home *** CD-ROM | disk | FTP | other *** search
-
- Electronic Solutions Company
-
- This package should contain two files : MENU-ESC.EXE and MENU-DOC.
-
- This is distributed as shareware, and if you feel that it is of value
- to you, please send a check or money order for $15.00 to :
-
- ESC
- PO Box 54504
- Lexington, KY 40555
-
- By sending a check, you will be a registered user, and receive updates
- by mail as they are available. You will also be placed on our mailing
- list and receive information on other software available from ESC. You
- can also suggest changes you would like to see in the program. If the
- F11 and F12 keys do not work from your menu, your DOS cannot recognize
- them, but you will still be able to use the other keys as advertisied.
-
- Versions of this program are also available which are optimized for an
- 80286 or 80386 system. Register and request more information on these.
-
- _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
-
- MENU-ESC
-
- DOCUMENTATION
-
- This program was written and designed to be easy to use, so this guide
- is very short.
-
- PURPOSE : MENU-ESC is a menu program, allowing users to use a function
- key to perform tasks such as loading programs. It also has a
- three level security system, allowing a user to control both
- access to the menu and access to individual menu selections.
- Menu and key titles are programmable, as are steps performed.
-
- INSTALLATION : Simply copy MENU-ESC.EXE to the desired directory. Your
- system must have an EGA color compatible monitor.
-
- EXECUTION : Type MENU-ESC from the DOS command line. You may rename the
- program if desired, and is often done to allow multiple menus
- in one directory, where a key on one menu causes another menu
- to load. The program can accept a command-line parameters, or
- be called normally. Two parameters are available :
-
- MENU-ESC 2 - Causes the Alternate Menu to be displayed first.
-
- MENU-ESC S - Causes the program to load in the Secured Mode.
-
- While the program is loading, you may press the desired key
- to execute, and it will automatically perform the steps for
- that key when finished loading.
-
- OVERVIEW : There are 2 menus within the program, Primary and Alternate,
- and the display is switched between them by pressing Page Up
- or Page Down. With either menu displayed, the keys for both
- are active, so keys F1 - F12 will be used with the Alternate
- Menu displayed on the screen, and keys Alt-F1 - Alt-F12 will
- be used even with the Primary Menu on screen. The Home, End,
- and Escape keys are on both menus, so there are 27 different
- keys available to be programmed.
-
- PROGRAMMING : To enter the Programming mode, press Tab. You will first
- be asked to enter the Level 3 security code, which is ESC in
- capital letters. The Level 2 security code is Esc, and Level
- 1 is esc. When you register, you will receive information on
- how to change these security codes, which should be done for
- preventing unauthorized re-programming.
-
- After entering the proper security code, you will be given a
- chance to change the menu title of whichever menu was active
- when you pressed Tab. Press Return when finished. The top of
- the menu will display - Press the Key to Program.
-
-
- KEY PROGRAMMING : At this point, you can press any of the 27 keys that
- are available. You will be offered an opportunity to re-name
- the displayed title for that key. Press Return when finished
- and you will be asked to edit the steps to be performed when
- that key is pressed.
-
- The number of steps can be from 1 to 10, and blank steps are
- skipped. The steps can be any valid DOS command, and what is
- actually being programmed is a batch file. Once programmed,
- pressing the key will cause a DOS batch file called TEMP.BAT
- to be created, and will then exit and automatically run TEMP
- from DOS.
-
- The program does not check the validity of steps you program
- because you can do virtually anything you can in DOS. Rather
- than simply performing DOS commands, you can program the key
- to call other batch files or run any of a multitude of other
- programs.
-
- To make an individual key a secure key, put the level number
- of security you want in the last character spot of the first
- step for that key. Note that there must be a command for the
- step instead of spaces at the beginning.
-
-
- EXAMPLES
-
- The example below would cause a This example would change to
- Level 2 security check, and then Subdirectory D:\WS5, run WS,
- re-load the menu program. and re-load the menu on exit.
-
- Step 1 @ECHO OFF 2 Step 1 @ECHO OFF
- Step 2 MENU-ESC Step 2 D:
- Step 3 Step 3 CD\WS5
- Step 4 Step 4 WS
- Step 5 Step 5 MENU-ESC
-
- The example below would cause a The example below changes to
- Level 3 security check, run the subdirectory \NEW, copies all
- batch file DOWN.BAT, then load a the .ZIP files to D:\ZIP,
- second menu program, displaying changes to subdirectory D:\ZIP
- the Alternate Menu initially. and finally runs the directory.
-
- Step 1 @ECHO OFF 3 Step 1 @ECHO OFF 2
- Step 2 CALL DOWN Step 2 CD\NEW
- Step 3 MENU-TWO 2 Step 3 XCOPY *.ZIP D:\ZIP
- Step 4 Step 4 D:
- Step 5 Step 5 CD\ZIP
- Step 6 Step 6 DIR
-