
Select File/Open.
3. Select Automation/Keys... to display the Keys for <entry> dialog.
Open Button 4. Click the New... push button.
5. In the Key edit field, press C+S+1. Notice the resulting
<CTRL-SHIFT-1> in the edit field.
6. In the Macro edit field, press I, 1. Notice the resulting <F1> in the edit field.
Note: You must press I because 1 normally displays context sensitive help for
a dialog.
7. Click OK.
8. In the Keys for <entry> dialog, click OK.
Youre now ready to use the C+S+1 key combination to issue the same code as
PF1 to the host. Continue using the same procedure to reassign the other function keys.
Creating Suffixes
Figure 3-23.
The Change Calling
Card dialog lets you
create or modify
calling cards
(suffixes).
4. In the Change Calling Card dialog, click the New... button. This displays the
Create New Calling Card dialog with a single text edit field.
5. Enter the same name you used for the location in Step 2 and click OK. This
returns you to the Change Calling Card dialog with your new name in the Calling
card to use drop-down list. By default, the Calling Card number edit field is
unavailable.
6. Click the Advanced... button to display the Dialing Rules dialog shown in
Figure 3-24.
7. In general, you enter codes in each edit field of this dialog to specify the sequence
of numbers you want Windows to use when dialing with this Calling Card. For
3-76 Common Procedures
Figure 3-24.
The Dialing Rules
dialog lets you
define the dialing
sequence to use for
a Calling Card.
example, with direct touch tone compatible lines to your modem, you should
enter the following:
If you use a third party long distance carrier and want to dial an access code
before the area code and phone number (formerly implemented as a prefix in
HyperACCESS), you could enter the following:
where 10222 is the access code for MCI. Other possible codes are 10333 for
Sprint and 10288 for AT&T. Check with your local service provider or long
distance carrier to determine whether you need to enter a prefix.
Note: For a complete list of dialing codes and their meaning, click the ? button
in the Dialing Rules dialog and then click one of the edit fields, or right-click
one of the entry field titles and select Whats this? from the pop-up menu.
Note: You can enter one or more commas (,) to specify a fixed, two-second pause
for each comma.
8. Click the Close button to return to the Change Calling Card dialog.
Using Advanced Features 3-77
9. The Calling Card number edit field is now available. Enter the suffix you want
to use, and click OK to return to the Dialing Properties dialog.
Note: You can set the time to Wait for credit card tone in the TAPI modem
Options panel. See Modifying Connections on page 3-59 for instructions on how
to display that panel.
10. In the Dialing Properties dialog, verify the selection of the This location has
call waiting check box (Windows selects it by default).
11. Select the Dial as long distance call check box to enable the calling card dialing
procedure even for local number.
12. Click OK in the Dialing Properties dialog to return to the New Entry Destina-
tion dialog or Communications properties sheet. Then click Next to continue
defining a new connection, or click OK to close the properties notebook.
Youre now ready to use the location and calling card combination for dialing with a
suffix. Make sure you select the Confirm phone numbers before dialing check box
(the default) in the Dialing Details dialog (see Dialing Details on page 4-39). Then,
each time you make a connection, you can verify and, if necessary, simply change the
location you use in the Confirm Phone Numbers dialog (leave the Dial without this
confirmation dialog check box unselected).
Caution: If you make a local call to an Internet service provider for e-mail and Web
access, Microsofts Dial-Up Networking uses the same, global value for the location
youre dialing from. Youll have to change your location back to Default Location
after using this technique to make sure that your calls to your Internet service provider
dont get charged to the accounting code represented by the location-calling card you
last used when making a call in HyperACCESS.
Figure 3-25.
The Change Calling
Card dialog lets you
create or modify
calling cards
(suffixes).
3. Use the Calling Card to use drop-down list to select your calling card.
4. If the Calling Card number edit field is available, enter your calling card
number, and click OK to return to the Dialing Properties dialog.
Note: You can set the time to Wait for credit card tone in the TAPI modem
Options panel. See Modifying Connections on page 3-59 for instructions on how
to display that panel.
5. In the Dialing Properties dialog, verify the selection of the This location has
call waiting check box (Windows selects it by default).
6. Click OK in the Dialing Properties dialog to return to the New Entry Destina-
tion dialog or Communications properties sheet. Then click Next to continue
defining a new connection, or click OK to close the properties notebook.
In-place activation and program embedding are major advantages of Office 97,
Internet Explorer, and future versions of Windows. With these features you can run
Using Advanced Features 3-79
In-Place Activation
To use in-place activation you need a program that supports ActiveX, such as Internet
Explorer from Microsoft. Within Internet Explorer, you can add telnet sites to your
favorites list. Then when you want to connect to that telnet site while running Internet
Explorer, you simply select the entry from your favorites list and Internet Explorer
launches HyperACCESS and executes it inside the Internet Explorer window.
For example, you could follow these steps:
1. Start Internet Explorer and connect to the Web.
2. Within Internet Explorer, select File/Open.
3. In the Open dialog, use the Browse... button to find the .HAW file that connects
to your telnet site. Click OK until Internet Explorer launches HyperACCESS.
HyperACCESS automatically runs your login script (if youve created one).
4. Once youve connected to the telnet site, youll see the HyperACCESS toolbar
(if youve selected it to be visible) and HyperACCESS menu selections on the
menu bar in addition to Internet Explorer menus.
5. Select Favorites/Add to Favorites... to save an entry for this telnet site.
6. The next time you use Internet Explorer and want to connect to this telnet site,
simply select the entry from the Favorites drop-down menu.
Program Embedding
With program embedding you can place a HyperACCESS entry in another program
and then automatically launch HyperACCESS and make a connection when you
double-click the entry object icon.
For example, you can place the Dow Jones entry file in an Excel spread sheet and
automatically connect to Dow Jones and run a prepared script to update prices in your
spread sheet. To accomplish this you would:
1. Start Excel and load your spread sheet.
2. Select Insert/Object... to display the Object dialog.
3-80 Common Procedures
3. In the Object dialog, select the Create from File tab, and enter the path or use
the Browse... button to select the .HAW (Dow Jones.haw) file you want to
access.
4. Select the Display as Icon check box (you can change the icon if you want), and
click OK.
5. When youre ready to connect to the Dow Jones service and update your spread
sheet (assuming that you have a properly prepared Script to run upon connec-
tion, see Recording a Logon Sequence on page 5-5), double-click the
HyperACCESS icon.
Chapter 4
HyperACCESS Reference
This chapter has major sections for each panel in HyperACCESS, plus it includes
reference sections for secondary windows that HyperACCESS creates. These sec-
tions provide a complete reference to HyperACCESS menus and dialogs, and appear
in the following order:
Notebook Panels and Menus
Properties Sheets
Terminal Panel and Menus
Message Pad Panel and Menus
Lists Panel and Menus
Call Log Panel and Menus
Graphics Viewer Window
HyperACCESS menu bars and menus differ depending on the panel or window
youre using.
To access a panel in the primary HyperACCESS window, you can click its tab or
select it from the Window menu (see Phonebook Panel Window Menu on page 4-25).
When selected, a panel moves to the top, and the menu bar and Toolbar change for
that panel. For example, the Terminal panel has a Transfer menu and the other panels
dont, and all panels have File and View menus.
Youll find that the View menu on each panel and secondary window lets you
customize the appearance of HyperACCESS.
4-2 HyperACCESS Reference
Phonebook Panel
Figure 4-1 shows the default Phonebook panel display. Since most users have only
this one notebook, this section specifically describes the Phonebook panel, and uses
the term Phonebook interchangeably with notebook. All information in this section
applies to the default Phonebook panel as well as any notebook you create.
The Phonebook panel is a notebook that includes phonebook entries. You can create
additional notebooks and use them as phonebook panels (see Phonebook Panel
Notebook/New on page 4-20). New notebooks appear as additional tabbed panels.
Youll find that double-clicking on an entry is usually the easiest way to begin a
communications session; however, there are other techniques. For example, you can
drag the entry and drop it on the Terminal tab, or you can use the File menu to begin
a communications session, as youll see in Phonebook Panel File Menu on page 4-4.
To select an entry, you can either click on it or move your mouse pointer over the
entry. If your mouse pointer hovers over an entry for more than one second,
HyperACCESS selects that entry without requiring a mouse click.
There are a series of index tabs at the top of each notebook panel. The * tab displays
all entries in the current notebook sorted alphabetically. Selecting an individual tab
letter displays a sheet with entries that have names beginning with that letter.
Figure 4-1.
The Phonebook
panel with its menu
bar.
Phonebook Panel Menu Bar 4-3
Each menu on the menu bar generally gives you some control over the Phonebook
panel and how its used or displayed. Briefly, the menus are:
File gives you the capability to add and delete entries as well as begin commu-
nications sessions.
View lets you customize various features related to the display. You have many
options available to change the Phonebook panel display.
Notebook lets you create, delete, and copy notebooks.
Options lets you specify a text viewer and sounds to use for HyperACCESS
events. It also selects whether HyperACCESS should display the Terminal panel
on startup and checks whether or not it is the default Telnet application.
Automation lets you run predefined programs and macros, and set up custom
buttons.
Window lets you change to a different HyperACCESS panel.
Help provides additional information on how to use HyperACCESS.
The following sections describe the Phonebook panel menus in more detail. Youll
find the menus in the same order as they appear in the menu bar (from left to right).
4-4 HyperACCESS Reference
The Phonebook panel File menu is useful for adding and deleting entries, beginning
a communications session, and exiting HyperACCESS. Figure 4-2 shows the Phone-
book panel File menu.
Figure 4-2.
The phonebook
panel File menu lets
you add and delete
phonebook entries as
well as begin com-
munications sessions.
Regardless of the entry selected, New displays the New Entry wizard that guides you
through the process of creating a new entry. The first dialog is the New Entry
Description dialog shown in Figure 4-3. Type an entry name, select an icon, and
specify a notebook and terminal emulator. Then click Next.
Note: HyperACCESS uses the entry name as the filename and adds a .HAW extension
(.HHW for Host entries). This is the name that appears under the icon Phonebook
panel and in the Terminal panel title bar.
Phonebook Panel Menu Bar 4-5
Figure 4-3.
The New Entry
Description dialog
lets you specify an
entry name, an icon,
and a notebook. You
can also enter notes
for later reference.
HyperACCESS then displays the New Entry Connection dialog shown in Figure 4-4.
This dialog lets you select or create the type of connection you want to use. The default
connection type is determined from the New Entry Template. For more information
on creating connections, see Creating Connections on page 3-19 or Modifying Con-
nections on page 3-59.
Figure 4-4.
The New Entry
Connection dialog
lets you accept the
default or select a dif-
ferent connection
type.
4-6 HyperACCESS Reference
Clicking Next displays the New Entry Destination dialog (see Figure 4-5) that lets
you change any of the default settings. This new entry uses settings from the New
Entry Template.
Figure 4-5.
The New Entry Desti-
nation dialog lets you
specify connection
attributes.
The contents of this dialog depend on the type of connection selected. For more
information on creating connections, see Creating Connections on page 3-19 or
Modifying Connections on page 3-59. To complete the definition of the entry, click
Next and then Finish.
Opening another entry or exiting HyperACCESS automatically saves your new entry.
HyperACCESS creates a filename based on the entry name you entered in the New
Entry Description dialog.
Note: You can open the New Entry Template, and modify default settings from the
Terminal panel. However, you cant connect to a remote system or type in the Terminal
panel with the New Entry Template open. For more information on modifying default
settings, see Modifying Entry Defaults on page 3-16.
This menu selection lets you save the selected entry with a new name. It displays the
standard Save As dialog shown in Figure 4-6. This dialog lets you change the filename
or drive and folder to use for the save. The filename you enter becomes the entry name
in the Phonebook panel (see note on page 4-4), and the original entry remains
unchanged.
Note: Entries have a .HAW extension, and Host entries have a .HHW extension.
Figure 4-6.
The Save As dialog
lets you change the
filename or drive and
directory to use for
the save.
Figure 4-7.
The Import Files dia-
log is a common
browse dialog. It lets
you select a drive,
directory, and file.
The Properties selection displays the properties notebook. For a description of the
properties notebook and its sheets, see Properties Sheets on page 4-27.
Among parameters specified through properties sheets are entry name; communica-
tions settings like connection and phone number; terminal emulator and custom
settings for the emulator; ASCII receiving and sending parameters; file transfer
protocols; paths used for logon program, capture file, and log file; and default
preferences for mouse behavior, colors, and other settings.
Page Setup... displays the standard Windows dialog shown in Figure 4-8. This dialog
lets you specify printer parameters and select from among available printers. You can
use the Printer... button to display another standard Windows dialog to select the
printer. HyperACCESS uses the printer you select for all its printing. You can also
select the Font... button in the Page Setup dialog. The resulting Font dialog lets you
select a font to use for your printer output. For more information on any of these
4-10 HyperACCESS Reference
dialogs, see your Windows documentation or click the ? in the dialog and select the
object on which you need help.
Figure 4-8.
The Page Setup
dialog lets you specify
printer parameters
and select a printer to
use in HyperACCESS.
Figure 4-9.
The print preview
window shows what
HyperACCESS will
print.
Two Page This button is available if more than one page would print. It
displays pairs of pages in the preview window.
One Page This button is available if two or more pages are displayed. It
displays the current (left-most) page in the preview window.
Zoom In This button is available if the preview isnt at the highest level
of zoom. Clicking this button zooms in one level of magnifi-
cation. The preview window supports three zoom levels. Click-
ing in the preview window when it is not at its highest level of
magnification zooms in one level.
Note: Moving your mouse pointer into the zoom window
changes the pointer to a magnifying glass if additional zoom
levels are available. Clicking in the window increases the zoom
one level with the focus at the point you clicked.
4-12 HyperACCESS Reference
Zoom Out This button is available if the preview isnt at the lowest level
of zoom. Clicking this button zooms out one level of magnifi-
cation. The preview window supports three zoom levels. Click-
ing in the preview window when it is at its highest level of
magnification zooms all the way out.
Note: When the mouse pointer does not change to a magnifying
glass in the zoom window (or changes back to an arrow), no
additional zoom levels are available. In this case, clicking in
the window zooms all the way out.
Close Closes the preview window without printing.
Print... displays the standard dialog shown in Figure 4-10. In the Phonebook, this
dialog prints a summary of all or selected entries in the notebook. For more informa-
tion, see your Windows documentation or click the ? in the dialog and select the object
on which you need help.
Figure 4-10.
The Print dialog lets
you select a printer
and specify what will
print.
The Connect menu item opens the Terminal panel, makes a connection, and dials the
phone number (if appropriate). This selection is grayed out (unavailable) if
HyperACCESS is already connected to a remote system.
Phonebook Panel Menu Bar 4-13
Figure 4-11.
This dialog lets you
enter a telephone
number for an entry
that doesnt have one
predefined. You can
save this number in
the entry by selecting
the check box.
Figure 4-12.
The Confirm Phone
Numbers dialog
appears for modem
connections.
Figure 4-13 shows the dialog that displays while HyperACCESS attempts a modem
connection to the desired system. If HyperACCESS detects an abnormal event during
4-14 HyperACCESS Reference
modem setup or dialing, it displays a dialog that summarizes the problem and offers
help. The help information explains possible causes and remedies.
Figure 4-13.
While attempting to
dial a remote system,
HyperACCESS dis-
plays this dialog.
You can specify the number of retries and time between retries in the Dialing Details
dialog (see page 4-39). You access this dialog when applicable for the connection
device (for example, a modem) by clicking the Dialing Details... button in the
Communications properties sheet.
The Connect and Record Logon menu item displays the Terminal panel and the
Recording in Progress window, and makes the connection as in File/Connect, above.
Once HyperACCESS establishes connection with the remote system, you must
manually log on to the system.
HyperACCESS begins learning your keystrokes as soon as youre connected to the
remote system. When you complete all commands you want HyperACCESS to learn,
select Stop! from the menu bar of the Recording in Progress window. For more
information, see Chapter 5, Automation Tools.
Phonebook Panel Menu Bar 4-15
Use the Connect but Skip Logon menu item to ignore a standard logon script that was
previously recorded. It displays the Terminal panel, and makes the connection as in
File/Connect, above. Once HyperACCESS establishes connection with the remote
system, you must manually log on to the system. This selection is grayed out
(unavailable) if HyperACCESS is already connected to a remote system.
The File menu includes a numbered list of the four most recently opened entry files.
Selecting one of these files in the list opens the entry.
The Exit menu item terminates HyperACCESS. If there is an active connection with
a remote system, HyperACCESS displays a warning dialog.
If you want to customize the way HyperACCESS displays the current notebook, use
the View menu. Figure 4-14 shows the menu.
Figure 4-14.
The View menu lets
you control how the
panel displays
entries.
The first group has only one menu item, Refresh Now. In the second group, which
controls what the current panel displays, you can check only one menu item at a time.
The remaining groups provide independent selections that affect the appearance of
the HyperACCESS window and the notebook panel.
4-16 HyperACCESS Reference
Redisplays the panel to show changes made outside the program; for example, deletion
of entry files.
With Icons selected (the default), the Icons menu item displays a check mark, and
youll see a notebook panel similar to Figure 4-1 on page 4-2. In this case, each icon
and entry name identifies a remote system.
With Details selected, the menu item displays a check mark. The details displayed are
values specified in the Communications properties sheet (see page 4-29), plus the full
path of the entry file.
With Entry Names selected, the Entry Names menu item displays a check mark. In
this case, HyperACCESS displays each entry in a multi-column list format with entry
names and their icons shown.
When selected, Toolbars... displays the Toolbars dialog that lets you select toolbar
options. The Toolbars dialog has a Toolbars list with check boxes for toolbars
available in HyperACCESS. Select whichever toolbars you want to use. This dialog
also has check boxes for additional options. Some selections you make are global for
all panels while others impact specific panels. For more information about docking
and undocking these toolbars, see Dockable Toolbars and Windows on page 4-59.
The toolbars available are:
<Terminal> This toolbar is entry-specific (<Terminal> represents the name
of the entry), and appears on the Terminal panel. Initially, all
entries have the same buttons, and this toolbar appears below
Phonebook Panel Menu Bar 4-17
the menu bar at the left side of the toolbar section of the panel.
This toolbar consists of entry-specific buttons that provide
shortcuts to menu selections. Adding, modifying, or deleting
buttons on this toolbar only impacts the current entry. Display-
ing or hiding this toolbar also only impacts the current entry.
Note: HyperACCESS stores the buttons on this toolbar and its
display status in the entry file. You copy the toolbar definition
when you copy the entry file.
Standard Terminal This toolbar appears on all Terminal panels. Initially, it appears
to the right of the <Terminal> toolbar. Adding, modifying, or
deleting buttons on this toolbar impacts all entries. Displaying
or hiding this toolbar also impacts all entries.
Note: HyperACCESS stores the buttons on this toolbar and its
display status in the Windows Registry. Since the Windows
Registry is machine specific, you should not place buttons on
this toolbar that you want to use on other PCs when you copy
entry definitions.
Notebooks This toolbar appears on all notebook panels. Initially, this
toolbar appears below the menu bar at the left side of the
toolbar section of notebook panels. Adding, modifying, or
deleting buttons on this toolbar impacts all entries. Displaying
or hiding this toolbar also impacts all entries.
Call Log This toolbar appears on the Call Log panel. Initially, this
toolbar appears below the menu bar at the left side of the
toolbar section of Call Log panel. Adding, modifying, or
deleting buttons on this toolbar impacts only the Call Log
panel. Displaying or hiding this toolbar also impacts only the
Call Log panel.
Lists This toolbar appears on the Lists panel. Initially, this toolbar
appears below the menu bar at the left side of the toolbar
section of Lists panel. Adding, modifying, or deleting buttons
on this toolbar impacts only the Lists panel. Displaying or
hiding this toolbar also impacts only the Lists panel.
Modem Status The Modem Status toolbar only appears on the Terminal panel.
It simulates the most common front panel indicator lights on
external modems. With devices other than modems, such as
4-18 HyperACCESS Reference
When selected, Status Bar displays a check mark and the status bar appears at the
bottom of the window. This is the default. Clicking on this menu item removes the
check mark and status bar. The selection you make is global for all panels.
The status bar has five fields. From left to right, they are:
Help line The left-most section of the status bar displays a single line of
help information for the current selection or menu item.
Connect status If connected to a port, this field displays the word Connected
and the elapsed time for the current connection in hours,
Phonebook Panel Menu Bar 4-19
When selected, Tabs displays a check mark and panel tabs appear below the toolbar
in the HyperACCESS window. This is the default. Clicking on this menu item removes
the check mark and panel tabs. These tabs provide single-click access to
HyperACCESS panels (Terminal, Phonebook, Call Log, Lists, and user created
phonebook tabs). When unselected, the panel tabs no longer appear. To switch
between panels, you can use the Window menu, or re-enable the panel tabs. The
selection you make is global for all panels.
The Notebook menu lets you create or delete notebooks. You can also copy a
notebook or rename it. Figure 4-15 shows the Notebook menu.
Figure 4-15.
The Notebook menu
lets you create, copy,
or delete custom
notebooks.
4-20 HyperACCESS Reference
This menu item displays the Rename dialog (see Figure 4-16) that lets you change
the name of the current notebook. The notebook tab permits names up to 30 characters
long.
Figure 4-16.
This dialog lets you
change the name of
the current note-
book. The new name
appears on the tab.
This menu displays the Notebook Name dialog (see Figure 4-16) that lets you specify
the name of a new notebook. When you enter a new name and click OK,
HyperACCESS displays a notebook panel with a tab that shows the new name. The
notebook tab permits names up to 30 characters long. The only entry in the new
notebook is the New Entry Template.
This menu lets you copy all entries from the current notebook to a new notebook. It
displays the Notebook Name dialog (see Figure 4-16) that lets you specify the name
of the destination notebook. The notebook tab permits names up to 30 characters long.
HyperACCESS creates the notebook, and the notebook tab shows the new name. You
cant copy to an existing notebook.
This menu displays a confirmation dialog. When you click OK, HyperACCESS deletes
the notebook panel. This selection doesnt delete the entry files contained in the
deleted notebook.
Phonebook Panel Menu Bar 4-21
The Phonebook Options menu provides selections that affect overall operation of
HyperACCESS. For example, you can specify a text viewer that you want
HyperACCESS to use. Figure 4-17 shows the Options menu. Selecting any of these
menu items displays a tabbed panel of the Options dialog.
Figure 4-17.
With the Options
menu you can specify
text viewer and
sound files for differ-
ent events.
Selecting Text Viewer displays the Options dialog with the Text Viewer tab visible,
as shown in Figure 4-18. This dialog lets you change the text viewer program used by
HyperACCESS. By default, HyperACCESS uses Notepad for the Text viewer.
Figure 4-18.
With the Text Viewer
tab of the Options
dialog, you can spec-
ify programs used by
HyperACCESS.
Note: The text viewer is used to edit programs, (see Terminal Panel Automation/Edit
Program on page 4-88.
4-22 HyperACCESS Reference
Displays the Options dialog with the Sound tab visible, as shown in Figure 4-19.
Figure 4-19.
The Sound dialog lets
you associate .WAV
files with
HyperACCESS
events.
This panel has a drop-down list that lets you select system sound, custom sound, or
off. In more detail these selections are:
System sound This selection is the default if your system doesnt have mul-
timedia drivers installed. If selected, HyperACCESS beeps the
system speaker whenever one of the listed events occurs.
Custom sound This selection is the default if your system has multimedia
drivers installed. If selected, the Event list and Associated file
combo field become available. These fields let you associate
.WAV files with HyperACCESS events.
If you select Custom sound, you associate a file with each event by following these
steps:
1. Select an event from the Event list (for example, Disconnected).
2. Use the Associated file combo field to enter a filename, select a filename from
the drop-down history list, or use the Browse... push button to select a .WAV
file for the event. (For more information on browse dialogs, see page 4-8.)
3. Use the play and stop buttons to preview the .WAV file.
4. Click OK when you have completed all associations.
To disable multimedia sound for an event, make sure its Associated file edit field
indicates (None).
Phonebook Panel Menu Bar 4-23
Selecting Startup displays the Startup tab of the Options dialog shown in Figure 4-20.
Figure 4-20.
The Startup tab of the
Options dialog lets
you specify whether
HyperACCESS should
display the Terminal
panel on startup, and
whether it should
verify that it is the
default Telnet
application.
The Automation menu provides four selections to Run, Abort, Edit Program, and
assign programs to Buttons (see Figure 4-21). These selections are a subset of the
available menu items in the Terminal panel Automation menu. For a complete
description of all automation menu items see Terminal Panel Automation Menu on
page 4-85.
Figure 4-21.
The phonebook
panel Automation
menu has items to
run, edit, or abort
programs, and assign
programs to buttons.
Phonebook Panel Menu Bar 4-25
The Window menu (see Figure 4-22) lets you select HyperACCESSs panels. The
currently active panel appears with a check mark.
Figure 4-22.
The Window menu
has items that let you
display HyperACCESS
panels.
Selecting Terminal displays the Terminal panel where you interact with the remote
system (see Features of the Terminal Panel on page 4-58).
Selecting Phonebook displays the Phonebook panel containing the default phone-
book. If you change the name or delete this notebook, the menu list reflects this change.
The mnemonic for Phonebook, the first notebook, is 1.
The Phonebook panel Help menu items let you get Help information about
HyperACCESS. See HyperACCESS Help on page xiv in the Introduction.
You can optionally display or hide toolbars for all panels using View/Toolbar. You
can also create your own buttons or reposition buttons using drag and drop (press S
in combination with the left mouse button and drag the button to its new location).
Default buttons provided with HyperACCESS (in their default order) are:
New
Open
Print
Performs the same function as File/Print (see page 4-12).
Print Preview
Performs the same function as File/Connect and Record Logon (see page 4-14).
Cycles between Icons, Details, Entry names, and File names phonebook displays.
Help
Performs the same function as Help (see HyperACCESS Help on page xiv in the
Introduction).
Properties Sheets
The properties notebook is a modal window (that is, you must select OK or Cancel or
close the window before you can continue working in HyperACCESS). It has sheets
that let you specify various communications parameters for an entry. You can display
the properties notebook by selecting a menu item from the Properties menu of the
Terminal panel, or by selecting the Properties menu item from a notebook panel File
menu or an entrys pop-up menu, or by clicking the Settings button.
The following sections describe each sheet of the properties notebook. To display a
sheet, once you have the properties notebook displayed, simply click its tab.
4-28 HyperACCESS Reference
The Description properties sheet (Figure 4-23) lets you change the entry name, pick
an icon, and enter a brief comment.
Figure 4-23.
The Description prop-
erties sheet lets you
change an entry
name, pick an icon,
and enter a brief
comment.
Name
Use this edit field to enter or change the name for the entry (its filename without the
.HAW or .HHW extension). In Icons view, this name appears under the icon. You can
enter a name up to 256 characters (including path).
Icons
Use this scrollable region to select an icon to represent the entry in Icons view. The
selected icon is highlighted. To change a selection, simply click another icon.
Note: You can use these icons for objects outside HyperACCESS by selecting the file
HADLL32.DLL in the HyperACCESS program directory. Simply select this file when
assigning icons to shortcuts and select the icon you want to use.
Properties Sheets 4-29
Notes
This scrollable edit field lets you add any textual information about the entry. For
example, you might want to keep the system administrator or help desk phone number
in this field.
The Communications properties sheet lets you define how HyperACCESS connects
to the remote system. The edit fields and buttons that appear on this sheet depend on
the connection you define using the Change... button in the Connect Via group box.
For example, Figure 4-24 shows the communications sheet for a modem connection.
This sheet lets you define one or more phone numbers, and communications settings.
Figure 4-24.
The Communications
properties sheet lets
you define telephone
numbers and other
settings for an entry.
Connections
Different types of connections require different parameters. You can specify global
parameters that affect all entries that use a connection, and you can specify local
parameters that affect the current entry.
When you create connections, you specify the connection
type (see Creating Connections on page 3-19). Valid types Contact Hilgraeve if you
include: need support for addi-
tional connection types.
Modem or modem pool (TAPI)
Direct cable
Winsock (TCP/IP)
Depending on the type of connection, you can specify other
connection parameters. For example, a modem connection If you have any third-party
lets you select a standard communications port. If you pick communications drivers,
install them according to
Standard Com Port, you can then assign the port to a manufacturers instruc-
physical device (i.e., COM1, COM2), assign a modem name, tions prior to using
and specify modem setup details. These are all global HyperACCESS.
parameters for the connection.
Connection definitions dont include settings for dialing procedures (that is, how many
times and how often to try dialing). Since these settings may vary from call to call,
they are local to the current entry, and you can specify these settings for each entry
using the Communications properties sheet (see Dialing Details on page 4-39).
Settings such as data bits, stop bits, and parity appear in standard Windows TAPI
dialogs for defining modems and connections. For information on changing these
settings, see Communications Settings on page 4-35 and the Windows online help
system.
Connect Via
The Connect Via group box at the top of the Communications properties sheet is
common to all connection types. This group box displays the name and type of the
current connection. Other entries on the sheet vary depending on connection type.
You can add or modify connections using the Change... button. For details on the
dialogs used to create, modify, and delete connections, see Creating Connections on
page 3-19, Modifying Connections on page 3-59, and Deleting Connections on
page 3-23. Those sections define the details of the dialogs required for each procedure.
Properties Sheets 4-31
The following sections define the Communications properties sheet depending on type
of connection.
This section defines the text fields and buttons on the Communications properties
sheet when the connection type is through a modem (see Figure 4-24 on page 4-29).
Phone number to By default, this field indicates that the phone number infor-
dial mation is for the First phone number to try. Use the up or
down arrow buttons to select one or two alternate phone
numbers.
Country code This drop-down combo box lets you specify one of the pre-
defined country codes for the phone number youre calling.
Area code This edit field lets you specify an area code for the phone
number youre calling.
Phone number Use this edit field to enter the tele-
phone number. If you always call If you leave the Phone
the same phone number to access a number field blank,
HyperACCESS will prompt
remote system, its best to enter the you for a number when
Phone number. However, there you try to connect to the
may be advantages to leaving this remote system.
field blank attempting to con-
nect with an entry that doesnt have a phone number displays
a dialog to obtain the number.
Dial phone The Dial phone number only check box lets you indicate
number only that HyperACCESS should only dial the phone number spec-
ified in the Phone number edit field.
Dialing Use this button to display the Dialing Properties dialog (see
Properties... Dialing Properties, below).
Dialing Details The Dialing Details... push button on the Communications
properties sheet displays the Dialing Details dialog
Communications Use this button to display standard Windows TAPI dialogs to
Settings.... modify modem connection parameters from HyperACCESS.
For more information, see Communications Settings on
page 4-35.
4-32 HyperACCESS Reference
Dialing Properties
The Dialing Properties... button in the Communications properties sheet displays the
Dialing Properties dialog shown in Figure 4-25. This dialog lets you enter information
about your default location and any number of remote locations. You can either pre-
define these locations or define them as the need arises.
Figure 4-25.
The Dialing Proper-
ties dialog lets you
enter dialing infor-
mation for multiple
locations.
The drop-down lists, edit fields, check boxes, and push buttons in this dialog are:
Where I Am
The Where I am group box specifies parameters for the default location, and lets you
define additional locations. The drop-down list, edit fields, and push button in this
group box are:
I am dialing from This drop-down list displays currently defined locations. Make
a selection from the list or click the New... push button.
New This push button lets you create a new location. Clicking on
New... displays a dialog that lets you enter the name of the
location. Type a name and click on OK or press e. The
Dialing Properties dialog displays the new name in the I am
dialing from drop-down list, and keeps previous dialog
attribute values as defaults for the new entry.
Properties Sheets 4-33
Remove This push button is unavailable (grayed out) for the Default
Location. Selecting any other location in the I am dialing from
drop-down list activates this button. Clicking on Remove
displays a dialog requesting confirmation before removing the
location.
The area code is The edit field lets you define the area code for the current
location. This number determines whether dialed numbers use
long distance or local access.
I am in This drop-down list displays a list of countries. Select the
country of the current location. This selection determines
whether dialed numbers include a country code.
The phone system These two radio buttons let you select either Tone dialing or
at this location Pulse dialing. The selection you make is a function of the
uses telephone company or in-house PBX capabilities.
HyperACCESS uses the selection you make for all entries
that use this connection.
You access the Change Calling Card dialog (see Figure 4-26) by selecting the Dial
using Calling Card check box or by clicking its associated Change... button. For
procedures using this dialog to create a calling suffix required for some phone systems,
see Creating Suffixes on page 3-74).
Figure 4-26.
Change Calling Card
lets you select from
among predefined
entries and enter a
calling card number
when applicable. It
also lets you create
new calling card
entries.
The drop-down list, edit field, and push buttons in this dialog are:
Calling Card to use Use this drop-down list to select a pre-defined calling card, or
click the New... push button (see below) to define a new calling
card.
Calling Card number Use this edit field to enter a calling card number. This edit field
is unavailable unless the defined calling card requires a num-
ber.
New... Use this push button to display the Create New Calling Card
dialog. This dialog lets you enter the name of the new calling
card. Enter the name in the edit field and click on OK or press
e.
Remove Use this push button to remove the current calling card from
the drop-down list.
Advanced... Use this push button to display the Dialing Rules dialog that
lets you customize the sequence of numbers used to place calls
Properties Sheets 4-35
Communications Settings
General
The General panel, shown in Figure 4-27, displays the modem name, plus has
additional controls to modify modem parameters.
Figure 4-27.
The General tab of
the Windows modem
properties dialog.
The drop-down lists, check box, and slider control in this dialog are:
Port This drop-down list displays the available communications
ports available on the system.
Speaker volume This slider bar lets you adjust the modem speaker. To move
the slider, either click on the slider track at one of the markers
or drag the slider to the desired marker. The slider only
moves in discrete increments shown by the markers.
Maximum speed This group box has a drop-down list and check box. The
drop-down list provides common transmission rates between
110 and 115,200 baud. This parameter determines the maxi-
mum transfer speed in bits per second (bps) between your PC
and modem.
Only connect at Selecting this check box, in the Maximum speed group,
this speed specifies that your modem must connect at exactly this speed
regardless of the capabilities of the two modems making the
connection.
Properties Sheets 4-37
Connection
The Connection panel, shown in Figure 4-27, displays connection and call
preferences.
Figure 4-28.
The Connection tab
of the Windows
modem properties
dialog.
The drop-down lists, check box, and edit fields in this dialog are:
Connection This group box includes drop-down lists for Data bits, Par-
preferences ity, and Stop bits. The most common settings for these
attributes are: 8, None, and 1, respectively. If you fail to con-
nect with these settings, contact the system administrator of
the system youre calling to see if you should use different
settings.
Call preferences The check boxes (and edit fields) in this group box are:
Wait for dial tone before dialing select this check
box to have the modem wait before dialing. See the online
help for more information.
Cancel the call if not connected within select this
check box and enter a value in the edit field to have
Windows disconnect and cancel the call if the modem
doesnt indicate connection within the allotted time.
Disconnect a call if idle for more than select this
check box and enter a value in the edit field to have
Windows disconnect the call if no characters are trans-
mitted in either direction for the specified time.
4-38 HyperACCESS Reference
Port Settings... This push button displays the Advanced Port Settings dialog.
For more information on this dialog, see Windows online help.
Advanced... This push button displays the Advanced Connection Settings
dialog. For more information on this dialog, see Windows
online help.
Options
The Options panel, shown in Figure 4-27, is in the dialog when you click the
Communications Settings... button in the HyperACCESS Communications proper-
ties sheet. This panel doesnt appear when you display this dialog from the Windows
Control Panel. (However, it does appear when you display this dialog using the
Configure... button in the Properties dialog of a Windows Dial-Up Networking entry.)
The options panel lets you configure connection control, dial control, and status
control. The only section applicable to HyperACCESS is Dial control.
Figure 4-29.
The Options tab of
the Windows modem
properties dialog.
The three group boxes in this dialog and the attributes they provide are:
Connection Control This group box has two check boxes that let you configure
TAPI to display a terminal window before and/or after dialing.
Select Bring up terminal window before dialing to manually
enter modem commands before TAPI issues dial commands to
the modem.
Select Bring up terminal window after dialing to manually
enter commands to the remote computer after TAPI dials. For
Properties Sheets 4-39
Dialing Details
The Dialing Details... push button on the Communications properties sheet displays
the Dialing Details dialog shown in Figure 4-30. HyperACCESS specifies reasonable
defaults for each of these settings. Settings in the upper group box of this dialog affect
only this entry, and are independent of settings used when calling other systems.
Settings in the lower group box affect calls to all entries.
Figure 4-30.
Dialing Details lets
you specify number
of retries, when to
retry, and other dial-
ing options.
4-40 HyperACCESS Reference
When the connection type you select is through a direct cable, the Communications
properties sheet displays two parameters with corresponding Change... push buttons
as shown in Figure 4-31.
Figure 4-31.
The Communications
properties sheet for
direct cable connec-
tions.
Port Settings
Figure 4-32.
The Port Settings dia-
log used for direct
cable connections.
Data bits Use this drop-down list to specify the number of bits per
character. Possible settings include 4, 5, 6, 7, and 8. Most
systems use eight.
Parity Use this drop-down list to select the type of character parity.
The options are None, Odd, Even, Mark, and Space.
Note: When using Odd, Even, Mark, or Space parity, you will
customarily set data bits to 7.
Stop bits Use this drop-down list to specify the number of stop bits per
character. The choices are 1, 1.5, and 2. Most systems use one
stop bit.
Flow control This drop-down list lets you select Hardware (RTS/CTS),
software (Xon/Xoff), or no (None) flow control.
Advanced... This push button displays the Advanced Connection Settings
dialog. For more information on this dialog, see Windows
online help.
Restore Defaults This push button returns all drop-down lists in this dialog to
their previously saved state.
Properties Sheets 4-43
This section defines the text fields and buttons on the Communications sheet when
the connection type is through WinSock. For WinSock connections, the Communica-
tions properties sheet displays three parameters. as shown in Figure 4-31.
Figure 4-33.
The Communications
properties sheet for
WinSock (TCP/IP)
connections.
The Terminal Emulator properties sheet (shown in Figure 4-34) lets you select a
terminal that you want HyperACCESS to emulate. It also lets you define settings that
4-44 HyperACCESS Reference
are applicable to any emulation. The Settings... button displays a dialog that is unique
for each terminal emulator (see Appendix D, Terminal Emulator Characteristics for
emulator-specific settings).
Figure 4-34.
The Terminal
Emulator properties
sheet defines which
emulator you want to
use and how you
want the emulator to
behave.
This group box has two radio buttons that let you specify whether you want the
function, arrow, and control keys to perform as Terminal keys or as System keys.
Selecting Terminal keys causes HyperACCESS to override Windows system keys,
such as C+V.
This group box has three radio buttons that let you determine what HyperACCESS
sends the remote system each time you press B. Your choices are:
Ctrl+H Send the value associated with C+H ASCII backspace
(08H).
Del Send the value associated with Del (7FH).
Ctrl+H, Space, Send an ASCII backspace, replace the character at that posi-
Ctrl+H tion with a space character, and backspace again. This pro-
vides a destructive backspace for systems that provide only a
nondestructive backspace.
Cursor
This group box has two radio buttons that select between an Underline and Block
cursor. It also has a check box that lets you select a blinking (selected) or nonblinking
(unselected) cursor.
These two spin buttons and their associated edit fields let you specify the terminal
screen height (Rows) and width (Columns). You can specify a minimum of 2 and a
maximum of 64 rows, and a minimum of 2 and a maximum of 132 columns. The
Default push button returns the number of rows and columns to appropriate settings
for the selected terminal.
Note: Selecting a number of Rows or Columns different than the default values may
cause text on the terminal screen to appear misaligned with remote systems that lack
support for this capability.
4-46 HyperACCESS Reference
The ASCII Receiving properties sheet (shown in Figure 4-35) lets you specify options
that only apply to normal terminal interaction with remote systems. These options
dont affect file transfer protocols.
Figure 4-35.
The ASCII Receiving
properties sheet lets
you specify options
that apply only to
terminal interaction
with remote systems.
Note: HyperACCESS ignores this setting when you use the ANSI
emulator because it must support graphic characters that use the
eighth bit.
Properties Sheets 4-47
Echo incoming The default is no echo. When set, this option transmits every
data to sender received character back to the remote system.
You may want to select this check box when youre commu-
nicating terminal-to-terminal.
Wrap lines that When off, discards characters beyond the terminals maxi-
exceed terminals mum line length. When on, the default, long lines appear on
width multiple terminal lines.
Show hex value The default is off. When on, control characters, escape
of nonprinting sequences, and screen control codes no longer control your
characters screen; instead they display as hexadecimal values in square
brackets.
By comparing these values with the table in Appendix C,
ASCII Characters, you may be able to spot troublesome char-
acters or sequences.
Tab spacing for The default replaces each tab character with eight contiguous
incoming text spaces. Use the spin button or associated edit field to change
the number of contiguous spaces used to convert a tab char-
acter. Set this value to zero to turn conversion off.
The ASCII Sending properties sheet (shown in Figure 4-36) lets you specify options
that only apply to normal terminal interaction with remote systems. For example, this
sheet lets you specify whether or not to append LF characters to the end of outgoing
lines. You can also specify line and character delays to correct problems with lost
characters. These options dont affect file transfer protocols.
The check boxes and combo boxes on this sheet are:
Send line feed Default is CR. Check this box to have HyperACCESS send a
with each line CR and LF at the end of each line.
Expand blank The default permits null lines (two CRs without any interven-
lines to include a ing characters). Check this box to force HyperACCESS to
space always include at least one space character between two CRs.
4-48 HyperACCESS Reference
Figure 4-36.
The ASCII Sending
sheet lets you specify
options that apply
only to normal termi-
nal interaction with
remote systems.
Echo typed The default is no echo. When set, this option displays trans-
characters locally mitted characters in the terminal area. Select this option when
youre communicating with remote systems that expect you
to be operating in half duplex (sometimes called echoplex)
mode.
After sending The default is no waiting. However, if selected, the default
each line, wait for character causes HyperACCESS to wait for an echoed CR
character character (decimal 13) before sending the next line. Most
remote systems operate in full duplex mode, so all characters
sent are echoed back. Waiting for CR can help synchronize
transmission to slower remote systems. The spin button lets
you select the decimal value of the character you want to wait
for.
Convert outgoing The default is no conversion. However, if checked, the
tabs to default is eight spaces. You can change the number of spaces
using the spin button or associated edit field.
Delay after each The default is zero milliseconds. If you experience loss of
character characters when performing ASCII transmissions to slow
remote systems, increasing this setting may improve trans-
mission integrity. Use the spin button or associated edit field
to change the number of milliseconds.
Properties Sheets 4-49
Delay after each The default is zero milliseconds. If you experience loss of
line characters at the beginning of lines when performing ASCII
transmission to slow remote systems, increasing this setting
may improve transmission integrity. Use the spin button or
associated edit field to change the number of milliseconds.
The File Transfer properties sheet (shown in Figure 4-37) lets you specify default
protocols for sending and receiving files. You can also set default folders for sending
and receiving.
Figure 4-37.
The File Transfer
properties sheet lets
you define default
protocols and folders
for sending and
receiving files.
The following sections define group boxes and their corresponding edit fields and
buttons.
This group box has drop-down lists of supported protocols for receiving and sending.
(The associated display boxes dont permit manual entry. You must make a selection
from the drop-down list.) In addition, the dialog has Settings... push buttons for
receiving and sending that display a dialog for each protocol. If you specify the same
4-50 HyperACCESS Reference
protocol for both sending and receiving, either Settings... button defines settings for
both directions.
Appendix E, File Transfer Protocols describes supported protocols and lists their
options and defaults.
This group box lets you define folders that you want to use as default receiving and
sending folders.
For receiving Defines a default folder for files received from the remote
system. You can change the receiving folder during a session.
The drop-down list shows the last six folders used to receive
files using this entry. The Browse... push button associated
with this entry field displays a directory browse dialog that
permits selection of drive and folder. The file selection list isnt
present in the browse dialog. For a complete description of
browse dialogs, see page 4-8.
For sending Defines a default folder for files transmitted to the remote
system. You can change the sending folder during a session.
The drop-down list shows the last six folders used to send files
using this entry. The Browse... push button associated with this
entry field displays a directory browse dialog that permits
selection of drive and folder. The file selection list isnt present
in the browse dialog. For a complete description of browse
dialogs, see page 4-8.
The File Usage properties sheet lets you specify files that you want HyperACCESS
to use for various operations (see Figure 4-38). HyperACCESS defines one file for
Properties Sheets 4-51
each listed function. By default, the program uses these files for all entries. You can
use this sheet to define unique files for the current entry.
Figure 4-38.
The File Usage prop-
erties sheet lets you
specify files that you
want HyperACCESS
to use for various
operations.
The Usage list defines functions that require files. When you select an entry in the
Usage list, the Associated file edit field shows the current filename (and relative or
full path if required). The drop-down list associated with the edit field shows the six
most recently used files for this selection. You can enter or modify the edit field, select
an entry from the drop-down list, or use the Browse... push button to select a file. For
a complete description of browse dialogs, see page 4-8.
The functions defined in the Usage list are:
Defines a default capture file. You can change the capture file during a communica-
tions session. Changing the default capture file here has the same effect as changing
it in the Terminal panel File/Capture to File (see Terminal Panel File/Capture to File
on page 4-66).
This file is a program thats automatically run before you connect with a remote
system. It does not automatically connect the program must explicitly initiate
connection using appropriate HAPI functions. You can use this feature to substitute
a user-defined modem handling routine for the built-in mechanisms. These files should
have a .TXT extension for VBScript or JavaScript, .EXE for compiled code written
in any language (Visual Basic, Microsoft C, etc.), or .BAT for batch files.
This file is a program thats automatically run when you connect with a remote system.
These files should have a .TXT extension for VBScript or JavaScript, .EXE for
compiled code written in any language (Visual Basic, Microsoft C, etc.), or .BAT for
batch files.
The Preferences properties sheet (see Figure 4-39) lets you specify how
HyperACCESS reacts to your mouse clicks, and how it handles the Backscroll Buffer.
Properties Sheets 4-53
Figure 4-39.
The Preferences
properties sheet lets
you specify how
HyperACCESS reacts
to mouse button
clicks and how large
it makes the Back-
scroll Buffer.
The following sections define the group boxes and their radio buttons and the edit
fields that appear on this sheet:
Button 1 Double-Click
This group box has three radio buttons that determine the action taken when you
double-click the mouse selection button (normally the left button). The options are:
Selects word Selecting this radio button deselects any selected text, and
selects the word currently under the mouse pointer. This
action can occur in the terminal viewing area or Backscroll
Buffer.
This is the default action, and is consistent with normal Win-
dows interface standards. Extended selection can proceed
from the selected word by dragging the mouse pointer (with-
out releasing on the second click), or using extended selec-
tion keys (S+l, S+r, C+S+l, or C+S+r).
4-54 HyperACCESS Reference
Copies word or Selecting this radio button automatically transmits the word
selected text to under the mouse pointer; or if the mouse pointer is pointing
remote computer to selected text, transmits the selected text to the remote sys-
tem. If the mouse pointer is over white space, nothing is
transmitted.
Copies word or Selecting this radio button causes a button 1 double-click to
selected text to behave just like the previous option; plus transmits a CR
remote computer character after any text. If the mouse pointer is over white
with ENTER space, HyperACCESS transmits a single CR character.
Button 2 Click
This group box has four radio buttons that determine the action taken when you click
the second mouse button (normally the right button of a two or three-button mouse).
The options are:
Displays pop-up Selecting this option causes display of pop-up menus within
menu the terminal viewing area or Backscroll Buffer. See Using
Terminal Area/Backscroll Buffer Pop-up Menus on page 3-5
for complete information on how to use these menus. This is
the default.
Positions remote Selecting this option causes repositioning of the remote sys-
computers cursor tems cursor position, provided the terminal being emulated
has the capability to transmit cursor control characters. For
those terminals, HyperACCESS typically transmits multiple
cursor control characters equivalent to the number of times
arrow keys would have been pressed to arrive at the new
position.
Because few remote systems respond properly to this feature,
HyperACCESS makes no attempt to verify appropriate
response. However, an error message displays when cursor
repositioning is used with terminal emulators that dont sup-
port cursor control characters.
Copies single let- Selecting this option causes automatic transmission of the
ter to remote single character under the mouse pointer. Clicking on white
computer space sends an <ENTER> character to the remote system.
Properties Sheets 4-55
Other Options
You can have HyperACCESS use any of these values during program execution. For
information on inserting HyperACCESS statements that use these runtime values, see
Action Menu on page 5-8.
Figure 4-40.
The Runtime Values
properties sheet lets
you specify variable
data that your auto-
mation programs can
use.
The Colors properties sheet (see Figure 4-41) lets you select colors for the Terminal
panel text and background from 16 predefined selections. To select a color, click it.
Text preview shows your selections and lets you try other combinations before
selecting OK.
The colors you define here become default colors for this entry. If you connect with
a computer that sends color redefinition codes to HyperACCESS, your screen colors
will change.
Properties Sheets 4-57
Figure 4-41.
The Colors properties
sheet lets you select
colors for the Host
panel text and back-
ground.
4-58 HyperACCESS Reference
Terminal Panel
You can begin a communications session many ways. One technique is to double-
click an entry. When your communications session begins, youll see a Terminal panel
that looks like the one shown in Figure 4-42.
Backscroll
Terminal area/
Buffer
Backscroll Buffer Terminal Area
Separator Bar
Scroll Bar
Message Pad
Send Button
Status Bar
In Figure 4-42, a bar separates the terminal display area from the Backscroll Buffer
(above the bar). When you first display the Terminal panel, you dont see the
Backscroll Buffer. By default, the Backscroll Buffer appears when one or more lines
Terminal Panel 4-59
of text from the current communications session scroll into it. You can hide the
Backscroll Buffer until you explicitly use the scroll bar (or cursor keys) to view
information that has scrolled up.
The terminal youre emulating and the Terminal Emulator
properties sheet (see Terminal Emulator Properties Sheet If a remote system dis-
on page 4-43) determine the size of the terminal screen. This plays new data by selec-
tively erasing or
area (whether or not its fully visible) contains your most overwriting data instead
recent interaction with the remote system. If youre emulat- of scrolling or clearing
ing a terminal that scrolls lines off the top of the screen, the screens, no information
Backscroll Buffer stores everything that scrolls off the passes into the Backscroll
Buffer.
screen. Lines also move to the Backscroll Buffer if the
remote system sends a code to clear your screen.
Each entry has its own Backscroll Buffer. When the number
of incoming lines exceeds the Backscroll Buffers capacity You can set the size of the
Backscroll Buffer using
(the default is 500 lines), HyperACCESS deletes the oldest
the Preferences proper-
lines, as required, to make room for new lines. ties sheet.
You can double-click in a blank area in a toolbar to display a floating palette (or
undocked) window, or you can drag a toolbar off its docked location to create a floating
palette window.
You can resize these palette windows using normal windows techniques by dragging
on a border or corner, and you can move them anywhere on your screen even off
the HyperACCESS window. HyperACCESS remembers where you last positioned
these toolbars when you toggle their display (see Terminal Panel View Menu on
page 4-75) or exit and restart.
You can close a palette window by clicking its close button in the upper right corner.
This closes the window, removes the check mark from the corresponding entry in the
Toolbars dialog (accessed from View/Toolbars...). For Message Pad, closing the
palette window unselects the Toolbar button and the entry in the View menu.
To redock palette windows, you can double-click the title bar to return it to its previous
docked position. You can redock the palette window elsewhere by positioning your
mouse pointer over the title bar and dragging your mouse pointer to a HyperACCESS
window border. As you move your mouse pointer, an outline of the palette window
appears. As you approach a dockable border for the toolbar (Modem Status and
Message Pad are only dockable at the top or bottom panel border), the outline snaps
into its docked position. Depending on the size of the toolbar and HyperACCESS
window, you may be able to move the docked outline along the border; for example,
you can move the Modem Status toolbar to the right side of the bottom border. As you
move your mouse pointer away from the dockable border, the palette window outline
snaps back to your pointer.
Each menu on the menu bar provides control over the Terminal panel and how its
used or displayed. Briefly, the menus are:
File gives you some of the same capabilities as the phonebook panel File menu.
For example, you can begin a communications session or exit HyperACCESS.
In addition, you can disconnect a session or capture interaction with the remote
system to a file or printer.
Edit lets you copy and paste text. It also features a search capability with the
Find... menu item.
Terminal Panel Menu Bar 4-61
View lets you customize various features for the Terminal panel. From this menu
item, you can display the Message Pad panel and specify how you want the
HyperACCESS window to appear.
Properties displays menu items that open different sheets of the properties
notebook. These sheets let you change various communications parameters
pertaining to this entry, such as name, phone number, terminal emulation, and
so on.
Transfer lets you send and receive files.
Automation lets you learn or run programs and set up custom keys and buttons.
Window lets you display different HyperACCESS panels.
Help provides additional information on how to use HyperACCESS.
The following sections describe the Terminal panel menus in the same order as they
appear in the menu bar (from left to right). Only menu items unique to the Terminal
panel menu bar are fully described. Other menu items appear with a reference to the
relevant section in the Phonebook panel section of this chapter.
The Terminal panel File menu is useful for opening, closing, and saving entries. It also
provides selections that let you connect and disconnect from a remote system, capture
and print remote system interaction, and exit from HyperACCESS. Figure 4-43 shows
the Terminal panel File menu.
Selecting Open... displays the Open browse dialog that lets you open any entry file.
For a complete description of browse dialogs, see page 4-8.
4-62 HyperACCESS Reference
Figure 4-43.
The Terminal panel
File menu has entries
to initiate or discon-
nect a session, or
capture session infor-
mation to a file or
printer.
Selecting Save uses the current entry file to save the options and parameters. If the
entry is untitled, youll see the Save As dialog (see below).
Selecting Save As... displays a standard Save As dialog shown in Figure 4-44. The
File name edit field displays a proposed filename.
Figure 4-44.
The Save As dialog
lets you specify a file-
name and path for an
entry.
Terminal Panel Menu Bar 4-63
You can enter any filename (with or without an extension). However, if you enter any
extension other than .HAW HyperACCESS automatically adds an .HAW extension.
Selecting Connect connects to the port and dials the phone number (if appropriate).
See Phonebook Panel File/Connect on page 4-12 for more information. This selection
is grayed out (unavailable) if HyperACCESS is already connected to a remote system.
Selecting Connect and Record Logon dials the phone number, and displays the
Recording in Progress window upon successful connection. See Phonebook Panel
File/Connect and Record Logon on page 4-14 for more information. This selection is
grayed out (unavailable) if HyperACCESS is already connected to a remote system.
The Connect but Skip Logon menu item dials the phone number without running any
scripts. See Phonebook Panel File/Connect but Skip Logon on page 4-15 for more
information. This selection is grayed out (unavailable) if HyperACCESS is already
connected to a remote system.
Page Setup... displays the standard Windows Page Setup dialog. See Phonebook
Panel File/Page Setup on page 4-9.
4-64 HyperACCESS Reference
Displays a standard Windows print preview window that shows what printed pages
will look like. See Phonebook Panel File/Print Preview on page 4-10.
Print... displays the standard dialog shown in Figure 4-10 on page 4-12. This dialog
lets you print all or selected text in the Terminal panel. For more information, see your
Windows documentation or online Help.
The Capture to Printer menu item displays a cascade menu with the following entries:
Start... Displays the Capture to Printer dialog described below, and
displays Prn in the status line while capture is active. Start...
is grayed out (unavailable) if printing is already started.
Stop Stops printing and closes the printer. The print data are released
to the print spooler. If printing hasnt started, this menu item
is grayed out (unavailable).
Pause Suspends printing, but doesnt close the printer. If printing
hasnt started or is already paused, this menu item is grayed
out (unavailable).
Resume Restarts printing using the current printer. If the printer hasnt
started or is already active, this menu item is grayed out
(unavailable).
Figure 4-45.
The Capture to
Printer dialog
determines how
HyperACCESS cap-
tures incoming infor-
mation and releases it
to the printer.
The information displayed, and the parameters and options of the dialog are:
Printer Displays the current printer. This is either the system default
printer or the printer selected using the Page Setup dialog, see
Terminal Panel File/Page Setup on page 4-63.
Capture Mode This group box specifies what HyperACCESS captures for
printing. It has the following three radio buttons:
Characters prints all incoming data except escape
sequences.
Lines prints each line when the CR character at its end
is received (the default). It also prints the line youre on
when you stop or suspend printing, unless that line is
blank.
Screens prints the entire screen whenever the remote
system clears the screen or you stop or suspend printing.
Print Method This group box specifies when HyperACCESS releases cap-
tured data to the printer. The buttons provide two choices:
By page prints each page as its received.
HyperACCESS uses information from the system to
determine page length.
By session releases data to the printer after you stop
capture or you terminate the communications session.
Make these Selecting this check box makes the options youve selected
the default the default settings for future capture to printer operations.
settings
4-66 HyperACCESS Reference
Start This push button initiates printing on the selected printer using
the options specified.
Figure 4-46.
Capture to File lets
you specify a file and
how to use it for sav-
ing your interaction
with the remote
system.
Terminal Panel Menu Bar 4-67
The information displayed, and the parameters and options of the dialog are:
Folder The full path of the current folder.
File This drop-down list, with its associated Browse... push button,
lets you specify a path and name for the capture file.
If youve previously specified a default capture file in the File
Usage properties sheet (see File Usage Properties Sheet on
page 4-50), or youve previously used a capture file for this
session, HyperACCESS displays that filename in the drop-
down history list box.
The drop-down list displays the last six files used for capture.
You can edit the path or name in the list box, select a file from
the drop-down list, or use the Browse... push button to select
a capture file. For a complete description of browse dialogs,
see page 4-8.
If File Already This group box has the following four radio buttons:
Exists
Append if the file exists, this selection adds new
session interaction to the end of the current file. If the file
doesnt exist, HyperACCESS creates it.
Capture Mode This section has the following four radio buttons:
Characters captures all incoming data except control
or escape sequences.
Lines captures each line when the CR character at its
end is received. It also captures the line youre on when
you stop or suspend capturing.
Screens captures whatever passes into the Backscroll
Buffer, plus the terminal screen when you stop or sus-
pend capturing.
Raw data captures all incoming data, including con-
trol or escape sequences.
Make these This check box appears at the bottom of the dialog. Selecting
the default it makes the file specified the default capture file, with the
settings options youve selected as the default settings.
Start This push button returns to the Terminal panel and begins
capturing data according to selected options.
The Redisplay File... menu item displays a standard file selection dialog that lets you
select a file for display. If the file is one that Graphics Viewer supports,
HyperACCESS launches Graphics Viewer and displays the file in the Graphics
Viewer window. Otherwise, HyperACCESS displays the file in the Terminal panel.
In this case, data in the file replaces the current Terminal panel contents. If you are
online, HyperACCESS displays a warning dialog before displaying the file in the
Terminal panel. Data displayed in this manner appears only on your screen and isnt
transmitted to the remote system.
For more information on Graphics Viewer, see HyperACCESS Graphics Viewer
Window on page 4-114.
Note: Since you can display any file, HyperACCESS has no way of knowing whether
data will display properly with the current emulator. Displaying garbage characters
may produce strange looking results, but it is harmless.
Terminal Panel Menu Bar 4-69
The File menu includes a numbered list of the four most recently opened entry files.
Selecting one of these files in the list opens the entry.
The Exit menu item terminates HyperACCESS. If there is an active connection with
a remote system, HyperACCESS displays a warning dialog. Click OK to disconnect
and exit or Cancel to continue the connection without exiting.
The Terminal panel Edit menu provides text manipulation tools. Figure 4-47 shows
the Edit menu.
Figure 4-47.
The Terminal panel
Edit menu has items
useful for text
manipulation.
Undo is only available after you have performed an operation that modifies the
Message Pad. This selection reverses the last operation.
4-70 HyperACCESS Reference
Cut is only available when you select text in the Message Pad. This selection copies
selected text to the Clipboard and removes it from the Message Pad. Note that you
must select text before attempting to use Cut. See also Terminal Panel Edit/Paste on
page 4-72, Terminal Panel Edit/Paste on page 4-72, and Terminal Panel Edit/Paste
on page 4-72.
If you want to copy selected text directly to the remote system and remove it from the
Message Pad, use Cut to Remote Computer. This menu item is available only with
Message Pad text selected.
Selecting Copy copies selected text from the terminal area or Backscroll Buffer to the
Clipboard. Note that you must select text before attempting to use Copy (the Copy
command is unavailable if you dont select text first). See also Terminal Panel Edit/
Paste on page 4-72.
Use this cascade menu if you want to copy selected text directly to the remote
computer, a file, printer, or the Message Pad. One or more of these menu items are
available with text selected in the terminal area, Backscroll Buffer, or Message Pad.
This cascade menu has the following selections:
Remote Computer
Remote Computer with <Enter>
File...
Printer
Message Pad
The following sections describe these cascade menu items.
Terminal Panel Menu Bar 4-71
Use Copy to/Remote Computer, if you want to copy selected text directly to the
remote system from the terminal area, Backscroll Buffer, or Message Pad. This menu
item is available only with text selected.
Use Copy to/Remote Computer with <Enter>, if you want to copy selected text
directly to the remote system from the terminal area, Backscroll Buffer, or Message
Pad, and append a CR character to the end of the text sent. This menu item is available
only with text selected.
Use Copy to/File... if you want to copy selected text to a file. This menu item displays
the Copy to File dialog shown in Figure 4-48.
Figure 4-48.
Copy to File lets you
specify a file and path
for the destination of
the copy.
OK Use this push button to initiate the copy operation and close
the dialog.
If necessary, this selection opens the Message Pad, and copies selected text to the
Message Pad. This selection is not available for text selected in Message Pad with
focus in the Message Pad.
The Paste menu item copies text from the Clipboard to the remote system or Message
Pad depending on which has focus (where you last clicked your mouse). See Terminal
Panel Edit/Copy on page 4-70 for information on how to copy text to the Clipboard.
Terminal Panel Menu Bar 4-73
Selecting Paste from File... displays the Paste from File dialog shown in
Figure 4-49.
Figure 4-49.
Paste from File lets
you copy data from a
file to the remote
computer or Mes-
sage Pad.
The Select Terminal Screen menu item selects all text in the terminal area of the
Terminal panel.
The Select All menu item selects all text in the terminal area and Backscroll Buffer
of the Terminal panel.
4-74 HyperACCESS Reference
Selecting Find... displays the Find dialog as shown in Figure 4-50. This dialog lets
you find a text string in either the terminal area or Backscroll Buffer.
The search begins at the current insertion point and proceeds in the direction specified
in the dialog. You can reposition the insertion point while the Find dialog remains
active simply by clicking at the desired location.
Figure 4-50.
Find lets you search
for a string of charac-
ters in the terminal
area or Backscroll
Buffer.
Find next This push button initiates or continues a search. You can
continue to search for the next occurrence until you find what
youre looking for, or see a Not found message.
Terminal Panel Menu Bar 4-75
If you want to customize the way HyperACCESS displays its window, use the View
menu. Figure 4-51 illustrates the Terminal panel View menu. There are several entries
in common with the notebook panel View menu.
Figure 4-51.
The View menu lets
you customize how
HyperACCESS
appears.
With Scroll Lock selected, the Scroll Lock menu item displays a check mark, and the
Terminal panel stops scrolling received text in the terminal area/Backscroll Buffer.
You can use Scroll Lock when you want to force the view to remain stationary for
reading, to select text, or to make keys available for local uses that would otherwise
perform terminal functions.
Displays the Message Pad. For a description of Message Pad, see page 4-98.
The Message Pad is a detachable and can appear as a floating window. You can then
dock the Message Pad to either the top or bottom border of the Terminal panel (see
Dockable Toolbars and Windows on page 4-59).
When selected, Backscroll shows a check mark and displays the Backscroll Buffer
when you explicitly scroll into it. You may want to unselect this option if you find the
Backscroll Buffer distracting or confusing. The default is selected.
When selected, Scroll Bar(s) shows a check mark and displays vertical and horizontal
(if necessary) scroll bars in the Terminal panel. Unselecting this menu item surpresses
scroll bars. The default is selected.
When selected, Toolbars... displays the Toolbars dialog that lets you select toolbar
options. The Toolbars dialog has a Toolbars list with check boxes for toolbars
available in HyperACCESS. Select whichever toolbars you want to use. This dialog
also has check boxes for additional options. The selections you make are global for
all panels.
Toolbars are detachable and can appear as floating palettes. You can dock toolbars to
a border of the HyperACCESS window (see Dockable Toolbars and Windows on
page 4-59). For more information on toolbars available in HyperACCESS and the
Toolbars dialog, see Phonebook Panel View/Toolbars on page 4-16.
Fonts... displays the standard Windows font selection dialog shown in Figure 4-52.
This dialog lets you select a font, style, and size to use in the Terminal panel. You can
also have HyperACCESS automatically adjust font size based on window size.
Figure 4-52.
The Font dialog lets
you select the font,
style, and size to use
in the Terminal panel.
You can also have
HyperACCESS auto-
matically adjust font
size based on win-
dow size.
The lists with their associated edit fields, check boxes, and drop-down lists in this
dialog are:
Font This edit field displays the font
selected in the scrollable list below Not all fonts contain
graphics characters
the field. You can type in this field
needed for proper termi-
(you should only enter a font name nal emulation. Using a
in the list), or select a font from the font without graphics
list. HyperACCESSs default font characters may produce
unusual results.
provides all standard ANSI graphics
characters.
Note: HyperACCESS only lists monospace fonts, since propor-
tionally spaced fonts usually arent appropriate for communi-
cations.
4-78 HyperACCESS Reference
Font style This edit field displays the style selected in the scrollable list
below the field. You can type in this field (you should only
enter a style in the list), or select a style from the list.
Size This edit field displays the current size selected. You can type
any size in this field, or select from among the standard sizes
displayed in the list. This selection is ignored if you select the
Automatically adjust font size to terminal window size
check box (see below).
Sample Displays a sample of the currently selected font, style, and size.
Use IBM PC Select this check box to have HyperACCESS display line
character set draw characters with any non-symbol TrueType font. This is
particularly helpful for accessing BBSs that use line draw
characters for borders on their menus.
Automatically With this check box selected (the default), HyperACCESS
adjust font size to automatically picks the best point size for the font and style
terminal window selected and the terminal area size.
size
The Terminal panel Properties menu has an entry for each properties sheet. When
you select an entry from this menu, HyperACCESS opens the properties notebook
with the selected sheet on top. The properties notebook applies to the Terminal panels
entry. HyperACCESS always saves changes you make in the properties notebook
when you click OK. The selections in this menu and the properties sheets they display
are:
Description See Description Properties Sheet on page 4-28.
Communications See Communications Properties Sheet on page 4-29.
Terminal See Terminal Emulator Properties Sheet on page 4-43.
Emulator
ASCII Sending See ASCII Sending Properties Sheet on page 4-47.
ASCII Receiving See ASCII Receiving Properties Sheet on page 4-46.
File Transfer See File Transfer Properties Sheet on page 4-49.
File Usage See File Usage Properties Sheet on page 4-50.
Preferences See Preferences Properties Sheet on page 4-52.
Terminal Panel Menu Bar 4-79
You can use the Terminal panel Transfer menu items to send and receive files.
Selecting Receive File(s)... displays a non-modal dialog (see Figure 4-53) that you can
position anywhere on your screen. The dialog lets you set the file transfer protocol
and other parameters for receiving files from a remote system. You can continue to
interact with the remote system with this dialog displayed. This lets you prepare to
receive files, issue commands to the remote system, then click the Receive button.
Figure 4-53.
Receive is a non-
modal dialog. It can
remain on screen
while you issue com-
mands to the host
system.
Some option check boxes may be unavailable (grayed out or dimmed) for the selected
file transfer protocol. The options and parameters specified in this dialog are:
Place received This edit field with its associated
files in the drop-down list and Browse... push You can define a default
directory and protocol to
following folder button lets you specify a folder path
use for receiving files on
for receiving file(s). the File Transfer properties
sheet.
4-80 HyperACCESS Reference
Expand .ZIP files When you select this check box HyperACCESS expands
compressed (ZIP and self-extracting EXE) files, on-the-fly,
as they are received.
If a compressed file contains other compressed (either ZIP or
self-extracting EXE) files, HyperACCESS does not extract
(or virus check) these second-level compressed files. You can
still uncompress and virus check these files using third party,
standalone programs.
If File Already This group box provides six radio buttons that determine how
Exists HyperACCESS handles received files that have the same
name as files that already exist. The options are:
Overwrite deletes existing files and replaces them
with incoming data.
Refuse HyperACCESS refuses the file transfer if the
file already exists.
Refuse unless newer HyperACCESS checks the date
and time of incoming files to see if they are newer. If a
file is newer HyperACCESS will overwrite the existing
file; otherwise, HyperACCESS will refuse the file
transfer.
Append adds incoming data to existing files.
Rename use this drop-down list to select how you
want HyperACCESS to handle duplicate filenames.
There are options that let you elect to rename the Existing
file or the newly Received file. For each of these options,
you can have HyperACCESS rename files sequentially
or using date (a total of four choices). Definitions of
sequentially and date renaming are:
sequentially HyperACCESS appends a sequential
number, starting with zero, to the filename. If the
pathname is already at its maximum length (255), the
sequence number replaces characters at the end of the
name.
4-82 HyperACCESS Reference
Receive Progress
The receive progress dialog has a window title that includes
both the entry name and protocol. The dialog has tabbed If you minimize
HyperACCESS during a
panels that show various details about the progress of the transfer, the globe icon
file transfer, which includes information that depends on the fills in like a dial to show
protocol in use. Typically this information includes one or that transfer is in progress
two progress bars, the number of retries, and the name of for protocols that report
total amount of data to be
the current file. Information on the Statistics panel may sent in advance of transfer.
include estimated time remaining for the transfer, packet
size, total retries, elapsed time, throughput, and whether or
not virus detection and on-the-fly unzipping are enabled. This dialog has a Cancel
Terminal Panel Menu Bar 4-83
button, and may include a Skip File button. Figure 4-54 shows a sample HyperProtocol
receive progress dialog.
Figure 4-54.
The receive progress
dialog has a tabbed
panel that shows
detailed status of the
file transfer.
To hang up when the transfer is complete, select the Disconnect after transfer check
box.
Selecting Send File(s)... displays a non-modal dialog (see Figure 4-55) that you can
position anywhere on your screen. The dialog lets you set the file transfer protocol
and other parameters for sending files to a remote system. You can continue to interact
with the remote system with this dialog displayed. This lets you prepare to send files,
issue commands to the remote system, then click the Send button.
Figure 4-55.
Send is a non-modal
dialog. It can remain
on screen while you
issue commands to
the host system.
The options and parameters specified, and information displayed in this dialog, are:
Folder This area of the dialog displays the current full path to which
file selection applies. The path changes when you select a file
in the file browse dialog.
4-84 HyperACCESS Reference
Filename This drop-down combo field and Browse... push button let you
specify a filename you want to send. (You can enter absolute
or relative paths with or without wildcard filename selection.)
If youve already sent and/or
selected files or paths in the current You can define a default
directory and protocol to
session, those names appear in the
use for receiving files on
drop-down history list, and the most the File Transfer properties
recently selected file or path appears sheet.
in the edit field. The Browse... push
button displays the standard file browse dialog, from which
you can select a drive, folder, and file. (For a complete descrip-
tion of browse dialogs, see page 4-8.)
Transfer protocol This drop-down list displays the default transfer protocol for
this session. You can select another protocol from the drop-
down list (you cant type into the display box associated with
the drop-down list). For more information on transfer proto-
cols, see Appendix E, File Transfer Protocols.
In addition, the dialog has a Settings... push button that dis-
plays a custom dialog for each protocol. Appendix E describes
each protocol and lists its options and defaults.
Include matching When selected this option causes HyperACCESS to search
files from subfolders of the path specified in the Filename edit field.
subfolders Files matching the filename or wild card selection are sent.
Include paths This check box, when selected, causes HyperACCESS to
when sending send the full path along with the filename. This option is
filenames available only when its supported by the selected protocol.
Send This push button initiates the transmission sequence for the
selected protocol and displays the send progress dialog. See
Figure 4-56.
Close This push button closes the Send dialog without initiating a
file transfer operation. This selection is different than Cancel
in that it saves entries you modified in the dialog.
Send Progress
The send progress dialog has a window title that includes both the entry name and
protocol. The dialog has tabbed panels that show various details about the progress of
the file transfer, which includes the name of the current file, one or two progress bars,
Terminal Panel Menu Bar 4-85
the number of retries, the estimated time remaining or elapsed time for the transfer,
and throughput. This dialog has a Cancel button, and may include a Skip File button.
Figure 4-56 shows sample HyperProtocol send progress dialog.
Figure 4-56.
The HyperProtocol
send progress dialog
has a tabbed panel
that shows detailed
status of the file
transfer.
To hang up when the transfer is complete, check the Disconnect after transfer check
box.
Figure 4-57.
The Terminal panel
Automation menu.
HAPI, and the definition of the functions available, see HyperACCESS Application
Programming Interface Manual. That manual also provides programming examples
for both simple and complex tasks.
Note: Depending on the product you purchase, the HyperACCESS Application
Programming Interface Manual may only be on disk.
Selecting Run... displays a standard file browse dialog, from which you can select a
drive, folder, and file. (For a complete description of browse dialogs, see page 4-8.)
The file you select can be an automatically generated VBScript or JavaScript program,
or a program youve written or modified using VBScript or JavaScript. Alternatively,
you can select any .EXE program or .BAT file.
The Abort cascade menu is grayed out (unavailable) unless one or more HAPI
programs are executing. Selecting an entry from the Abort cascade menu terminates
the program.
Figure 4-58.
Recording Options
lets you choose how
the user can termi-
nate the generated
program.
Selecting Edit Program... displays a standard file browse dialog from which you can
select a drive, folder, and file that contains the source program you want to edit. (For
a complete description of browse dialogs, see page 4-8.) Once selected, the file is
opened in Windows Notepad, or whichever editor youve specified in the Text Viewer
dialog (see Phonebook Panel Options/Text Viewer on page 4-21).
Selecting Keys... from the Automation menu displays the dialog shown in
Figure 4-59. This dialog displays existing user-defined key combinations that invoke
a macro, command, or program. The ability to define macros provides a powerful
technique within HyperACCESS to remap your keyboard. In addition to simple
keyboard remapping, macros let you assign multiple keystrokes to a single key or key
combination. This provides a simple, straightforward, nonprogramming method to
automate commonly used words, phrases, and key combinations.
Figure 4-59.
This dialog lets you
add, modify, or
delete the
assignment of
macros, commands,
or programs to key
combinations.
Figure 4-60.
The Keys dialog lets
you add or modify
macros or programs
assigned to key
combinations.
The Key dialog lets you assign keyboard macros, HyperACCESS commands, auto-
matically generated or manually created VBScript programs, or any .EXE program
file.
The edit fields and buttons in this dialog are:
Key This edit field lets you assign a key combination to a macro,
command, or program. Simply press the key (or combination
of keys) that you want to use. To assign T, e, E, B,
D, or other cursor control keys, first press I, followed by
the desired key.
4-90 HyperACCESS Reference
Action This group box has three radio buttons with associated edit
fields that let you define what type of action you want to assign
to a key combination. You must select a radio button and enter
text in an edit field or make a selection from the associated
drop-down list (or Browse... push button) for that action type.
Macro this radio button and its associated edit field
let you define a macro (a sequence of keystrokes or key
combinations). Simply press the keys (or combination of
keys) in the sequence you want them issued. To assign
T, e, E, B, D, or other cursor control keys,
first press I, followed by the desired key.
Command this radio button lets you make a selection
from the drop-down list of HyperACCESS commands.
You can assign only one command to a key combination.
Commands in the list include all HyperACCESS menu
selections for the current panel. This lets you perform
any operation with a single keystroke.
Program this radio button, with its associated edit
field, drop-down list, and Browse... push button, lets you
specify a program filename and path. (For a complete
description of browse dialogs, see page 4-8.) The pro-
gram file can be a VBScript or JavaScript program, an
.EXE program file, or .BAT file (see Assigning Pro-
grams to Keys or Buttons on page 3-18).
OK Selecting OK without specifying an action displays a warning
dialog that lets you return to define an action. If the key
combination specified already has an action associated with it,
you will see a warning dialog that asks if you want to replace
the current action.
Selecting Buttons... from the Automation menu displays the dialog shown in
Figure 4-61. This dialog displays existing system and user-defined buttons that invoke
macros, commands, or programs. The ability to define macros and assign them to
buttons provides a simple, straightforward, nonprogramming method to automate
commonly used words, phrases, and key combinations.
Terminal Panel Menu Bar 4-91
Figure 4-61.
This dialog lets you
add, modify, or
delete the assign-
ment of macros,
commands, or pro-
grams to buttons.
You can define or modify system-defined buttons that appear in the Toolbar. In
addition to assigning macros, commands, or programs to buttons, you can assign
similar functions to key combinations (see Terminal Panel Automation/Keys on
page 4-88).
Note: You can rearrange buttons on any toolbar using drag and drop (press S in
combination with the left mouse button and drag the button to its new location).
The lists and buttons in this dialog are:
Toolbar This drop-down list lets you select either the (HyperACCESS)
Terminal or (Windows) Standard button bar.
Existing buttons This scrollable list shows existing buttons on the selected
Toolbar that have macros, commands, or programs defined.
Entries in the list include the word Macro, Program, or Com-
mand to indicate what type of action the button represents. To
modify or delete an entry, select it and click the appropriate
button.
Modify... Use this push button to modify an existing macro, command,
program, or button assignment. After selecting an entry in the
list, clicking this button displays the dialog shown in
Figure 4-62.
New... Use this push button to define a new macro, command, or
program for a button. Clicking this button displays the dialog
shown in Figure 4-62.
4-92 HyperACCESS Reference
Figure 4-62.
The Button dialog
lets you add or
modify macros or
programs assigned
to buttons.
The Button dialog lets you assign keyboard macros, HyperACCESS commands,
automatically generated or manually created VBScript or JavaScript programs, any
.EXE program, or .BAT file.
The edit fields and buttons in this dialog are:
Button This group box contains an Icon scrollable area showing icons
you can assign to a button.
Action This group box has three radio buttons with associated edit
fields that let you define what type of action you want to assign
to a button. You must select a radio button and enter text in an
edit field or make a selection from the associated drop-down
list (or Browse... push button) for that action type.
Macro text this radio button and its associated edit
field let you define a macro (a sequence of keystrokes or
key combinations). Simply press the keys (or combina-
Terminal Panel Menu Bar 4-93
Select Clear Backscroll to erase the contents in the Backscroll Buffer of the Terminal
panel.
4-94 HyperACCESS Reference
Figure 4-63.
The Terminal panel
Window menu.
Select Clear Screen to erase the contents in the terminal area of the Terminal panel.
HyperACCESS scrolls lines in the terminal area up into the Backscroll Buffer.
Select Reset Terminal to return the terminal emulator to its default settings. The
defaults depend on the terminal type, and may include parameters such as tab stops,
cursor type, colors, etc.
The Help menu items lets you get information about HyperACCESS. For more
information, see HyperACCESS Help on page xiv in the Introduction.
own buttons or reposition buttons using drag and drop (press S in combination with
the left mouse button and drag the button to its new location).
<Terminal> Toolbar
Default buttons provided with HyperACCESS (in their default order) are:
Establish Connection
Disconnect
Start Recording
Performs the same function as File/Connect and Record Logon (see page 4-63).
Settings
Send File(s)
Receive File(s)
Message Pad
Launch Browser
Default buttons provided with HyperACCESS (in their default order) are:
New
Open
Save
Print Preview
Spelling
Only available with modified text in the Message Pad. Performs the same function as
the Message Pad popup menu Check Spelling (see page 3-7).
Cut
Only available for text selected in the Message Pad. Performs the same function as
Edit/Cut (see page 4-70).
Copy
Paste
Performs the same function as Edit/Paste (see page 4-72).
Undo
Only available after modifying text in the Message Pad. Performs the same function
as Edit/Undo (see page 4-69).
4-98 HyperACCESS Reference
Help
Displays the Help Topics window. For more information, see HyperACCESS Help on
page xiv of the Introduction.
Message Pad
The Message Pad is a special text editor that includes a spelling checker. You can use
the Message Pad to type responses to the remote system. It lets you manipulate text
with the mouse, keyboard, or Edit menu. You can use Message Pad for creating and
sending text messages. For example, you can read an incoming e-mail message using
the terminal screen and Backscroll Buffer, and concurrently create an answer using
the text editing and manipulation capabilities of the Message Pad. You can also use
Message Pad in chat mode to carry on an interactive dialog with a user on the remote
system. Simply select Chat Mode from the Message Pad pop-up menu, and issue the
CHAT command. Chat mode lets you send text to the remote system each time you
press e. For more information on chat mode, see Chatting With a User on the
Remote PC on page 3-41.
With Message Pad, youll save time because you wont have to use an e-mail editor;
or switch from your communications session, use your own editor to create your
message, save the message, switch back to the session, and send your message. The
Send button sends selected text or the entire contents of the Message Pad to the remote
system.
You open the Message Pad, shown in Figure 4-42 on page 4-58, either by clicking on
the Terminal panels Message Pad button or using its View/Message Pad (see
page 4-76) menu selection.
You can detach the Message Pad and move it anywhere on your screen as a separate
window (see Sizing and Moving Message Pad on page 3-65 for procedures to do this).
Message Pad
Button Once the Message Pad is a separate window, you can dock it at either the top or bottom
Call Log Panel and Menus 4-99
of the Terminal Panel. HyperACCESS remembers where you last had the Message
Pad each time you choose to display it.
The Call Log panel lets you view log files. A log file is an
ASCII file that contains a record of calls and file transfers. HyperACCESS writes mes-
sages to the Call Log panel
By default, HyperACCESS uses the same log file,
as file transfers occur. You
CallLog.txt, for all entries. You can specify a unique can select this panel to ver-
log file for any or all entries. ify that file transfers have
completed and where
Figure 4-64 shows the Call Log panel. When you select its received files were
tab, the Call Log panel displays the current call log. You written.
can open any ASCII file in this panel. HyperACCESS keeps
this file in the panel until you explicitly open another file, or load another entry and
then display the Call Log panel again.
Figure 4-64.
The Call Log panel
displays the current
log and lets you
open, edit, and save
log files.
Note: Although you can explicitly open any ASCII file, HyperACCESS continues to
log events to the log file specified in the File Usage properties sheet.
Each menu on the menu bar provides control over the Call Log panel and how its
used or displayed. Briefly, the menus are:
File provides selections that let you open any ASCII file. You can also find menu
items to print the file, and exit HyperACCESS.
4-100 HyperACCESS Reference
The File menu items let you open, save, and print the Call Log panel. Figure 4-65
shows the File menu.
Figure 4-65.
The File menu lets
you open, save, and
print a call log file.
Open... displays a standard file browse dialog that lets you select and open any ASCII
file. For more information on browse dialogs, see page 4-8. This doesnt change the
current log file. HyperACCESS continues to log events to the log file specified in the
File Usage properties sheet.
Selecting Save As... displays a standard Save As dialog that lets you specify a new
filename and path to save the contents of the Call Log panel.
Call Log Panel and Menus 4-101
Page Setup... displays a dialog that lets you specify printer parameters and select from
among system-defined printers. HyperACCESS uses the printer you select for all its
printing. For more information, see Phonebook Panel File/Page Setup on page 4-9.
Print Preview displays a standard Windows print preview window that shows what
printed pages will look like. See Phonebook Panel File/Print Preview on page 4-10.
Selecting Print... displays a standard Print dialog to print the current list file.
The Exit menu item terminates HyperACCESS. If there is an active connection with
a remote system, HyperACCESS displays a warning dialog. HyperACCESS automat-
ically saves any changes that you make to the log file. The next time you display the
Call Log panel, HyperACCESS displays the file that was last open, or, if you load a
different entry, HyperACCESS displays the log specified for that entry.
The Call Log panel Edit menu has items useful for text manipulation. Figure 4-66
shows the Edit menu
Figure 4-66.
The Call Log panel
Edit menu has entries
useful for text
manipulation.
4-102 HyperACCESS Reference
The Copy menu item copies selected text from the Call Log panel to the Clipboard.
If you prefer, you can use the Copy shortcut key sequence: C+C.
This menu item selects (highlights) the entire contents of the Call Log panel.
The Find... menu item locates a text string in the list. For more information on the
Find dialog, see Terminal Panel Edit/Find on page 4-74.
This menu item deletes the contents of the Call Log panel and file.
If you want to customize the way HyperACCESS displays, you can use the View
menu. Figure 4-67 illustrates the Call Log panel View menu.
Figure 4-67.
The Call Log panel
View menu has items
that let you change
what HyperACCESS
displays.
Call Log Panel and Menus 4-103
Lets take a brief look at each of these menu items from top to bottom:
When selected, Toolbars... displays the Toolbars dialog that lets you select toolbar
options. The Toolbars dialog has a Toolbars list with check boxes for toolbars
available in HyperACCESS. Select whichever toolbars you want to use. This dialog
also has check boxes for additional options.
Toolbars are detachable and can appear as floating palettes. You can dock toolbars to
HyperACCESS window borders (see Dockable Toolbars and Windows on page 4-59).
You can create your own buttons on toolbars or reposition buttons using drag and drop
(press S in combination with the left mouse button and drag the button to its new
location). For more information on toolbars available in HyperACCESS and the
Toolbars dialog, see Phonebook Panel View/Toolbars on page 4-16.
When selected, Status Bar displays a check mark, and the status bar appears at the
bottom of the window. This is the default. Clicking on this menu item removes the
check mark and status bar. The selection you make is global for all panels. For more
information about this feature, see Phonebook Panel View/Status Bar on page 4-18.
You can use the Call Log panel Automation menu to record and edit programs that
will operate HyperACCESS. It has the same items as its Phonebook panel counterpart
(see Phonebook Panel Automation Menu on page 4-24).
You can use the Call Log panel Window menu to select a panel to make active. The
Call Log panel Window menu has the same items as its Phonebook panel counterpart
(see Phonebook Panel Window Menu on page 4-25).
4-104 HyperACCESS Reference
The Call Log panel Help menu items let you obtain help information about
HyperACCESS. For more information, see HyperACCESS Help on page xiv of the
Introduction.
You can optionally display or hide toolbars for all panels using View/Toolbar. You
can also create your own buttons or reposition buttons using drag and drop (press S
in combination with the left mouse button and drag the button to its new location).
Default buttons provided with HyperACCESS (in their default order) are:
Open
Print Preview
Performs the same function as File/Print Preview (see page 4-10).
Help
Displays the Help Topics window. For more information, see HyperACCESS Help on
page xiv of the Introduction.
Lists Panel and Menu Bar 4-105
The Lists panel provides a tool for viewing lists of remote systems. HyperACCESS
comes with several lists. In addition, you can download other lists from various
bulletin board systems, or export lists from contact programs and personal information
managers (PIMs). Large companies may want to create lists of PCs with
HyperACCESS Host licenses so that support personnel and others may connect to
them. These lists may be exportable as comma-delimited files from a corporate
database of network users. Other companies may be able to use the HOSTS file that
exists on workstations in a TCP/IP network.
Lists give you the option of calling thousands of systems, yet the space required to
store the information is minimal compared to regular notebook entries. Figure 4-68
shows the Lists panel.
Figure 4-68.
The Lists panel lets
you view and select
from a list of remote
system entries. You
can copy entries to a
notebook or make a
trial call from this
panel.
Authors of these lists consider them copyrighted material. Therefore, we only include
lists with the authors consent and in original, unaltered form. The authors retain the
copyright and sole right to revise and update these lists.
If you find anything in a list that you feel needs to be updated or revised, please notify
the independent, third-party author of the list, not Hilgraeve. Only the author has the
right to update or revise a list.
Certain lists may include BBSs that provide access to explicit materials materials
you may find offensive or unsuitable for minors. Hilgraeve in no way condones
electronic distribution of such materials. If you find materials on a BBS offensive,
please be aware that the List panel does permit you to delete entries from your copy
of the list.
The Lists panel diplays grid lines between list entries. You can select an entry in the
lists panel by clicking anywhere on an entry line or by letting your mouse pointer reset
over a line for more than one second.
To use a list file, it must have a template. The list files that come with HyperACCESS
have predefined templates. You can create templates for list files you download or
create (see Creating List File Templates on page 3-62).
Each menu on the menu bar provides control over the Lists panel and how its used
or displayed. Briefly, the menus are:
File lets you open or save a list file, copy entries to a phonebook, or place a trial
call. You can also find menu items to create a list template, print a list, and exit
HyperACCESS.
Edit lets you cut or copy selected text to the clipboard. It also features a search
capability with the Find... menu item.
View lets you customize various features of the Lists panel.
Automation lets you run programs and set up custom buttons.
Window lets you change the display of windows within HyperACCESS.
Help provides additional information on how to use HyperACCESS.
The following sections describe the Lists panel menus in the same order as they appear
in the menu bar (from left to right).
Lists Panel and Menu Bar 4-107
The File menu items let you open, save, and print lists. You can also find items to copy
entries to a notebook, place a trial call, and create a list file template. Figure 4-69
shows the File menu.
Figure 4-69.
The File menu lets
you open, save, and
print lists; copy
entries to a note-
book; place a trial
call; and create a
template.
Open... displays a standard file browse dialog that lets you select and open a list file
(actually any ASCII file). For more information on browse dialogs, see page 4-8.
Selecting Save writes the contents of the current Lists panel to the current list file.
This selection doesnt prompt you for a filename since it saves to the same file that is
open.
With one entry selected in the Lists panel, this menu item displays the sequence of
dialogs required to define a new notebook entry (see Copying a Notebook Entry From
a List File on page 3-14). With multiple entries selected in the Lists panel, this menu
4-108 HyperACCESS Reference
item displays the dialog shown in Figure 4-70. Using this dialog, you select a notebook
that you want to use as the destination for a copy of selected entries. Entries appear
in the notebook with a default icon and the entry name specified in the list.
Figure 4-70.
The Copy to
Notebook dialog lets
you specify a note-
book to copy multiple
entries from the Lists
panel.
The list in this dialog displays defined notebooks. You can select any notebook from
the list.
Selecting this menu item lets you call an entry in the Lists panel before copying the
entry to a notebook. Follow the procedure described in Placing a Trial Call From the
Lists Panel on page 3-64. If you have more than one entry selected, this menu item is
grayed out (unavailable).
Figure 4-71.
The Template dialog
lets you define the
format of list files.
Fields separated This drop-down list lets you pick a character (or technique)
by used to separate data items in each entry. Choices in this list
are:
Column Spacing
Comma
Quote
Tab
Note: With Column Spacing selected, the field location
entries change to show from and to column locations (see
Figure 4-71). The left-most character in each line is col-
umn 1.
Name field This edit field lets you select which field number in each
location entry represents the notebook entry name.
Phone number This edit field lets you select which field number in each
field location entry represents the notebook entry telephone number.
Data begins in Use this edit field to define the number of lines at the begin-
line number ning of the file that dont include notebook entries. Such lines
may include copyright information and file attribution. This
field causes HyperACCESS to display a warning if you
attempt to dial or copy lines that are within this region.
Comments lines This edit field lets you specify a character that defines a com-
begin with ment line in the list file. Entering a character in this field
causes HyperACCESS to display a warning if you attempt to
dial or copy lines that begin with the specified character.
Add prefix to dial This check box and edit field let you specify a prefix to use
before dialing a phone number in the list.
4-110 HyperACCESS Reference
Page Setup... displays a dialog that lets you specify printer parameters and select from
among system-defined printers. HyperACCESS uses the printer you select for all its
printing. For more information, see Phonebook Panel File/Page Setup on page 4-9.
Print Preview displays a standard Windows print preview window that shows what
printed pages will look like. See Phonebook Panel File/Print Preview on page 4-10.
Selecting Print... displays a standard Print dialog to print the current list file.
The Exit menu item terminates HyperACCESS. If there is an active connection with
a remote system, HyperACCESS displays a warning dialog. HyperACCESS automat-
ically saves any changes that you make to the list file. The next time you display the
Lists panel, HyperACCESS displays the file that was last open.
Figure 4-72.
The Lists panel Edit
menu has entries use-
ful for copying, cut-
ting, removing, and
finding entries in a list
file.
Lets take a brief look at each of these menu items from top to bottom:
The Undo menu item is available after a cut or clear operation. It reverses the last
operation.
The Cut menu item removes selected entries from the Lists
panel and copies them to the Clipboard. Cut and Copy operations
are grayed out unless you
have text selected.
The Copy menu item copies selected text from the Lists panel to the Clipboard.
The Find... menu item locates a text string in the list. You specify the search string
and criteria in the dialog. For more information, see Terminal Panel Edit/Find on
page 4-74.
4-112 HyperACCESS Reference
You can use the Lists panel View menu to change the appearance of the
HyperACCESS window. It has the same items as its Call Log panel counterpart (see
Call Log Panel View Menu on page 4-102).
You can use the Lists panel Automation menu to run and edit programs that will
operate HyperACCESS. It has the same items as its Phonebook panel counterpart (see
Phonebook Panel Automation Menu on page 4-24).
You can use the Lists panel Window menu to select a panel to make active. The Lists
panel Window menu has the same items as its Phonebook panel counterpart (see
Phonebook Panel Window Menu on page 4-25).
The Lists panel Help menu items let you obtain help information about
HyperACCESS. See HyperACCESS Help on page xiv in the Introduction.
You can optionally display or hide toolbars for all panels using View/Toolbars.... You
can also create your own buttons or reposition buttons using drag and drop (press S
in combination with the left mouse button and drag the button to its new location).
Default buttons provided with HyperACCESS (in their default order) are:
Open
Save
Print Preview
Cut
Only available for text selected in the Message Pad. Performs the same function as
Edit/Cut (see page 4-70).
Copy
Undo
Only available after modifying text in the Message Pad. Performs the same function
as Edit/Undo (see page 4-69).
Copy to Notebook
Performs the same function as File/Place a Trial Call (see page 4-108).
4-114 HyperACCESS Reference
Help
Displays the Help Topics window. For more information, see HyperACCESS Help on
page xiv of the Introduction.
Figure 4-73.
The HyperACCESS
Graphics Viewer with
a graphic displayed.
HyperACCESS Graphics Viewer Window 4-115
Among the file formats supported are animated GIF, TIFF, and PCX. The Graphics
Viewer automatically detects and plays animated graphics files even during file
download.
In addition to discrete zooming using the keyboard shortcut (I), the Edit/Zoom In menu
selection, or the Zoom In button (see below), the Graphics Viewer supports drag
selection of a zoom area. Simply drag the mouse over a section of the image and the
Viewer displays a rectangle. Release the mouse button, and the image zooms to fill
the current window with the selected area.
Open
Displays a standard file browse dialog that lets you select and open any supported
graphics file. For more information on browse dialogs, see page 4-8.
Print Preview
Copy
Zoom In
This button is available if the graphic isnt at the highest level of zoom. Clicking this
button zooms in one level of magnification.
4-116 HyperACCESS Reference
Zoom Out
This button is available if the graphic isnt at the lowest level of zoom. Clicking this
button zooms out one level of magnification.
Size to Window
Resizes the graphic to fit in the window while maintaining the graphics aspect ratio.
Help
Displays the Help Topics window. For more information, see HyperACCESS Help on
page xiv of the Introduction.
Chapter 5
Automation Tools
Automating Communications
As with any application, youll find that you perform certain communications tasks
repeatedly. For example, logon procedures for a remote system remain essentially
unchanged from session to session. You may also find that youre often repeating the
same remote system commands. HyperACCESS provides several complementary
tools for automating these repetitive tasks. You can create automatic sequences that
do such things as:
Producing many keystrokes when you press a single key, and sending these
characters to the remote system.
Waiting for prompts from a remote system and sending a response.
Waiting for a certain time of day or a given length of time before executing a
series of commands.
5-2 Automation Tools
Macros
PRO CON
No programming experi-
ence required
PRO CON
Permit generation of
custom communications
interface for corporate
systems
Generating Programs
All HyperACCESS panel and window menu bars have an Automation menu. How-
ever, only the Terminal panel includes recording menu selections. HyperACCESS
records your interaction with remote systems in the Terminal panel. It also records
file transfer and capture operations in the Terminal Panel, but does not record
interaction with menus, dialogs, and program locations.
Figure 5-1 shows the Automation menu in the Terminal panel. The following sections
review the recording processes.
Figure 5-1.
The Terminal panels
Automation menu
includes recording
options that arent
available from other
menu bars.
There are five sequences of operations that let you record your logon interaction. They
are:
1. Using the Terminal panel Automation menu:
a) Open the desired entry.
b) Select Automation/Record.
c) Select File/Connect or press the Establish Connection button.
Establish
Connection
2. Initiating from a notebook panel using menu selection:
Button
a) Select an entry.
b) Select the File/Connect and Record Logon menu item.
3. Initiating from a notebook panel using a button:
a) Select an entry.
5-6 Automation Tools
b) Click the Start recording button. HyperACCESS opens the entry, con-
nects, and begins recording.
4. Initiating from the Terminal panel using a button:
Figure 5-2.
The Stop
Recording
dialog lets you save a
program as the
logon task.
2. Enter a filename by typing in the edit field, making a selection from the history
drop-down list, or making a selection using the Browse... push button (for a
complete description of browse dialogs, see page 4-8).
Figure 5-3.
The Recording in
Progress window dis-
plays statements as
they are generated.
File Menu
The Recording in Progress window File menu has standard print selections. For a
description of these selections, see Phonebook Panel File/Print on page 4-12, Phone-
book Panel File/Print Preview on page 4-10, and Phonebook Panel File/Page Setup
on page 4-9.
Edit Menu
Selecting Edit displays the menu shown in Figure 5-4. The menu items provide editing
capabilities comparable to standard Windows 95 shortcut editing keys.
5-8 Automation Tools
Figure 5-4.
The Edit menu pro-
vides an abbreviated
set of editing tools.
Action Menu
Figure 5-5.
The User Name dia-
log lets you enter a
user name for use in
the program.
Insert User ID Similar to Insert User Name, above, except that the runtime
value is the user ID.
Insert Password Similar to Insert User Name, above, except that the runtime
value is the user password.
Insert Text Query Selecting this menu item displays the Insert Response Box
dialog (Figure 5-6). The first edit field in this dialog lets you
enter the title for the displayed dialog. The second, larger edit
field lets you enter instructions to the user.
Generating Programs 5-9
Figure 5-6.
The Insert
Response Box lets
you create your own
dialogs to get infor-
mation when your
program executes.
The Assign key... push button displays the Key dialog shown in Figure 5-7.
Figure 5-7.
The Key dialog lets
you assign a gener-
ated program to any
key combination.
To assign a keyboard combination to a program, simply click in the Key edit field and
press the desired keys. For example:
2 displays <F2>
By default, the program filename you entered in the Stop Recording dialog appears
in the Program drop-down combo box with the radio button selected.
Assigning a Button
The Assign button... push button displays the Button dialog shown in Figure 5-8.
Figure 5-8.
The Button dialog
lets you assign a gen-
erated program to a
graphic button.
Note: When you assign a button from the Stop Recording dialog, the button appears
on the Terminal toolbar.
You can assign a bitmap button to any program. Select one of the predefined buttons
in the scrollable area.
You can enter a line of help information in the edit field, ToolTip. This line of help
information displays as the Toolbar ToolTip.
5-12 Automation Tools
Running Programs
There are five ways you can execute a program. Depending on how it was defined,
you can:
Have it The program will automatically execute upon initiation of a
automatically notebook entry. To define a program for automatic execution,
execute define it to execute before or after connection, or after discon-
necting using the File Usage properties sheet (see page 4-50).
Press a key Programs assigned to specific keys or key combinations exe-
combination cute when you type the correct keys.
Press a button Programs assigned to a button execute when you position the
mouse pointer over the button and click. You can define but-
tons for display on any toolbar.
Explicitly run You can explicitly run any program by selecting Automa-
tion/Run...; this displays the Select Program dialog, which is
simply a file browse dialog. Enter the path and filename, or
use the browse dialog to find the file you want to run and
either select it and click OK, or double-click on it (for a com-
plete description of browse dialogs, see page 4-8).
Command line To execute a program on initiation of HyperACCESS, list the
execution program name as a command line parameter (see Appendix F,
Command Line Parameters).
You can create programs that automatically terminate if the remote system fails to
respond. You can also manually terminate a running program by selecting
Automation/Abort.
Editing Programs
You can use any text editor to create or modify a program. From within
HyperACCESS you can launch Windows 95 Notepad or any other editor by selecting
Changing Assignment of a Program 5-13
the Automation/Edit Program... menu item. This displays a standard file browse
dialog. As soon as you select a file, HyperACCESS launches the editor. You can
specify your preferred editor using Options/Text Viewer (see page 4-21).
You can assign a program to a key combination and/or button. You can change this
assignment using the following procedures:
After assigning a program to a key combination, you can go back and change the
assignment at any time using Automation/Keys... from the Terminal panel. Making
this selection displays the Keys for dialog shown in Figure 5-9.
Figure 5-9.
The Keys for dialog
lets you add or mod-
ify macros or
programs.
The Existing keys list displays the key combination in the left-most column followed
by a program filename, command, or macro. You can assign the same program to both
a key combination and a button (see Changing a Button, below).
You can use this dialog to add a program to a key combination; modify the key
combination for a program; or delete a key assignment. Later sections describe these
options. The techniques are similar for assigning to a key combination or button.
5-14 Automation Tools
Changing a Button
After assigning a program to a button, you can go back and change the assignment at
any time using Automation/Buttons... from the Terminal panel or a notebook panel.
Making this selection displays the Buttons for dialog shown in Figure 5-10.
Figure 5-10.
The Buttons for dia-
log lets you add or
modify macros or
programs.
The Existing buttons list displays the buttons for the selected Toolbar in the left-most
column followed by a program filename, command, or macro. You can assign the
same program to both a button and a key combination (see Changing a Key Combi-
nation on page 5-13).
You can use this dialog to add new programs; modify the button for a program; or
delete an assigned program. Later sections describe these options. The techniques are
similar for assigning to a key combination or button.
Adding Programs
If you create a program using a text editor or compiler, you can assign it to a
HyperACCESS key combination and/or button using the dialogs described above.
Click the New... push button and follow the instructions in Assigning Programs to
Keys or Buttons on page 5-9.
Changing Assignment of a Program 5-15
To edit a program assigned to a key or button, you can follow these steps if you dont
know (or remember) the program filename:
1. Select Automation/Keys or Automation/Buttons as appropriate. This displays
the Keys for (see Figure 5-9) or Buttons for (see Figure 5-10) dialog.
2. Note the filename of the entry you want to modify, and then Cancel the dialog.
3. Select Automation/Edit Program... to open Windows 95 Notepad (or other
application specified in Options/Text Viewer, see Phonebook Panel Options/
Text Viewer on page 4-21) with the program displayed.
4. Make edits as required, and then select Save or Save As before closing Windows
95 Notepad.
Deleting a Program
To delete a program assignment in HyperACCESS, follow these steps:
1. Select Automation/Keys or Automation/Buttons as appropriate. This displays
the Keys for (see Figure 5-9) or Buttons for (see Figure 5-10) dialog.
2. With the program selected, click the Delete push button. This deletes the
assignment of the key combination and/or removes the button from the current
Toolbar. It doesnt delete the program file.
5-16 Automation Tools
Chapter 6
HyperACCESS Host
This chapter describes how to perform various host operations. Youll see how to:
Initiate host operations (that is, begin waiting for calls).
Establish security settings, and restrict access to predefined users if desired.
Define user privileges what individual users can do when they log on to your
PC.
Set default privileges for new callers.
Specify a greeting to display when your system answers a call.
HyperACCESS Host is a separate program that launches and displays a window
similar to the main HyperACCESS window. This chapter briefly describes the
differences between main features of HyperACCESS and HyperACCESS Host (just
Host for the remainder of this chapter)
With Host, you can let other users access your PC. Host isnt just a bulletin board,
its a remote access host (or server) that lets you authorize who can log on, and what
they can do. After your PC answers a call, you can require callers to enter their name
and password. They can type commands that make your PC do various operations.
You can define, in advance, which of the following operations each caller can
perform:
Examine your disk (you can restrict callers to a given drive and folder).
Command your PC to send a file or batch of files.
Command your PC to receive a file or batch of files.
Perform file or disk management operations on your PC using COPY, DELETE,
RENAME, CD, MKDIR, or RMDIR.
6-2 HyperACCESS Host
After you initiate Host, you can minimize it. You can also use HyperACCESS to
initiate outgoing sessions, using the same communications port, while Host is waiting
for calls. In this case, the outgoing HyperACCESS borrows the communications
port from Host for the duration of the outbound call and returns it after youve
completed your outgoing communications session. Finally, you can start multiple
instances of Host, each using its own settings (provided that you have multiple
modems or other remote connections attached to your PC). These multiple host entries
can either share or have their own list of valid callers and access authorization.
Once youve started Host operation, you can leave your PC. Host will accept call after
call with no assistance from you. For example, you can start Host when you leave the
office, so you can access it later from your home PC, or from a laptop PC when youre
on the road.
There are minor differences between HyperACCESS and Host that this chapter
assumes you understand. Among them are:
Host has a Host panel instead of a Terminal panel, and a Host Entries panel
instead of a Phonebook panel.
The Host properties notebooks have Security and Passwords sheets, and are
missing Terminal Emulator, ASCII Sending, and ASCII Receiving sheets.
The Host File Transfer properties sheet has some significant differences docu-
mented in this chapter.
Host panels have different Toolbar buttons.
Host entries have a .HHW extension.
The first time you use any host entry, you must define security settings and create a
password list. The easiest way to perform these operations is to follow these steps:
1. Right-click the host entry to display the pop-up menu. Then select Properties
to display the properties notebook.
2. With the properties notebook displayed, establish security settings (see Defining
Security Settings for Host on page 6-5).
3. Create a password list if necessary (see Assigning Passwords and Access
Privileges on page 6-8). The default password list file is PASSWORD.LST. You
can specify any path and filename in the File Usage properties sheet (see File
Usage Properties Sheet on page 4-50).
4. Verify that the communications properties are appropriate for this entry (see
Modifying Connections on page 3-59, Modifying Communications Settings on
page 3-56, and Modifying Dialing Details on page 3-60).
5. Optionally, define a greeting to display when callers connect (see Specifying a
Greeting on page 6-16).
6. Optionally, create a batch file called AUTO.BAT in the Host logon directory
(different users can have different logon directories). Host executes commands
in this file after callers log on. The file can contain any valid Host commands
(see Host Commands on page 6-20).
After youve established your security settings, default privileges, and any predefined
users, open the entry using one of the following actions:
With the mouse pointer over the host entry you want to open, right-click to
display the pop-up menu, and select Open.
Select the host entry you want to open, and then select File/Open.
Use the Open notebook entry button in the Toolbar.
Open Notebook
Entry Button
6-4 HyperACCESS Host
You can also begin host entries by double-clicking them. This opens the entry, displays
the host panel, and initializes the connection to answer incoming calls (see Figure 6-1).
Figure 6-1.
The Host panel with
Host waiting for a
call.
This button initializes connection for autoanswer. It is the same as selecting File/Wait
for a Connection. If the entry is already connected, Host displays a warning dialog
Start Waiting for
Calls Button
asking if you want to disconnect the current session.
Settings
Click this button to display the Passwords properties sheet. This sheet lets you assign
default privileges, lock the sheet, and display caller names and privileges. Additional
Modify Host push buttons let you add, modify, and delete users and their privileges. For information
Passwords Button on how to use this sheet, see Assigning Passwords and Access Privileges on page 6-8.
Click this button to display the Security properties sheet. This sheet lets you configure
the level of logon authorization you require. You can also use the Security properties
Modify Host sheet to limit the number of logon attempts, connect time, and amount of time a caller
Security Settings can be inactive before you want Host to disconnect the caller. For information on how
Button
to use this properties sheet, see Defining Security Settings for Host, below.
You use the Security properties sheet to define what type of logon security you want
to enforce, what actions you want Host to take for failed logons, and what time limits
you want to place on callers.
To define security settings, follow these steps:
1. Display the Security properties sheet (shown in Figure 6-2) using one of the
techniques described in Changing Property Sheet Settings on page 3-53, or click
Modify Host
Security Settings
Button
6-6 HyperACCESS Host
the Modify Host Security Settings button in the Toolbar of the Host Entries
panel.
Figure 6-2.
The Security proper-
ties sheet lets you
configure how Host
handles logons.
2. Define how you want users to log on using radio buttons in the Grant Access
To group box. The choices are:
All remote users without asking for passwords when you select this
radio button, Host doesnt ask for names or passwords when users log on.
Only users who enter default password select this radio button and
enter a password in the edit field to have Host prompt for a password
without a user Id. All callers get the default privileges defined on the
Passwords properties sheet (see Defining Default Privileges on
page 6-10).
Only users with passwords listed on Passwords sheet when you
select this radio button, Host wont let callers log on to your system unless
their name and password appear in the password file. Selecting this radio
button enables the Let new users define their own passwords check box,
defined next.
Let new users define their own passwords select this option when
you want to let new callers identify themselves and their passwords during
their first call. Such callers receive privileges defined in the Default
Privileges dialog (see Defining Default Privileges on page 6-10).
Preparing to Answer Calls 6-7
Figure 6-3.
The Lock This Page
dialog lets you enter
a password that pre-
vents others from
viewing or changing
your Security proper-
ties sheet. If you for-
get this password,
you will have to rein-
stall Host.
When the Security properties sheet is locked, the only control visible on the sheet is
an Unlock this Page... button. Clicking this button displays a dialog that requires entry
of the sheet password. Once correctly entered, the Security properties sheet displays
the information described above. However, the Lock this Page... button is replaced
with a Remove Lock button, which removes the requirement to enter a password to
view or modify this sheet.
6-8 HyperACCESS Host
Note: The sheet remains unlocked until you display another sheet or close the
properties notebook.
You define user IDs, passwords, and access privileges using the Passwords properties
sheet (shown in Figure 6-4). Display the Passwords properties sheet using one of the
techniques described in Changing Property Sheet Settings on page 3-53, or click the
Modify Host passwords button in the Toolbar of the Host Entries panel.
Figure 6-4.
Modify Host The Passwords prop-
Passwords Button erties sheet displays
the password file-
name, lets you lock
the file, and displays
caller names. Push
buttons let you add
and modify users and
their privileges.
The default password file, PASSWORD.LST, includes two predefined sample users.
These users, John Doe and Jane Doe illustrate different levels of privileges. After
viewing the samples, you should delete them before adding your new callers.
The Passwords properties sheet has the following information, parameters, and
buttons:
Add... Clicking this push button displays the Add Callers dialog that
lets you add new callers and specify their access privileges.
See Adding Callers on page 6-11.
Modify... Clicking this push button, after you select an entry from the
password list, displays the Modify Callers dialog that lets you
Preparing to Answer Calls 6-9
Figure 6-5.
The Default Privi-
leges dialog lets you
establish defaults for
new callers.
Lock this Page... Clicking this push button displays the dialog shown in
Figure 6-6. Once you lock a sheet, Host lets you keep others
from displaying or modifying the caller list and access privi-
leges. After youve specified a Password, Host requires that
you enter the password before you can see the contents of the
Passwords properties sheet.
When the Security properties sheet is locked, the only control
visible on the sheet is an Unlock this Page... button. Clicking
this button displays a dialog that requires entry of the sheet
password. Once correctly entered, the Security properties sheet
displays the information described above. However, the Lock
this Page... button is replaced with a Remove Lock button,
which removes the requirement to enter a password to view or
modify this sheet.
6-10 HyperACCESS Host
Figure 6-6.
The Lock This Page
dialog lets you enter
a master password
that prevents others
from viewing or
changing your pass-
word file.
To define default privileges for new users that you create or that you allow to log on
and define their own user Id and password, follow these steps:
1. Display the Passwords properties sheet using one of the techniques described in
Changing Property Sheet Settings on page 3-53, or click the Modify Host
passwords button in the Toolbar of the Host Entries panel.
Modify Host 2. Click the Default Privileges... push button. This displays the Default Privileges
Passwords Button dialog. This is similar to as the Add Caller dialog (see below).
3. Select the defaults that you want for all new users. You can modify these settings
when you create a new user (see Adding Callers, below), or at any later time
(see Modifying Callers on page 6-13).
4. Click OK in the Default Privileges dialog, and then in the properties notebook.
Preparing to Answer Calls 6-11
Adding Callers
The Add Caller dialog shown in Figure 6-7 lets you enter new callers and their
privileges.
Figure 6-7.
The Add Caller dialog
lets you add callers
and specify their
passwords and
privileges.
Privileges This group box lets you specify access privileges for this caller.
Note: You can change default values for these settings by clicking Default Privileges...
in the Passwords properties sheet (see page 6-10).
Select the check boxes corresponding to the privileges you want to grant.
Download files This check box lets callers send files from your computer to
from Host their computer. Its the callers responsibility to issue the cor-
rect command depending on protocol.
Upload files to Host This check box lets callers send files from their computer to
your computer. Its the callers responsibility to issue the
correct command depending on protocol.
File management Select this check box to let the caller use COPY, DELETE,
RENAME, MKDIR, and RMDIR. To prevent tampering with
your files and directories, leave this check box unselected.
Preparing to Answer Calls 6-13
Limit access to Select this check box to limit the callers access to a particular
drive or folder. Enter the path in the associated edit field, or
use the Browse... push button. For a complete description of
browse dialogs, see page 4-8.
This becomes the callers default location, and commands
issued affect only this drive and folder.
Note: The caller also has access to all subdirectories of the
specified drive and folder.
The Next and Previous push buttons are unavailable for adding users. See Modifying
Callers, below.
Modifying Callers
The File Transfer properties sheet (shown in Figure 6-8) for Host lets you specify a
default protocol and other parameters that appear in the Receive dialog in
HyperACCESS. The following sections define the group boxes and their correspond-
ing options.
Figure 6-8.
The File Transfer
properties sheet lets
you define default
protocol and options
for receiving files.
Transfer Protocol
This group box has a drop-down list of supported protocols for receiving files. (The
associated display box doesnt permit manual entry. You must make a selection from
the drop-down list.) In addition, the dialog has a Settings... push button that displays
a dialog for each protocol.
Appendix E, File Transfer Protocols describes supported protocols and lists their
options and defaults.
Preparing to Answer Calls 6-15
Some option check boxes may be unavailable (grayed out or dimmed) for the selected
file transfer protocol. The options and parameters specified in this dialog are:
Use received file This check box is available if the selected protocol is capable
date and time of sending a files time and date attributes. If selected,
HyperACCESS uses the received files time and date when
saving the file. If not selected, HyperACCESS uses the cur-
rent time and date for the file.
Save partial files if This check box indicates that HyperACCESS is to save partly
interrupted completed file transfers. (This permits you to use Zmodem
and HyperProtocol crash recovery procedures.) If left
unchecked, HyperACCESS deletes partly transferred files.
Filter received This check box indicates that you want HyperACCESS to
files for known check received files for viruses using HyperGuard antivirus
viruses technology (US Patent 5,319,776).
HyperGuard instantly warns you if files you download con-
tain any of over 4,000 known viruses. Its X-ray Vision even
spots viruses hiding in compressed files and Word macros.
Upon detection of a virus, HyperACCESS displays a warning
message and aborts the file transfer. If you want to receive a
file that appears to have a virus, you must unselect this check
box and repeat the file transfer.
This group box provides six radio buttons that determine how HyperACCESS handles
received files that have the same name as files that already exist. The options are:
Overwrite Deletes existing files and replaces them with incoming data.
Refuse HyperACCESS refuses the file transfer if the file already
exists.
Refuse unless HyperACCESS checks the date and time of incoming files to
newer see if they are newer. If a file is newer HyperACCESS will
overwrite the existing file; otherwise, HyperACCESS will
refuse the file transfer.
6-16 HyperACCESS Host
Specifying a Greeting
Host includes a file called WELCOME.TXT. You can edit this file using the
Windows Notepad or any text editor. Alternatively, you can specify a different file in
the File Usage properties sheet. To ensure compatibility with potential callers, its a
good idea to limit text lines to less than 80 characters. If youre uncertain as to the
type of terminal or emulator the caller may be using, its also good practice to limit
your welcoming text to standard ASCII characters. Extended ASCII, or graphics
characters, can create problems for some terminals. If all callers will be using an ANSI
terminal emulator, you may include extended ASCII characters in your welcome
message to add special graphics and colors.
Note: WELCOME.TXT contains only standard ASCII text characters. The file
WELCOME.ANS includes ANSI escape sequences to change colors displayed on the
callers terminal. Callers must use an ANSI terminal emulator to correctly display
this file.
How Callers Access HyperACCESS Host 6-17
You can have Windows automatically launch HyperACCESS Host whenever you
reboot or restart Windows. (See Starting Communications Sessions From the Desktop
on page 3-37 for a related procedure.) To launch HyperACCESS Host on startup,
follow these steps:
1. Open an Explorer window and use the directory tree to display:
C:\Windows\Start Menu\Programs\StartUp
2. If necessary, start HyperACCESS Host.
3. Select the notebook panel tab for the notebook that has the entry you want
Windows to automatically launch.
4. Drag the entry icon to the StartUp directory (see Drag and Drop on page 3-1).
This creates a shortcut of the entry that automatically launches HyperACCESS
Host and begins waiting for a call whenever Windows starts. The shortcut shows
the same icon that appeared in the notebook along with the .HHW filename.
In addition to telling callers how to configure their computers, you must tell them how
to log on to your PC. Callers should follow these steps:
1. Configure their computer as described above.
2. Dial your modems telephone number (if applicable). Otherwise make a con-
nection using the technique required for the network or direct connection.
3. When callers connect, and the modems have matched baud rates, Host displays
a prompt that depends on the option selected in the Security properties sheet.
The prompt appears on both your screen and the callers screen. This usually
happens automatically, but some callers may need to press e (about once per
second) until it appears.
The options available on the Security properties sheet are:
All remote users without asking for passwords continue with Step 7.
Only users who enter default password continue with Step 6.
Only users with passwords on Passwords sheet continue with Step 4.
4. When Host displays Enter first name:, callers should type their first
name. If youre admitting only predefined callers, they must type their name as
youve entered them in the caller list. Otherwise, they should enter their name
as they want to type it in the future.
5. When Host displays Enter last name:, callers should type their last name.
If youre admitting only predefined callers, they must type their name as youve
entered them in the caller list. Otherwise, they should enter their name as they
want to type it in the future.
6. When Host displays Enter password:, callers should type their password.
If youre admitting only predefined callers, they must type their password as
youve entered them in the caller list. Otherwise, they should enter their own
password as they want to type it in the future. For security reasons, passwords
never display on either computer while callers are entering them.
7. Host then displays a prompt that includes the path of the current folder, and the
caller can begin interacting with Host.
There are three alternatives to steps 4-6 above. They are:
At the Enter first name: prompt, the caller types:
firstname lastname
How Callers Access HyperACCESS Host 6-19
Although privileges you give each caller may vary, all callers use the same general
procedure to command your PC. Host displays the following prompt on both your
screen and the callers screen:
Type HELP for a list of commands
[Host]C:\pathname
To see a list of available commands, the caller types HELP followed by e. To see
a detailed explanation of a particular command, the caller types HELP followed by
that command and then e.
When a caller types HELP, the list of commands displayed depends on the callers
privileges. For a complete list of commands and their description, see section Host
Commands, below, or for any updates since publication, see the file HOSTHELP.TXT
in the HyperACCESS program folder.
6-20 HyperACCESS Host
To Avoid Confusion
When youre at the host PC, dont type commands at the command prompt, as this
may confuse the caller. When at the calling PC, remember that commands you enter
at the command prompt control the host PC only, not the calling PC.
Host Commands
This section contains a summary of commands that callers to Host can use. The host
operator can also use these commands (except those which upload or download files)
after pressing C+L to enter a local logon.
Note: Local logon is available when the host is not waiting for a call. This lets the
Host operator test user IDs, passwords, and authorization levels without calling in
from another PC.
The Host PC operator can assign different access privileges to callers. If you are a
caller, and you have questions about privileges that the Host PC operator has assigned
you, check with the Host PC operator.
The following sections group commands by user privileges. For more information on
available access privileges, see Assigning Passwords and Access Privileges on
page 6-8. The sections are:
Commands available to all callers
Commands for callers with download privileges
Commands for callers with upload privileges
Commands for callers with file management privileges
Commands used in batch files
Note: Options in brackets [] indicate optional parameters. Options separated by the
pipe symbol | are mutually exclusive; you may specify just one of the given choices.
reference a path or filename with one or more embedded spaces, you must enclose the
entire path in double quotes. For example, you must enclose the following in quotes
because two folder names include a space:
c:\Program Files\HAWin32\My Files\welcome.txt
You dont need to use quotes on long names unless there are spaces involved. For
example, the following path doesnt require quotes:
c:\user\CompanyBudget1997.xls
This section includes commands that any authorized user can issue to Host, regardless
of access privileges.
CHAT
Puts the Host PC into chat mode, so the caller can type messages to the Host operator.
If the Host operator is present, the caller and operator can take turns typing. To return
to the host prompt, either may type C+C or E.
CHDIR path
CD path
Changes the current folder of the Host PC. (The current folder is shown as part of the
Host prompt). Callers who are restricted to a particular folder or drive can change to
its subdirectories, but cannot change to other directories.
CLS
Clears the Host PC screen and places the prompt in the upper left corner.
6-22 HyperACCESS Host
Displays directories (folders) of files on the Host PC. The pathname can contain a
drive or directory, and includes the filename, and may include * or ?. Callers who are
restricted to a particular directory or drive cannot examine files from other areas.
Options
/P Pause between screens
/N New (long name) format
/Ox Sort by order
Where x is one of the following:
N Sort by Name
E Sort by Extension
S Sort by Size
D Sort by Date
/S List files in subdirectories
HELP [topic]
Displays the list of commands the caller can enter to control the answering PC. For
more detailed help, enter HELP followed by any command shown in this section.
These commands all perform essentially the same function they send one or more
files from the Host PC to the callers PC. The different commands provide for the
different file transfer protocols supported by Host.
Host Commands 6-23
To make the Host PC send files from a folder and its subdirectories, callers can enter
HSEND, ZSEND, YSEND, GYSEND or KSEND, followed by a space, /S, and a
filename. For example:
HSEND /S \DB\*.DAT
causes Host to send files with a .DAT extension from the \DB folder and its
subdirectories.
Callers can use this command to make the Host PC send with Ymodem-G protocol,
which is faster than Ymodem. However, instead of acknowledging each received
packet, it simply aborts a transfer if an error occurs. If both computers have Hyper-
Protocol, use it instead for the fastest, most reliable transfers.
Sends a file or files from the Host PC to the callers PC using HyperProtocol. The
callers communications software must support HyperProtocol. For a single file, the
caller enters HSEND and a filename; the filename can include * or ? to specify file
groups; callers can enter multiple filenames separated by spaces. After entering this
command, the caller instructs the communications software on his/her PC to begin
receiving.
SEND filename
Sends a file from the Host PC to the callers PC using Text protocol. Callers can only
transfer ASCII files with Text protocol. After entering this command, the caller
6-24 HyperACCESS Host
Displays contents of a text file stored on the Host PC. Callers can use the text capture
feature of HyperACCESS to capture the text to a file. During the display of the file,
HyperACCESS will display one screen at a time, then give the caller the option to
display another screen, display the file continuously, or quit. The caller can type C+S
to suspend display, C+Q to resume, and C+C to cancel.
If the caller specifies /C, Host displays the file without the More, Nonstop,
Quit (M/N/Q) [M]? prompt after each page.
XSEND filename
Sends a file from the Host PC to the callers PC using Xmodem protocol. Since
Xmodem cannot transfer multiple files, the caller must enter the name of a single file
without * or ?. After entering this command, the caller instructs the communications
software on his/her PC to begin receiving with Xmodem protocol.
Sends a file or files from the Host PC to the callers PC using Ymodem protocol. For
a single file, the caller enters YSEND and the filename; the filename can include * or
? to specify file groups; callers can enter multiple filenames separated by spaces. After
entering this command, the caller instructs the communications software on his/her
PC to begin receiving with Ymodem protocol.
Sends a file or files from the Host PC to the callers PC with Zmodem protocol. For
a single file, the caller enters ZSEND and the filename; the filename can include * or
? to specify file groups; callers can enter multiple filenames separated by spaces. After
entering this command, the caller instructs the communications software at his/her
end to begin receiving with Zmodem protocol.
Host Commands 6-25
These commands all perform essentially the same function they instruct the Host
PC to receive one or more files from the callers PC. The different commands provide
for the different file transfer protocols supported by Host.
To make the Host PC receive files into a folder and its subdirectories, callers can enter
HREC, ZREC, YREC, GYREC or KREC, followed by a space, /P, and a filename. For
example:
HREC /P \DB\*.DAT
causes Host to receive files with a .DAT extension and write them to the \DB folder
and its subdirectories.
The upload options are:
/O Causes Host to overwrite existing files when it receives files
with the same filenames.
/N Causes Host to overwrite existing files when it receives iden-
tically named files with a more recent time and date.
/R Causes Host to refuse files if they already exists.
/P Causes Host to store files using folder names included in
received filenames. (When sending files, the caller needs to
instruct the communications software on his/her PC to send the
filenames paths with the files.)
Through modems with error-correction, callers can use this command to make Host
receive with Ymodem G protocol, which is faster than Ymodem. However, instead
of acknowledging each received packet, it simply aborts a transfer if an error occurs.
If both computers have HyperProtocol, use it instead for the fastest, most reliable
transfers.
Commands Host to receive a file or files from the callers PC using HyperProtocol
(this command can be used only by callers whose communications software supports
HyperProtocol). To have Host receive into the current drive and folder, the caller
6-26 HyperACCESS Host
simply enters HREC; to have it receive into a specific drive or folder, enter HREC and
that drive or folder; to have it receive a file and store it under a given name, the caller
enters HREC and the filename. After entering any of these, the caller instructs the
communications software on his/her PC to begin sending with HyperProtocol.
Commands Host to receive a file from the callers PC using Kermit protocol. To have
Host receive into its current folder, the caller simply enters KREC; to have it receive
into another drive or folder, enter KREC and that drive or folder. After entering this,
the caller instructs the communications software on his/her PC to begin sending using
Kermit protocol.
REC filename
Commands Host to receive a file from the callers PC using Text protocol. Callers can
only transfer ASCII files with Text protocol. After entering this command, the caller
instructs the communications software on his/her PC to begin sending the file using
Text (or ASCII) protocol. To indicate the end of the file, the caller can either type
C+C or enter a period on a line by itself.
XREC filename
Commands Host to receive a file from the callers PC using Xmodem file transfer
protocol. XREC must be followed by a single filename, which cannot contain * or ?.
After entering this command, the caller instructs the communications software on his/
her PC to begin sending using Xmodem protocol.
Commands Host to receive a file from the callers PC using Ymodem protocol. To
have Host receive into its current folder, the caller simply enters YREC; to have it
receive into a specific drive or folder, enter YREC and that drive or folder. After
entering this command, the caller instructs the communications software on his/her
PC to begin sending using Ymodem protocol.
Host Commands 6-27
Commands Host to receive a file from the callers PC using Zmodem protocol. To
have Host receive into its current folder, the caller simply enters ZREC; to have it
receive into another drive or folder, enter ZREC and that drive or folder. After entering
this command, the caller instructs the communications software at his/her PC to begin
sending using Zmodem protocol.
These commands perform standard file management actions they instruct the Host
PC to copy, move, delete, and rename files. In addition, there are commands to create
or delete directories (folders) on the Host PC.
Copies source file(s) to the destination file, drive, or folder (similar to the Windows
COPY command). This command manages files on the Host PC, not for copying
between PCs (which is done with commands such as SEND or REC).
Deletes file(s) from the Host PC (similar to the Windows DEL command). The
filename can include * or ?.
MKDIR directory
MD directory
Makes a new directory (folder) on the Host PC (similar to the Windows MKDIR
command).
Moves one or more files from one folder to another folder on the same drive. The
filenames can include * or ?. Source and destination cannot be the same.
6-28 HyperACCESS Host
Changes the source filename to the destination filename. The destination filename
cannot already exist.
RMDIR directory
RD directory
Removes a directory (folder) from the Host PC (similar to the Windows RMDIR
command). Before a directory can be removed, any files and/or subdirectories that it
contains must first be deleted.
HyperACCESS has the ability to execute batch files (.BAT) from the host prompt. In
these batch files, you can use any of the commands listed above, plus the commands
in this section. Normally, it is the Host PC operator who creates and maintains batch
files that run on the Host PC. However, you can also create batch files on other PCs
and upload them to the Host PC for execution. Any caller can execute batch files
present in directories to which the caller has access authorization. Host ignores any
commands in the batch file that are beyond that callers privileges.
Host also supports automatic batch file execution upon
caller logon. The automatic batch file, AUTO.BAT, is like You can use an AUTO.BAT
file to present callers with
any other batch file, except that it runs automatically, and a menu of choices. This lets
must appear in the callers logon directory. The callers you customize Host ser-
logon directory is either the hostdata directory or the vices, and gives you a tech-
directory specified in the Limit access to edit field of the nique to hide the standard
Passwords properties sheet. For more information on setting command-type interface.
the logon directory, see Defining Default Privileges on
page 6-10, Adding Callers on page 6-11, and Modifying Callers on page 6-13.
The CHOICE command lets callers make a selection. It optionally displays a message
followed by a prompt for a response. The choice (response) simply returns an
errorlevel to the batch file. The batch program must include subsequent commands
Host Commands 6-29
that act on every possible errorlevel. An invalid response sends a BEL (07h) character
to the user without returning to the batch file. A break key or C+C returns an errorlevel
of zero (0).
Parameters
Text The text message displayed to the user before the prompt. If
the text includes the switch character (/), include your text in
quotes. If no text is specified in the command, CHOICE only
issues the prompt.
Switches
/C:<keys> Defines allowed keys in the prompt. The colon (:) is optional
to improve readability. The command encloses choices in
brackets separated by commas, and displays a question mark
at the end. Each choice returns an errorlevel based on its
position in the list. The first choice returns 1, the second returns
2, and so on.
If this switch is not specified, the command displays the default
choice of [Y,N?].
/N Displays a prompt without displaying available choices. The
text before the prompt is still displayed, and the choices defined
with /C are still valid.
/S Makes the available choices case sensitive. By default,
CHOICE assumes upper and lower case values are equivalent.
Example:
CHOICE /C:y,n Do you want to continue?
IF ERRORLEVEL 2 GOTO end
IF ERRORLEVEL 1 GOTO continue
:continue echo You chose to continue
:end
Displays to the caller:
Do you want to continue? [Y/N?]
Note: When checking the errorlevel returned by CHOICE, you must check the highest
errorlevel first in order for this command to work properly.
6-30 HyperACCESS Host
Parameters
ON Displays all commands to the screen as they execute.
OFF Stops the display of commands on the screen.
Text Displays text regardless of the current state of ECHO.
GOTO label
Transfers control of the batch program to the label. Label names begin with a colon.
Label names cannot contain periods.
IF [NOT] ERRORLEVEL x
IF [NOT] string1 == string2
IF [NOT] EXIST path
Notes
NOT reverses the true and false value.
IF ERRORLEVEL is true if the previous program had an exit code greater than or
equal to the specified errorlevel number.
IF string1 == string2 is true if the first string matches the characters in the
second string.
IF EXIST is true if the filename is found in the specified folder.
Host Commands 6-31
PAUSE
REM [comment]
Allows comments to appear in the batch program. The batch interpreter ignores any
line preceded by REM.
6-32 HyperACCESS Host
Appendix A
Glossary
This glossary provides brief definitions of common terms and abbreviations used throughout this manual.
Absolute path A complete listing of the disk drive and folders used to store or retrieve a file.
It often includes the filename. Sometimes referred to as a fully qualified
filename or full path.
Accelerator key See shortcut key.
Access To establish a connection and log on to a remote system.
Application icon A picture that is a graphical representation of an application. Same as icon.
ASCII An abbreviation for American Standard Code for Information Interchange.
This standard code consists of 7 data bits (or binary values) per character.
Letters, numbers, and special characters ($, #, %, etc.) are represented by
different ASCII codes. The ASCII character set represents 96 printable
characters and 32 nonprintable control characters.
Asynchronous A method of communicating characters between computers. With asynchro-
nous communication, characters can be sent without special coordination or
control characters. See Synchronous communication.
Asynchronous adapter See communications port.
Autodial A modem feature that allows users to dial telephone numbers without using
a telephone. Commands for dialing can be manually entered from the com-
puter keyboard or automatically issued by a communications program.
Backscroll Buffer A special area of your computers memory that contains a read-only image of
the data scrolled off the terminal screen. HyperACCESS displays the Back-
scroll Buffer above the terminal area in the session window.
Baud Although technically speaking, baud is the number of discrete signal changes
that occur per second on a data line, the term baud is now used interchangeably
with the term bits per second (bps). Hence, 1200 baud is the same as 1200 bps
and equates to a transmission rate of about 120 characters per second (a
character typically consists of 8 data bits, 1 start bit, and 1 stop bit).
Binary A numbering system that is used by computers for storage of data. Binary
numbers are stored as a series of 0s and 1s. Each 0 or 1 is referred to as a bit.
Bit The smallest unit of information used by computer systems. A bit is either on
or off representing values 1 or 0, respectively. A series of 8 bits is called a
byte. ASCII characters are represented as one byte.
A-2 Glossary
Boot The process of starting a computer and loading its operating system from a
storage device into the computers memory. Most computers boot automati-
cally when you turn them on.
bps An abbreviation for bits per second, which is a measure of data transmission
speed. See baud.
Byte Eight bits, which are treated as one unit of information. Within your computer,
numbers and characters are represented as bytes.
Carrier Detect signal See CD.
Cascade menu A menu that appears to the right of a menu item. Menu items that display
cascade menus have a right pointing arrow at the right edge of the pull-down
menu.
CD An abbreviation for Carrier Detect. CD is an RS-232 signal from a modem to
a computer indicating that the modem has made a connection with a remote
system. Also known as DCD.
Character Any alphabetic, numeric, or special character symbol. See also ASCII.
Character length Also called data bits or bits per character, this is the number of bits required
to represent a character. Standard ASCII characters have a character length of
7 bits.
Check box In a GUI, a square box next to a description of an option that you can turn on
and off. A check box contains an X if the option is selected (turned on).
Checksum A method of error checking that is sometimes used in Xmodem and other file
transfer protocols. A checksum is a calculated by both the sending and
receiving systems. The sending system transmits its calculated number. If the
checksum received differs from the receiving systems calculated number it,
requests retransmission of the block.
Choose To use a mouse or keyboard commands to pick an item that starts an action in
Windows.
Clear to Send signal See CTS.
Click To press and release a mouse button (normally the left one, or button 1) quickly.
See also double-click.
Client A computer on a network that requests and uses resources supplied by a server.
Workstations usually act as clients, but they may also provide some server
functions. See Workstation and Server.
Glossary A-3
calculated by both the sending and receiving systems. The sending system
transmits its calculated number. If the CRC received differs from the receiving
systems calculated number, it requests retransmission of the block.
CTS An abbreviation for clear to send, which is an RS-232 signal from a modem to
a computer that indicates the remote system is ready to receive data.
Cursor The indicator on your display that shows where characters you type will appear
on the screen. In a GUI, the cursor may be displayed in various ways such as
an insertion point, mouse pointer, or underline character.
Data bits The number of bits, usually 7 or 8, in a data word that contain data. See also
start bits, parity, and stop bits.
Data Carrier Detect signal See CD.
Data Terminal Ready signal See DTR.
Data word The combination of start bits, data bits, parity bits, and stop bits is called the
data word. One data word is used to represent each character of transmitted
data.
DCD See CD.
DCE An abbreviation for data communications equipment, which identifies the
specific type of RS-232 port that is commonly found on peripheral equipment
such as modems. Contrast with DTE.
Default drive The disk drive that is assumed unless you explicitly specify the letter of a
different drive.
Dialog In a GUI, a special window displayed by an application. A dialog may display
options you need to choose among (usually with OK and Cancel push buttons);
or it may display a warning (sometimes with Yes and No push buttons); or it
may explain why a command cant be completed as requested (usually with
an OK push button).
Directory See folder.
DOS An abbreviation for disk operating system. It is frequently used as a generic
description for MS-DOS, PC-DOS, and other equivalent disk operating sys-
tems.
Double-click To click a mouse button twice in rapid succession.
Download The process of receiving a file from another computer. (Upload means to send
a file to another computer.) Since some people find the terms download and
upload confusing, HyperACCESS and this manual use the terms send and
receive.
Glossary A-5
Drag To press and hold a mouse button (usually the left one) while moving the
mouse.
Drop-down combo box In a GUI, an edit field with the current choice displayed in the field. You can
change the choice by clicking (see click) on the underlined arrow in the square
box at the right (displaying the drop-down list) and choosing a different option,
or by typing in the edit field.
DSR An abbreviation for data set ready. DSR is an RS-232 signal from a modem to
a computer indicating that the data set (modem) is ready to communicate.
DTE An abbreviation for data terminal equipment, which identifies the specific type
of RS-232 port that is commonly found on personal computers and terminals.
Contrast with DCE.
DTR An abbreviation for data terminal ready. DTR is an RS-232 signal from a
computer to a modem indicating that the data terminal (computer) is ready to
receive data. It is used to force the modem to disconnect (hang up) from a
remote system.
Echo The process whereby a computer sends back a duplicate of each received
character to the computer that sent the character. In communications with most
remote, dial-up systems, characters you type on your keyboard will be echoed
back to you by the remote system.
Edit field A rectangular box in a GUI into which you type information, such as a phone
number.
EIA Electronic Industries Association.
Electronic mail Messages sent from one computer to another through telephone lines. Some-
times called E-mail for short.
Emulate To enable a computer to simulate the behavior of a terminal.
Filename The name of a file known to DOS and Windows. The filename must conform
to standard naming conventions.
Flow control A means by which a computer or device that is receiving data can command
the computer or device that is sending the data to suspend and resume sending.
Typical means of flow control are XON/XOFF and hardware handshaking.
Folder A grouping of files on a storage device (hard disk, CD-ROM, diskette, etc.)
Files in folders may be logically or physically co-located on the storage device.
Formatting The process performed by DOS or OS/2 FORMAT program, which prepares
(initializes) a disk to accept files. Also the process of arranging data or text, as
in an editor.
A-6 Glossary
Full duplex A mode of communications whereby characters you type are sent directly to
the remote computer without first being displayed on your screen. The char-
acters display on your screen only after the remote system has sent an echo of
the characters back to you.
Full path A complete listing of the disk drive and folders used to store or retrieve a file.
It often includes the filename. Sometimes referred to as a fully qualified
filename or absolute path.
GND An abbreviation for ground. GND is an RS-232 signal that serves as a signal
ground between a computer and a modem.
Ground signal See GND.
GUI Abbreviation for graphical user interface, such as Windows or OS/2 Presenta-
tion Manager.
Half duplex A mode of communications whereby characters you type are displayed on your
screen as they are being sent. The remote computer does not echo characters
you type when you are using half duplex.
Hardware handshaking A process by which a computer uses lines in the RS-232 cable, in addition to
those that carry serial data, to indicate to another computer when it is ready to
accept data.
Host system A computer or computer service (other than the one on which youre running
HyperACCESS) with which you can establish a connection and exchange data.
It accepts calls and responds to commands that the caller types on a terminal
or on a computer that is acting as a terminal. Same as Remote system.
HyperProtocol An error-free, streaming file transfer protocol developed by Hilgraeve. Hyper-
Protocol is very fast over noisy or noise-free connections despite propagation
delays common with long-distance calls, high-speed modems, X.25, and
packet-switching networks.
Icon A picture that is a graphical representation of various Windows elements.
Short for application icon.
Insertion point In a GUI, the flashing vertical bar usually displayed in a text box to indicate
the place where you can type or edit information.
Int 14h Int 14h refers to the standard interrupt vector used to support communications
hardware/software. HyperACCESS supports Int 14h redirection in conjunction
with special redirection software provided by other vendors.
ISDN An abbreviation for Integrated Services Digital Network, a digital transmission
technology that enables voice and high-speed data communications to be
multiplexed on a single telephone line.
Glossary A-7
to digital signals. HyperACCESS and this manual occasionally use the term
modem to refer to communications devices in general.
Mouse pointer In a GUI, this is usually an arrow (but may have other shapes like an I-beam)
that is controlled by a mouse and is displayed if you have installed a mouse in
Windows.
NASI Network Asynchronous Services Interface provided by Novell for accessing
shared communications ports.
NCSI Network Communications Services Interface provided by Network Products,
Inc. for accessing shared communications ports.
Notebook A notebook is a general term used to describe a special tabbed window (or area
within a window) provided by Windows 95. Each tab selects an independent
panel that may have its own edit fields, buttons, and other controls. In
HyperACCESS, the main window is a notebook with panels, and the Phone-
book panel is itself a notebook with tabbed panels that provide alphabetic
selections of entries. You can create additional notebooks to organize entries
by other criteria. Each new notebook you create has alphabetically tabbed
panels. Another example of a notebook in HyperACCESS is the properties
notebook. Each sheet of the properties notebook is one of the tabbed panels.
Null modem cable An RS-232 cable that allows the DTE ports of two computers to be directly
connected to each other.
Offline A term describing a computer that is not connected to another for the purpose
of communications. Contrast with online.
Online A term for being connected with a remote computer for purposes of commu-
nications. Contrast with offline.
Option button Same as radio button.
OS/2 A multitasking operating system developed jointly by Microsoft and IBM for
80286 and later computers. It is an alternative to the DOS, PC-DOS, MSDOS,
and Windows.
Parity A bit having a value of 0 or 1 that is added to a character as the character is
sent. The receiving system can use the parity bit as a means of detecting errors
in the character. The parity bit added makes the sum of bits in a data word
either an odd number (for odd parity) or an even number (for even parity).
Pathname A listing of folders used to store or retrieve a file. See also absolute path and
relative path, and for details your OS/2 or DOS manual.
Peripheral device A device that is connected to a computer for supplying input and/or accepting
output from the computer.
Glossary A-9
Point To move a mouse until the mouse pointer is located on an item. See also choose.
Port See communications port.
Push button In a GUI, a button in a dialog that performs a command, such as OK or Cancel.
Same as command button.
Radio button In a GUI, a circular button that selects an option from a list of mutually
exclusive items. The selected option contains a black dot. You click on an
option button to select a different option.
RD An abbreviation for receive data. RD is an RS-232 signal that carries data from
a modem to a computer.
Reboot To reboot is to restart a computer or to reload its operating system from a
storage device, such as a disk, into a computers memory. With microcomput-
ers, you reboot by pressing C+A+D, by pushing a reset button on the
computer, or by turning the power off and back on.
Receive The process of receiving a file from another computer. Since some people find
the term download confusing, HyperACCESS and this manual use the term
receive.
Receive data signal See RD.
Relative path A listing of folders used to store or retrieve a file. A relative path assumes that
the current drive and folder are the starting point for the path. It often includes
the filename.
Remote system A computer or computer service (other than the one on which youre running
HyperACCESS) with which you can establish a connection and exchange data.
It accepts calls and responds to commands that the caller types on a terminal
or on a computer that is acting as a terminal. Same as host system.
Request To Send signal See RTS.
Restore button In a Windows 95, this button shows a square with two vertical bars. It appears
in the upper right-hand corner of a window. The restore button replaces the
maximize button after the window has been enlarged and will restore a window
to its previous size. To use it, move the mouse pointer to the restore button and
click.
Ring indicator signal See RNG.
RNG An abbreviation for ring indicator. RNG is an RS-232 signal from a modem to
a computer indicating that the telephone is ringing. Sometimes called ring
detect.
A-10 Glossary
RS-232 cable A standard type of cable adopted by EIA to ensure uniformity of interfacing
signals between two computers and/or peripherals. RS-232 cables typically
plug into male or female 9-pin or 25-pin D sockets on your computer, modem,
or other peripheral devices.
RTS An abbreviation for request to send. RTS is an RS-232 signal from a computer
to a modem that indicates the computer has data to send to a remote system.
Scroll bar In a GUI, a vertical scroll bar appears on the right-hand side of a window and
the horizontal scroll bar appears at the bottom of a window. Each scroll bar
contains a scroll box, which may be moved by dragging (see drag) it to see
different areas of a window. You can also click on the bar or the arrow buttons
on either end.
Select To select is to mark an item by clicking (see click) on it or by highlighting it
using keyboard commands. See also choose.
Send The process of sending a file to another computer. Since some people find the
term upload confusing, HyperACCESS and this manual use the term send.
Serial port See communications port.
Server A computer on a network that provides specialized services to other computers
on the network. Among services provided by servers are: shared printers,
databases, and communications. Some servers are dedicated to providing their
specialized service, others provide multiple services or are also used as
workstations. See Workstation and Client.
Shortcut key A key combination or sequence that can be used in place of selecting a menu
item. For example, you can use the shortcut key C+X instead of selecting the
Edit/Cut menu item.
Sign-on (or sign on) HyperACCESS and this manual use the terms log on and logon, in place of
sign on and sign-on.
Software handshaking A method by which a system that is receiving data can send control characters
to the computer that is sending, to indicate when it is ready to receive data.
Start bits Bits that are added to the beginning of a data character (see data bits) during
asynchronous communications.
Stop bits Bits that are added to the end of a data character (see data bits) during
asynchronous communications.
Streaming A method of data transmission that lets the sending system transmit data until
all are sent or it receives a negative acknowledgment from the receiving system.
Upon receipt of a negative acknowledgment, the sender retransmits the failed
block and all subsequent blocks.
Glossary A-11
Ymodem protocol Ymodem (also known as Ymodem Batch) is a 1024-byte packet, error-
correcting protocol capable of transferring single files or groups of files.
Ymodem is generally faster than Xmodem over noise-free lines, but slower
over noisy lines, as it must retransmit 1024-byte packets rather than 128 bytes
as with Xmodem. (Ymodem is similar to 1K Xmodem, except that 1K
Xmodem transfers only one file at a time without a filename.)
Ymodem-G protocol Ymodem G is a variant of Ymodem that does away
A common misconception
with packet-by-packet acknowledgments and sim- is that Ymodem G is the
ply aborts the transfer if an error is detected. Ymo- best protocol to use with
dem G should be used only with error-correcting MNP or other error-
modems or inherently error-free connections. Ymo- correcting modems.
dem G is clearly faster than Ymodem, Xmodem, and
Kermit, but there is a common misconception that Ymodem G is the best
protocol to use with error-correcting modems. In reality, HyperProtocol and
Zmodem are much better because they can correct errors the modems cannot
sense (such as those introduced by the computers or serial ports) with no
penalty in performance.
Zmodem protocol Zmodem is an error-correcting, streaming protocol that has become popular
on bulletin boards. Next to HyperProtocol, it is the fastest, most desirable
protocol. Like HyperProtocol, it maintains its speed despite propagation
delays, though its efficiency is slightly less (98% versus 99%), and it lacks
compression. Zmodem can send single files or file groups.
A-14 Glossary
Appendix B
Modems, Communications Ports, and Cables
Most computers are configured with at least one serial port (identified as COM1),
and some have a second serial port, usually identified as COM2. Check your computer
manual to locate and identify a serial port connector. If your computer does not have
an available serial port and youre planning on using an external modem, you will
need to buy and install an adapter card with a serial port.
An external modem is connected to a computers serial port with a standard RS-232
cable. A standard cable, sometimes called a modem cable or straight-through cable,
has one of two types of connectors. The first type called a DB-25 connector
can have as many as 25 pins. The second type called a DB-9 connector, which is
much smaller can have up to 9 pins. You will need to be sure that each connector
on your cable matches the modem and computers serial port. The following listings
describe the pin connections and signals (see Appendix A, Glossary, for definitions
of acronyms following each pin number) for each type of cable.
B-2 Modems, Communications Ports, and Cables
The correct type of cable can be easily identified with an ohmmeter or other continuity
tester by checking pins 2 and/or 3 at each end based on the connector type as shown
in the above listings. If the TD (transmit data) pin on one end is connected to the TD
pin on the other end, it is a standard modem cable used to connect data terminal
equipment (DTE) devices, such as your computer, to data communications equipment
(DCE), such as a modem. If the TD pin is connected to the RD (receive data) pin, it
is a null modem cable used for direct computer-to-computer connections described
later in this appendix. Now you are ready to define and configure the modem.
Install your internal modem according to instructions in your modem manual. Win-
dows works with modems configured as COM1, COM2, COM3, and COM4. When
you set your modems switches or jumpers, be sure to avoid port address and IRQ
(interrupt request) settings that are already in use. Using the same address or IRQ as
an existing device (e.g., serial port or mouse) can prevent both from working. If you
use an address or IRQ other than the common COM1 or COM2 settings you must
B-4 Modems, Communications Ports, and Cables
configure Windows 95 to recognize the port. This happens automatically when you
use the Add New Hardware wizard.
For trouble-free operation with Windows, modems with mechanical switches should
be configured as described here. Few of todays modems have such switches, because
they rely on commands issued by Windows and HyperACCESS to establish their
configuration. Modems that do have switches should be configured according to the
following general guidelines:
CD switch the modem switch that affects the CD (carrier detect) signal
should be set so that CD turns on only when a connection exists, rather than
being held constantly on.
DTR switch the modem switch that affects the DTR (data terminal ready)
signal should be set so that the modem disconnects in response to DTR, rather
than ignoring DTR.
Other switches other switches should generally be set so that the modem
responds to Hayes commands, echoes modem commands, and gives visible,
verbal responses.
If your modem isnt listed by name in Windows Add New Hardware wizard, you can
still get excellent results by selecting one of the following:
Standard Modem Types
For modems that use basic or extended AT commands. Older
modems typically have mechanical configuration switches that
should be set as described above. Select an entry from the
Models list based on the speed of your modem.
VoiceView Modem Types
For modems that support concurrent voice and data operation.
You may want to change modem selection for any of the following reasons:
To fix an incorrect selection that you made earlier.
Defining and Configuring the Modem B-5
Most users find Windows TAPI predefined modem support ideal and never encounter
a need for customizing their modem definition. But when the need arises, or if you
simply want to do things your own way, TAPI provides some customization support.
Here are a few instances where customizing your modem might be required:
Calls are going well for the most part, but you need to make minor changes to
handle calls to specific systems. (For entry-specific changes, see Modifying
Connections on page 3-59.)
Youve selected a specific or generic modem name that matches or closely
approximates your modem, but you conclude that you need to change the
modems definition to achieve desired performance. (Follow instructions in the
following section, Custom Modem Specification, to make global changes.)
Figure B-1.
The Advanced Con-
nection Settings dia-
log lets you define
custom modem
setup strings.
You can select the appropriate communications port as you install the modem with
the Add New Hardware wizard, when you install HyperACCESS, or by using the
Communications properties sheet. HyperACCESS automatically takes care of making
port settings (that is, setting number of data bits, number of stop bits, and parity).
Which port you can use depends on the type of computer you have and how you have
defined and configured the modem. To customize port settings, follow these steps to
display the Settings dialog:
1. Access the Communications properties sheet by performing one of the tech-
niques described in Changing Property Sheet Settings on page 3-53.
2. In the Communications properties sheet, click the Change... push button in the
Connect Via group box.
3. Select the connection you want to modify, and click the Modify Connection...
button. What happens next depends on the type of connection you select, but is
similar to the procedure for new connections. For modem or modem pool type
connections, see Modem or Modem Pool Connections on page 3-20. For direct
cable connections, see Direct Cable Connections on page 3-22.
B-8 Modems, Communications Ports, and Cables
Before you can use shared communications devices (ports or modems) on Microsoft
LAN Manager, and other LAN Manager-based networks, you must install modem
sharing software from a third party vendor. Once youve installed this software, you
can create a TAPI modem using network device names. HyperACCESS can use any
TAPI-defined modem.
There are two basic types of RS-232 cables: standard cables, which are used to connect
a PC to a modem, and null modem cables, which are used to connect one PC to another.
The following listings describe pin connections and signals (see Appendix A, Glos-
sary, for definitions of acronyms) used by HyperACCESS for each type of null modem
cable.
The following table shows the standard ASCII character codes and extended ASCII
character codes. The first 32 are called control characters and are not displayed in an
application, such as HyperACCESS. To type them, press and hold C and type the
character indicated below, such as C+A. The next 96 are the standard ASCII character
codes for letters, numbers, punctuation, and symbols, which you type using the regular
keys on your keyboard. The last 128, called extended ASCII characters, are graphics
characters and other special characters used in ANSI terminal emulation. To obtain an
extended ASCII character, press and hold A, type the decimal value shown in the Key
column (including the leading zero) on the numeric keypad, then release A.
Click the following hypertext link to see the ASCII character table.
C-2
Appendix D
Terminal Emulator Characteristics
Introduction
HyperACCESS emulates a wide variety of computer terminals so that you can call
and communicate with different systems. Each emulator allows you to see text and
respond to screen control codes in a way that closely resembles that type of terminal.
If the terminal has keys that your computer lacks, the emulator defines other keys
you can use in their place. HyperACCESS includes emulators for the following:
ADDS Viewpoint.
ADM 3A (Lear Siegler).
ANSI (American National Standards Institute).
CompuServe (CompuServe Information System).
DG210 and DG211.
IBM 3101 (IBM 3101 series terminals).
IBM 3278 (IBM 3278 series terminals).
SCO ANSI
TTY (Teletype).
TV910, TV912, TV920, TV925, and TV950 (Televideo terminals).
VT52, VT100, VT102, VT220, and VT320 (DEC terminals).
Wyse 50 and Wyse 60.
Most people find the keys defined by HyperACCESSs emulators to be quite
satisfactory. But you can easily define new keys to replace or supplement the original
keys by creating macros and assigning them to keys as described in Creating
Keyboard Macros on page 3-71.
This appendix provides information about each terminal emulator and its optional
settings (or parameters). Settings common to all emulators appear on the Terminal
Emulator properties sheet (see Terminal Emulator Properties Sheet on page 4-43).
Since HyperACCESS supports additional settings for each emulator, each terminal
emulator also has its own Terminal Settings dialog. Settings you specify on the
Terminal Emulator properties sheet and the Terminal Settings dialog are unique
for each phonebook entry. Even if phonebook entries share the same emulator, they
still have their own settings and macros.
D-2 Terminal Emulator Characteristics
There are several ways to access an emulators Terminal Settings dialog. For
detailed instruction see Changing Terminal Emulator Settings on page 3-55.
Figure D-1.
The Terminal
Emulator properties
sheet defines which
emulator you want to
use and how you
want the emulator to
behave.
This group box has two radio buttons that let you specify whether these keys should
perform as Terminal keys or as System keys.
Common Emulator Characteristics D-3
This group box has three radio buttons that let you determine what HyperACCESS
sends the remote system each time you press B. Your choices are:
Ctrl+H Send the value associated with C+H ASCII backspace
(08H).
Del Send the value associated with Del (7FH).
Ctrl+H, Space, Send an ASCII backspace, replace the character at that posi-
Ctrl+H tion with a space character, and backspace again. This pro-
vides a destructive backspace for systems that only provide a
nondestructive backspace.
Cursor
This group box has two radio buttons that select between an Underline and Block
cursor. In addition, the Blink check box causes HyperACCESS to display a blinking
cursor when selected, and a nonblinking cursor when unselected.
These two spin buttons and their associated edit fields let you specify the terminal
screen height (Rows) and width (Columns). You can specify a minimum of 2 and a
maximum of 64 rows, and a minimum of 2 and a maximum of 132 columns. The
Default push button returns the number of rows and columns to appropriate settings
for the selected terminal.
This feature lets you display wide (or long) screens of data without issuing scroll
commands to the host. Check with your systems administrator before using this feature
to verify that your host computer supports terminals with more rows or columns.
D-4 Terminal Emulator Characteristics
Emulator-Unique Characteristics
ADDS Viewpoint
The emulator supports ADDS Viewpoint terminals. The following keys are supported:
Terminal Settings
ADM 3A Emulator
The ADM 3A emulator supports the Lear Siegler ADM 3A terminal. A+I performs
the same function as the ADM 3A terminals Here Is key, which sends the answerback
message entered on the ASCII Sending menu. You can use the keys listed below:
Terminal Settings
ANSI Emulator
Terminal Settings
Figure D-2.
The ANSI Terminal
Settings dialog.
Use Windows Select this check box to have HyperACCESS use the Win-
drivers for host- dows default printer driver for host initiated printing. Leave
controlled printing the box unchecked to have data pass directly to the printer in
host-controlled printing.
CompuServe
This emulator simplifies file transfers with CompuServe B+ protocol and is used
solely with CompuServe Information Service. With this emulator, you can initiate file
transfers just by commanding CompuServe to send or receive files (you dont need to
select Transfer/Send or Transfer/Receive). When using this emulator, you should config-
ure CompuServe to treat your computer as an ANSI terminal (to begin the configuration
process, enter GO TERMINAL at the CompuServe prompt).
Terminal Settings
The Data General DG210 and DG211 emulators support the following keyboard
mapping:
Terminal Settings
There are no emulator-unique settings for Data General DG210 and DG211 emulation.
IBM 3101
The IBM 3101 emulator supports both character mode and block mode of IBM 3101
series terminals. You can use the following keys:
Details that you would set with dip switches on an IBM 3101 terminal are set on menus
in HyperACCESS.
Emulator-Unique Characteristics D-9
Terminal Settings
Figure D-3.
The IBM3101
Terminal Settings
dialog.
IBM 3278
If the mainframe operator has redefined the protocol converters VT100 conversion
table, keys may not work as shown. You may need to define new keys as described
in Creating Keyboard Macros on page 3-71.
Terminal Settings
SCO ANSI
The SCO ANSI emulator uses ANSI character sequences with minor modifications
to act like an SCO UNIX operating system console on a PC.
Terminal Settings
Figure D-4.
The ANSI Terminal
Settings dialog.
TTY
Use the TTY (Teletype) emulator with any system that calls for a TTY terminal, a
Teletype, a glass terminal, or no terminal. This class of terminal, with its simplicity
and wide availability, has become a de facto standard in communications, and you
can access more systems with this emulator than any other. Even systems designed
for use with more sophisticated terminals often provide rudimentary support for TTY
terminals as well. TTY terminals use only regular, alphanumeric keys.
Emulator-Unique Characteristics D-13
Terminal Settings
Use TV910, TV912, TV920, TV925, or TV950 to emulate the respective Televideo
terminals. They provide full emulation of conversational (or character) mode, block
mode, local edit mode, protected fields, and selective clear.
You can use the following keys:
Terminal Settings
Figure D-5.
The Televideo 910
Terminal Settings
dialog. The other
Televideo terminal
settings dialogs look
the same.
Details that you would define with setup screens on true DEC terminals are set on
menus in HyperACCESS.
Emulator-Unique Characteristics D-17
Figure D-6.
The VT52 Terminal
Settings dialog.
Figure D-7.
The VT100 Terminal
Settings dialog. The
VT102 Terminal Set-
tings dialog looks the
same.
Figure D-8.
The VT220 Terminal
Settings dialog. The
VT320 Terminal Set-
tings dialog looks the
same.
Character set This drop-down list lets you specify the national character set
used.
Use Wyse 50 or Wyse 60 to emulate the respective Wyse terminals. They provide full
emulation of conversational (or character) mode, block mode, local edit mode,
protected fields, and selective clear.
The following keys are supported:
Figure D-9.
The Wyse Terminal
Settings dialog.
The Terminal Status Line group box lets you select from among three radio button
choices. The choices are:
Standard This radio button displays a status line with the current time
and cursor location.
Extended This radio button displays a status line with editing messages.
Selecting this check box replaces the time and cursor location
with editing status messages.
Invisible Selecting this radio button hides the terminal status line.
The Corner Key (Scroll Lock) group box lets you select from among two radio button
choices. The choices are:
Hold Select this radio button to have the L key behave like the
Wyse Hold key.
Funct Select this radio button to have the L key behave like the
Wyse Funct key.
Use Windows Select this check box to have HyperACCESS use the Win-
drivers for host- dows default printer driver for host initiated printing. Leave
controlled the box unchecked to have data pass directly to the printer in
printing
host-controlled printing.
D-22 Terminal Emulator Characteristics
Appendix E
File Transfer Protocols
This appendix provides information about each protocol and its optional settings.
Since HyperACCESS supports different settings for each protocol, each protocol has
its own, unique Settings dialog.
There are several ways to access a protocols Settings dialog. For detailed instruc-
tions see Changing File Transfer Protocol Settings on page 3-53.
When you use Paste from File (to remote computer), Cut to Remote Computer, Copy
to Remote Computer, or Capture to File, HyperACCESS performs ASCII transfers.
E-2 File Transfer Protocols
1K Xmodem
CompuServe B+
HyperProtocol
Crash Recovery This group box has three option buttons each for receiving and
sending. In both cases, the default is Negotiate. For crash
recovery to work for partially received files, you must have
had the following settings in your Receive dialog when the
transfer failed:
In the If file already exists group box, you must have
had Rename set to either Existing file sequentially or
Existing file using date.
You must have had the Save partial files if transfer is
interrupted check box selected.
Protocols and Their Settings E-5
Kermit
Pad character Use the spin button or edit field to set the pad character your
PC sends before each packet. The most common entry is 0,
which is the null character. With remote systems that require
different characters, enter the decimal ASCII value from
Appendix C.
Xmodem
Ymodem
similar to 1K Xmodem, except that 1K Xmodem transfers only one file at a time
without a filename.) Ymodem settings are:
Seconds to wait to Use the spin button or edit field to set the number of seconds
receive each your PC waits for each packet to begin. This is normally set to
packet 10. With slower systems such as CompuServe, you may need
to set this as high as 30.
Seconds to wait to Use the spin button or edit field to set the number of seconds
receive each byte your PC waits for each byte in the packet. This is normally set
to 5. With slower systems such as CompuServe, you may
need to set this as high as 10.
Attempts to send Use the spin button or edit field to set how many times your
each packet PC retransmits (or requests retransmission of) each packet.
Normally this is 4. You may want to increase this value for
particularly noisy telephone lines.
Ymodem G
Attempts to send Use the spin button or edit field to set how many times your
each packet PC retransmits (or requests retransmission of) each packet.
Normally this is 4. You may want to increase this value for
particularly noisy telephone lines.
Zmodem
Receiving Parameters
Respond to Select this check box to have HyperACCESS automatically
Zmodem autostart begin receiving as soon as you command the remote system
to send. If this check box is left unselected, you must click the
Receive push button in the Receive dialog to begin receiving.
The default is selected.
If the file already This group consists of two radio buttons. Select either:
exists Follow senders Append/Overwrite option to use
the option specified by the receiving system. This can be
dangerous to your files.
Follow options in Transfer Receive dialog the
default. To use your options specified in the Receive
dialog. You have somewhat more control.
Crash recovery This group consists of three radio buttons. Select either:
Negotiate the default. This lets recovery occur when
file recovery is enabled at the remote system.
Never prevents recovery from occurring, even if the
remote system has file recovery enabled.
Always file recovery will occur if the remote system
has recovery set to enable or negotiate.
E-10 File Transfer Protocols
Sending Parameters
Append/ This drop-down list has eight options:
Overwrite options None the default. Use this with systems that dont
support Zmodem Management options.
Newer or longer overwrites if file sent has newer time/
date or larger size.
CRC differs overwrites if file sent has different contents.
Append to file adds file sent to end of existing file.
Overwrite overwrites any file having same name as file
sent.
Newer overwrites if file sent has a more recent time/
date.
Length or date differs overwrites if file sent has
different size or time/date.
Refuse rejects file sent if its name matches any existing
file.
Crash recovery This group consists of three radio buttons. Select either:
Negotiate the default. This lets recovery occur when
file recovery is enabled at the remote system.
One-time allows recovery during the next file transfer
only, after which the setting reverts to Negotiate. This
prevents inadvertent file recovery, which can damage
files.
Always file recovery will occur if the remote system
has recovery set to enable or negotiate.
Protocols and Their Settings E-11
Transmission Parameters
Method This group lets you specify error detection and recovery pro-
cedures when youre sending files. The Zmodem protocol lets
the sending system choose whether or not to wait for positive
acknowledgment from the receiving system before sending
additional blocks. If the sending system chooses to wait for
acknowledgment, it can also choose how often it waits. Alter-
natively, the sending system can stream data until transmission
is complete or it receives a negative acknowledgment from the
receiving system. Upon receipt of a negative acknowledgment,
the sender retransmits the failed block and all subsequent
blocks.
Streaming this radio button indicates that
HyperACCESS Zmodem should send in streaming mode
(the default).
Windowed this radio button, with its associated drop-
down list box, indicates that you want Zmodem to stop
and wait for acknowledgment when necessary. The drop-
down list provides options of 2K and 4K bytes.
Packet Use the spin button to set the number of bytes in each packet.
Larger packets mean faster transfers but slower recovery from
errors. Available packet sizes are: 32, 64, 128, 256, and 1024
(the default). Packet size reduces automatically if necessary.
CRC Lets you set the size of error-checking codes used; 16 (the
default) bits is usually adequate. Setting to 32 bits further
enhances reliability, at the expense of speed.
Wait This spin button sets how long Zmodem waits between
attempts to resend packets. Through networks, where the
receiver may lag far behind the sender, you may need to
increase this setting. The default setting is 15 seconds, with a
range of 1 to 99 seconds.
End-of-line Select this check box if youre transferring text files with a
conversion system that requires a line feed character after each carriage
return, which is typical of UNIX systems. The default is
unselected.
E-12 File Transfer Protocols
Control sequences Select this check box if you want Zmodem to replace all con-
use escape codes trol codes with an equivalent series of noncontrol codes. This
may be necessary with networks or remote systems that have
problems transmitting control codes, such as UNIX systems
through TCP/IP.
Appendix F
Command Line Parameters
When you launch HyperACCESS, you can provide command line parameters that
let you automate common procedures or define options and settings. You can enter
these parameters when you execute HyperACCESS from a command line (hence the
name), or in the HyperACCESS settings notebook.
The available command line parameters are:
/R <program_file> Use this command line parameter to run a script when
HyperACCESS starts. If your program path or filename con-
tains one or more spaces, enclose the entire pathname in
quotes.
/T <Telnet address> Use this command line parameter to connect to a Telnet server
when HyperACCESS starts.
<notebook_entry_file>
Enter the filename (and path if necessary) of an entry that you
want HyperACCESS to open and connect to. Entry files
generally have an .HAW extension. For example, to have
HyperACCESS automatically start with a connection to the
Hilgraeve BBS, you might perform the following steps:
1. Open the HyperACCESS folder (generally,
c:\Program Files\HAWin32\HyperACCESS), and right-click the
HyperACCESS icon.
2. Select Create Shortcut from the pop-up menu. Windows creates a new shortcut
labeled HyperACCESS (2).
3. Right-click on this new icon, and select Properties from the pop-up menu.
4. Select the Shortcut tab in the Properties dialog.
5. In the Target edit field, after the program name, type a space and then the
following text exactly as shown:
"Hilgraeve BBS.haw"
6. Click the OK button.
F-2 Command Line Parameters
Print . . . . . . . . . . . . 3-48, 3-50, 3-70, 4-64, 4-101, 4-110 Information . . . . . . . . . . . . . . . . . . . . 4-26, 4-104, 4-112
Print Preview . . . . . . . . . . . . . . 4-10, 4-64, 4-101, 4-110 Using help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xiv
Properties . . . . . . . . . . . . . . . . . . . . . . . . 3-16, 3-53, 4-27 Help menu
Redisplay File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-68 Call Log panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-104
Save . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-62, 4-107 Lists panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-112
Save As . . . . . . . . . . . . . . . . . . . 3-14, 4-62, 4-100, 4-107 Phonebook panel . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-26
Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-108 Terminal panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-94
Terminal panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-61 Hilgraeve
File menu/Capture to Printer. . . . . . . . . . . . . . . . . . . . . . . 3-50 BBS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
File Transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-51 Horizontal scroll bar
File Transfer properties sheet . . . . . . . . . . . . . . . . . . . . . . 4-49 Scroll bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-10
File transfer protocols . . . . . . . . . . . . . . . . . . . . . . . 3-43, 4-49 Host
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-54 See also, HyperACCESS Host
File Usage properties sheet . . . . . . . . . . . . . . . . . . . . . . . . 4-50 Host Entries panel
Find dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6, 3-10, 4-74 File/Connect. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-12
Find dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7 to 3-8 File/Connect and Record Logon . . . . . . . . . . . . . . . .4-14
Flow control . . . . . . . . . . . . . . . . . . . . . . . . . . 3-57, 3-59, A-5 File/Connect but Skip Logon . . . . . . . . . . . . . . . . . . .4-15
Font File/Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-27
Automatic sizing. . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-78 Window/Host Entries. . . . . . . . . . . . . . . . . . . . . . . . .4-25
Sample . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-78 Host system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-6
Font dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9 HOSTHELP.TXT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-19
Full duplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-6 .HTW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-7
Full path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-6 HyperACCESS Application Programming Interface
Function, Arrow, and Ctrl Keys . . . . . . . . . . . . . . . . . . . . .D-2 See also HAPI
HyperAccess Convert. . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-17
HyperACCESS Host . . . . . . . . . . . . . . . . . . . . . . . . 6-1 to 6-2
G Auto-answer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-17
.GIF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-82 Automatic startup. . . . . . . . . . . . . . . . . . . . . . . . . . . .6-17
GND . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-6 Caller commands . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-19
Graphical User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 Caller configuration . . . . . . . . . . . . . . . . . . . . . . . . . .6-17
GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-6 Caller logon . . . . . . . . . . . . . . . . . . . . . . . . . 6-18 to 6-19
Graphics characters . . . . . . . . . . . . . . . . . . . . . . 4-77, C-1, D-5 Default Privileges . . . . . . . . . . . . . . . . . . . . . . . 6-9, 6-12
Graphics Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . 4-82, 4-114 HyperACCESS/5
Zoom In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-115 Upgrading from . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-17
Graphics Viewer Window. . . . . . . . . . . . . . . . . . . . . . . . 4-114 HyperGuard . . . . . . . . . . . . . . . . . . . . . . .1-2, 3-44, 4-80, 6-15
Ground signal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-6 HyperProtocol . . . . . . . . . . . . . . . . . . . . . . . . . . . .xi, A-6, E-4
GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1, A-6
I
H I-beam
Half duplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-6 Insertion point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-8
.HAO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7 Mouse pointer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-8
HAPI . . . . . . . . . . . . . . . . . . . . . . . . 1-3, 3-18, 3-71, 4-86, 5-1 IBM 3101 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-1, D-7
Hard disk requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1 IBM 3270 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-10
Hardware handshaking . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-6 IBM 3278 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-1, D-10
.HAW . . . . . . . . . . . . . . . . . . 2-18, 3-2, 3-14, 3-29, 3-37, 4-63 IBM 3708 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-10
Help IBM 7171 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-10
IBM 9370 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-10
6 Index
NASI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-8
NCSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-8 P
Network Page Setup dialog . . . . . . . . . . . . . . . . .3-48, 4-9, 4-101, 4-110
Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-11 Palette window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-60
Network Asynchronous Services Interface Panel Tabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-58
NASI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-8 Panel tabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-19
Network Communications Services Interface Parity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-42, A-8
NCSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-8 Password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-55
New Entry Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5 Password dialog box. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-22
New Entry Connection dialog. . . . . . 3-12, 3-19, 3-21 to 3-23, Passwords properties sheet. . . . . . . . . . . 6-5, 6-8, 6-12 to 6-13
. . . . . 3-30 to 3-34, 3-56, 3-58 to 3-59, 3-61, 3-75, 3-78 Paste from File dialog. . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-73
New Entry Description dialog. . . . . . . . . . . . . . . 3-11, 4-4, 4-6 Paste to Message Pad
New Entry Destination dialog. . 3-13, 3-56, 3-58 to 3-59, 3-61 Shortcut key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-69
New Entry Template . . . . . . . . . . . . . . . . . . . . 4-6 to 4-7, 4-20 Path name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-8
New Entry wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4 Phone number. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-26, 4-31
New Notebook Entry Template . . . . .3-13 to 3-14, 3-16, 3-24 Phonebook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-24, 4-25
No Template Found warning dialog . . . . . . . . . . . . . . . . . 3-63
8 Index
V Phonebook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-25
Phonebook panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-25
VBScript . . 3-18, 4-85 to 4-86, 4-89 to 4-90, 4-92, 5-1 to 5-3, Reset Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-94
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-7 Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-25
Version number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-19 Terminal panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-93
Vertical scroll bar Window title . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-12
Scroll bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-10 Windowed transmission . . . . . . . . . . . . . . . . . . . . . . . . . .A-12
View menu Windows
Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-16 Docking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-59
Entry Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-16 WinSock (TCP/IP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-22
Fonts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-77 WinZip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Hide Backscroll . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-76 Word Wrap dialog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9
Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-16 Workspace. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-12
Lists panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-112 Workstation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-12
Message Pad . . . . . . . . . . 3-41 to 3-42, 3-67, 3-70, 4-76 WWW
Phonebook panel . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-15 See Cutomer Support
Refresh Now . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-16 World Wide Web
Scroll Bar(s). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-76 Wyse 50 and Wyse 60 emulators . . . . . . . . . . . . . . . . . . . .D-1
Scroll Lock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-75
Wyse 50 and Wyse 60 terminals . . . . . . . . . . . . . . . . . . . .D-20
Status Bar. . . . . . . . . . . . . . . . . . . . . . . 4-18, 4-76, 4-103
Tabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-19, 4-77
Terminal panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-75 X
Toolbars. . 4-16, 4-26, 4-76, 4-94, 4-103 to 4-104, 4-112
Xmodem . . . . . . . . . . . . . . . . . .A-2, A-12 to A-13, E-7 to E-8
VIEWPNT emulator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-4
1K Xmodem . . . . . . . . . . . . . . . . . . . . xi, A-13, E-2, E-8
Virus filtering. . . . . . . . . . . . . . . . . . . . . . . . . . 1-2, 4-80, 6-15
Xon/Xoff . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .A-12
Visual Basic scripting language. . . 4-85, 4-89, 5-1 to 5-3, 5-7
VT52, VT100, VT102, VT220, VT320 emulators . 3-73, D-1,
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-15 Y
Yale ASCII protocol conversion . . . . . . . . . . . . . . . . . . . .D-10
W Ymodem . . . . . . . . . . . . . . . . . . . . . . xi, A-13, E-2, E-7 to E-8
Ymodem Batch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-13, E-7
Wildcard characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-12
Ymodem G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi, A-13, E-8
Window menu
Call Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-25
Call Log panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-103 Z
Clear Backscroll . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-93
Zip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Clear Screen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-94
ZIP files
Host Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-25
Expanding . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-44, 4-81
Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-26
Zmodem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi, A-13, E-9
Lists panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-112