The Break Sequence
Before you start the password-recovery process, you need to be aware that the Break key sequence of the most common operating systems depends on the software you use. Table D-6 shows the standard Break key sequences you use with a variety of software.
Software | Platform | Operating System | Key Combination or Procedure |
---|---|---|---|
Hyperterminal | IBM-compatible | Windows 2000 | Ctrl-Break |
Hyperterminal (version 595160) | IBM-compatible | Windows 95 | Ctrl-F6-Break |
Kermit | Sun workstation | UNIX | Ctrl-\l Ctrl-\b |
MicroPhone Pro | IBM-compatible | Windows | Ctrl-Break |
Minicom | IBM-compatible | Linux | Ctrl-a f |
ProComm Plus | IBM-compatible | DOS or Windows | Alt-b |
Telix | IBM-compatible | DOS | Ctrl-End |
Telnet to Cisco | IBM-compatible | — | Ctrl-] |
Teraterm | IBM-compatible | Windows | Alt-b ... |
Get CCIE Practical Studies: Security (CCIE Self-Study) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.