home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Magnum One
/
Magnum One (Mid-American Digital) (Disc Manufacturing).iso
/
d1
/
menu_esc.arc
/
MENU-DOC
< prev
next >
Wrap
Text File
|
1990-09-25
|
7KB
|
127 lines
Electronic Solutions Company
This package should contain two files : MENU-ESC.EXE and MENU-DOC.
This is distributed as shareware, and if you feel that it is of value
to you, please send a check or money order for $15.00 to :
ESC
PO Box 54504
Lexington, KY 40555
By sending a check, you will be a registered user, and receive updates
by mail as they are available. You will also be placed on our mailing
list and receive information on other software available from ESC. You
can also suggest changes you would like to see in the program. If the
F11 and F12 keys do not work from your menu, your DOS cannot recognize
them, but you will still be able to use the other keys as advertisied.
Versions of this program are also available which are optimized for an
80286 or 80386 system. Register and request more information on these.
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
MENU-ESC
DOCUMENTATION
This program was written and designed to be easy to use, so this guide
is very short.
PURPOSE : MENU-ESC is a menu program, allowing users to use a function
key to perform tasks such as loading programs. It also has a
three level security system, allowing a user to control both
access to the menu and access to individual menu selections.
Menu and key titles are programmable, as are steps performed.
INSTALLATION : Simply copy MENU-ESC.EXE to the desired directory. Your
system must have an EGA color compatible monitor.
EXECUTION : Type MENU-ESC from the DOS command line. You may rename the
program if desired, and is often done to allow multiple menus
in one directory, where a key on one menu causes another menu
to load. The program can accept a command-line parameters, or
be called normally. Two parameters are available :
MENU-ESC 2 - Causes the Alternate Menu to be displayed first.
MENU-ESC S - Causes the program to load in the Secured Mode.
While the program is loading, you may press the desired key
to execute, and it will automatically perform the steps for
that key when finished loading.
OVERVIEW : There are 2 menus within the program, Primary and Alternate,
and the display is switched between them by pressing Page Up
or Page Down. With either menu displayed, the keys for both
are active, so keys F1 - F12 will be used with the Alternate
Menu displayed on the screen, and keys Alt-F1 - Alt-F12 will
be used even with the Primary Menu on screen. The Home, End,
and Escape keys are on both menus, so there are 27 different
keys available to be programmed.
PROGRAMMING : To enter the Programming mode, press Tab. You will first
be asked to enter the Level 3 security code, which is ESC in
capital letters. The Level 2 security code is Esc, and Level
1 is esc. When you register, you will receive information on
how to change these security codes, which should be done for
preventing unauthorized re-programming.
After entering the proper security code, you will be given a
chance to change the menu title of whichever menu was active
when you pressed Tab. Press Return when finished. The top of
the menu will display - Press the Key to Program.
KEY PROGRAMMING : At this point, you can press any of the 27 keys that
are available. You will be offered an opportunity to re-name
the displayed title for that key. Press Return when finished
and you will be asked to edit the steps to be performed when
that key is pressed.
The number of steps can be from 1 to 10, and blank steps are
skipped. The steps can be any valid DOS command, and what is
actually being programmed is a batch file. Once programmed,
pressing the key will cause a DOS batch file called TEMP.BAT
to be created, and will then exit and automatically run TEMP
from DOS.
The program does not check the validity of steps you program
because you can do virtually anything you can in DOS. Rather
than simply performing DOS commands, you can program the key
to call other batch files or run any of a multitude of other
programs.
To make an individual key a secure key, put the level number
of security you want in the last character spot of the first
step for that key. Note that there must be a command for the
step instead of spaces at the beginning.
EXAMPLES
The example below would cause a This example would change to
Level 2 security check, and then Subdirectory D:\WS5, run WS,
re-load the menu program. and re-load the menu on exit.
Step 1 @ECHO OFF 2 Step 1 @ECHO OFF
Step 2 MENU-ESC Step 2 D:
Step 3 Step 3 CD\WS5
Step 4 Step 4 WS
Step 5 Step 5 MENU-ESC
The example below would cause a The example below changes to
Level 3 security check, run the subdirectory \NEW, copies all
batch file DOWN.BAT, then load a the .ZIP files to D:\ZIP,
second menu program, displaying changes to subdirectory D:\ZIP
the Alternate Menu initially. and finally runs the directory.
Step 1 @ECHO OFF 3 Step 1 @ECHO OFF 2
Step 2 CALL DOWN Step 2 CD\NEW
Step 3 MENU-TWO 2 Step 3 XCOPY *.ZIP D:\ZIP
Step 4 Step 4 D:
Step 5 Step 5 CD\ZIP
Step 6 Step 6 DIR