Commodore Hacking Issue 14
########
##################
###### ######
#####
##### #### #### ## ##### #### #### #### #### #### #####
##### ## ## #### ## ## ## ### ## #### ## ## ##
##### ######## ## ## ## ##### ## ## ## ## ##
##### ## ## ######## ## ## ## ### ## ## #### ## ##
##### #### #### #### #### ##### #### #### #### #### #### ######
##### ##
###### ###### Issue #14
################## Version 1.0
######## November 1996
Alternate Representations:
-
text version (268725 bytes) - for easier
offline reading. Contains all articles in one ASCII text file
-
ZIP archive (161256 bytes) - for easier C64/128
reading. PKZIP 1.01 archive of issue as separate ASCII text files
Table of Contents
Features
-
In this age of internetworked computer systems, is the Commodore left out?
No way, as Bo Zimmerman describes how to coax your Commodore BBS system
to play the networking game. Bo shows how to set up your BBS so that Internet
users can "telnet" to your BBS from anywhere on the 'Net.
-
You've got this neat idea for a game, utility, or productivity application.
The engine is complete and working, but the user interface is a mess. Do
you scrap the project because you're not up to the task of writing a whole
UI engine? Nonsense. Jeff presents a rich set of functions and subroutines
to tame that killer application.
-
Has your computer system started looking like the multi-headed beast from
a "B" movie? Are you tired of having so many items on your desk? Do you
envy IBM PC owners with their all-in-one computer? Well, if you answered
YES! to any of the above, let Todd show you his souped up C128DCR. Learn
how you, too, can "upgrade" your computer system and refine its image.
-
Jim Butterfield has long been associated with the Commodore computer system,
from the days of the KIM-1 to the present. Many of us learned machine language
through Jim's articles or books, while most have benefitted from his early
work on creating memory maps and documenting KERNAL routines for the Commodore
line. Jim Lawless talks to the ubiquitous Commodore Guru.
Columns
-
In part II of Alan's "Heavy Math" series, he moves right into Linear Programming
and how to accomplish it on the C64. If you're still not sure what LP math
is, read on, as you'll be surprised at which everyday problems fall into
this category of mathematics.
15. Hacking BASICs by Richard T. Cunningham
-
Even as more and more programmers take up the ML flag and wave it proudly,
there are many who either use BASIC entirely, or prototype pieces of code
in BASIC before converting to ML. Richard outlines some common "gotchas"
in the ever-present programming language.
-
OK, VIC-20 enthusiasts, listen up. Resident VIC-20 cartridge expert Ward
Shrake details exactly how the VIC-20 and its cartridges work together
to allow the user to play games and use applications on cartridge. Ward
details how to archive your collection of VIC carts, as well as how the
computer recognizes and executes code on a cartridge.
Departments
C= Hacking Home
Copyright ©
1992 - 1997 Commodore Hacking
Commodore,
CBM, its respective computer system names, and the CBM logo are
either registered trademarks or trademarks of ESCOM GmbH or
VISCorp in the United States and/or other countries. Neither
ESCOM nor VISCorp endorse or are affiliated with Commodore
Hacking.
Commodore
Hacking is published by:
Last Updated: 1997-03-31 by Jim
Brain