Lisa LCD 5
................................................................................................................................................. 7110.6 Implementation tips for a custom platform
11. Controlling the Lisa with commands
72
................................................................................................................................................. 7211.1 Task scheduling
.......................................................................................................................................................... 7311.1.1 Tasks and interruptions
.......................................................................................................................................................... 7511.1.2 Handling task execution failure
................................................................................................................................................. 7611.2 Remote control from monitoring server
................................................................................................................................................. 7611.3 Telnet
................................................................................................................................................. 7711.4 Command overview list
................................................................................................................................................. 8211.5 Examples of sending commands
12. Protecting device and content
84
................................................................................................................................................. 8412.1 Locking the hardware keys on the Lisa
................................................................................................................................................. 8412.2 Card track encryption
.......................................................................................................................................................... 8512.2.1 Generating an encryption key
.......................................................................................................................................................... 8512.2.2 Loading the encryption key into the Lisa