- Sign-up Now!
 - Current Issue
 - Edit Your Profile/Unsubscribe

Subscribe | Media Kit | About Us | All Issues | Subscriber Feedback | Contact Us | Privacy Statement
Sunbelt W2Knews™ Electronic Newsletter
The secret of those "who always seem to know" - Over 500,000 Readers!
Sun, Jul 18, 1999
Win2K Release Candidate 1 Shipped
  This issue of W2Knews™ contains:
1. EDITORS CORNER 
2. TECH BRIEFING
* WHAT ARE FILTER DRIVERS, AND HOW DO THEY WORK?
3. NT RELATED NEWS
* WIN2K RELEASE CANDIDATE 1 SHIPPED!
* CRACKING ON THE RISE
* MICROSOFT BUYS ZOOMIT: ENHANCES WINDOWS 2000 AND AD
* MICROSOFT AND CISCO EXTEND PARTNERSHIP
* IDC PREDICTS SIGNIFICANT GROWTH FOR NT
4. NT THIRD PARTY NEWS
* THE FIVE BEST SOLD NT ADMIN UTILITIES JAN-JUNE 1999
* NEW TOOLS IN THE SUNBELT ON-LINE SHOP
5. HINTS AND TIPS - TIME SAVERS AND OTHER GOODIES...
6. THE NT STOCK WATCH - July 16, 1999
7. CERTIFICATION NEWS 
8. HOW TO USE THE MAILING LIST
Instructions on how to subscribe, sign off or change your address.
***************************SPONSOR*********************************

INSIDER PREVIEW: It earned five stars from ZDN
Software Library, and you can be one of the first
to take advantage of it: SupportSource 2000, now
100% browser-based, with instant access to a vault
of specific documentation on jumper settings,
obscure firmware, master/slave parameters...
EVERYTHING. Get your Insider's Sneak Peek:
http://www.supportsource.com/ss2k/reg05.htm

****************WHAT IS NTOOLS E-NEWS?******************************
Sunbelt Windows NTools E-News is the World's first and largest 
E-Newsletter designed for NT System Managers that have the job to 
get and keep NT up & running in a production environment. Sunbelt 
launched this electronic newsletter early 1996. Every two weeks we
keep the Windows NT community informed and aware of new developments
of NT and 3-rd party NT System Management Tools. You get hints and
tips that will enable you to better utilize and understand Windows NT, 
now renamed to Windows 2000 (abbreviated to Win2K).

You'll find general Windows NT related and third party news, tech
information, and 3-rd party beta and release information. As a
subscriber to NTools E-News[tm], you will receive instant notifi-
cation of important NT related events and you are also a charter 
member of the Sunbelt Field Test Bonus Program. Sunbelt Software is 
the first and largest distributor worldwide of Third Party System
Management Tools for Windows NT with 6 subsidiaries in the US and 
Europe.
-------------------------------------------------------------------

1. "EDITORS CORNER" 

Hi NT-ers,

If this is the first issue you receive, welcome! We now have 325,000
subscribers and are still growing strong. I suggest you read a few
issues before you decide to continue or to unsubscribe. You can unsub
in about 5 seconds, but you would miss all the goodies every two 
weeks!

This newsletter was not scheduled, but there is SO MUCH NT related
news at the moment we decided to send you an extra issue to make
sure we would not fall behind. The most important item being of course
that the Win2K Release Candidate 1 was actually shipped. Read the
article below. I also have some very interesting market-related data
for you and some predictions about NT's growth expectations. Our Tech 
Briefing handles an interesting technology that is getting used more 
and more: Filter Drivers.

But, enough talk, let's get busy!

Warm regards,

Stu Sjouwerman

PS: All the back issues of NTools E-News are available with just
your email address as the key to get in, searchable by keyword at:
http://lyris.sunbelt-software.com/scripts/lyris.pl?enter=nt-list&text_mode=0


********************************************************************

2. "TECH BRIEFING"

* WHAT ARE FILTER DRIVERS, AND HOW DO THEY WORK?

First, why is this important? More and more utilities use filter 
drivers to do their work. Think disk quota's, file replication,
virus protection and the like. These filter drivers are powerful.
You have to conceptually understand how they work and why they
are different from device drivers. OK, let's start at the top
and go down into specifics, but first a definition: Device Drivers.

Device Drivers are the kind of driver that you use to support an
existing (or custom add-on) device in NT. We are now talking about a
standard kernel mode driver that controls for instance a specialized 
serial port. You usually see them sitting on your harddisk as a DLL.

There are many different driver architectures in NT, and sometimes
this causes some confusion. NT does not have a single driver model.
Actually, there are many different things called "drivers" in NT.
At the highest level, you can split them into two categories: User 
Mode drivers and Kernel Mode drivers. Often these two categories
work together to get the job done. An example would be MP3 Audio 
compression. The User Mode driver is part of the Application and 
executes the MP3 compression algorithm itself. It then interfaces 
with the sound card device driver in your system (which is Kernel 
Mode) and hands over the compressed audio and the kernel mode driver 
will write the MP3 file to disk.

Drivers are all layered. This means that the software is written in 
modules that interact with each other. You could see them as building 
blocks. There are stacked on top of each other and the most general 
ones are on top, the most specific ones are at the bottom. The top 
ones would be interacting with the application. The ones at the 
bottom interface with the hardware via the Hardware Abstraction Layer. 

Windows NT has a large section called the I/O subsystem. You could
define that as all those components that together provide the capa-
bility to perform I/O to peripherals on your system. This includes
the I/O Manager and all the Kernel mode device drivers. The I/O
subsystem is layered, and highly structured. It looks a lot like
the VMS and UNIX I/O subsystems, and is configurable, object-based 
and packet driven. You will see why this is important in a minute.

The Win NT I/O Subsystem uses packets to describe I/O operations.
These are called I/O Request Packets or IRP's. For instance, the 
I/O manager creates an IRP when data is written to disk. The I/O
subsystem is layered. That means that layers, or 'stacks' of drivers
work together to process I/O requests.

The highest level of the stack are the File System Drivers. Below
these sit the intermediate Drivers, and at the bottom sit the
device drivers that interact with and manage the hardware. Usually
packets travel through the stack, being forwarded from one driver
to another until they reach the bottom device driver.

In NT, the stacks of drivers are created when the system boots, and
the sequence is determined by the Registry Parameters. This means
that usually driver stacks are static. It needs a reboot to change
them. There are a few really important advantages to this layered
driver model:
- Each driver can specialize in a particular type of function
- It allows for functionality to be dynamically added to a stack

In short, a kernel mode device driver is the module that controls
the hardware it was specifically written for. The way it does that
is by creating a 'Device Object' when it is started up. This Device
Object sits in memory for as long as the system is up. 

Now we are getting into the nuts and bolts of a Filter Driver. The
NT I/O manager includes the capability for one Kernel Mode driver
to "attach" one of its Device Objects to a Device Object created
by another driver. This is where the magic happens. The result of
this attachment is that I/O request packets destined for the driver
that created the original Device Object are now also available to
the driver that piggybacked to the original.

You see that adding this functionality, technically is nothing more
than gracefully sliding in a building block in the middle of the 
stack. It does not modify any NT code, it just adds a module that
interfaces with the drivers that sit above and below it. The driver
that attached its Device Object to an already existing Device Object
is called a Filter Driver.

The Filter Driver can now examine, modify, complete or pass along
the IRP's it receives to the original driver. Filter drivers can
be inserted at any layer in the NT driver stack, and this is the
way that for instance many virus protection tools work. All I/O that
comes in can be immediately investigated for potential threats
before they hit the hard disk.

Filter drivers are also used by second generation disk quota tools
like QuotaAdvisor. The data that gets written by a user goes into
the NT I/O Manager and gets immediately checked against the quota
database and stopped real-time even before it hits the cache or the
disk subsystem.

The same is true for Double-Take. Data that gets written by the app
on the source machine hits the I/O Manager and the Double-Take filter 
driver creates an immediate copy and forwards it to the target box.
We have even seen during testing something extremely interesting. 
The Source server was shut down via an unexpected power cycle, and 
because the data was out of the server SO fast, the target system 
was just a tiny bit MORE up-to-date than the source machine. You 
can see the immediate benefit of that architecture.

So there you have it. Filter drivers attach their Device Object
to the Device Object of an existing driver and provide added power.
It's an elegant solution, and Microsoft holds regular meetings for 
developers using filter driver technology.

You may wonder where I get all this stuff? In this case I owe many 
thanks to Peter Viscarola and W. Anthony Mason from OSR Open Systems
Resources, Inc. who wrote an excellent book called 'Windows NT Device 
Driver Development' published by Macmillan Technical Publishing. 
More at: http://www.osr.com/book/

********************************************************************

3. "NT RELATED NEWS" 

* WIN2K RELEASE CANDIDATE 1 SHIPPED!

And what do you know, just the day after I leave for TechEd Amsterdam
they release (as I announced in NTools E-News of June 27) Release
Candidate 1 for Win2K. This is good news and means that we are on
track for a Gold Release before the end of the year. Obviously that 
also means the following problem will occur.

Sometime next year some one will step up to you and ask you to install
something. Likely somebody in upper management, as is always the case.
On the box it will say: "Windows 2000 ONLY". You're going to be in the
hot seat if you're not ready by that time. There is a lot of work to
do so you'd better start now.

There are seven steps to migration from NT 4 to Win2K and the first 
one is to discover what is our there, assess the repercussions and start
to clean up the redundant stuff. In a next issue we will go into much
greater depth on how to do that. For the moment, start thinking about
domain restructuring and flattening them out, but that is only a small
part of the whole migration picture. You can download the Driver 
Development Kit over here: http://www.microsoft.com/ddk/
-------------------------------

* CRACKING ON THE RISE

WIRED news reported that companies that are getting into E-commerce 
are 57 percent more likely to suffer leaks of proprietary data than 
companies that aren't on the Web. Moreover, the rate at which crackers 
are breaching corporate networks has nearly doubled in the last year, 
according to the 745 companies polled. 

This basically means two things. You need to protect from attacks
from the outside, and protect from attacks by company staff from the 
inside if you run NT and have a database with credit card numbers
of customers. Inside attacks are usually the case. Around 80% of the 
security breeches are initiated from the inside. You need different 
kinds of disciplines and tools for these two kinds of protection. 
Attacks from the outside are usually stopped by firewalls and applying 
all the latest NT hotfixes.

Attacks from the inside are covered by sniffing out network holes
on a regular basis and fixing them. A product like STAT that takes
the NT market by storm at the moment is a good example. You could
also think about a real-time intrusion detection type tool that
will cover both inside and outside attacks. There are a few good
ones around from companies like ISS, Kane and Axent.

And with the hacker tool BackOrifice V.2000 (BO2K) out, which now 
works on NT you just _have to_ regularly scan your LAN for this kind 
of thing. STAT will come out with a vulnerability check for BO2K very
shortly.

More info:
http://www.wired.com/news/news/email/explode-infobeat/business/story/20704.html
STAT was updated recently, check out the new NT vulnerabilities:
http://www.sunbelt-software.com/stat.htm
-------------------------------

* MICROSOFT BUYS ZOOMIT: ENHANCES WINDOWS 2000 and AD.

ZOOMIT's products will enable Win2K users to use AD to manage identity 
data such as account information, passwords, configs and access rights, 
stored in heterogeneous directory services throughout the enterprise. 
Microsoft also will enhance Active Directory to become the industry's 
first comprehensive enterprise identity-management platform by adding 
support for many popular applications and network services that store 
identity information in places other than directories.

Obviously this was to be expected. Existing Fortune 1000 companies 
have an average of something like 180 directories and they want to
integrate this and not replace it all at once. Meta-directory tools
are products that sit on top of existing directories and consolidate
the info and make it transparent. It will help to manage disparate
user and device information. More at:
http://www.microsoft.com/presspass/press/1999/Jul99/metadirPR.htm 
-------------------------------

* MICROSOFT AND CISCO EXTEND PARTNERSHIP

Enterprise NT Magazine reported on Monday, July 12, 1999 that Cisco 
Systems Inc. and Microsoft Corp. today announced that they have 
extended their joint development agreement for the Microsoft Active 
Directory service in Windows 2000 Server. This extension builds on 
a partnership formed in May 1997, in which Cisco and Microsoft agreed 
to jointly enhance Active Directory to simplify the provisioning and 
management of network devices and services, and to offer advanced 
personalized networking services to customers. More at:
http://www.entmag.com/breaknews.asp?ID=1023
-------------------------------

* IDC PREDICTS SIGNIFICANT GROWTH FOR NT

NT will be the key engine for growth within the worldwide server market.
According to the new Server Market Review and Forecast, 1998-2003 report 
from International Data Corporation (IDC), NT will expand its share of 
the worldwide server market from 13.8% in 1998 to 30% in 2003. This 
significant jump represents a 25% compound annual growth rate. NT's 
expected 30% market share translates to $26.9 billion in end-user 
spending by 2003.

"NT's phenomenal projected growth rate will put pressure on every 
aspect of the server market. Don't be surprised to see irrational 
behavior from both customers and vendors, who will be feeling NT's 
momentum and Unix's response. In addition, if you throw in the emerging 
trends of appliance servers, information utilities, continued market 
and technology consolidation, and new vendor-based business models, 
the server landscape in 2003 may be unrecognizable," said Vernon Turner, 
vice president of IDC's Worldwide Commercial Systems and Servers 
research program.

The overall worldwide server market will grow in customer revenues from 
$65 billion in 1998 to an astounding $88.8 billion by 2003. Unix servers 
will maintain their leadership position as the largest operating system
platform, according to IDC. By 2003, they are expected to capture $37 
billion in end-user spending, or 41% of the total server market.

Outside of the six named operating systems (NetWare, NT, Unix, OpenVMS,
OS400, OS390), IDC distinguishes Linux as one whose initial impact will
mainly be among home users of PCs rather than business users of servers.
Future research initiatives are currently underway to determine the 
impact of Linux in the commercial market segment.

Going forward, IDC expects that symmetrical multiprocessing (SMP) and
clustering are poised to increase in importance for the overall server
market. In the short term, chip types favor RISC; however, as IA64 
machines progress, the increased performance could shift the current 
trend. If you want all the details, check out: 
http://www.idc.com/Data/Enterprise/EnterpriseOffer.htm.

********************************************************************

4. NT THIRD PARTY NEWS

* THE FIVE BEST SOLD NT ADMIN UTILITIES JAN-JUNE 1999

Sunbelt reports on a regular basis what the best selling tools are, so
that you know what your colleagues are buying. Since we are the largest
distributor of NT Tools worldwide, we get a good picture of what you 
really need and want. Well, here you go. These are the Top 5 tools
based on Jan-June sales in US Dollars:

1) Trusted Enterprise Manager. This product allows you to delegate
limited NT admin rights in a secure way to departmental levels. Great
way to free up time and get rid of way too many Domain Administrators
which has the keys to the kingdom and the power to shut your bizz down.
http://www.sunbelt-software.com/tem.htm

2) QuotaAdvisor/Storage Central. Everyone needs storage management.
You need to see who uses what, how much is left, how fast it's going
and what you can do to clean up the file pollution on those drives.
Implementing Storage Central normally gets you around 30% of your
drive space back immediately and allows you to set completely automated
policies to keep space use in check with soft- and hard disk quotas.
http://www.sunbelt-software.com/storcent.htm

3) Double-Take. This product is rapidly rising as a clear winner to
get High Availability for your mission critical apps, and at the same
time Disaster Recovery via a WAN for both your normal servers and
Microsoft Clusters. Double-Take supports Exchange, SQL, MSCS, and
is of course BackOffice Certified. 30-day eval at:
http://www.sunbelt-software.com/dtake.htm

4) STAT. This is a powerful tool that sniffs our holes in your network.
It was developed for Secure US Government Sites by Harris Corp., a 3.8
Billion company that does a lot for the US Department of Defense. STAT
is updated every few weeks as new NT vulnerabilities are found daily.
This is one of those tools that you cannot afford not to run regularly.
http://www.sunbelt-software.com/stat.htm

5) Diskeeper. Still going strong as the number one defragger in the
market by far. Microsoft has added a stripped down version of it in
Win2K so that is the ultimate endorsement.
http://www.sunbelt-software.com/dkpnt.htm


AND NOT TO FORGET: THE 5 UP & COMING TOOLS:

- NetOp, just missed the Top 5. The fastest Remote Control around.
http://www.sunbelt-software.com/netop.htm

- LanTrace, excellent and low cost network packet sniffer with a
great, very friendly graphical interface and chockful of features.
http://www.sunbelt-software.com/lantrace/lantrace.htm

- Melia, a great reporter for Exchange use. Many useful reports.
http://www.sunbelt-software.com/melia.htm

- Print Queue Manager, powerful printer manager that redirects, load-
balances and much more. http://www.sunbelt-software.com/pqm.htm

- Brand New: NTscript. Downloaded almost 2000 times in the first week.
Great graphical enterprise logon script manager. Get rid of programming.
http://www.sunbelt-software.com/ntscript.htm
-------------------------------

* NEW TOOLS IN THE SUNBELT ON-LINE SHOP

Did you know that Sunbelt has an on-line shop where you can get tools
with immediate electronic delivery? We now have a dedicated Customer
Service Rep as well, and you can get in touch with Nick if you have
questions after your purchase at [email protected]

The shop is at: http://www.sunbelt-software.com/onlineshop/store.htm
And here are just some of the tools you can get on-line:

***
FILE RESCUE: A very fast and powerful tool to UNDELETE the files and
folders that suddenly were gobbled up by clicking one time too much. 
Supports Windows 95, 98, NT 4.0 SV and WS, Windows 2000.
File Systems: FAT 12, FAT 16, FAT 32, and NTFS. 
- Undelete Compressed files - Undelete Small, Medium, and large files
- Undelete HEAVILY fragmented files - Scan for specific file types
- Ignore .TMP files - File List Sorting - Multiple File Undeletion
Just $69,95.

***
SPQuery: Automatic reporting and installation of all those pesky 
hotfixes for NT.

***
AutoPilot: Automatic Tuner for NT. Uses neural network based 
Artificial Intelligence to speed up NT dynamically.

***
AND NEW! FIXIT UTILITIES For an unbelievable $49.95 you get all
of this and I would say if you run NT Workstation at home this is
by far the best deal you will ever get. Check this out:
- Clean and Optimize your Hard Drive (defrags both FAT and NTFS)
- Optimize your registry files
- Detect and eliminate viruses
- Save hours of work by crash-proofing your system
- Create emergency boot disks
- Check and correct for Year 2000 compliance
- Keep track of your computer's resources, warns for problems
- Restore deleted files
- Customize your Windows environment
- Diagnose your hardware
- Gather information about your system
Comes with automatic, and FREE web-based updates for new versions.
Just click one button and the latest version gets installed.

Again, the on-line shop is over here. Check out the bargains. We offer
an unconditional 30-day money back guarantee. Of course this is an
internet secure site and your customer privacy is respected.
The shop is at: http://www.sunbelt-software.com/onlineshop/store.htm

********************************************************************

5. "HINTS AND TIPS - TIME SAVERS AND OTHER GOODIES...

If part of your job is providing Tech Support to end-users, this might
be interesting for you. The Association of Support Professionals (ASP) 
has just published a brief survey that offers up-to-date benchmarks 
for hours of coverage for live phone support. This new report also 
touches on after-hours compensation methods, 7x24 support trends, and 
options for providing offsite coverage. The survey draws on data from 
174 companies that responded to an ASP e-mail survey in June.
Complimentary copies of the Tech Support Hours report can be downloaded
in PDF format from the ASP Web site, http://www.asponline.com.

********************************************************************

6. "THE NT STOCK WATCH" Closing Friday June 25, 1999

52 WK 52 WK P/E WEEK
SECURITY CLOSE HIGH LOW RATIO CHNG
---------------------------------------------------------------------
Advanced Micro Devices... 17 9/16 33 12 3/4 +3.3%
BMC Software............. 63 11/16 61 7/8 30 44 +12.2%
Citrix Systems Inc....... 63 1/2 65 1/4 23 1/8 78 +6.0%
Compaq Computer.......... 27 5/16 51 1/4 20 +2.1%
Computer Associates...... 56 61 15/16 26 50 -0.4%
Data General Corp........ 15 3/4 21 13/16 7 -10.0%
Dell Computer............ 43 1/4 55 20 3/8 76 +1.0%
Electronic Data Systems C 67 64 1/2 30 7/16 61 +8.0%
Gateway Inc.............. 70 1/2 84 1/2 36 1/8 30 +4.2%
Hewlett Packard Co....... 114 113 1/2 47 1/16 37 +6.8%
Intergraph Corp.......... 5 1/16 10 1/4 4 11/16 -28.9%
International Business Ma 136 1/4 139 3/16 55 1/2 39 -0.8%
Legato Systems Inc....... 80 7/8 75 1/4 27 1/2 97 +20.0%
Micron Electronics Inc... 11 9/16 24 3/4 9 29 +14.2%
Microsoft Corp........... 99 7/16 95 5/8 43 7/8 78 +6.6%
NCR Corp................. 52 5/16 55 3/4 23 1/2 44 +3.8%
Network Associates Inc... 19 15/16 67 11/16 10 1/16 100 +21.2%
Novell Inc............... 30 11/16 30 9 1/2 79 +3.5%
Oracle Corp.............. 39 3/4 41 1/8 12 1/8 46 +1.1%
Qualcomm Incorporated.... 158 1/4 153 5/8 18 7/8 +6.3%
Seagate Technology....... 26 9/16 44 1/4 16 1/8 6 -6.1%
Silicon Graphics......... 16 15/16 20 7/8 7 3/8 -3.2%
Sun Microsystems Inc..... 76 1/8 76 7/16 19 1/4 53 +4.3%
Sybase Inc............... 11 5/8 13 3/8 4 1/2 +9.4%
Symantec Corp............ 29 3/4 29 1/8 8 11/16 35 +8.6%
Unisys Corp.............. 45 7/8 45 1/16 17 5/8 33 +7.3%
Veritas Software Corp.... 61 3/16 54 1/2 11 7/8 +17.6%
Dow Jones 30 Industrials. 11,209.84 +0.1%
********************************************************************7. 
CERTIFICATION NEWS
Sunbelt University has opened its doors and many of you have already 
checked out some courses. Computer Based Training is certainly nice
when you have to squeeze your training into a busy schedule. You can
load it on your laptop and get trained any time, anywhere. This week's
Special is: Inter-Networking MS TCP/IP on Windows NT Curriculum. This 
course series will help you prepare for certification exam 70-059. 
That exam is an elective for MCSE certification. NORMALLY $599, NOW
LIMITED TIME OFFER $495. Check out http://www.sunbelt-university.com
********************************************************************

8. "HOW TO USE THE MAILING LIST"
Instructions on how to subscribe, sign offor change your email address

TO SUBSCRIBE TO THE LIST (Tell your friends!) 

Click: 
http://lyris.sunbelt-software.com/scripts/lyris.pl?join=nt-list
and fill out the form, simple & easy: 1 minute work.

Or by email, send a blank message to the following address:
[email protected]

_____________________________________________________

TO QUIT THE LIST

1) The Web Way:
http://lyris.sunbelt-software.com/scripts/lyris.pl?
choose the NT-List, use your email address that is at 
the bottom of each newsletter and leave the list via 
the web interface.

2) The Email Way: Simply follow the personalized 
instructions at the very end of this newsletter.
_____________________________________________________

TO CHANGE YOUR ADDRESS

First unsubscribe and then resubscribe as per the
procedure above.

********************************************************************

FOR MORE INFORMATION

On the World Wide Web point your browser to:

For the newsletter and our website:
USA: http://www.sunbelt-software.com

For Tech Support on Sunbelt products mentioned:
http://www.sunbelt-software.com/scripts/rightnow.exe
Email for US sales information to:
[email protected] for US Tech support 
to:[email protected] to the US Editor:
[email protected]
Email for European Sales to:
[email protected]
Email for European Tech support to:
[email protected]

At the time of this newsletter's release, all links were checked 
to verify their accuracy and validity. However, due to the ever-
changing pages of various sites, some links may later prove to be 
invalid. We regret any inconvenience should you be unable to open 
any of these links.
********************************************************************

Things Our Lawyers Make Us Say:

This document is provided for informational purposes only. 
The information contained in this document represents the

current view of Sunbelt Software Distribution on the issues
discussed as of the date of publication. Because Sunbelt
must respond to changes in market conditions, it should not
be interpreted to be a commitment on the part of Sunbelt
and Sunbelt cannot guarantee the accuracy of any informa-
tion presented after the date of publication.

INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED "AS IS"
WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
FREEDOM FROM INFRINGEMENT.

The user assumes the entire risk as to the accuracy and the
use of this document. This document may be copied and
distributed subject to the following conditions: 1) All text
must be copied without modification and all pages must be
included; 2) All copies must contain Sunbelt's copyright
notice and any other notices provided therein; and 3) This
document may not be distributed for profit. All trademarks
acknowledged. Copyright Sunbelt Software Distribution, Inc.
1996-1999.

(email me with feedback: [email protected])