Welcome to CashCube
CashCube is a unique system designed for use with IBM compatible personal computers. It provides a means of setting up and charging for public access to PC's. CashCube™ provides a system for collecting user fees without the need for external timers, extra employees, or special equipment.
For the latest version of CashCube™, along with technical support and information about Upstate Networks, access the Upstate Networks World-Wide Web server at http://www.upstatenetworks.com.
The CashCube automatically times computer usage and charges the user accordingly. Facility owners can determine usage cost and adjust the system to charge more during peak usage periods. CashCube's accounting software (a means for tracking usage) determines which days and times are the most profitable. There are several options available to the facility owner interested in tailoring the product.
It is assumed that the software the facility owner expects to be charging for will already be installed on the computers. The facility owner will require a copy of a browser such as Explorer or Netscape and a Winsock for communications to the Internet.
CashCube requires:
CashCube copyright 1996-1999 by UNI. All rights reserved.
By using CashCube, you agree to abide by the terms of this License to the best of your ability.
CashCube is distributed free-of-charge for personal use by individuals and use by educational institutions. All others wishing to use CashCube must obtain a site license from UNI. Licensing information is available by contacting UNI.
CashCube must be distributed complete and intact without modifications whatsoever. No modifications are allowed, including BBS advertisements and modifications to the distribution .ZIP file. CashCube may be distributed on BBS's, Internet FTP sites, commercial online services, and on CD-ROM's containing public domain, freeware, and shareware programs. In the case of CD-ROM distribution, notice must be given that the disc contains shareware with an explanation of the shareware concept, such as in the distribution notices required on the SimTel and Garbo CD-ROM's.
For permission to distribute CashCube with a magazine, book, or bundled with another product contact UNI.
You agree you will not attempt to reverse compile, modify, translate, or disassemble CashCube in whole or in part and that you will make reasonable efforts to prevent anyone from doing same.
You agree that you will allow UNI to contact you for purposes of announcing new releases, bug-fixes, and other technical and business information.
UNI warrants that CashCube will perform substantially for a period of sixty (60) days from the date of license. Any implied warranties relating to CashCube are limited to sixty (60) days.
If CashCube does not conform to the limited warranty above, UNI's entire liability and your sole and exclusive remedy shall be, at UNI's option, either to (a) correct the error or (a) help you work around or avoid the error. The limited warranty is void if failure of CashCube is due to accident, abuse, or misapplication, including use of CashCube with beta-test or non-compliant operating systems and software. Any replacement will be warranted for the remainder of the original limited warranty period.
UNI does not warrant that CashCube is error-free. Except for the express limited warranty above, UNI disclaims all other warranties with respect to the software, either express or implied, including but not limited to implied warranties of merchantability, fitness for a particular purpose, and non-infringement of third-party rights.
In the event of invalidity of any provision of this license, the parties agree that such invalidity shall not affect the validity of the remaining portions of this license.
In no event shall UNI be liable for consequential, incidental or indirect damages of any kind arising out of the delivery, performance or use of the software, even if UNI has been advised of the possibility of such damages. In no event will UNI's liability for any claim, whether in contract, tort or any other theory of liability, exceed the license fee paid for CashCube, if any.
This license will be governed by the laws of the State of New York as they are applied to agreements between New York residents entered into and to be performed entirely within New York. The United Nations Convention on Contracts for the International Sale of Goods is specifically disclaimed.
If CashCube is acquired (i) for use by the DOD, use, duplication or disclosure by the Government is subject to the terms of this license unless superseded by 252.227-7013(c)(1)(ii) or (ii) for use by civilian agencies, use, reproduction, or disclosure is subject to the terms of this license unless superseded by 52.227-19.
The CashCube User Guide makes reference to a number of copyrighted and trademarked products. Rather than point out each one individually, we will note here that they are copyrighted and trademarked by their respective holders.
Upstate Networks Incorporated
Rome, NY 13442-0762
info@upstatenetworks.com
If you have trouble installing Computer peripherals (i.e., modems/ scanners etc...) seek the help of your local computer professionals or UNI @ (315) 334-9625. Note that the Quick Start instructions given below will speed you on your way. If you would like a bit more guidance, refer to the section Detailed Instructions. |
Install the CashCube™ on a free serial port, either 9 pin or 25 pin, and designate it COM2. Serial port settings are 300, 8, 1, none. Avoid Interrupt conflicts! The following is a typical COM port configuration:
PORT | INTERRUPT | BASE I/O | TYPICAL DEVICE |
COM1 | IRQ4 | 03F8 | Mouse |
COM2 | IRQ3 | 02F8 | Cash Cube |
COM3 | IRQ5 | 03E8 | Modem/NIC |
COM4 | IRQ3 | 02E8 | Unused |
TABLE 1
Install and run A:\SETUP.EXE on Disk #1. Load the remaining disks as instructed by the installation program. Run cctime32.exe. Insert different dollar bill denominations and check to see that they register in the test program. If all currency registers, the HARDWARE INSTALLATION is complete. Proceed to SOFTWARE INSTALLATION.
Installation is relatively simple. Only two connections must be made in order for the device to be fully functional. There are two cables attached to the back of the CashCube™. One cable plugs into any wall outlet (the outlet chosen should not be on the same circuit as heavy load equipment, such as refrigerators). The other cable plugs into the back of the computer. There should be an open port on the back of the computer labeled SERIAL2 or COM2. If the connector on the back is the same size as the CashCube's plug, go ahead and connect them. If the connector is a much larger 25 pin connector, use a standard adapter.
You can verify your existing configuration in windows. Open the MY COMPUTER window, then go to Control Panel. From Control Panel, open System. Go to Device Manager and check view devices by connection. Click on properties. The Computer Properties window appears as follows:
FIGURE 1
In view resources check for interrupt conflicts (see Figure 1). These will appear as yellow exclamation marks. Each interrupt conflict will be unique. If no conflicts are found, exit Computer Properties. In Device Manager select COM2 and the Port settings window will open.
FIGURE 2
In this window, set each option as shown above (Baud Rate to 300; Data Bits to 8; Parity to None; Stop Bits to 1; Flow Control to None). Alternate settings will result in improper operation.
Open the GENERAL tab that appears as follows:
FIGURE 3
Open the RESOURCES tab. Set base I/O to 02F8 and Interrupt Request Line (IRQ) to IRQ 3 (this is the preferred setting).
Ensure that COM 1, 2, 3 and 4 all have different IRQ numbers (if numbers are the same, ports will conflict). Pay special attention to COM2 and COM4 as they will tend to default to the same IRQ number. If COM 4 is in use, check to make sure it does not share the same Interrupt as COM 2 (you can set it at Interrupt 5, 7 or 9). Once you implement all necessary changes, restart Windows for changes to take effect.
It will be necessary to ensure that your machine can support three serial devices. Standard configuration will put the mouse on serial port 1 and the modem or NIC on port 2, leaving ports three and four vacant. Verify this in System Properties (view devices by connection).
Refer to Table 1 and the section entitled Check and Configure COM Ports. Open System Properties (Ref. Fig 1). In Device Manager (view devices by connection) open COM3 and the Communications Port Properties window will open (Ref. Fig 2). Open port setting tab. In the Bits Per Second box set the number at 19200. Set other boxes as follows: Data Bits = 8; Parity = None; Stop Bits = 1; Flow Control = Hardware. Click on the Resources tab and set the Input/Output Port Address to 03E8-03EF. The Interrupt Request Line (IRQ) should be set to 5. Note that some modems and NIC's require different jumper settings to change their COM port and IRQ. Please consult the manufacturer's documentation.
There are a variety of programs that call the modem or NIC. With each of these, it will be necessary to alert the software that the modem/NIC is in a new port. As programs vary, it will be best to check the program itself. Generally there will be a help function that will allow you to determine the correct way to change the modem to recognize port 3 instead of 2. If using a modem, go to Device Manager and click on modem. Open the modem tab and the screen will identify which Port is in use. The modem MUST be at COM 3 to ensure proper functioning.
If the system rejects the paper currency or if the currency does not register as having been accepted, there may be a hardware problem. DO NOT install the rest of the software until this problem is resolved! Re-check to ensure that the CashCube™ is plugged in, both to a 120VAC outlet and the proper port on the back of the computer. Tighten the screws that connect it to the computer port to ensure a good connection. Go back and recheck the port settings.
WARNING! Disconnect 120VAC from wall outlet before removing the back of the cabinet! |
If the settings are all correct, check the connection inside the CashCube™. It is possible, though unlikely, that the process of shipping and handling loosened the connections inside the cube. Unplug the Cube before checking the connections. There are two connections inside. The cables connect to the bill acceptor along a terminal strip at the bottom. In order to see the connection it may be necessary to remove the back cover of the cube using a #2 square head screwdriver.
It is important that the hardware be fully configured and tested prior to software installment (see the section of this manual entitled Hardware Installation).
When you run this software it will attempt to access the device on COM2. If you have a device on COM2 other than a CashCube™ the results may be unpredictable. |
If the software has not been installed (see Quick Start), do so now. The software is contained on disks supplied with this CashCube™. Run setup.exe. The program will begin to install. Once installation is complete, restart the computer to implement changes.
FIGURE 4
In my computer open C: (local hard drive). Open program files and cctime32.exe. Select the icon labeled cctime32 to activate it. The timing program should begin and the timer icon should appear in the lower left hand corner of the screen, counting down from the default grace period of three minutes. Double clicking on the icon as it appears on the screen will maximize it and show the exact time remaining.
Once everything is configured, insert a dollar bill face up into the CashCube™. The CashCube™ will recognize the dollar amount and will alter the time remaining (if the dollar amount is NOT recognized, see Troubleshooting). If the timer is allowed to run out, Windows will close all of your open applications and will then close itself.
DO NOT RUN CCTIME32 FOR THE FIRST TIME IF YOU HAVE OTHER APPLICATIONS OPEN! |
FIGURE 5
The Usage Report feature provides the facility owner with a means of studying the statistics of usage. To open, click on the Usage icon in cctime32. A second window will open, allowing you to select the Usage Report button. Selecting this button opens the usage chart and shows such statistics as revenue in dollars, actual hours and minutes of use and number of paid sessions (see Figure 5). Peak usage times are displayed, allowing the facility owner to calculate maximum profitability. Other options available in this window include a quick sales recap (by clicking the Sales button) and a review of the actual usage log (review by clicking on the View Log button). The usage log contains all statistics related to usage.
FIGURE 6
The Timing Options function allows the facility owner to change the amount of money collected per minute. Clicking on the ini icon opens the window entitled Timing Options. Clicking on the Timing Options button opens a window showing all of the current settings for timing.
The above table displays each setting. The first column lists the setting number (this number is set automatically). The second column notes the starting time for the function desired (i.e., the time of day at which the minutes per dollar is to change). The third column displays the amount of time allotted per the amount of money inserted. The fourth column displays the amount of money collected per designated time. The fifth column displays the amount of time allotted per additional dollars (i.e., a user who chooses to pay to keep the system running as opposed to a new user). Alter the columns by clicking the Edit button at the right of the table. A separate window will open to allow for editing of any or all columns in a particular row. Click the Add button to include new times. Likewise, the Delete button will eradicate an entire row. Be aware that default values come up for all fields in the edit box. Edit those you wish to change.
Note: While editing Setting #1, some users may come across a bug that causes an error. If this occurs, re-open INI and Timing Options. Work around the bug by adding an additional setting for that time period and then deleting the first setting.
In the upper right of the window is a box labeled Grace Period. This is an optional function that references the period of time a new user sits down at the machine prior to being required to insert money. In a cyber-cafe setting the grace period is desirable as it allows time for the new user to get hooked before being prompted to insert cash. However, if you wish to eliminate the function, simply re-set to zero. Click on the Set button to select a grace period.
Once changes are implemented, click the Close button to return to the main screen. All features will take effect beginning with the next session. It is necessary to allow the existing shell to close and reopen.
To open the control program, click on the shell icon in CCtime32. This program may replace the standard windows shell which is generally set as Program Manager (progman.exe). For testing purposes, it may be run as it is. Additional explanations regarding the use of this program follow.
FIGURE 7
The shell program will present a screen that provides several options to the user. These are relatively self-explanatory and are merely items selected from menus or buttons on the screen. Perhaps more importantly are the functions available to the facility owner.
Clicking on the top line menu item labeled Owner will open a separate window prompting the user for a password. Only the correct password will allow access. The only other choice is the button labeled I shouldn't be here. The default password is UNI. Future versions of the software will offer the option of changing the password.
When the owner enters the correct password a window entitled Change Advertising Message opens. Type a short message in the box in the center of the screen and hit the Submit button (the Quit button allows you to leave without altering the existing message). The next time the shell program opens, the typed message will appear in the box at the bottom of the screen. Note that this change is not immediate; the shell program must be closed down and reopened for the change to take place. In an environment utilizing the CashCube™ the closure will take place at the end of every paid session.
FIGURE 8
Clicking the top line menu item labeled Access opens a separate window prompting the user for a password. Only the correct password will allow access to this. The only other choice is the button labeled I shouldn't be here (the default password is UNI).
Entering the correct password will open a window entitled Maintenance Options. Three choices are available within this menu: Program Manager, Accounting and Timing Options.
FIGURE 9
Clicking once on the item labeled Program Manager will open the familiar Windows environment. This provides a means for the facility owner, but not the individual customer, to access needed Windows features.
The Accounting feature allows the facility owner a means of accessing the USAGE REPORT features (described above) directly from the shell environment.
The third icon available from the Maintenance Options window allows the facility owner to access the TIMING OPTIONS feature (described above) directly from the shell environment.
Edit browser.txt and insert the path name of your browser in order to activate the surf and chat buttons. You can do this by accessing the cctime32 folder and clicking on the browser icon. Change the path name to match that of the browser. Locate the browser icon (i.e., Netscape Navigator) and click the right mouse button. Open properties and click on shortcut tab. The Target is the path name to your browser. You must enter this into browser.txt. To activate the chat button, search for the chat program and alter the path name as you did for the browser. If you are not using a chat program, you may set the chat button for browser use. Edit chat.txt as you did for the browser.
The Program Killer is a tool that ensures the shut down of applications when the user's time runs out and the session ends. You will need to identify the programs to be killed at the end of all user sessions and activate kill programs. There are three files necessary for the program killer; two executables and one text file. K.exe actually kills the programs, while s.exe (run from a DOS window) gives the PID, class, and title of every application running in Win95/NT. To kill the listed applications, cctime32.exe opens and reads the text file programs.txt. If you open programs.txt in a text editor (cctime32) you will find:
-t Internet Explorer |
-c mIRC |
-c Solitaire |
-c Minesweeper |
-t The Microsoft Hearts Network |
-t quake |
NOTES:
The switch -t specifies the title of an application.
The title must be in quotes.
The switch -c is the class of an application and is NOT in quotes.
The arguments are case sensitive.
If running quake.exe, it MUST be the last program listed in programs.txt
At the DOS prompt, identify the programs you want killed. Move to directory c:\Program Files\cctime32>. Then, type the command s |more. This will run s.exe. Look for programs to be killed and add to programs.txt.
The CashCube™ was originally designed for the cyber-cafe environment, although a multitude of other uses exist. The CashCube™ has a number of features to ensure it's security while used in a public, high traffic environment. There are several additional features of specific use for this environment.
Note that this product was designed to work with the built-in Windows 95 winsock and the security explanations that follow are based on this. Other Winsocks can easily be adapted for similar use.
All security measures taken may be for naught if a knowledgeable user has access to the floppy drive. Therefore, we recommended the floppy drive be secured or blocked off in some manner. Note, however, that this will prevent customers from being able to make copies of their work. An alternative is to prevent the user from booting the PC via the floppy drive (which would other wise give access to the entire operating system). You can accomplish this by making a small change in the BIOS. When the machine first boots up, a message will appear on the screen instructing the user to press and hold a key (usually the delete key) to enter setup. Follow this instruction and the BIOS screen will appear. There are several different BIOS possibilities. Rather than try to list the details for each, this section will bring you through a common setup.
A message may appear to Enter Password. If you have previously set a password here, go ahead and enter it. If not, try just hitting Return. If this does not work it will be necessary to attain the password, perhaps from the retailer where the machine was purchased or from a previous owner. Once you enter the correct password, an options menu appears.
Select the choice closest to BIOS Features Setup. When you select this item another menu will appear which will include an item labeled Boot Sequence. The entry for this item will likely be A,C. Change it to read C,A. This action will prevent the machine from being booted by a floppy disk.
If a password has already been set, save changes and exit BIOS. If you have not set a password, look for an item labeled Password and follow the steps to enter a unique password. We suggest you set a Supervisor Password that will ensure limited access to BIOS to make changes. Save the changes and exit.
In the file autoexec.bat, add a line that says "BREAK OFF." In the file msdos.sys, add a line that says "BootKeys=0. These lines will prevent the user from bypassing the cash collection software by jamming the keyboard or similar measures.
In the file config.sys add a line that says SWITCHES /F /N." This will eliminate the F8 and F5 selections on boot-up that allows step-by-step execution of the autoexec.bat and config.sys files.
Install the policy editor (poledit.exe) on the server and set permissions so only system administrators can run it. You can create security measures in Windows 95 by setting the computer policies, using the Win95 program called poledit.exe. This program does not load automatically during Win95 installation. You must add it from the original program CD (or disks). Prior to editing in poledit, we strongly suggest a backup copy be made of the Windows 95 registry, consisting of the files user.dat and system.dat. In the event of a problem, you can reinstall the backup and restore a working version.
Once added, start the program. From the initial screen, select File from the top line menu, then Open Registry." This will open a new window, from which you can select the Local User icon. The menu that opens contains options for restricting user access to certain features. Expand the items in the menu by clicking on the plus sign. You can toggle options by clicking on them. When completed successfully, the selected options appear with a check mark. We recommend the following items (shown with their respective higher level menu names) for activation. (All items in a subgroup are shown. Activate more than what we have shown here at your own risk!)
CHANGES WE RECOMMEND TO POLICY EDIT |
||
Control Panel | *Display | Restrict Display Control Panel |
*Network | Restrict Network Control Panel | |
*Passwords | Restrict Passwords Control Panel | |
*Printers | Restrict Printers Setting | |
*System | Restrict System Control Panel | |
Shell | Restrictions | Remove Folders From "Settings" On Start Menu |
Remove Taskbar From "Settings" On Start Menu | ||
Remove "Find" Command | ||
Hide Drives In "My Compter" | ||
Hide Network Neighborhood | ||
No "Entire Network" In Network Neighborhood | ||
No Workgroup Contents in Network Neighborhood | ||
Don't Save Settings At Exit | ||
System | Restrictions | Disable Single Mode MS-DOS Applications |
**Disable MS-DOS Prompt |
* Check each disable command in the sub-menu for each of these.
** This item may be checked unless running a DOS-based application such as DOOM or QUAKE
After editing the policies, save the changes and exit poledit. In order to ensure that experienced users do not merely reverse the measures taken, it will be necessary to remove the program poledit.exe (and regedit.exe, if it also exists). By copying them onto a floppy disk, it is relatively straightforward to return and make changes in the future.
The command bootkeys=0," added to the msdos.sys file, prevents the experienced user from entering Safe Mode in Win95 by simply pressing a function key. Safe Mode allows access to functions and features protected by the registry updates made by poledit. In order to enter safe mode once the bootkeys=0 line is added, it is first necessary to remove this line from the file.
You can eliminate Windows 95 desktop task bar and start button as a final security step. Do this by editing system.ini. Look for shell=explorer.exe and replace with shell=c:\progra~1\cctime32\cctime32.exe. Once you make this change, re-boot the computer.
Program Name | Description |
cctime32.exe | main program |
unishell.exe | User's shell |
usage.exe | Accounting |
ini.exe | Timing options |
k.exe | Application Killer |
s.exe | Shows active applications |
pail.ini | Value of dollars based on time of day, used by cctime32.exe and ini.exe |
log.txt | log start and stop time used by cctime32.exe and usage.exe |
timeleft.txt | Save time left in case of crash used by cctime32.exe |
programs.txt | list of program title and classes to be killed used by cctime32.exe |
message.txt | advertising message used by unishell.exe |
chat.txt | path name for chat program used by unishell.exe |
browser.txt | path name for browser program used by unishell.exe |
BMPS sub-directory | stores rotating UNI logo for unishell.exe |
There may be a hardware problem Check to make sure the CashCube™ is plugged in, both to a 120VAC outlet and the proper port on the back of the computer. Tighten the screws that connect it to the computer port to ensure a good connection.
Verify that all port settings are correct. Refer to Hardware Installation, Step 2.
If the settings are all correct, check the connection inside the CashCube™. It is possible, though unlikely, that the process of shipping and handling loosened the connections inside the cube. UNPLUG the Cube and check the connections. There are two connections inside. The cables connect to the bill acceptor along a terminal strip at the bottom. In order to see the connection it may be necessary to remove the back cover of the cube (by using a #2 square head screwdriver).
WARNING! Disconnect 120VAC from wall outlet before removing the back of the cabinet! |
The CashCube™ is connected to the wrong port. Connect the CashCube™ to COM2.
This could be caused by having the CashCube plugged into the wrong COM port or might be an interrupt or device conflict. Check COM port settings.
COM1 and COM2 have a conflict. Check COM port settings.
Hit Ctrl-Alt-Del again to open the task manager. The BA should come back on when the CCTIME32.EXE task is ended.
If all settings are correct and all connections are verified but the system still is not operational, please contact us via e-mail at upstat29@borg.com. |
The CashCube distribution archive contains all of the program files necessary to run CashCube. Files are listed in Appendix A.
UNI offers technical support for CashCube primarily by e-mail.
Please read this manual thoroughly before contacting UNI.
Technical support is available via e-mail 24-hours-a-day, 7-days-a-week at info@upstatenetworks.com
Priority support will be given to people who have followed the instructions in the Before Contacting Technical Support section below. |
Please have the following information available or enclose it with your e-mail when you contact UNI for technical support:
The majority of this information can be found by running a utility such as Microsoft's System Diagnostics (standard configuration included with MS-DOS and Microsoft Windows).
Program Name | Directory | Dependencies |
CCTIME32.EXE | CASHCUBE | Main timing program |
LOG.TXT | CASHCUBE | Activity log |
BROWSER.TXT | CASHCUBE™ | Path name for browser program (used by unishell) |
TIMELEFT.TXT | CASHCUBE | Saves time left every 120 seconds in case of a crash |
PROGRAM.TXT | CASHCUBE | List of programs to be closed at end of session |
PAIL.INI | CASHCUBE | Initialization file for cashcube(tm) |
CHAT.TXT | CASHCUBE™ | Path name for chat program (used by unishell.exe) |
MESSAGE.TXT | CASHCUBE | Advertising message in unishell |
USAGE.EXE | CASHCUBE | Program to display usage statistics and revenues |
INI.EXE | CASHCUBE | Program to change dollar bill values and grace period |
K.EXE | CASHCUBE™ | Kills applications when session is over |
S.EXE | CASHCUBE™ | Displays active sessions |
NEWUNI.BMP | CASHCUBE\BMPS | Unishell image |
NEWUNI1.BMP | CASHCUBE\BMPS | |
NEWUNI2.BMP | CASHCUBE\BMPS | |
NEWUNI3.BMP | CASHCUBE\BMPS | |
NEWUNI4.BMP | CASHCUBE\BMPS | |
NEWUNI5.BMP | CASHCUBE\BMPS | |
NEWUNI6.BMP | CASHCUBE\BMPS | |
NEWUNI7.BMP | CASHCUBE\BMPS | |
NEWUNI8.BMP | CASHCUBE\BMPS | |
NEWUNI9.BMP | CASHCUBE\BMPS | |
NEWUNI10.BMP | CASHCUBE\BMPS | |
NEWUNI11.BMP | CASHCUBE\BMPS | |
NEWUNI12.BMP | CASHCUBE\BMPS | |
NEWUNI13.BMP | CASHCUBE\BMPS | |
NEWUNI14.BMP | CASHCUBE\BMPS | |
NEWUNI15.BMP | CASHCUBE\BMPS | |
NEWUNI16.BMP | CASHCUBE\BMPS | |
UNISHELL.EXE | CASHCUBE | Shell program for cyber-cafe |
THREED32.OCX | \WINDOWS\SYSTEM | Visual Basic(4) run-time library |
GRID32.OCX | \WINDOWS\SYSTEM | INI.EXE |
GSWDLL32.DLL | \WINDOWS\SYSTEM | GRAPH32.OCX |
GSW32.EXE | \WINDOWS\SYSTEM | GRAPH32.OCX |
GRAPH32.OCX | \WINDOWS\SYSTEM | USAGE.EXE |
GAUGE32.OCX | \WINDOWS\SYSTEM | USAGE/INI.EXE |
MSCOMM32.OCX | \WINDOWS\SYSTEM | CCTIME32.EXE |
VBAR2232.DLL | \WINDOWS\SYSTEM | MSJT3032.DLL |
ODBCTL32.DLL | \WINDOWS\SYSTEM | MSJT3032.DLL |
ODBCTi32.DLL | \WINDOWS\SYSTEM | MSJT3032.DLL |
ODBCJT32.DLL | \WINDOWS\SYSTEM | MSJT3032.DLL |
MSWNG300.DLL | \WINDOWS\SYSTEM | MSJT3032.DLL |
MSRD2X32.DLL | \WINDOWS\SYSTEM | MSJT3032.DLL |
VBDB32.DLL | \WINDOWS\SYSTEM | MSJT3032.DLL |
VBAJET32.DLL | \WINDOWS\SYSTEM | MSJT3032.DLL |
MSJINT32.DLC | \WINDOWS\SYSTEM | MSJT3032.DLL |
MSJTER32.DLL | \WINDOWS\SYSTEM | MSJT3032.DLL |
MSJT3032.DLL | \WINDOWS\SYSTEM | DAO3032.DLL |
DAO3032.DLL | \WINDOWS\SYSTEM | Visual Basic(4) run-time library |
DAO2532.TLB | \WINDOWS\SYSTEM | Visual Basic(4) run-time library |
OC25.DLL | \WINDOWS\SYSTEM | CCTIME32.EXE |
GRDKRN32.DLL | \WINDOWS\SYSTEM | DBGRID32.OCX |
DBGRID32.OCX | \WINDOWS\SYSTEM | CCTIME32.EXE |
DBLIST32.OCX | \WINDOWS\SYSTEM | CCTIME32.OCX |
TABCTL32.OCX | \WINDOWS\SYSTEM | CCTIME32.OCX |
MFC40.DLL | \WINDOWS\SYSTEM | COMDLG32.OCX |
COMDLG32.OCX | \WINDOWS\SYSTEM | CCTIME32.OCX |
CTL3D32.DLL | \WINDOWS\SYSTEM | VBRUNTIME |
MSVCRT40.DLL | \WINDOWS\SYSTEM | VBRUNTIME |
MSVCRT20.DLL | \WINDOWS\SYSTEM | VBRUNTIME |
OLEPRO32.DLL | \WINDOWS\SYSTEM | VBRUNTIME |
VEN2232.OLB | \WINDOWS\SYSTEM | VBRUNTIME |
VB40032.DLL | \WINDOWS\SYSTEM | VBRUNTIME |
README.DOC | \WINDOWS\SYSTEM | Installation instructions |
INDEX