home *** CD-ROM | disk | FTP | other *** search
-
-
- Key to the Mouse
- Release A
- Program and Documentation
- Copyright 1991 Andrew M. Saucci, Jr.
- All rights reserved
-
- Registration and payment information is at the end of this document.
-
- WHAT THIS PROGRAM DOES
-
- Key to the Mouse modifies existing programs that do not
- use a mouse to accept sequences of keystrokes from the mouse as if
- they had been entered from the keyboard. The most useful case of
- this is a file browser. The mouse can be programmed to send the
- "Page Up" and "Page Down" keys (or any others) to the file browser,
- which will then act the same way as if the actual keys had been
- pressed. You can then sit back with the mouse in your hand and read
- long documents without being hunched over the keyboard. Another use
- is for programs which have every possible key combination already
- defined. With this program you can gain an extra, easily used
- function for each key on your mouse. The program may also be of
- value to handicapped people who may not be able to use a keyboard
- for some reason. Finally, in security-conscious installations,
- the keyboard could be removed or disabled and limited input accepted
- only from the mouse-- a good way to protect against unauthorized
- rebooting or other prohibited actions.
-
- HOW IT WORKS
-
- Key to the Mouse (KTM) "grafts" itself onto your
- existing application and hooks itself into the system timer. About
- 18 times a second, KTM checks to see if one of the mouse keys has
- been pressed. If so, that press is converted into the series of
- keystrokes that you define at the start of the program, using
- DOS environment variables. This series is then "stuffed" into the
- keyboard buffer, where your application will find it at the next
- check for keystrokes. The location of the mouse pointer is
- irrelevant (it is ignored), and KTM does not put anything on
- the screen while your original application is running.
-
- COMPATIBILITY
-
- Key to the Mouse will work with any existing program
- that does NOT use mouse input. The results of using KTM with
- programs that DO use the mouse are unpredictable. You can try
- it if you want, and no serious damage should result, but keep
- your hand near the reset switch or power cord. It will run under
- any version of MS-DOS or PC-DOS greater than 2.0, but if you
- want to rename the program, version 3.0 or higher is required.
- The computer must be 100% IBM PC-compatible, particularly with
- regard to the location of the keyboard buffer and associated
- information stored in the BIOS data area of low memory. Your
- mouse driver must also use interrupt 33h and support functions
- 0 and 3. Most of you should still be in the running at this point.
-
- - 1 -
- USING THE DOS ENVIRONMENT
-
- Key to the Mouse uses five environment variables to
- operate. The first thing to do is to insure that you have
- sufficient space reserved in your DOS environment to hold these
- variables. The default is a miserly 160 bytes, so you may need
- to add more. In versions of DOS prior to 3.2, the environment
- can be expanded, but the solution is rather arcane and beyond
- the scope of these instructions. For those who are interested,
- the complete information is available in PC Magazine's DOS Power
- Tools, published by Bantam Computer Books. This is an expensive
- book but worth every penny-- chock full of valuable information.
-
- Now, for DOS 3.2 or later, the solution is simple.
- Just add the following line to your CONFIG.SYS file:
-
- SHELL=C:\COMMAND.COM /E:512 /P
-
- This increases the size of the environment to 512 bytes, and
- the "/P" tells DOS to run your AUTOEXEC.BAT file. If COMMAND.COM
- is not in your root directory, specify the full path in the
- SHELL command. If necessary, you can increase the size of the
- environment to as much as 32,768 bytes using this command,
- but in most cases, 512 should be plenty. Keep in mind that the
- larger environment is deducted from your available memory.
-
- The next thing you need to do is to set the various
- environment variables. This is done either at the DOS command
- prompt or within a batch file with the "SET" command. It takes
- this form:
-
- SET variable=string
-
- where "variable" is one of the five variables mentioned below,
- and "string" is any series of characters according to the rules
- for the given variable. Do NOT add a space after the "=".
-
- The best place to set the environment variables will
- probably be from a batch file. This way, you just enter the
- name of the batch file, and the rest is done automatically.
-
- Here's a sample batch file that assigns a value to each of
- the environment variables and then runs Key to the Mouse:
-
- set KMPROG=c:\util\browse.com
- set KMRIGHT=$5000
- set KMLEFT=$4800
- set KMRATE=$01
- set KMDELAY=$01
- k2rod smith.txt
-
- If "browse.com" is a file browser, then this batch file will
- tell KTM to run browse.com with the command-line parameter
- "smith.txt" and make the right mouse key simulate the down
- arrow, the left mouse key simulate the up arrow, delay one
- clock tick before repeating a keypress, and then repeat keys
- every other clock tick. If "smith.txt" is changed to "%1", then
- this batch file can be used with any command-line parameter.
-
- - 2 -
-
-
-
- KMPROG ENVIRONMENT VARIABLE
-
- This tells KTM the name of the program that will be
- modified (the target program). You must include the .COM or .EXE
- extension, and the program will be located more quickly if you
- supply the full path name ("C:\UTIL\LIST.COM" instead of "LIST.COM").
- If you do not supply the full path, KTM will look first in the
- current directory, then in each of the directories specified by your
- DOS PATH environment variable. If the program is on a floppy disk,
- that disk must be in the drive when KTM is loaded, or else KTM will
- not be able to find it. If KMPROG is not assigned a value, KTM will
- not run, and the message
-
- Key to the Mouse: No program specified by SET KMPROG.
-
- will be displayed. By the way, all Key to the Mouse error messages
- (except rare runtime errors 201-203) are prefaced either by "Key to
- the Mouse:" or "KTM" to distinguish them from errors generated by the
- target program. If the target program is not found, then the message
-
- Key to the Mouse: Target program not found.
-
- will be displayed, and KTM will not run.
-
- KMRATE AND KMDELAY VARIABLES
-
- The "delay" (time a mouse key must be held down before
- it begins repeating) and "rate" (how often that key will repeat
- once it starts repeating) are adjustable. You use the KMRATE
- and KMDELAY variables to do this. The default value of KMDELAY
- is 10, and the default for KMRATE is 5. The default values are
- used if you do not specify your own with KMDELAY and KMRATE.
- The defaults are somewhat conservative, and you will probably
- feel better with lower values, so experiment. Values for these
- variables may range from 0 to 99, and values greater than 99
- will be truncated (456 will become 45). The value represents
- a number of clock ticks. A value of 3 for KMDELAY means to
- wait three clock ticks (about 0.165 seconds) before repeating
- a key. A value of 5 for KMRATE means to repeat a key every
- fifth clock tick (about 0.275 seconds) once it starts repeating.
- Values of 0 are acceptable and mean no delay and continuous
- repeat (18.2 times a second).
-
- If invalid values are specified for these variables
- (letters, for example), one or both of the messages
-
- Key to the Mouse: Invalid typematic delay. Substituting 10.
- Key to the Mouse: Invalid typematic rate. Substituting 5.
-
- will appear as applicable. Key to the Mouse will then run
- using the default values as if none had been specified.
-
-
-
- - 3 -
- KMRIGHT, KMLEFT, AND KMMID
-
- These three variables control the series of keystrokes
- that each key of your mouse will send to the target program when
- pressed. (KMMID is not available on a two-button mouse and will
- in that case be ignored.) You can specify either a series of
- characters typed in the usual way, a series of hexadecimal
- ASCII/scan code combinations, or a mixture of these.
-
- Example 1:
- KMRIGHT=exit
-
- This will send the string "exit" to the target program (if the right
- mouse key is pressed).
-
- Example 2:
- KMRIGHT=exit$000D
-
- This will send "exit" followed by "Enter" to the target program.
- The ASCII code for "Enter" is $0D. The scan code in this case
- is $00, which is equivalent to typing "13" on the numeric keypad
- while holding down "Alt".
-
- In most cases, the scan code is unimportant when using
- ordinary characters, and $00 is fine, but some programs will not
- recognize a scan code of $00 (or will treat it differently), and
- in those cases you will have to select the exact scan code from the
- included table of scan codes. Also, special keys such as Page Up
- and F6 have non-zero scan codes (and an ASCII code of zero). These
- must be selected from the "Non-ASCII" table (also included). Anytime
- you specify a hexadecimal ASCII/scan code combination, it MUST be
- preceded by a "$", and the next four characters are treated as part
- of that value. (This also means that a dollar sign must always be
- expressed as the $0524 or $0024 values.) The first pair of characters
- is the scan code, and the second pair is the ASCII value.
-
- Example 3:
- KMLEFT=cd\$1C0Ddir
-
- This will stuff the characters "cd\", a carriage return, and "dir"
- into the keyboard buffer. (If at the DOS prompt with KTM loaded, DOS
- would execute both these commands, changing to the root directory and
- displaying the files there.) The "Enter" is as if the left "Enter"
- key had been pressed (the "1C" indicates this).
-
- KEYBOARD BUFFER SIZE
-
- Note that the size of the keyboard buffer on IBM PC's
- and compatibles is 15 characters. This means that no KMLEFT,
- KMRIGHT, or KMMID string can exceed 15 characters AFTER translation.
- That is, "KMRIGHT=supercalafristicexpialadocious" is no good,
- but "KMRIGHT=$0044$0055$0011$0074$0023$0099", which only stuffs
- 6 characters into the keyboard buffer, is quite all right. Also,
- repeating keys and programs that take input slowly can quickly
- fill the buffer. If the buffer will not hold an entire string
- at the time it is sent, the string will be truncated and a
- short beep will sound (similar to what happens when ordinary
- keypresses fill the buffer).
-
- - 4 -
-
-
-
- ERRORS IN KMLEFT, KMRIGHT, & KMMID
-
- If you specify a string that is too long (in excess of
- 15 characters) the following message will be displayed:
-
- Key to the Mouse: String too long. Assignment truncated on <key> key.
-
- where <key> is the name of the affected key (left, right, or middle).
- KTM will continue to run, and the target program will be loaded.
-
- If the specified string is invalid in any other way (for instance,
- insufficient or non-hexadecimal digits immediately after a "$")
- the following message will be displayed:
-
- Key to the Mouse: Invalid key string. No assignment made on <key> key.
-
- Again, KTM will continue minus the offending assignment.
-
- OTHER ERRORS
-
- Three other errors can be generated by KTM itself.
- The first is
-
- Key to the Mouse: Insufficient memory for application.
-
- This will terminate the program. You must have sufficient memory to
- run the target program plus about 14,000 bytes for Key to the Mouse.
-
- The second of these errors is
-
- Key to the Mouse: Unable to initialize mouse.
-
- This will also terminate the program and means that either the
- mouse driver is not loaded or the mouse is not found. If your
- mouse is in working order with a valid driver loaded from either
- CONFIG.SYS or AUTOEXEC.BAT, this error should not occur.
-
- The last of these is
-
- Key to the Mouse: Damaged .EXE file. Program terminates.
-
- Should you encounter this error, you should contact the source
- of your copy of Key to the Mouse and verify that you received
- a correct and complete version.
-
- COMMAND LINE PARAMETERS
-
- Any command-line parameters found on the command line
- after "k2rod" are passed unchanged to the target program. In other
- words, if your target program takes three parameters, simply
- specify them after the "k2rod" command in the same way you would
- if you were executing the target program directly. The parameters
- MUST be separated by spaces, however. Otherwise, they will be
- interpreted as a single parameter.
-
- - 5 -
-
-
- TABLE OF ASCII CODES
-
- Use these as the second pair of characters after the "$" with
- KMLEFT, KMRIGHT, and KMMID.
-
- Control characters Various Special
-
- Ctrl-A $01 Ctrl-P $10 ! $21 ; $3B
- Ctrl-B $02 Ctrl-Q $11 " $22 < $3C
- Ctrl-C $03 Ctrl-R $12 # $23 = $3D
- Ctrl-D $04 Ctrl-S $13 $ $24 > $3E
- Ctrl-E $05 Ctrl-T $14 % $25 ? $3F
- Ctrl-F $06 Ctrl-U $15 & $26 @ $40
- Ctrl-G $07 (Bell) Ctrl-V $16 ' $27 [ $5B
- Ctrl-H $08 (Bksp) Ctrl-W $17 ( $28 \ $5C
- Ctrl-I $09 (Tab) Ctrl-X $18 ) $29 ] $5D
- Ctrl-J $0A Ctrl-Y $19 * $2A ^ $5E
- Ctrl-K $0B Ctrl-Z $1A + $2B _ $5F
- Ctrl-L $0C Ctrl-] $1D , $2C ` $60
- Ctrl-M $0D (Enter) Ctrl-^ $1E - $2D { $7B
- Ctrl-N $0E Ctrl-_ $1F . $2E | $7C
- Ctrl-O $0F Ctrl-Bksp $7F / $2F } $7D
- : $3A ~ $7E
- Esc: $1B Space: $20
- $1C is supposed to be Ctrl-\, but this does not always apply.
- However, you can stuff this code into the keyboard buffer.
-
- Main alphabet
-
- A $41 H $48 O $4F V $56 a $61 h $68 o $6F v $76
- B $42 I $49 P $50 W $57 b $62 i $69 p $70 w $77
- C $43 J $4A Q $51 X $58 c $63 j $6A q $71 x $78
- D $44 K $4B R $52 Y $59 d $64 k $6B r $72 y $79
- E $45 L $4C S $53 Z $5A e $65 l $6C s $73 z $7A
- F $46 M $4D T $54 f $66 m $6D t $74
- G $47 N $4E U $55 g $67 n $6E u $75
-
- High-bit (Extended) ASCII
-
- Ç $80 É $90 á $A0 ░ $B0 └ $C0 ╨ $D0 α $E0 ≡ $F0
- ü $81 æ $91 í $A1 ▒ $B1 ┴ $C1 ╤ $D1 ß $E1 ± $F1
- é $82 Æ $92 ó $A2 ▓ $B2 ┬ $C2 ╥ $D2 Γ $E2 ≥ $F2
- â $83 ô $93 ú $A3 │ $B3 ├ $C3 ╙ $D3 π $E3 ≤ $F3
- ä $84 ö $94 ñ $A4 ┤ $B4 ─ $C4 ╘ $D4 Σ $E4 ⌠ $F4
- à $85 ò $95 Ñ $A5 ╡ $B5 ┼ $C5 ╒ $D5 σ $E5 ⌡ $F5
- å $86 û $96 ª $A6 ╢ $B6 ╞ $C6 ╓ $D6 µ $E6 ÷ $F6
- ç $87 ù $97 º $A7 ╖ $B7 ╟ $C7 ╫ $D7 τ $E7 ≈ $F7
- ê $88 ÿ $98 ¿ $A8 ╕ $B8 ╚ $C8 ╪ $D8 Φ $E8 ° $F8
- ë $89 Ö $99 ⌐ $A9 ╣ $B9 ╔ $C9 ┘ $D9 Θ $E9 ∙ $F9
- è $8A Ü $9A ¬ $AA ║ $BA ╩ $CA ┌ $DA Ω $EA · $FA
- ï $8B ¢ $9B ½ $AB ╗ $BB ╦ $CB █ $DB δ $EB √ $FB
- î $8C £ $9C ¼ $AC ╝ $BC ╠ $CC ▄ $DC ∞ $EC ⁿ $FC
- ì $8D ¥ $9D ¡ $AD ╜ $BD ═ $CD ▌ $DD φ $ED ² $FD
- Ä $8E ₧ $9E « $AE ╛ $BE ╬ $CE ▐ $DE ε $EE ■ $FE
- Å $8F ƒ $9F » $AF ┐ $BF ╧ $CF ▀ $DF ∩ $EF $FF
-
-
- - 6 -
-
- NON-ASCII CODES
-
- Use these in place of the scan code (with an ASCII code
- of $00) as the first pair of characters after the "$".
-
- Function keys
-
- Unshifted Ctrl Alt Shift
- F1 $3B $5E $68 $54
- F2 $3C $5F $69 $55
- F3 $3D $60 $6A $56
- F4 $3E $61 $6B $57
- F5 $3F $62 $6C $58
- F6 $40 $63 $6D $59
- F7 $41 $64 $6E $5A
- F8 $42 $65 $6F $5B
- F9 $43 $66 $70 $5C
- F10 $44 $67 $71 $5D
-
- Alt-keys
-
- A $1E G $22 M $32 S $1F Y $15 5 $7C - $82
- B $30 H $23 N $31 T $14 Z $16 6 $7D = $83
- C $2E I $17 O $18 U $16 1 $78 7 $7E
- D $20 J $24 P $19 V $2F 2 $79 8 $7F
- E $12 K $25 Q $10 W $11 3 $7A 9 $80
- F $21 L $26 R $13 X $2D 4 $7B 0 $81
-
- Various cursor keys
-
- Shift-Tab $0F End $4F Ctrl-Print Screen $72
- Home $47 Down arrow $50 Ctrl-Left arrow $73
- Up arrow $48 Page Down $51 Ctrl-Right arrow $74
- Page Up $49 Insert $52 Ctrl-End $75
- Left arrow $4B Delete $53 Ctrl-Page Down $76
- Right arrow $4D Ctrl-Page Up $84 Ctrl-Home $77
-
- Keys available only with enhanced BIOS
-
- These key combinations will be read by your target program
- only if an Enhanced BIOS is available (interrupt 16h, functions
- 10h, 11h, and 12h) and the target program is written to accept them.
-
- F11 $85 Shift-F11 $87 Ctrl-F11 $89 Alt-F11 $8B
- F12 $86 Shift-F12 $88 Ctrl-F12 $8A Alt-F12 $8C
-
- Ctrl-Up arrow $8D Ctrl-/ $95 Alt-Down arrow $A0
- Ctrl- - (hyphen) $8E Ctrl-* $96 Alt-Page Down $A1
- Ctrl-5 $8F Alt-Home $97 Alt-Insert $A2
- Ctrl- + $90 Alt-Up arrow $98 Alt-Delete $A3
- Ctrl-Down arrow $91 Alt-Page Up $99 Alt-/ $A4
- Ctrl-Insert $92 Alt-Left arrow $9B Alt-Tab $A5
- Ctrl-Delete $93 Alt-Right arrow $9D Alt-Enter $A6
- Ctrl-Tab $94 Alt-End $9F
-
- Some imperfect BIOS implementations may define additional codes, and
- others may not implement all of these. Again, you'll have to experiment.
-
- - 7 -
-
-
-
-
-
- SCAN CODE TABLE
-
- Use these as the first pair of characters after the "$" when a
- scan code of $00 does not work with a particular program. Note
- that all characters on a given physical key share the same
- scan code.
-
- Esc $01 J j $24 ~ ` $29
- ! 1 $02 K k $25 | \ $2B
- @ 2 $03 L l $26 < , $33
- # 3 $04 M m $32 > . $34
- $ 4 $05 N n $31 ? / $35
- % 5 $06 O o $18 Numeric keypad:
- ^ 6 $07 P p $19 7 Home $47
- & 7 $08 Q q $10 8 Up arrow $48
- * 8 $09 R r $13 9 Page Up $49
- ( 9 $0A S s $1F Minus $4A
- ) 0 $0B T t $14 4 Left arrow $4B
- _ - $0C U u $16 5 $4C
- + = $0D V v $2F 6 Right arrow $4D
- Backspace $0E W w $11 + $4E
- A a $1E X x $2D 1 End $4F
- B b $30 Y y $15 2 Down arrow $50
- C c $2E Z z $2C 3 Page Down $51
- D d $20 Space $39 0 Insert $52
- E e $12 Tab $0F Delete $53
- F f $21 { [ $1A Others $E0
- G g $22 } ] $1B
- H h $23 : ; $27 Keys omitted here are
- I i $17 " ' $28 not of particular use
- Enter $1C with Key to the Mouse.
-
- Examples:
-
- $5000 sends a down arrow.
- $4800 sends an up arrow.
- $5100 sends Page Down.
- $0070 sends a lower-case "p" as if it had been typed with the
- Alt+numeric keypad method.
- $1970 sends a lower-case "p" as if it had been typed from the
- main keyboard.
- $0E08 sends an ASCII 8 as if the Backspace key had been pressed.
- $2308 sends an ASCII 8 as if Ctrl-H (the equivalent) had been pressed.
- $0008 sends an ASCII 8 as if it had been typed with the Alt+numeric
- keypad method.
- $1C0D sends a carriage return as if the left-hand Enter key had been
- pressed.
- $0E0D sends a carriage return as if the numeric keypad Enter had been
- pressed.
- $4000 sends an F6.
- $5900 sends a Shift-F6.
-
- - 8 -
-
-
-
-
- INPUT/OUTPUT AND MISC. ERRORS
-
- Key to the Mouse does a few quick self-checks before executing.
- If any of the following errors occurs during that process, the
- message
-
- KTM Error #xxx
- Press ESC to abort or another key to retry.
-
- will be displayed. If you can correct the error, retry the operation;
- otherwise, press ESC to abort Key to the Mouse. These messages are
- referenced by number to avoid having to have the text of the messages
- stored in memory throughout program execution. They should occur
- rarely, and only when you are first starting to use the program
- (and haven't quite mastered it yet).
-
- 2: File not found.
- 3: Path not found.
- 4: Too many open files.
- 5: File access denied.
- 6: Invalid file handle.
- 12: Invalid file access code.
- 100: Disk read error.
- 101: Disk write error.
- 102: File not assigned.
- 103: File not open.
- 104: File not open for input.
- 150: Disk is write-protected.
- 151: Unknown unit.
- 152: Drive is not ready. (insert the appropriate disk)
- 153: Unknown command.
- 154: CRC error in data.
- 155: Bad drive request structure length.
- 156: Disk seek error.
- 157: Unknown media type.
- 158: Sector not found.
- 159: Printer out of paper.
- 160: Device write fault.
- 161: Device read fault.
- 162: Hardware failure.
-
- Another class of errors will immediately terminate Key to the Mouse
- with the message
-
- Runtime error xxx at ssss:oooo.
-
- These should not occur, but should be reported to the address
- listed below for orders. They most likely indicate design errors
- which may need to be corrected.
-
- 201: Range check error.
- 202: Stack overflow error.
- 203: Heap overflow error.
-
- - 9 -
- THIS IS SHAREWARE
-
- You are authorized to use this program for 60 days in order
- to determine if it fits your needs. After that, you must either purchase
- a license or erase all uncompressed copies. The fee for a license is
- $20. If you do not purchase a license after 60 days, you may retain
- only compressed (.ZIP, .PAK, .LZH) versions of this file solely for
- the purpose of distribution to others. Shareware is a marvelous way
- for people to try software BEFORE they buy it and find that it makes
- their computers billow smoke and start fires which destroy their
- receipts so they can't get refunds that their software dealers will
- give only on odd-numbered Mondays in June. In order for this approach
- to work, however, people who find this (and other shareware programs)
- useful must pay for them, or else authors will be unable to continue
- to distribute programs in this way.
-
- After your payment is received, you will be sent the latest
- release of Key to the Mouse, with the registration reminder at the
- end of the program removed. (This will save some memory.) Other than
- that, and the unique serial number that will be added to your
- personalized copy, the shareware version is identical to the
- registered version. The quality of the program speaks for itself and
- needs no crippling in order to promote registrations. Registered
- users may also return the program for a full refund for 30 days
- after registration.
-
- To register your copy of Key to the Mouse, complete the
- included order form (K2ORDER.FRM) and send a $20 check in U. S. funds
- drawn on a U. S. bank (or add $10 to cover the cost of collection) to
-
- Andrew M. Saucci, Jr.
- 641 Koelbel Ct
- Baldwin, NY 11510-3915.
-
- New York State residents MUST add the following sales tax based upon
- the county or city where you live, or your order will be delayed:
-
- Albany 7% Lewis 7% Steuben 7%
- Allegany 8% Livingston 7% Suffolk 7.50%
- Broome 7% Madison 7% Sullivan 7%
- Cattaraugus 8% Monroe 7% Tioga 7%
- Cayuga 7% Montgomery 7% Tompkins 7%
- Chautauqua 7% Nassau 8% Ulster 7%
- Chemung 7% Niagara 7% Warren 7%
- Chenango 6% Oneida 7% Washington 7%
- Chenango (Norwich) 7% Oneida (Rome) 7.25% Wayne 7%
- Clinton 7% Onondaga 7% Westchester
- Columbia 7% Ontario 7% Mt. Vernon 8.25%
- Cortland 7% Orange 6.25% New Rochelle 7.25%
- Delaware 6% Orleans 7% White Plains 7.25%
- Dutchess 7.25% Otsego 6% Yonkers 8.25%
- Erie 8% Putnam 7.25% Other 5.75%
- Essex 7% Rensselaer 7% Wyoming 7%
- Franklin 7% Rockland 6.75% Yates 7%
- Fulton 7% St. Lawrence 7%
- Genesee 7% Saratoga 7% New York City 8.25%
- Greene 7% Schenectady 7%
- Hamilton 7% Schoharie 6%
- Herkimer 7% Schuyler 7%
- Jefferson 7% Seneca 7%
- - 10 -
-
-
- Registered users also are entitled to unlimited technical
- support by U. S. Mail, CompuServe (72117,241), GEnie (A.SAUCCI3),
- Delphi (ASAUCCI), Exec-PC (Andrew Saucci), and any other BBS where
- I might pass in my travels wearing my other hat as the proprietor
- of a shareware uploading service. If you don't already have a
- CompuServe account, you might be interested in the $15 free-connect
- time offer that is available to registered users of Key to the Mouse.
- CompuServe is one of the fastest and most efficient ways to contact me
- and a wide variety of other shareware authors. You should find it
- well worth the price. What's more, if within the first three months
- after registration, you find a defect in this program, and that defect
- cannot be repaired, you are entitled to a refund of the registration fee.
-
- This program is produced by a member of the Association of
- Shareware Professionals (ASP). ASP wants to make sure that the
- shareware principle works for you. If you are unable to resolve a
- shareware-related problem with an ASP member by contacting the
- member directly, ASP may be able to help. The ASP Ombudsman can
- help you resolve a dispute or problem with an ASP member, but
- does not provide technical support for members' products. Please
- write to the ASP Ombudsman at 545 Grover Rd, Muskegon, MI 49442-9427
- or send a CompuServe message via CompuServe mail to ASP Ombudsman
- 70007,3536.
-
- Apart from what has been previously stated in this
- document, the following must be added:
-
- LIABILITY IN THE EVENT OF DEFECTS IN KEY TO THE MOUSE IS
- EXPRESSLY LIMITED TO REPLACEMENT OF THE DISK ON WHICH IT
- WAS ORIGINALLY PROVIDED OR A REFUND OF THE REGISTRATION
- FEE. NO OTHER LIABILITY OF ANY SORT IS IMPLIED OR ASSUMED.
- IN PARTICULAR, THE USER ASSUMES ALL RESPONSIBILITY FOR
- CONSEQUENTIAL DAMAGES, INCLUDING LOSS OF DATA, LOSS OF
- INCOME, PAIN AND SUFFERING, ETC.
-
- In other words, you should have a full backup before
- using this program.
-
- NOTICE TO BBS DOWNLOADERS
-
- This program was distributed using PKZIP authenticity
- verification. If PKUNZIP did not display the message "Authentic
- files verified!" AND the "-AV" designation next to each of the
- files listed, ESPECIALLY the .EXE, you should contact the source
- of your copy of Key to the Mouse to verify that you received
- a correct and complete version of the program and documentation.
- You might also consider downloading a copy from another source.
-
-
- Thank you for trying Key to the Mouse!
-
- - 11 -