delorie.com/archives/browse.cgi | search |
X-Apparently-From: | <pmoran22 AT yahoo DOT com> |
Message-ID: | <002001c058fc$e9c33060$818a1004@dbcooper> |
From: | "Patrick Moran" <pmoran22 AT yahoo DOT com> |
To: | <opendos AT delorie DOT com> |
References: | <DDCDC9DE5EC0D411AE7B0090273F74A412C9D2 AT emwatent02 DOT meters DOT com DOT au> |
Subject: | Re: EMS (was: BASIC & EMS, nee Optimizing CONFIG.SYS...) |
Date: | Mon, 27 Nov 2000 22:29:47 -0700 |
MIME-Version: | 1.0 |
X-Priority: | 3 |
X-MSMail-Priority: | Normal |
X-Mailer: | Microsoft Outlook Express 5.00.3018.1300 |
X-MimeOLE: | Produced By Microsoft MimeOLE V5.00.3018.1300 |
Reply-To: | opendos AT delorie DOT com |
Heh Heh, yeah that is easy to do. Cloak is similar in meaning to STEALTH. You are speaking of STEALTH when referring to QEMM. That is a very good book and really explains a lot about how upper, extended and expanded memory works. It also explains some of the popular memory managers. Pat ----- Original Message ----- From: "Da Silva, Joe" <Joe DOT DaSilva AT emailmetering DOT com> To: <opendos AT delorie DOT com> Sent: Monday, November 27, 2000 4:13 PM Subject: RE: EMS (was: BASIC & EMS, nee Optimizing CONFIG.SYS...) > Hmmm ... Perhaps I have my terminology "mixed up"? _________________________________________________________ Do You Yahoo!? Get your free @yahoo.com address at http://mail.yahoo.com
webmaster | delorie software privacy |
Copyright © 2019 by DJ Delorie | Updated Jul 2019 |