                   INVISIBLE LAN COMPATIBILITY ISSUES

                Copyright 1993 Invisible Software, Inc.



       [See GUIDE.TXT for a list of all manuals and text files.]



     This file describes special procedures that are required to run
certain applications on the network.  It also documents a number of
utility programs that are included with Invisible LAN specifically to
resolve compatibility issues.

     The utility programs documented in this file are:  IKB, MPCPAT,
NETOFF, NETON, POPMAST, POPTOP, VPDONE, and VPFIX.



------------------------------------------------------------------------



TABLE OF CONTENTS:

 1.  Using Memory-Resident Programs With Invisible LAN
    1.1.  General Considerations
    1.2.  Using PopMaster
 2.  Keyboard Problems
 3.  Patch For Xerox Ventura Publisher (DOS/GEM Version)
 4.  Using Networker Plus with Invisible LAN
 5.  Using Network Courier with Invisible LAN
 6.  Turning Off the Invisible Network Hardware
 7.  Using VDISK with Invisible RAM 386
 8.  Bypassing Invisible LAN
 9.  Using Windows with Invisible Network Models 200/A and 300/A
10.  Patch for Magic PC
11.  PKZIP Version 2.04C



------------------------------------------------------------------------



1.  USING MEMORY-RESIDENT PROGRAMS WITH INVISIBLE LAN


     A memory-resident program is one that remains in your computer's
memory after you load it.  Examples include pop-up desk accessories and
special keyboard handlers.  Invisible LAN itself is a memory-resident
program.

     This section presents general considerations for using
memory-resident programs, followed by a discussion of PopMaster, a
utility program that allows pop-up utilities to work with Invisible LAN.



1.1.  GENERAL CONSIDERATIONS


     Some memory-resident programs do not use DOS calls.  Examples
include pop-up calculators, calendars, and keyboard handlers (there may
be exceptions to these).  This kind of memory-resident program usually
works when Invisible LAN is loaded.  In most cases, Invisible LAN can be
loaded either before or after this kind of program.

     Some memory-resident programs use DOS calls.  These include pop-up
notepads and dictionaries.  Memory-resident programs that call DOS may
or may not work with Invisible LAN.  In general, Invisible LAN should be
loaded before this type of memory-resident program.

     Pop-up network utilities sometimes malfunction when used with
Invisible LAN, especially on a server.  The most common problem is that
the server is deactivated when the utility pops up;  the server does not
respond to other workstations until you exit from the utility.  Many of
these problems can be eliminated by using PopMaster as described below.



1.2.  USING POPMASTER


     PopMaster is a program that "tames" memory-resident network
utilities so that they can be used with Invisible LAN.

     PopMaster is supplied as two separate programs:  POPMAST and
POPTOP.

     POPMAST is a small memory-resident program that occupies less than
2K of memory.  You must load POPMAST before loading your pop-up network
utilities.  POPTOP is a program that you must run after loading your
pop-up network utilities.  POPTOP does not use any memory;  it simply
informs POPMAST that all the utilities have been loaded.  When you run
POPTOP, the POPMAST program takes over control of the pop-up utilities,
and forces them to operate without conflicting with Invisible LAN.

     To use PopMaster, follow this procedure:

        1.  Load Invisible LAN.

        2.  Give the POPMAST command.

        3.  Load the pop-up network utilities.

        4.  Give the POPTOP command.


     Example 1 -- You want to start Invisible LAN and use a pop-up
network utility called NETUTIL.  Type the following commands:

        NET30 POPMAST
        NETUTIL
        POPTOP


     Example 2 -- You want to start Invisible LAN and use two network
utilities called UTIL1 and UTIL2.  Type:

        NET30
        POPMAST
        UTIL1
        UTIL2
        POPTOP


     Note -- If you want to use PopMaster, then you must not use the
Invisible LAN Mail program;  PopMaster and Mail conflict with each
other.



------------------------------------------------------------------------



2.  KEYBOARD PROBLEMS


     Some keyboards exhibit problems when the network software is
installed.  The most common problems are digits appearing when you press
the cursor keys, and the Shift, Ctrl, and Alt keys not behaving
properly.  Sometimes, you will get uppercase letters when you type
lowercase, or vice-versa;  pressing the Shift key a few times may clear
up the problem.

     Most systems do not exhibit any keyboard problems.  When the
problems occur, they vary greatly depending on the type of keyboard, the
type of motherboard, and the computer's BIOS.

     IKB is a memory-resident program that attempts to correct the
keyboard problem.  It should be installed after the network and all
other memory-resident programs.  The command format is:

        IKB  [option]

     The option specifies the method that IKB uses to correct the
keyboard problem.  There are four options available:

        0  -  Deactivate IKB.
        1  -  Select method #1 (this is the default method).
        2  -  Select method #2.
        3  -  Select method #3.

     The IKB command can be used both to install IKB, and to change the
method after IKB has been previously installed.  If you omit the option,
then:  (a) if IKB is not already installed, it is installed with method
#1;  (b) if IKB is already installed, the current method is displayed.

     Once installed, IKB monitors all keypresses and attempts to detect
and correct any errors that occur.

     If you have a keyboard problem, you will have to experiment to see
which method is best for your system.



------------------------------------------------------------------------



3.  PATCH FOR XEROX VENTURA PUBLISHER (DOS/GEM VERSION)


     There is a bug in Xerox Ventura Publisher (tm) DOS/GEM versions 2.0
and later which causes the system to crash if Ventura Publisher is used
when Invisible LAN is loaded into expanded memory.  (There is no problem
if Invisible LAN is loaded into conventional DOS memory or shadow RAM.
Also, there is no problem with the Windows version of Ventura
Publisher.)

     We have developed a patch which fixes the bug in Ventura Publisher.
The patch consists of two programs:  VPFIX and VPDONE.

     You must run the VPFIX program before starting Ventura Publisher.
VPFIX alters the operation of the computer, so that the bug in Ventura
Publisher does not crash the system.

     You must run the VPDONE program after exiting from Ventura
Publisher.  VPDONE returns the operation of the computer to normal, so
that you can run other programs.

     We strongly recommend that you put the VPFIX and VPDONE commands
into the batch file which is used to run Ventura Publisher (usually
called VP.BAT or VPPROF.BAT).  The following is a sample VP.BAT batch
file to start Ventura Publisher (DRVRMRGR is the command that actually
starts Ventura Publisher):

        C:
        CD  \VENTURA
        VPFIX
        DRVRMRGR VP %1 /S=SDFEGAH5.EGA/M=01
        VPDONE

     The first time you run VPFIX, it uses up approximately 2.5K of DOS
memory.  VPDONE does not use any memory.



------------------------------------------------------------------------



4.  USING NETWORKER PLUS WITH INVISIBLE LAN


     Networker Plus (tm) is a pop-up utility from WordTech Systems.  It
lets you send a message, send a snapshot of your screen, have an
interactive conversation, and give commands to other computers.

     To use Networker Plus with Invisible LAN, follow these guidelines:

     1.  Install Networker Plus on a single file server and have all
workstations access this file server.  Workstations should not have
their own copies of Networker Plus.

     2.  Make sure all workstations use the same drive letter to refer
to the directory where Networker Plus is installed.  Use the MAP command
to establish the required drive mapping on each workstation, including
the server itself.

     3.  Before configuring the LAN.COM program (using the LANINST
installation program), start up Invisible LAN on the server and use the
MAP command to establish the drive letter reference to the Networker
Plus directory.  Then log in to that directory.  An example using drive
N:  to refer to the Networker Plus directory NWPLUS is:

        NET30  SERVER
        MAP  N:  \\SERVER\C:\NWPLUS
        N:
        LANINST

     4.  When configuring LAN.COM, select "IBM PC Network" or "Any Other
LAN" when prompted for the type of network being used.

     5.  When configuring LAN.COM, specify the drive letter used in the
MAP command when prompted for the drive letter where the program is
installed.  Using the example above, you would specify drive N.

     6.  After completing the configuration of LAN.COM, re-boot the
computer.

     7.  Synchronize the clocks on all your computers.  Make sure that
every workstation on the network uses the NETCLOCK command to get the
date and time from the file server where Networker Plus is installed.
Networker Plus doesn't work correctly unless the clocks are accurately
synchronized.

     8.  If you use DIALOG as a memory-resident program, you need to use
PopMaster.  Here is an example of how to start up Networker Plus on a
workstation:

        NET30
        NETCLOCK  \\SERVER\
        MAP  N:  \\SERVER\C:\NWPLUS
        POPMAST
        N:
        LAN  -M
        DIALOG  -M
        POPTOP



------------------------------------------------------------------------



5.  USING NETWORK COURIER WITH INVISIBLE LAN


     The Network Courier (tm) from Consumers Software is a pop-up
electronic mail utility that lets you send and receive messages, attach
files to messages, send mail to individuals or groups, and sort your
mail.

     To use Network Courier with Invisible LAN, follow these guidelines:

     1.  Install Network Courier on a single file server and have all
workstations access this file server.  Workstations should not have
their own copies of Network Courier.

     2.  Every computer in the network, including the server, should map
drive letter M:  to the directory where Network Courier is installed.
Use the MAP command to do so.  (If you use a drive letter other than M:,
you must use the -d switch when starting Network Courier.)

     3.  If you use the MONITOR pop-up utility, you must use PopMaster.
Here is an example of how to start up Network Courier on a workstation:


        NET30
        MAP  M:  \\SERVER\C:\COURIER
        POPMAST
        M:MONITOR  -K
        POPTOP

     4.  Never log in to drive M:.  (That is, never type M:  [Enter] at
the DOS prompt.) If you try to enter Network Courier while logged in to
drive M:, you will get an error message.



------------------------------------------------------------------------



6.  TURNING OFF THE INVISIBLE NETWORK HARDWARE


     If you are using Invisible Network Model 100, 200, or 300, you can
switch off the network hardware.  The most common reason for turning off
the network hardware is to enable the use of a tape drive which shares
the same DMA channel as the network card.

     To turn off the network hardware (Invisible Network Models 100,
200, and 300 only), give the command

        NETOFF

     After running NETOFF, the network hardware is totally inactive.  It
does not generate any interrupts, it does not use the DMA, and it does
not send or receive any data.

     To turn the network hardware back on, give the command

        NETON

     After giving the NETON command, the network card can be used
normally.  However, you should be aware that if the hardware was turned
off for more than 60 seconds, then any network sessions in progress may
have been lost.



------------------------------------------------------------------------



7.  USING VDISK WITH INVISIBLE RAM 386


     VDISK is a RAM Disk program that uses extended memory.  Beginning
with DOS 4.0, there was a change in the VDISK program that affects the
manner in which it coexists with Invisible RAM 386.  This section
describes the change, and how to deal with it.

     When you start Invisible RAM 386, you can specify that some of the
extended memory is to be reserved for extended memory applications, such
as VDISK and the Invisible LAN disk cache.  One of the parameters for
the 386 control program specifies the amount of extended memory to
reserve.

     If you start Invisible RAM 386 before starting VDISK, then the
reserved extended memory includes the memory used by VDISK.  This rule
applies in all versions of DOS.

     If you start VDISK before starting Invisible RAM 386, the
requirements vary depending on the DOS version.  For DOS version 3.3 and
earlier, the reserved extended memory includes the memory used by VDISK.
For DOS version 4.0 and later, the reserved extended memory does not
include the memory used by VDISK.

     EXAMPLE:  Suppose you are using Invisible RAM 386, the Invisible
LAN disk cache, and the VDISK program.  You want to use 2048K of
extended memory for the disk cache, and 1024K of extended memory for the
VDISK program.

     *  If you start Invisible RAM 386 before starting VDISK, you need
        to tell the 386 control program to reserve 3072K of extended
        memory.

     *  If you start VDISK before starting Invisible RAM 386, and you
        are using DOS 3.3 or earlier, you need to tell the 386 control
        program to reserve 3072K of extended memory.

     *  If you start VDISK before starting Invisible RAM 386, and you
        are using DOS 4.0 or later, you need to tell the 386 control
        program to reserve 2048K of extended memory.



------------------------------------------------------------------------



8.  BYPASSING INVISIBLE LAN


     You can prevent Invisible LAN from installing itself by pressing
Ctrl-Alt-Shift when the NET30 command is executed.  You must press the
Ctrl, Alt, and Shift keys before the NET30 command begins executing, and
hold the keys down until a message appears saying that Invisible LAN
will not install itself.

     This is useful if you place the NET30 command into your
AUTOEXEC.BAT file.  By pressing Ctrl-Alt-Shift, you can start your
computer without starting the network.



------------------------------------------------------------------------



9.  USING WINDOWS WITH INVISIBLE NETWORK MODELS 200/A AND 300/A


     Invisible Network Models 200/A and 300/A are network boards for the
Micro Channel.  Model 200/A runs at 1.8 megabits per second, while Model
300/A runs at 3.0 megabits per second.

     At the present time, you cannot run Windows in 386 enhanced mode if
you are using Model 200/A or 300/A.  You can run Windows in standard
mode instead.

     (Note that this restriction does NOT apply to Invisible Network
Models 100, 200, and 300.  You can run Windows in 386 enhanced mode with
Model 100, 200, or 300.)



------------------------------------------------------------------------



10.  PATCH FOR MAGIC PC


     There is a bug in some versions of Magic PC (tm) which causes
problems on some networks.  The symptom is that Magic PC cannot find
files on network drives.  This problem is caused by an incorrect usage
of a certain DOS function call.

     We have developed a program called MPCPAT.COM that "patches" the
affected DOS function call, so it returns the results expected by Magic
PC.

     MPCPAT.COM is a small memory-resident program.  You install
MPCPAT.COM after starting the network software, like this:

        NET30
        MPCPAT


     Technical Note:  The DOS function call that Magic PC uses
incorrectly is the TRUENAME function (INT 21h, function AH=60h).  Magic
PC uses TRUENAME to get the full pathname of a file, and then feeds the
output from TRUENAME directly into the OPEN function (INT 21h, function
AH=3Dh).  This is incorrect, because the output of TRUENAME is not
always in a form acceptable to OPEN.  This is particularly likely to
happen on network drives, but it can also happen on local drives if the
user has invoked the SUBST or JOIN commands.  MPCPAT alters the behavior
of the TRUENAME function so that when TRUENAME is called for a network
drive, the output of TRUENAME will be an acceptable input for OPEN.



------------------------------------------------------------------------



11.  PKZIP VERSION 2.04C


     PKZIP is a file compression shareware program developed by PKWare.
Version 2.04C of PKZIP sometimes exhibits the same bug as Magic PC (see
section 10 above).  When the bug occurs, it is usually because PKZIP is
trying to create a temporary file on a network drive, and it produces an
error message like "PKZIP: can't create".

     The bug was corrected in PKZIP version 2.04E.  If you have version
2.04C, we strongly recommend that you get version 2.04E or later.  It is
available for free on many computer bulletin boards.

     If you must use PKZIP version 2.04C, and if you encounter this bug,
you can correct it with the MPCPAT program.  See section 10 above for
instructions on running MPCPAT.
