The Break Sequence

Before you start the password-recovery process, you need to be aware that the Break key sequence of the most common operating systems depends on the software you use. Table D-6 shows the standard Break key sequences you use with a variety of software.

Table D-6. Standard Break Key Combinations
SoftwarePlatformOperating SystemKey Combination or Procedure
HyperterminalIBM-compatibleWindows 2000Ctrl-Break
Hyperterminal (version 595160)IBM-compatibleWindows 95Ctrl-F6-Break
KermitSun workstationUNIXCtrl-\l Ctrl-\b
MicroPhone ProIBM-compatibleWindowsCtrl-Break
MinicomIBM-compatibleLinuxCtrl-a f
ProComm PlusIBM-compatibleDOS or WindowsAlt-b
TelixIBM-compatibleDOSCtrl-End
Telnet to CiscoIBM-compatibleCtrl-]
TeratermIBM-compatibleWindowsAlt-b ...

Get CCIE Practical Studies: Security (CCIE Self-Study) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.