Section 8.  Operation 
 
 
being copied, or making it tamper resistant.    .CR<X> files, or files specified by 
the Include() instruction, can be hidden using the FileHide() instruction.  The 
CR800 can locate and use hidden files on the fly, but a listing of the file or the file 
name are not available for viewing.    See File Management in CR800 Memory 
(p. 
416).
 
 
8.7.7  Signatures 
Recording and monitoring system and program signatures are important 
components of a security scheme.    Read more about use of signatures in 
Programming to Use Signatures 
(p. 169) and Signatures: Example Programs (p. 180). 
 
8.7.8  Read Only Variables 
The following example of variable declaration demonstrates how to display a 
value in numeric display (Connect or RTMC) or on a CR1000KD but not allow 
the person viewing it to make changes: 
•  Var can be viewed and changed 
•  Reg() and Coil() can only be viewed 
•  The CRBasic program can read from and write to all variables 
 
Public Var 
Public Reg(4), Coil(4) as Boolean 
ReadOnly Reg, Coil 
 
8.8  Memory — Details 
Related Topics: 
 •  Memory — Overview (p. 89) 
 •  Memory — Details (p. 406) 
 •  Data Storage Devices — List (p. 571) 
 •  TABLE: Info Tables and Settings: Memory (p. 535) 
 
8.8.1  Storage Media 
CR800 memory consists of four non-volatile storage media: 
•  Internal battery-backed SRAM 
•  Internal flash 
•  Internal serial flash 
•  External flash (optional flash USB: drive)