Go to page of
Similar user manuals
-
Printer
Source Technologies STM.57B
14 pages 2.69 mb -
Printer
Source Technologies STM.57W
14 pages 2.74 mb -
Printer
Source Technologies ST9530
70 pages 0.9 mb -
Printer
Source Technologies ST9620
82 pages 4.64 mb -
Printer
Source Technologies STM.117B
13 pages 1.93 mb -
Printer
Source Technologies STI MICR ST9335 ST9335 ST9335
65 pages 0.24 mb -
Printer
Source Technologies STM.117W
13 pages 1.88 mb -
Printer
Source Technologies ST9650
79 pages 2.24 mb
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of Source Technologies ST9335, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Source Technologies ST9335 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of Source Technologies ST9335. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of Source Technologies ST9335 should contain:
- informations concerning technical data of Source Technologies ST9335
- name of the manufacturer and a year of construction of the Source Technologies ST9335 item
- rules of operation, control and maintenance of the Source Technologies ST9335 item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Source Technologies ST9335 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Source Technologies ST9335, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Source Technologies service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Source Technologies ST9335.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the Source Technologies ST9335 item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
ST9335 Secure MICR Printer User ’ s Guide Source T echnologies 2910 Whitehall Park Drive Charlotte, NC 28273 www .sourcetech.com techsupport@sourcetech.com 800-922-8501[...]
-
Page 2
This manual serves as a reference for Source T echnologies Secure MICR Printers. The user manual that ships with your printer contains details on printer setup and operations and should be read first. This manual should be used as a reference for learning more about MICR technology , and developing MICR printing applications. This guide was produce[...]
-
Page 3
T able of Contents 1 Printer Installation .......................................................... 1 2 MICR Overview ................................................................ 2 The Check Processing System .................................... 2 MICR Printing Today .................................................... 2 3 MICR Check Design ..[...]
-
Page 4
8 Audit T rail Report ............................................................ 34 Report Details ............................................................... 34 Audit T rail Menu ............................................................ 3 4 Audit T rail Command Set .............................................. 36 Figure 8.1: Audit T rail[...]
-
Page 5
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 1 All rights reserved 1 Printer Installation For complete information on how to unpack and setup your printer , see your printer ’s user ’s guide. Please read the following if you are going to install the printer driver shipped with your printer . 1. Locate the CD that wa[...]
-
Page 6
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 2 All rights reserved 2 MICR Overview MICR stands for Magnetic Ink Character Recognition. All MICR documents have a MICR line with numbers and symbols printed in a MICR font with magnetically chargeable toner. Each character of the MICR font has a unique waveform when sensed [...]
-
Page 7
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 3 All rights reserved The key standards that address check documents are as follows: ANSI X9.7 Specifications for Bank Check Background and Convenience Amount Field ANSI X9.13 Specifications for Placement and Location of MICR Printing ANSI X9.18 Paper Specifications for Check[...]
-
Page 8
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 4 All rights reserved 3 MICR Check Design General Features of Check Design To be a legal and negotiable document, the necessary elements required on a check are the date, amount, payee, drawee institution, and payer’s signature. Other elements included in a good check desig[...]
-
Page 9
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 5 All rights reserved Duplexing We do not recommend printing on both sides of the paper (duplexing) when printing checks. MICR toner on the back of a check can cause read failures in the MICR Line. Order your check stock with any necessary information preprinted on the back. [...]
-
Page 10
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 6 All rights reserved image capture equipment and is also a fraud deterrent. A fixed pitch courier font, or if available OCR-B, are also acceptable fonts to print the convenience amount. Note: The Source T echnologies’ Secure Numeric Font (see Appendix C) should not be used[...]
-
Page 11
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 7 All rights reserved Account Title The account title is normally printed in the upper left corner of the check. It includes the name of the account holder and other information such as addresses, telephone numbers, and logos. The data in the title should be legible and suffi[...]
-
Page 12
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 8 All rights reserved Routing Field Positions 43 to 33 The routing field is bounded by T ransit Symbols ( : ) in positions 43 and 33. It contains fixed format information about the drawee institution. Consult with your bank for the specific data field to be placed here for ea[...]
-
Page 13
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 9 All rights reserved Figure 3.1: Sample Check A . Serial Number: Must be in the upper right corner and match the serial number in the MICR line (see D for further explanation). B. Fractional Routing T ransit Number: Should be in the upper right corner and must match the rout[...]
-
Page 14
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 10 All rights reserved 4 Quality Issues A high quality MICR document can be read by bank reader/sorter equipment many times with no readability issues and does not result in damage to bank equipment. This quality is the result of a well designed printer, an originally manufac[...]
-
Page 15
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 11 All rights reserved MICR Check Stock Check stock has a large impact on the resulting quality and security of your MICR document. Here are a few features that should be considered when selecting a check stock. Please see Chapter 4 for more information on check stock securit[...]
-
Page 16
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 12 All rights reserved Moisture The paper moisture content should be between 4.7 and 5.5%. S torage conditions have much to do with the final moisture content of most papers. S tore your check stock in a cool, dry , environmentally stable and secure area. Protective wrappings[...]
-
Page 17
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 13 All rights reserved 5 Security Issues Printing negotiable documents from blank paper on desktop MICR laser printers makes security a top priority for any company embarking on a desktop check printing project. Good security programs integrate hardware, software, your employ[...]
-
Page 18
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 14 All rights reserved Security Note Check fraud in the United States is a continuing problem. We have attempted to identify security features that can be incorporated into the base check stock. However, these may not prove 100% fraud preventative. Over time, technology will [...]
-
Page 19
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 15 All rights reserved 8. Move methods of fraud detection to the item’s point of entry into the clearing system. For example, low cost readers can detect low magnetic strength in the MICR line which is a good indication of attempts to copy an original. 9. Always verify the [...]
-
Page 20
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 16 All rights reserved 6 MICR Features Source Technologies’ Secure MICR Printers are designed to allow both general office document printing and secure MICR document printing. You may print a variety of conventional jobs with regular Lexmark toner using all of the printer f[...]
-
Page 21
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 17 All rights reserved eye. This font provides protection against reproduction by most scanners and copiers because they cannot successfully print the tiny letters. Most check printers use this font in the signature area of their preprinted checks. We recommend using this fon[...]
-
Page 22
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 18 All rights reserved Flash Memory is an optional feature. It is user managed and resources can be designated as “secure” or “unsecure.” Secure resources are loaded to flash with the STL command and have ID numbers greater than or equal to 10000. They can only be acc[...]
-
Page 23
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 19 All rights reserved The Audit Menu deals with the optional Audit T rail Report settings. See chapter 7 for more information. Entering MICR Mode T o print MICR documents, your Secure MICR Printer uses special alphanumeric text commands called MICR Mode commands. There are t[...]
-
Page 24
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 20 All rights reserved When entering MICR mode with the &%STH command, the printer will: • Check to see if the proper Front Panel Combination has been entered (when enabled). • Allow access to secure check printing resources such as MICR fonts and secure fonts which a[...]
-
Page 25
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 21 All rights reserved In order to set a new password the current password must first be sent. Caution: Errors made in sending the new password command could lead to setting it to an unknown value. If the Password is unknown the printer must be returned to Source T echnologie[...]
-
Page 26
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 22 All rights reserved Print Secure Numeric Font & %SMFddd..ddd~ &%SMF Lead in sequence ddd...ddd Data to be printed in this font ~ Command terminator The dollar sign ($) is not a command terminator for this command. For both security fonts the tilde ~ (hex 7E) is the[...]
-
Page 27
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 23 All rights reserved Resource number 5001 is reserved for the Audit T rail overlay , see chapter 7. Format Flash Memory &%SFF$ &%SFF Lead in sequence $ Command terminator This command formats flash memory . A valid password command must precede this command. Caution[...]
-
Page 28
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 24 All rights reserved DES and AES Decr yption Data Encryption Standard (DES) and the recently approved Advanced Encryption Standard (AES) are both supported in the Source T echnologies Secure MICR Printers. The minimum Code Level support for AES is 8.5j. Levels 8.5i. and low[...]
-
Page 29
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 25 All rights reserved Section 6: MICR Features Set AES Decryption Key Command &% STSET AESKEY <32 Hex Characters> $ The command also requires a MICR Password Command be sent prior to the Key Command. The key data is similar to DES, but is twice in length with 32 He[...]
-
Page 30
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 26 All rights reserved Customer Character Conversation Command The Custom Character Conversion Command can be used to resolve some problems in printer data streams. An example might be to remove a special command character in an existing data stream that was used by your prev[...]
-
Page 31
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 27 All rights reserved Special Alert and Custom Beep Command Using the Beep Command, the printer data stream can alert printer operators that important pages are currently being printed. The STBEEP1 command sounds its special beeps but does not stop the printer . STBEEP2 stop[...]
-
Page 32
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 28 All rights reserved 7 IBM Host Programming Features and Examples Hex T ransfer The Hex T ransfer feature allows the user to send PCL escape sequence printer commands to the printer with simple text strings. Y ou may send any valid command or string of commands with no limi[...]
-
Page 33
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 29 All rights reserved Hex T ransfer Examples &&??&% This command enables Hex T ransfer On &%1B 26 6C 34 48 $ or &% 1B $& l 4H Sends the PCL Esc sequence: <Esc>&l4H which is a paper source command identifying what tray the paper will be pulle[...]
-
Page 34
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 30 All rights reserved Figure 7.1 MICR Mode Command Example The following example shows the MICR Mode commands and Hex Transfer commands in use. This datastream would print the check on the following page (assuming the check macro and the signature are loaded as flash resourc[...]
-
Page 35
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 31 All rights reserved Figure 7.2: Sample Check Section 7: IBM Host Programming Features and Examples VOID CHECK NO : 1000 2910 Whitehall Park Drive Charlotte, NC 28273 (704) 969-7500 First National Bank of Any State Any City , NC 27514 CHECK No . 1000 66-156 531 DA TE Octobe[...]
-
Page 36
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 32 All rights reserved The commands in Figure 7.1 in order of appearance : &%STFPASSWORD$ Password Command. &%SMCP0001$ MICR Definition Command with the count set to one. &%STP10001$ Unlock Flash Resource number 10001. &%STP20000$ Unlock Flash Resource number [...]
-
Page 37
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 33 All rights reserved Escape Character T ranslation In many IBM host environments, the programmer cannot send an ESC character (ASCII hex 1B) to the printer from within the application. Your Secure MICR Printer allows you to define the ESC character as a printable character [...]
-
Page 38
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 34 All rights reserved 8 Audit T rail Reports The Audit T rail Report feature provides a report of the printer ’s MICR printing activity . The printer must have flash memory to utilize this option. Details of each flagged check record sent to the printer are provided since [...]
-
Page 39
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 35 All rights reserved point, and no alpha characters. For example: Valid Formats Invalid Formats “$1,234,567.89” “$1,23,” “4321234.56” “432.123” “5,321” “34 test” “$.89” “12$123” If the value in field 4 is in an invalid format, that line will [...]
-
Page 40
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 36 All rights reserved Audit T rail Report Command Set &%SAR$ Start Audit Record &%SAR Lead in sequence $ Command terminator Marks the start of an audit record and begins a PJL job.. This command must be inserted in the datastream after MICR Mode is entered and before[...]
-
Page 41
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 37 All rights reserved Audit Report Field Four &%SQ4d..d~ &%SQ4 Lead in sequence d..d Data to be printed ~ Command terminator This command identifies the data to be printed in the fourth column of the report. It is a maximum of 16 characters in length. Since a total o[...]
-
Page 42
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 38 All rights reserved Print and Purge Audit Report &%SPURGExx$ &%SPURGE Lead in string x option(s) $ Command terminator This command prints and purges the Audit Report. All recorded information is deleted. The optional field can be any combination of the following le[...]
-
Page 43
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 39 All rights reserved St art Audit Feedback Command &%SAF$ The printer will report to the host that sent this command every time an audit job successfully prints. Each report will be a 151 byte string: byte 1 STX (0x02) bytes 2-15 field 1 of the audit record (from SQ1) 1[...]
-
Page 44
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 40 All rights reserved &&??&% &%STFP ASSWORD$ &%SMCP0001$ &%SAR$ &%STP10001$ &%STP20000$ &%1B266C3178307331683261363466306F3165316C372E3330431B2661304C 1B28733130481B266B31302E3030481B26663130303031793358$ 1000 &%SQ1 200 $ 200 V endor S[...]
-
Page 45
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 41 All rights reserved Figure 8.2 Audit T rail Check Sample The datastream in Figure 7.1 will print the following check (assuming the check macro and signature are loaded as flash resources). Section 8: Audit Trail Reports VOID VOID CHECK NO : 1000 2910 Whitehall Park Drive C[...]
-
Page 46
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 42 All rights reserved The commands in Figure 8.1 in order of appearance. (Audit Report fields shown in bold) &&??&% Hex transfer enable. &%STFPASSWORD$ Password command. &%SMCP0001$ MICR definition command with the count set to one. &%SAR$ Activates A[...]
-
Page 47
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 43 All rights reserved &%1B(3@ PCL command to return to the default font. &%1B$&f0S PCL command to push (store) the current cursor position. &%1B$*p296x3184Y PCL command to move the cursor to 296X, 3184Y. At 300 dpi, this is .97 inches across and 10.61 inches [...]
-
Page 48
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 44 All rights reserved This Audit Report is just one example of a report format. Any of the seven fields can be manipulated to show any information the user feels is appropriate. For example, the check amount could be in field 3 rather than field 4; or field 5 could contain i[...]
-
Page 49
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 45 All rights reserved 9 Error Messages Your Secure MICR Printer has a set of front panel error messages unique to MICR applications. These messages appear if there is a MICR related problem. The printer may also print an error message on the page near where the error occurre[...]
-
Page 50
Secure MICR Printer User’s Guide © Source T echnologies July 2003 Page 46 All rights reserved Error Message on Display Printed Message Description Action Can’t Purge Pswd not enabled Can’t Sort Insufficient Memory Command Decode Error Convert to Esc Error Flash Full Purge and Format Load MICR T oner Macro Definition Error Macro Definition Er[...]
-
Page 51
Secure MICR Printer User’s Guide © Source T echnologies July 2003 A1 All rights reserved Appendix A: E13B MICR Font Mapping Command &%SMDddd..ddd$ MICR Font Description Alpha/Numeric Hex V alues Character V alues 1 / / / / / Amount Symbol A a / 41 61 2F : : : : : Transit Symbol T t B b : 54 74 42 62 3A ; ; ; ; ; On-Us Symbol O o C c ; 4 F 6F[...]
-
Page 52
Secure MICR Printer User’s Guide © Source T echnologies July 2003 A2 All rights reserved Description Alpha/Numeric Hex V alues CMC7 Font Characters V alues 1 Zero 0 30 One 1 3 1 Tw o 2 3 2 Three 3 33 Four 4 3 4 Five 5 35 Six 6 3 6 Seven 7 3 7 Eight 8 3 8 Nine 9 3 9 Colon : 3A Semi-Colon ; 3B Less Than < 3 C Equal = 3 D Greater Than > 3E 1 [...]
-
Page 53
Secure MICR Printer User’s Guide © Source T echnologies July 2003 A3 All rights reserved Appendix C: Secure Numeric Font Mapping Command &%SMFddd...dd~ Description Alpha/Numeric Hex V alue Secure Font Character Character Dollar Sign $ 2 3 Left Bracket ( 2 8 Right Bracket ) 2 9 Asterisk * 2 A Comma , 2 C Dash - 2 D Period . 2E Slash / 2 F Zer[...]
-
Page 54
Secure MICR Printer User’s Guide © Source T echnologies July 2003 A4 All rights reserved Appendix C continued: Secure Numeric Font Mapping Description Alpha/Numeric Hex V alue Secure Font Character Character Three 3 33 Four 4 3 4 Five 5 35 Six 6 3 6 Seven 7 3 7 Eight 8 3 8 Nine 9 3 9 Arrow > 3 E Example: &%SMF($>>>1,123.00)~ will[...]
-
Page 55
Secure MICR Printer User’s Guide © Source T echnologies July 2003 A5 All rights reserved Appendix D: ICR Secure Numeric Font Mapping Command &%SMIxxxxxx~ Description Alpha/Numeric Hex V alue Character Character Zero 0 30 One 1 31 Tw o 2 3 2 Three 3 33 Four 4 3 4 Five 5 3 5 Six 6 3 6 Seven 7 37 Eight 8 3 8 Nine 9 3 9 Asterisk * 2 A Comma , 2 [...]
-
Page 56
Secure MICR Printer User’s Guide © Source T echnologies July 2003 A6 All rights reserved Appendix E: MICR Mode Command Summary Description Command Structure Function Password &%STFP ASSWORD$ Must be sent to enable &%STHP ASSWORD$ MICR Mode MICR Definition &%SMCPxxxx$ MICR Line Count command Set New Passwor d &%STExxxxxxxx$ Sets n[...]
-
Page 57
Secure MICR Printer User’s Guide © Source T echnologies July 2003 A7 All rights reserved Appendix F: Audit Report Command Summary Description Command Structure Function Start Audit Record &%SAR$ Activates Audit Trail and begins PJL job Audit Report Field One &%SQ1.d$ Records first field on the Audit Report - does not print Print MICR E13[...]
-
Page 58
Secure MICR Printer User’s Guide Source T echnologies July 2003 All rights reserved Appendix G: PJL Based MICR Commands In addition to supporting the T ext Based MICR Command Set described in Sections 6 and 7, this Secure MICR printer also supports the PJL based MICR Commands used on our slower speed models. The MICR code functions emulate th[...]
-
Page 59
Secure MICR Printer User’s Guide Source T echnologies July 2003 All rights reserved PJL Re-Lock Sequence W ith A New Password V alue <ESC>%-12345X@PJL DEFAULT LRESOURCE:”flash:” LRWLOCK=”xxxxxxxx”(0D)(0A) <ESC>%-12345X This command requires the resources to be previously unlocked. The new password is represented by the val[...]
-
Page 60
Secure MICR Printer User’s Guide Source T echnologies July 2003 All rights reserved MICR FONT NOTE – The E-13B and CMC7 Fonts are 8 characters per inch. T o position correctly at an exact 8 characters per inch, the printer must be set to an internal Unit of Mea- sure of 600 DPI or greater or must have a horizontal motion index command at 8 [...]
-
Page 61
Secure MICR Printer User’s Guide Source T echnologies July 2003 All rights reserved CARTRIDGE STATUS = UNKNOWN = OK = LOW = EMPTY CARTRIDGE SERIAL# = XXXXXXXX TONER LEVEL = 0-9 = UNKNOWN CARTRIDGE COUNT = XXXX LOW THRESHOLD = XXXX EMPTY THRESHOLD = XXXX • Printer S tate “Ready” is the expected return • Serial Number = Printer Serial N[...]
-
Page 62
Secure MICR Printer User’s Guide Source T echnologies July 2003 All rights reserved PJL MICR Command Example Figure 8.1, is an illustration of an Accounts Payable check and remitt ance information. The page used a PCL MACRO for the static data and background design. This manual does not address MACRO design and programming, but the variable t[...]
-
Page 63
Secure MICR Printer User’s Guide Source T echnologies July 2003 All rights reserved PCL Font Calls, Positioning Commands and V ariable Print Dat a The next eleven lines of data in the example call printer resident fonts, position the cursor , and print the variable information. We are again using the minimal data required, particularly the fo[...]
-
Page 64
Secure MICR Printer User’s Guide Source T echnologies July 2003 All rights reserved FIGURE 8.1 SAMPLE ACCOUNTS PA Y ABLE CHECK[...]
-
Page 65
Secure MICR Printer User’s Guide Source T echnologies July 2003 All rights reserved PJL and PCL commands used to print the sample check: <ESC>%-12345X@PJL LDECLARE LRESOURCE:"flash:" LRWLOCK="P ASSWORD" @PJL ENTER LANGUAGE = PCL <ESC>&l2a1h6d1e64F <ESC>&u600D <ESC>&f100y3X <ESC>(s4[...]