Bulletproofing the Database

Size: px
Start display at page:

Download "Bulletproofing the Database"

Transcription

1 Bulletproofing the Database Robert Grauer, Keith Mulbery, Maurie Wigman Lockley Copyright 2008 Pearson Prentice Hall. All rights reserved. 1

2 Objectives Encrypt and password protect a database Digitally sign and publish a database Save the database as an ACCDE file Analyze database documentation Analyze database performance Copyright 2008 Pearson Prentice Hall. All rights reserved. 2

3 Objectives Analyze database table structure and relationships Move data to a new database file Analyze/optimize object relationships in a database Create usable switchboards Copyright 2008 Pearson Prentice Hall. All rights reserved. 3

4 Data Protection Countermeasures Measures taken to protect your assets Access provides three countermeasure strategies Password Protection Ability to digitally sign database Creation of ACCDE file Copyright 2008 Pearson Prentice Hall. All rights reserved. 4

5 Password Protection Prevents unauthorized use of a file Need to follow certain guidelines Include combination of letters and numbers Six or eight characters long Combine uppercase, lowercase and symbols Last name and age Bad Smith18 Good crid8st! Combination of uppercase, lowercase, numbers, letters and symbols Copyright 2008 Pearson Prentice Hall. All rights reserved. 5

6 Assigning a Password in Access Prompt to Open database in Exclusive mode Open database for Exclusive Use Click to add password Access open dialog box Click arrow next to Open button Click Open Exclusive Use the Encrypt with Password command Database tools tab, database tools group Copyright 2008 Pearson Prentice Hall. All rights reserved. 6

7 Assigning a Password in Access Enter password Verify password Enter password in Password text box Reenter password in Verify text box If no match, you must re-verify Copyright 2008 Pearson Prentice Hall. All rights reserved. 7

8 Removing a Password Decrypt Password Enter Password Open in Exclusive mode Choose Decrypt database Database Tools group, Database Tools tab Enter the Password, click OK Copyright 2008 Pearson Prentice Hall. All rights reserved. 8

9 Digitally Sign and Publish a Database - Terminology Digital Signature Electronic Authentication Certification authority Commercial company that validates signatures Timestamp Encrypts date/time as part of the signature Copyright 2008 Pearson Prentice Hall. All rights reserved. 9

10 Creating a Digital Signature Package and Sign Click the Office button Click Publish Select Package and Sign Copyright 2008 Pearson Prentice Hall. All rights reserved. 10

11 Creating a Digital Signature Select a certificate Click OK Can also view existing certificate Database is packaged as ACCDE file Copyright 2008 Pearson Prentice Hall. All rights reserved. 11

12 ACCDE Files Previous Versions = MDE files Office 2007 = ACCDE files When saved as an ACCDE file Visual Basic code is removed Certain permissions are denied Use of database objects is prohibited Code and objects can be used They can not be modified Copyright 2008 Pearson Prentice Hall. All rights reserved. 12

13 ACCDE file An.accde file is the Office Access 2007 version of the.mde file in earlier versions of Access. It is a locked-down version of the original.accdb file. If the.accdb file contained any VBA code, only the compiled code is included in the.accde file - as a result, the VBA code cannot be viewed or modified by the user. The ACCDE file allows users to perform normal database operations, but prohibits creation of database objects and alterations to the designs of forms and reports. Copyright 2008 Pearson Prentice Hall. All rights reserved. 13

14 Benefits of an ACCDE File An ACCDE file has the following benefits: Reduces the size of the database. Optimizes memory usage and improves performance. Protects the VBA code from being viewed or edited while still allowing it to run. Allows users to update data and run reports without providing the entire database. Forms and Reports in an ACCDE File An ACCDE file does not allow you to: View, modify, or create forms, reports, or modules in Design view. Add, delete, or change references to databases or object libraries. Change code there is no source code. Import or export forms, reports, or code modules ACCDE File Requirements Before converting a database to an ACCDE file, you must password protect the database and save all references to other Access databases. Copyright 2008 Pearson Prentice Hall. All rights reserved. 14

15 Creating an ACCDE File Save As dialog box Make ACCDE file ACCDE extension Package and Sign a file OR Click Make ACCDE file Database Tools tab, database tools group Click Save Uses the same filename unless specified Copyright 2008 Pearson Prentice Hall. All rights reserved. 15

16 Caution: ACCDE Files Before converting to ACCDE format Make a back-up copy Conversion cannot be undone! Changes may need to be made later ACCDE file can t be modified Modify the backup and re-convert You must open in exclusive mode Copyright 2008 Pearson Prentice Hall. All rights reserved. 16

17 Database Analysis Tools Access provides three tools Database Documenter Performance Analyzer Table Analyzer Copyright 2008 Pearson Prentice Hall. All rights reserved. 17

18 The Database Documenter Database Documenter Creates documentation on all objects Create a data dictionary Itemizes and lists object attributes Click Database Documenter Database Tools tab, Analyze Group Copyright 2008 Pearson Prentice Hall. All rights reserved. 18

19 Using the Database Documenter Database Documenter dialog box Documenter Report Select objects to include in report Generate the report by clicking OK Copyright 2008 Pearson Prentice Hall. All rights reserved. 19

20 The Performance Analyzer Performance Analyzer Identifies design flaws Analyzes one or more objects Recommends optimizations Launched by clicking Analyze Performance Database Tools tab, Analyze Group Copyright 2008 Pearson Prentice Hall. All rights reserved. 20

21 Using the Performance Analyzer Select objects to analyze Results Select the objects to analyze View results in the Results Analysis pane Given three potential solution for problems Recommendations click icon to make changes Suggestion click the icon to make changes Idea You must implement manually Copyright 2008 Pearson Prentice Hall. All rights reserved. 21

22 Table Analyzer Examines how tables are structured Aids in normalization eliminating redundant data Three different levels of normalization 1NF (First Normal Form) Repeating groups eliminated 2NF Removes partial dependences 3NF Removes transitive dependencies Copyright 2008 Pearson Prentice Hall. All rights reserved. 22

23 Using the Table Analyzer Analyze Table Identify table to analyze Click Analyze Table Database Tools tab, Analyze Group Analyzer Wizard launches Identify table for analysis Make desired choices in Wizard Click Finish Copyright 2008 Pearson Prentice Hall. All rights reserved. 23

24 Splitting a Database One database Back-end Split Back-end Copy of original database only tables Front-end Copy of original database excluding tables Contains only tables Front-end Contains forms, queries, report no tables Copyright 2008 Pearson Prentice Hall. All rights reserved. 24

25 Database Splitter Database Splitter Creates front-end and back-end simultaneously Prompts to back up the database Prompts you to name both ends Copyright 2008 Pearson Prentice Hall. All rights reserved. 25

26 Understand Normalization Progression from one normal form to the next 1NF Promotes atomic fields Fields that contain only one value 2NF removes partial dependencies Depends on part of a composite key 3NF removes transitive dependencies Relationship problems between tables Copyright 2008 Pearson Prentice Hall. All rights reserved. 26

27 Switchboards Switchboard Allow non-access users to use Database Provide an attractive graphical interface Provides an intuitive environment Copyright 2008 Pearson Prentice Hall. All rights reserved. 27

28 Create a Switchboard Click Edit Use the Switchboard Manager Database Tools tab, Database Tools group Click Yes to create new switchboard Click Edit in Switchboard Manager Copyright 2008 Pearson Prentice Hall. All rights reserved. 28

29 Completing the Switchboard Manager Type text to appear in menu Choose how to how to open object Click Form arrow Select object to run Repeat process for additional items Copyright 2008 Pearson Prentice Hall. All rights reserved. 29

Exploring Microsoft Office Access 2007

Exploring Microsoft Office Access 2007 Exploring Microsoft Office Access 2007 Chapter 1: Finding Your Way Through a Database Robert Grauer, Keith Mulbery, Maurie Wigman Lockley Committed to Shaping the Next Generation of IT Experts. Copyright

More information

Introduction to Computer Applications. CISY 1225 Chapter 10. Zahoor Khan, PhD

Introduction to Computer Applications. CISY 1225 Chapter 10. Zahoor Khan, PhD Introduction to Computer Applications CISY 1225 Chapter 10 Zahoor Khan, PhD Last updated: May 2014 No new topics I will not be here Next Week Mashtura will help you Class time is for practice Do your own

More information

Digital Certificate Service (DCS) - User Guide

Digital Certificate Service (DCS) - User Guide Digital Certificate Service (DCS) - User Guide Information Security Branch Contents Using this Guide... 3 User Requirements... 3 Secure E-mail Messaging... 4 Send a Secure E-mail Message... 4 Receive a

More information

Administering a Database System

Administering a Database System Microsoft Access 2010 10 Administering a Database System Objectives You will have mastered the material in this project when you can: Create custom Quick Start fields Create indexes Create a Web database

More information

Access made easy. The Access Object.

Access made easy. The Access Object. Access made easy. The Access Object 01 www.accessallinone.com This guide was prepared for AccessAllInOne.com by: Robert Austin This is one of a series of guides pertaining to the use of Microsoft Access.

More information

USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003)

USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003) YATANARPON TELEPORT COMPANY LTD., YATANARPON CERTIFICATION AUTHORITY USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003) Yatanarpon Teleport Company Ltd., Hlaing Universities Campus, Hlaing Township,

More information

MICRSOFT OFFICE PACKAGE COURSE OUTLINES

MICRSOFT OFFICE PACKAGE COURSE OUTLINES MICRSOFT OFFICE PACKAGE COURSE OUTLINES Document Created by: Sivashankar Santhanam Training Course Outline- 3 Levels for Access 2013 Beginner Level -Access: In this course, students will learn how to use

More information

KYOCERA Net Viewer User Guide Supplement

KYOCERA Net Viewer User Guide Supplement KYOCERA Net Viewer User Guide Supplement Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be

More information

How to Import a Certificate When Using Microsoft Windows OS

How to Import a Certificate When Using Microsoft Windows OS How to Import a Certificate When Using Microsoft Windows OS This document explains the process of importing your digital certificate for use in Microsoft Internet Explorer (IE) and/or Mozilla Firefox.

More information

QuickBooks Windows Web Connect to Direct Connect

QuickBooks Windows Web Connect to Direct Connect QuickBooks for Windows Conversion Instructions QuickBooks Windows 2010-2013 Web Connect to Direct Connect Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 DOCUMENTATION & PROCEDURES... 3 Task

More information

Workshop on Windows Server 2012

Workshop on Windows Server 2012 Workshop on Windows Server 2012 Topics covered on Workshop DHCP Scope Splitting. A Dynamic Host Configuration Protocol (DHCP) split-scope configuration using multiple DHCP servers allows for increased

More information

ACCESS 2007 ADVANCED

ACCESS 2007 ADVANCED ACCESS 2007 ADVANCED WWP Learning and Development Ltd Page i Contents CONCEPTS OF NORMALISATION...1 INTRODUCTION...1 FIRST NORMAL FORM...1 SECOND NORMAL FORM...1 THIRD NORMAL FORM...1 FOURTH NORMAL FORM...2

More information

Creating and Reading SecurDisc Discs. SecurDisc - the technology 2

Creating and Reading SecurDisc Discs. SecurDisc - the technology 2 T U Creating and Reading SecurDisc Discs T O R I A L SecurDisc - the technology 2 Requirements 2 Creating SecurDisc discs: Nero Express 2 Reading SecurDisc discs: InCD or InCD Reader 3 Reading copy-protected

More information

MCSA Guide to Networking with Windows Server 2016, Exam

MCSA Guide to Networking with Windows Server 2016, Exam MCSA Guide to Networking with Windows Server 2016, Exam 70-741 First Edition Chapter 7 Implementing Network Policy Server 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in

More information

QuickBooks Windows Web Connect

QuickBooks Windows Web Connect QuickBooks for Windows Conversion Instructions QuickBooks Windows 2010-2013 Web Connect Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 DOCUMENTATION AND PROCEDURES... 3 Task 1: Conversion Preparation...

More information

Exploring Microsoft Office PowerPoint 2007

Exploring Microsoft Office PowerPoint 2007 Exploring Microsoft Office PowerPoint 2007 Chapter 1: Presentations Made Easy Robert Grauer, Keith Mulbery, Cynthia Krebs Objectives Identify PowerPoint user interface elements Use PowerPoint views Open

More information

Switchboard. Creating and Running a Navigation Form

Switchboard. Creating and Running a Navigation Form Switchboard A Switchboard is a type of form that displays a menu of items that a user can click on to launch data entry forms, reports, queries and other actions in the database. A switchboard is typically

More information

Getting Started With HMH Hosting Services

Getting Started With HMH Hosting Services Getting Started With HMH Hosting Services For use with HMH Hosting Services, HMH Teacher Central, HMH Student Central and Student Achievement Manager version 2.6 or later Table of Contents HMH Hosting

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

M i c r o s o f t. Office Introductory Concepts and Techniques. Access Project 1. Creating and Using a Database

M i c r o s o f t. Office Introductory Concepts and Techniques. Access Project 1. Creating and Using a Database M i c r o s o f t Office 2003 Introductory Concepts and Techniques Access Project 1 Creating and Using a Database Objectives Describe databases and database management systems Start Access Describe the

More information

Creating a Crosstab Query in Design View

Creating a Crosstab Query in Design View Procedures LESSON 31: CREATING CROSSTAB QUERIES Using the Crosstab Query Wizard box, click Crosstab Query Wizard. 5. In the next Crosstab Query the table or query on which you want to base the query. 7.

More information

KYOCERA Net Viewer 5.3 User Guide

KYOCERA Net Viewer 5.3 User Guide KYOCERA Net Viewer. User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

KYOCERA Net Viewer User Guide

KYOCERA Net Viewer User Guide KYOCERA Net Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Once a USB drive has been inserted into an encrypted machine, the Dell Data Protection software will recognize the unencrypted device.

Once a USB drive has been inserted into an encrypted machine, the Dell Data Protection software will recognize the unencrypted device. Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they

More information

Configuration of Microsoft SQL Server Express

Configuration of Microsoft SQL Server Express Configuration of Microsoft SQL Server Express Copyright 2017 NetSupport Ltd All rights reserved Configuration of Microsoft SQL Server Express and NetSupport DNA Installation Requirements If installing

More information

9.4 Authentication Server

9.4 Authentication Server 9 Useful Utilities 9.4 Authentication Server The Authentication Server is a password and account management system for multiple GV-VMS. Through the Authentication Server, the administrator can create the

More information

Acknowledgments Introduction. Part I: Programming Access Applications 1. Chapter 1: Overview of Programming for Access 3

Acknowledgments Introduction. Part I: Programming Access Applications 1. Chapter 1: Overview of Programming for Access 3 74029ftoc.qxd:WroxPro 9/27/07 1:40 PM Page xiii Acknowledgments Introduction x xxv Part I: Programming Access Applications 1 Chapter 1: Overview of Programming for Access 3 Writing Code for Access 3 The

More information

Introduction to Mail Merge. Use IT+

Introduction to Mail Merge. Use IT+ Introduction to Use IT+ Introduction is a useful tool that allows you to produce multiple letters, labels, envelopes, name tags, and more using information stored in a list, database, or spreadsheet. When

More information

ACCESS 2007 ADVANCED

ACCESS 2007 ADVANCED ACCESS 2007 ADVANCED Welcome! Thank you for choosing WWP as your learning and development provider. We hope that your programme today will be a stimulating, informative and rewarding experience. Our highly

More information

Mail Merge. To Use Mail Merge: Selecting Step by Step Mail Merge Wizard. Step 1:

Mail Merge. To Use Mail Merge: Selecting Step by Step Mail Merge Wizard. Step 1: Mail Merge When you are performing a Mail Merge, you will need a Word document (you can start with an existing one or create a new one), and a recipient list, which is typically an Excel workbook. Watch

More information

SC-3 USB Token. QUICK Reference. Copyright 2007 CRYPTOCard Corporation All Rights Reserved

SC-3 USB Token. QUICK Reference. Copyright 2007 CRYPTOCard Corporation All Rights Reserved SC-3 USB Token QUICK Reference Copyright 2007 CRYPTOCard Corporation All Rights Reserved 091807 http://www.cryptocard.com Table of Contents OVERVIEW... 1 OPERATING MODES & OPTIONS... 2 USING THE SC-3 USB

More information

Copyright PCVITA Software. All Rights Reserved

Copyright PCVITA Software. All Rights Reserved This guide is provided to help the administrators or users to starts implement the job of Google Apps Migration for Microsoft Outlook without any hassles. PCVITA Software provides 24/7 online technical

More information

TOP Server Version 6 Security Settings

TOP Server Version 6 Security Settings TOP Server 1 (10) TOP Server Version 6 TOP Server 2 (10) Contents Security Built In... 3 User Manager Configuration... 3 New User Accounts... 5 New User Group and Properties... 5 Configuration Security...

More information

Contents About This Guide... 5 About Notifications... 5 Managing User Accounts... 6 Managing Companies Managing Password Policies...

Contents About This Guide... 5 About Notifications... 5 Managing User Accounts... 6 Managing Companies Managing Password Policies... Cloud Services Identity Management Administration Guide Version 17 July 2017 Contents About This Guide... 5 About Notifications... 5 Managing User Accounts... 6 About the User Administration Table...

More information

Calendar & Buttons Dashboard Menu Features My Profile My Favorites Watch List Adding a New Request...

Calendar & Buttons Dashboard Menu Features My Profile My Favorites Watch List Adding a New Request... remitview User Guide 1 TABLE OF CONTENTS INTRODUCTION... 3 Calendar & Buttons... 3 GETTING STARTED.... 5 Dashboard.... 7 Menu Features... 8 PROFILE.... 10 My Profile... 10 My Favorites... 12 Watch List...

More information

Managing NCS User Accounts

Managing NCS User Accounts 7 CHAPTER The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and

More information

Proprietary Rights 2014 Qarbon.com, Inc. All rights reserved

Proprietary Rights 2014 Qarbon.com, Inc. All rights reserved User Manual Proprietary Rights 2014 Qarbon.com, Inc. All rights reserved The information contained in this manual is subject to change at any time and without prior notice. No part of this manual may be

More information

Guide Installation and User Guide - Mac

Guide Installation and User Guide - Mac Guide Installation and User Guide - Mac With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign

More information

City National E Deposit SM User Guide

City National E Deposit SM User Guide City National E Deposit SM User Guide July 2016 Copyright 2016 by City National Bank Member FDIC All rights reserved. No part of this User Guide may be reproduced or transmitted in any form or by any means,

More information

ebackup 11.0 and 12.0 for Easy Dental

ebackup 11.0 and 12.0 for Easy Dental ebackup 11.0 and 12.0 for Easy Dental BACKUP RECOMMENDATIONS PRACTICE SOLUTIONS www.easydental.com/eservices 1-800-734-5561 ii Contents PUBLICATION DATE March 2012 COPYRIGHT 2012 Henry Schein, Inc. All

More information

Storage Security Software (Version )

Storage Security Software (Version ) For Toshiba CANVIO series Storage Security Software (Version 1.00.6904) User s Manual Version 1.00 This document explains the installation process and basic usage of the Storage Security Software designed

More information

How to Configure Office 365 for Inbound and Outbound Mail

How to Configure Office 365 for Inbound and Outbound Mail How to Configure Office 365 for Inbound and Outbound Mail You can configure Microsoft Office 365 with the Barracuda Email Security Service as your inbound and/or outbound mail gateway. If you make setting

More information

MyFloridaNet-2 (MFN-2) Customer Portal/Password Management Reference Guide

MyFloridaNet-2 (MFN-2) Customer Portal/Password Management Reference Guide MyFloridaNet-2 (MFN-2) Customer Portal/Password Management Reference Guide REVISION RECORDS REVISION DATE DESCRIPTION 0 27 September 2017 Initial Submittal. 1 06 October 2017 Second Submittal. - 17 October

More information

Put Final Touches on an Application

Put Final Touches on an Application Put Final Touches on an Application Callahan Chapter 11 Preparing Your Application for Distribution Controlling How Your Application Starts Forms-based bound forms for data presentation dialog boxes Switchboard

More information

Managing Users and Configuring Role-Based Access Control

Managing Users and Configuring Role-Based Access Control Managing s and Configuring Role-Based Access Control This section describes how to manage users in Prime Central, including defining users and passwords and configuring role-based access control (RBAC).

More information

Microsoft Outlook (A guide to help you better understand and utilize MS Outlook)

Microsoft Outlook (A guide to help you better understand and utilize MS Outlook) Microsoft Outlook (A guide to help you better understand and utilize MS Outlook) Ramapo College of New Jersey Center for Computing Information Systems (CCIS) Administrative Help-Desk ext. 7000 adm_help@ramapo.edu

More information

Rev X 341. Table 111. Access Levels and Descriptions

Rev X 341. Table 111. Access Levels and Descriptions 9424200994 Rev X 341 Multiple levels of security give personnel the level of access appropriate for the tasks they routinely perform while securing critical settings from unauthorized access. Access Levels

More information

Sophos Anti-Virus for NetApp Storage Systems

Sophos Anti-Virus for NetApp Storage Systems Sophos Anti-Virus for NetApp Storage Systems user guide Product Version: 3.0 Contents About this guide... 1 About Sophos Anti-Virus for NetApp Storage Systems...2 System requirements... 4 Before you install

More information

Modern Systems Analysis and Design

Modern Systems Analysis and Design Modern Systems Analysis and Design Sixth Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Designing Databases Learning Objectives Concisely define each of the following key database design terms:

More information

Set Up with Microsoft Outlook 2013 using POP3

Set Up  with Microsoft Outlook 2013 using POP3 Page 1 of 14 Help Center Set Up E-mail with Microsoft Outlook 2013 using POP3 Learn how to configure Microsoft Outlook 2013 for use with your 1&1 e-mail account using the POP3 Protocol. Before you begin,

More information

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017 BROWSER-BASED SUPPORT CONSOLE USER S GUIDE 31 January 2017 Contents 1 Introduction... 2 2 Netop Host Configuration... 2 2.1 Connecting through HTTPS using Certificates... 3 2.1.1 Self-signed certificate...

More information

Business Insights Dashboard

Business Insights Dashboard Business Insights Dashboard Sage 500 ERP 2000-2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks

More information

Microsoft. Access Microsoft Office Specialist 2010 Series EXAM COURSEWARE Achieve more. For Evaluation Only

Microsoft. Access Microsoft Office Specialist 2010 Series EXAM COURSEWARE Achieve more. For Evaluation Only Microsoft Access 2010 Microsoft Office Specialist 2010 Series COURSEWARE 3245 1 EXAM 77 885 Achieve more Microsoft Office Specialist 2010 Series Microsoft Access 2010 Core Certification Lesson 1: Exploring

More information

Creating User-Friendly Databases

Creating User-Friendly Databases Creating User-Friendly Databases Chapter 8 Databases are often created by a small number of people then used by a larger number of others. Often these people do not know how to use all the features of

More information

Word Tutorial 10. Managing Long Documents COMPREHENSIVE

Word Tutorial 10. Managing Long Documents COMPREHENSIVE Word Tutorial 10 Managing Long Documents COMPREHENSIVE Objectives Create a master document Create, split, merge, and remove subdocuments Control text flow and page breaks Add automatic heading numbers

More information

Access ACS. Administrator s User Guide

Access ACS. Administrator s User Guide Access ACS Administrator s User Guide Copyright Copyright 2009 ACS Technologies Group, Inc. All rights reserved. Reproduction of any part of this publication by mechanical or electronic means, including

More information

Cisco SME Key Management

Cisco SME Key Management CHAPTER 6 This chapter contains information about Cisco Storage Media Encryption comprehensive key management. It includes the following topics: Key Hierarchy, page 6-1 Cisco Key Management Center, page

More information

Key File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171

Key File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Key File Generation NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Table of Contents Introduction... 2 PuTTY Installation... 2 Key Generation... 7 Configuring PuTTY

More information

Microsoft Access 2010

Microsoft Access 2010 Microsoft Access 2010 Microsoft Access is database software that provides templates to help you add databases that make it easier to track, report, and share data with others. Although very powerful, the

More information

Backup and Restore. About Backup and Restore

Backup and Restore. About Backup and Restore About, page 1 Back Up DNA Center, page 2 Restore DNA Center, page 4 Schedule a Backup, page 5 About The backup and restore procedures for DNA Center can be used for the following purposes: To create backup

More information

Configuring Administrative Operations

Configuring Administrative Operations Configuring Administrative Operations This section includes the following topics: Administrative Operation Conventions, page 1 Configuring Backup Operations, page 1 Restoring a Backup Configuration, page

More information

Exploring Microsoft Office Excel 2007

Exploring Microsoft Office Excel 2007 Exploring Microsoft Office Excel 2007 Chapter 5 Data to Information Robert Grauer, Keith Mulbery, Judy Scheeren Committed to Shaping the Next Generation of IT Experts. Copyright 2008 Pearson Prentice Hall.

More information

Doc. Version 1.0 Updated:

Doc. Version 1.0 Updated: OneStop Reporting Report Composer 3.5 User Guide Doc. Version 1.0 Updated: 2012-01-02 Table of Contents Introduction... 2 Who should read this manual... 2 What s included in this manual... 2 Symbols and

More information

Installation Guide. Last Revision: Oct 03, Page 1-

Installation Guide. Last Revision: Oct 03, Page 1- Installation Guide Last Revision: Oct 03, 2005 -Page 1- Contents Before You Begin... 2 Installation Overview... 2 Installation for Microsoft Windows 2000, Windows 2003, and Windows XP Professional... 3

More information

QuickBooks for Mac Conversion Instructions

QuickBooks for Mac Conversion Instructions QuickBooks for Mac Conversion Instructions Web Connect to Direct Connect Introduction As Southbridge Savings Bank completes its system conversion to Cornerstone Bank, you will need to modify your QuickBooks

More information

Word Processing Microsoft Word 2010

Word Processing Microsoft Word 2010 Word Processing Microsoft Word 2010 Prepared by: Teo Siew Copyright 2017 MAHSA UNIVERSITY Faculty of Business, Finance, and Hospitality Objectives Understand how word processors work Customize Microsoft

More information

QuickBooks Conversion Instructions

QuickBooks Conversion Instructions QuickBooks Conversion Instructions QuickBooks for Windows QuickBooks for Mac QuickBooks Online QuickBooks Windows Conversion Instructions Web Connect to Direct Connect Introduction Needham Bank is pleased

More information

Sage DacEasy. Getting Started Guide

Sage DacEasy. Getting Started Guide Sage DacEasy Getting Started Guide Sage DacEasy Getting Started Copyright Trademarks Information in this document is subject to change without notice. Company names and data used in examples herein are

More information

Release Notes. CaseWare Working Papers

Release Notes. CaseWare Working Papers Release Notes CaseWare Working Papers 2017.00.225 October 2017 Index 1. Executive summary CaseWare Working Papers 2017... 3 2. Features... 3 2.1. CaseWare Cloud... 3 2.2. Engagement Management... 3 2.3.

More information

Hitachi High Technologies America, Inc. Password Policy

Hitachi High Technologies America, Inc. Password Policy Hitachi High Technologies America, Inc. Password Policy Revision Date: 4/17/2015 Table of Contents Table of Contents...2 Overview...3 Scope. 3 Guidelines...3 A. General Password Construction Guidelines...3

More information

Exploring Microsoft Office Word 2007

Exploring Microsoft Office Word 2007 Exploring Microsoft Office Word 2007 Chapter 3: Enhancing a Document Robert Grauer, Keith Mulbery, Michelle Hulett Objectives Insert a table Format a table Sort and apply formulas to table data Convert

More information

QuickBooks for Windows Conversion Instructions

QuickBooks for Windows Conversion Instructions QuickBooks for Windows Conversion Instructions QuickBooks Windows 2011-2014 Web Connect to Direct Connect Table of Contents TABLE OF CONTENTS... 1 INTRODUCTION... 2 DOCUMENTATION & PROCEDURES... 2 Task

More information

PKI Contacts PKI for Fraunhofer Contacts

PKI Contacts PKI for Fraunhofer Contacts Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 03.02.2017

More information

Titan FTP Server SSH Host Key Authentication with SFTP

Titan FTP Server SSH Host Key Authentication with SFTP 2016 Titan FTP Server SSH Host Key Authentication with SFTP A guide for configuring and maintaining SSH Host Key Authentication for SFTP connections in Titan FTP Server. QuickStart Guide 2016 South River

More information

ModeChanger

ModeChanger 35020808-02 2015.11 ModeChanger ModeChanger is a software utility that can switch the drive between normal mode and encrypted mode. Operating in encrypted mode will help protect your data. While the drive

More information

Endpoint Security Client

Endpoint Security Client Endpoint Security Client R80 User Guide 28 February 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed

More information

Updating Astea Mobile URLs

Updating Astea Mobile URLs Updating Astea Mobile URLs Table of Contents UPDATING THE ASTEA APPLICATION SERVER URL... 4 RESETTING YOUR PASSWORD UPON INITIAL LOGIN... 7 CHANGING YOUR PASSWORD... 10 ACCESSING THE UPDATED TRAINING MATERIALS...

More information

Step by Step - Digital IDs in Adobe Acrobat & Reader versions XI and DC

Step by Step - Digital IDs in Adobe Acrobat & Reader versions XI and DC Step by Step - Digital IDs in Adobe Acrobat & Reader versions XI and DC Create a self-signed digital ID 1. In the upper left click Edit, choose Preferences, then Signatures on the left, under Categories.

More information

Document Signing Certificate Getting Started Guide

Document Signing Certificate Getting Started Guide Certificate Services Document Signing Certificate Getting Started Guide Using the SafeNet Authentication Client: 8.3 Document issue: 1.0 Date of issue: March 2017 For software release 12.1 Document Signing

More information

New World ERP-eSuite

New World ERP-eSuite New World ERP-eSuite 2018.1 INSTALLATION GUIDE April 9, 2018 Review important information for installing this release: SSL is required for esuite Services and Website servers. 2018 Tyler Technologies.

More information

Cornerstone MFT Server UNC Path Based Data Storage Guidelines

Cornerstone MFT Server UNC Path Based Data Storage Guidelines 2019 Cornerstone MFT Server UNC Path Based Data Storage Guidelines Instructions for configuring Cornerstone MFT to use UNC based storage locations on a SAN or network. QuickStart Guide 2019 South River

More information

MyFloridaNet-2 (MFN-2) Customer Portal/ Password Management/ VPN Reference Guide

MyFloridaNet-2 (MFN-2) Customer Portal/ Password Management/ VPN Reference Guide MyFloridaNet-2 (MFN-2) Customer Portal/ Password Management/ VPN Reference Guide i VISION RECORDS REVISION DATE DESCRIPTION 0 27 September 2017 Initial Submittal. 1 Second Submittal. ii TABLE OF CONTENTS

More information

Using Attix5 Pro with EFS

Using Attix5 Pro with EFS Using Attix5 Pro with EFS Windows has a built-in Encrypting File System (EFS), which is a component of NTFS. It allows users to encrypt files on disk, so that only they, and users who they provide keys

More information

Enter your Appserv username and password to sign in to the Website

Enter your Appserv username and password to sign in to the Website Appserv Desktop Access Logging on from a Windows 10 Device Step 1. To sign in to the Appserv Desktop Access website, either enter the following address into the Microsoft Edge browser address bar, or click

More information

Access Macros & Advanced Topics

Access Macros & Advanced Topics Access Macros & Advanced Topics Technical Support Services Office of Information Technology, West Virginia University OIT Help Desk 293-4444 x 1 http://oit.wvu.edu/support/training/classmat/db/ Instructor:

More information

T-SYSTEMS MULTIMEDIA SOLUTIONS ADMINISTRATION MANUAL

T-SYSTEMS MULTIMEDIA SOLUTIONS ADMINISTRATION MANUAL T-SYSTEMS MULTIMEDIA SOLUTIONS ADMINISTRATION MANUAL DOCULIFE DESKTOP 5.6 DATE: 16.03.2015 Document Future AG 03/2015 Document Future AG holds the copyright to this documentation. No part of this documentation

More information

Nero Recode Manual. Nero AG

Nero Recode Manual. Nero AG Nero Recode Manual Nero AG Copyright and Trademark Information The Nero Recode manual and all its contents are protected by copyright and are the property of Nero AG. All rights reserved. This manual contains

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

Hearing Care Dashboard

Hearing Care Dashboard Hearing Care Dashboard Registration & Management Hearing Care Dashboard: Register and Manage Your Organization Hearing Care Anywhere is Starkey s remote programming system. The Hearing Care Dashboard is

More information

Introduction. Mail Merge. Word 2010 Using Mail Merge. Video: Using Mail Merge in Word To Use Mail Merge: Page 1

Introduction. Mail Merge. Word 2010 Using Mail Merge. Video: Using Mail Merge in Word To Use Mail Merge: Page 1 Word 2010 Using Mail Merge Introduction Page 1 Mail merge is a useful tool that will allow you to easily produce multiple letters, labels, envelopes, name tags and more using information stored in a list,

More information

Manual. Software Protection. TwinCAT 3. Version: Date:

Manual. Software Protection. TwinCAT 3. Version: Date: Manual Software Protection TwinCAT 3 Version: Date: 1.7 2018-10-25 Table of contents Table of contents 1 Foreword... 5 1.1 Notes on the documentation... 5 1.2 Safety instructions... 6 2 Introduction...

More information

Desktop & Laptop Edition

Desktop & Laptop Edition Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion

More information

Configuring External Links in Visual Discovery AE

Configuring External Links in Visual Discovery AE Copyright 2014 WebFOCUS Release 8.0 Version 08 July 2014 Technical Memo Information Builders Two Penn Plaza New York, NY 10121-2898 (212) 736-4433 TM4742 Configuring External Links in Visual Discovery

More information

Word Module 2: Editing Documents

Word Module 2: Editing Documents 1. When you move text to a new location using drag and drop, that text is added to the Clipboard. False 2. When you use the Save command to save changes to a file, you overwrite the stored file. True LEARNING

More information

Imagine. Create. Discover. User Manual. TopLine Results Corporation

Imagine. Create. Discover. User Manual. TopLine Results Corporation Imagine. Create. Discover. User Manual TopLine Results Corporation 2008-2009 Created: Tuesday, March 17, 2009 Table of Contents 1 Welcome 1 Features 2 2 Installation 4 System Requirements 5 Obtaining Installation

More information

Device Manager. Managing Devices CHAPTER

Device Manager. Managing Devices CHAPTER 2 CHAPTER This chapter describes how to perform routine device management tasks using the Administrator Console. It provides information on managing the devices within your Cisco VXC Manager environment.

More information

Oracle SQL. murach s. and PL/SQL TRAINING & REFERENCE. (Chapter 2)

Oracle SQL. murach s. and PL/SQL TRAINING & REFERENCE. (Chapter 2) TRAINING & REFERENCE murach s Oracle SQL and PL/SQL (Chapter 2) works with all versions through 11g Thanks for reviewing this chapter from Murach s Oracle SQL and PL/SQL. To see the expanded table of contents

More information

Managing the Cisco APIC-EM and Applications

Managing the Cisco APIC-EM and Applications Managing Cisco APIC-EM Using the GUI, page 1 Cisco APIC-EM Application Separation, page 1 Information about Backing Up and Restoring the Cisco APIC-EM, page 4 Updating the Cisco APIC-EM Software, page

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information