inetquery 2005 User Guide

Size: px
Start display at page:

Download "inetquery 2005 User Guide"

Transcription

1 User Guide

2 Table of Contents Page: 2 Introduction... 4 License Agreement... 5 LICENSE AGREEMENT...5 LICENSE... 5 OTHER RESTRICTIONS... 5 LIMITED WARRANTY...5 DISCLAIMER OF DAMAGES... 5 System Requirements... 6 Network... 6 Using... 7 Function bar... 7 Main Menu... 8 File... 8 Edit... 8 Dialogs... 8 Extras... 9 Help... 9 Toolbar... 9 Dialog DNS Query Columns Type Name/Domain Class TTL Data Dialog Whois Dialog Ping Columns Num IP Address Hostname Duration TTL Response Message Dialog Traceroute Columns Num IP Address Hostname Duration TTL Dialog NetStat Dialog Interfaces Dialog Tasks Dialog Tools International Domain Names Address/-Domain...24 Encode Decode Normalized name Encoded Name Subnet Calculator IP Address Subnet Mask or the Numbers of Bits Calculate Subnet Address Subnet Mask First IP Address Last IP Address Check... 26

3 Table of Contents Page: 3 address Lookup Results SPF Check Domain/Hostname Lookup Results Open Relay Check IP-Address/Hostname...29 Lookup Results Dialog Report Dialog Settings Name server Timeout Options Whois Settings Whois server Ping Settings Packet count Packet size Timeout Delay Time-To-Live Options Traceroute Settings Maximum hops Packet size Timeout Delay Options NetStat Settings Statistics Interval Open Relay Settings Dialog Information Other Products MERCUR Messaging CARTHAGO Groupware CAMELOT Security

4 Introduction Page: 4 Introduction is a powerful Internet utility for network monitoring for MS Windows platforms. Special query features, like DNS, Whois or NetStat, can be used to determine detailed information about domains, hostnames or network providers. Utilities like Ping or Traceroute are suitable to find out if a remote host is reachable or to check your network performance. inetquery captures all active network connections, as well as the running tasks on the local system. Unwanted data transactions and activities of unknown applications, e.g. trojans, can be detected and denied in this way. Additional utilities can query special DNS records like SPF (Sender Permitted From) or Open-Relay databases to find blacklisteted hosts. A status panel shows detailed information about installed network interfaces. Adapter properties and activities, as well as statistics about tranferred bytes and packets, are shown there. A special report engine can create detailed reports about domains or hostnames. Information about domain owners, network providers and responsible persons will be determined automatically and displayed in a detailed summary.

5 License Agreement Page: 5 License Agreement LICENSE AGREEMENT This is a legal agreement between you (either an individual or an entity) and atrium software international. By installing this software, you are agreeing to be bound by the terms of this agreement. If you do not agree to the terms of this agreement, promptly return the uninstalled software and the accompanying items (including written materials and binders or other containers) to ATRIUM or its authorized distributor from which you received the software for a full refund. LICENSE This version of the Software is released as FREEWARE, but it may not be sold or be included in a product or package which intends to receive benefits through the inclusion of this software. This software may be be distributed freely over the internet as long as the files remain unmodified. This software may not be included on CD-ROMs without prior permission from the author. OTHER RESTRICTIONS You may not use, copy, or modify the files containing the licensed software, or any backup copy, in whole or in part, or translate such files into any other file format or language, except as expressly provided for in this agreement. You may not rent, lease, or sublicense the Licensed Software, but you may transfer the Licensed Software and accompanying written materials on a permanent basis, provided you retain no copies. The recipient agrees to the terms of this License Agreement. Upon such transfer, your license under this License Agreement is automatically terminated. You may not reverse engineer, decompile, or disassemble the Licensed Software foray purpose whatsoever. LIMITED WARRANTY ATRIUM warrants that for a period of three (3) months from the date of receipt, the Licensed Software will perform substantially in accordance with the accompanying written materials. The foregoing is the sole and exclusive warranty offered by ATRIUM. The warranty is according to the software limited to 3 months. DISCLAIMER OF DAMAGES In no event will ATRIUM or its suppliers be liable for indirect, special, incidental, contingent, consequential or similar damages of any kind resulting from any defect in the software or documentation, including, without limitation, any lost profits or savings, damages from business interruption, loss of or to data, computer programs, business, downtime, damage to or replacement of equipment or property, or any costs of recovering, reprogramming or reproducing any program or data used in conjunction with the products, even if ATRIUM, its suppliers or anyone else has been advised of the possibility of such damages. atrium software international All rights reserved.

6 System Requirements Page: 6 System Requirements Before you try to install you should control that your computer meets the software requirements. is running on the following operating systems: Microsoft Windows NT 4 Workstation or Server with Service Pack 6 or higher Microsoft Windows 2000 Professional or Server Microsoft Windows XP Professional or Windows 2003 Server The operating systems Microsoft Windows 9x, Microsoft Windows ME and Microsoft Windows XP-Home are not supported. Network An installed and correctly configured TCP/IP protocol.

7 Using Page: 7 Using The program main window consists of the function bar where you can select a dialog, the menu and toolbar for performing standard operations, and the output window where all results are displayed. The output window and also the toolbar depends on the selected dialog. The function bar contains all available dialogs and provides you to make a fast selection. All of these dialogs are also selectable by using the menu Dialogs. Function bar Menu Views the Start Menu which provides you to select a dialog. DNS Provides you to start a DNS query. Whois Provides you to start a Whois query. Ping Provides to process a ping. Traceroute Provides to process a traceroute. NetStat Views information about the current network statistic. Interfaces Views information about the installed interfaces. Tasks

8 Using Page: 8 Views information about the current running tasks. Tools Provides you to use several tools, e.g. IDN converter or SPF check. Reports Provides you to create a complete report for a domain or hostname. Info Shows information about the software. Main Menu File Print Provides you to print the current results Printer settings Opens the printer settings dialog Exit Closes the program Edit Copy Copies the results from the output window to the clipboard Execute Starts a query process Dialogs Start Menu Views the Start Menu dialog which provides you to select a dialog. DNS Query Provides you to perform a DNS query. Whois Query Provides you to perform a Whois query. Ping Provides to perform a ping. Traceroute Provides to perform a traceroute. Network Statistics Views information about the current network statistic. Interfaces Views information about the installed interfaces. Processes Views information about the current running tasks. Tools Provides you to use several tools, e.g. IDN converter. Report Views information about the current running tasks. Whois (only available if the dialog Whois is selected) Whois Summary Views the Whois results in summary. Whois Source Views the Whois results as source code. NetStat (only available if the dialog NetStat is selected) Perform Ping on remote address

9 Using Page: 9 Sends the selected IP address to Ping tool. Perform Traceroute on remote address Sends the selected IP address to Traceroute tool. Perform Whois query on remote address Sends the selected IP address to Whois tool. Perform DNS query on hostname Sends the selected IP address to DNS tool. Tasks properties Displays the task properties dialog for the selected task. Tasks (only available if the dialog Tasks is selected) Terminate Task Provides you to terminate a running task. Task Properties Displays the task properties dialog for the selected running task. Extras Settings Displays the Settings dialog. Help Help... Opens the inetquery help file. Search for Help on.. Opens the inetquery help index. inetquery Website Browse to the inetquery website. About... Shows the About window. Toolbar The available buttons of the toolbar depends on the selected dialog and will be explained in the description of the dialogs

10 Dialog DNS Query Page: 10 Dialog DNS Query DNS, short for Domain Name System (or Service), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name might translate to The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned. DNS is a tool that lets you enter a hostname (e.g. and find out the corresponding IP address. It will also do reverse name lookup and find the hostname for an IP address you specify. Such conversion of hostnames to IP addresses and vice versa is the main DNS function; however, advanced users can also use it to perform specific queries, e.g. queries for Mail Exchange (MX) records. DNS works by sending a Domain Name System (DNS) query to your default DNS server (the option Auto detect is enabled in the settings), or to any DNS server you specify in the settings. To perform the standard query, select - All Records - from the Type list, enter an IP address or hostname in the Query field, and click Lookup. The program will display the query result in a few seconds. Here is an example of a standard query output for the domain atriumsoftware.com:

11 Dialog DNS Query Page: 11 To perform non-standard queries, select the type of record you are requesting from the Type list, enter your query in the Query field, and click Lookup. When you run the tool for the first time, the Query drop-down list contains no entries; at later using you can select one from the list, or enter an new one. Columns Type Views the received result type. Name/Domain Views the received host or domain name. Class Views the received class type. TTL Views the received Time-To-Live value. Data Views all additional received data information. DNS offers many query types to choose from, and it takes some understanding of the Internet to perform any queries other than Standard Resolve Function. If you are a beginner and want to learn more about various query types, we suggest reading RFC 1034 and RFC 1035, or searching the web for query type names.

12 Dialog DNS Query Page: 12 Right-clicking on the window brings up a menu with the following commands: Copy all Copies the DNS table to the clipboard. Copy selected cell Copies selected cell to the clipboard. Copy selected row Copies selected row to the clipboard. You can customize the DNS configuration by clicking the Settings button or click Extras => Settings. See Settings for more information.

13 Dialog Whois Page: 13 Dialog Whois Use Whois to get information about an IP-address, an hostname or a domain. An IP address is a unique number that identifies a computer on the Internet, for example You may want to obtain information about an IP address to find out who is the real sender of an message, or who is attacking your computer. A hostname is just an easy name corresponding to an IP address. For example, mail.atriumsoftware.com is the name for the IP address A whois query for mail.atrium-software.com and returns exactly the same information. A domain is a network name registered to someone. Domain queries provide information about the owner of a domain name. inetquery provides you to performing IP address/hostname and domain name queries. To obtain information about an IP address, an hostname or a domain, just enter it in the Query box and click Lookup. You can choose a recently queried IP address/hostname or domain from the drop-down list.

14 Dialog Whois Page: 14 Right-clicking on the window brings up a menu with the following commands: Copy all Copies the DNS table to the clipboard. Copy selected cell Copies selected cell to the clipboard. Copy selected row Copies selected row to the clipboard. You can customize the Whois configuration by clicking the Settings button or click Extras => Settings. See Settings for more information.

15 Dialog Ping Page: 15 Dialog Ping Ping is a tool that lets you verify that a particular IP address exists and can accept requests by sending an Internet Control Message Protocol (ICMP) Echo request. Ping is used diagnostically to ensure that a host computer you are trying to reach is actually operating. If, for example, you can't ping a host, then you will be unable to use the Simple Mail Transfer Protocol (SMTP) to send s to that host. Ping can also be used with a host that is operating to see how long it takes to get a response back. If a host computer is operating, it normally sends back an Echo reply message. To perform a ping enter an IP address or hostname in the Query field, and click Lookup.

16 Dialog Ping Page: 16 Columns Num. Views the number of packets send to the remote host. IP Address Views the IP-address of the remote host. Hostname Views the hostname of the remote host. Duration Views the response time. TTL Views the Time-To-Live value. Response Message Views the response from the remote host. Right-clicking on the window brings up a menu with the following commands: Copy all Copies the DNS table to the clipboard. Copy selected cell Copies selected cell to the clipboard. Copy selected row Copies selected row to the clipboard. You can customize the Ping configuration by clicking the Settings button or click Extras => Settings. See Settings for more information.

17 Dialog Traceroute Page: 17 Dialog Traceroute Traceroute is a tool that traces the route (the specific gateway computers at each hop) from a client machine to the remote host being contacted by reporting all the router IP addresses in between. It also calculates and displays the amount of time each hop took. Traceroute is a handy tool both for understanding where problems exist in the Internet network and for getting a detailed sense of the Internet itself. Traceroute works by causing each router along a network path to return an Internet Control Message Protocol (ICMP) error message. An IP packet contains a Time-To-Live (TTL) value, which specifies how long it can go on its search for a destination before being discarded. Each time a packet passes through a router, its TTL value is decremented by one; when it reaches zero, the packet is dropped, and an ICMP TTL expired in transit error message is returned to the sender. The Traceroute tool sends its first group of packets with a TTL value of one. The first router along the path will therefore discard the packet (its TTL is decremented to zero) and return the TTL expired in transit error. Thus, we have found the first router on the path. Packets can then be sent with a TTL of two, and then three, and so on, causing each router along the path to return an error, identifying it to us. Some routers silently drop packets with expired TTL; for such hops you will get the Request timed out error. Eventually, either the final destination is reached, or the maximum value is reached, and the Traceroute ends. At the final destination, Traceroute sends an ICMP Echo Request packet (ping), and if the destination computer is reachable, Traceroute displays Echo reply in the Response Message column. To use this tool, enter an IP address or hostname and click Lookup.

18 Dialog Traceroute Page: 18 Columns Num. Views the number of packets send to the remote host. IP Address Views the IP-address of the remote host. Hostname Views the hostname of the remote host. Duration Views the response time. TTL Views the Time-To-Live value. Right-clicking on the window brings up a menu with the following commands: Copy all Copies the DNS table to the clipboard. Copy selected cell Copies selected cell to the clipboard. Copy selected row Copies selected row to the clipboard. You can customize the Traceroute configuration by clicking the Settings button or click Extras => Settings. See Settings for more information.

19 Dialog NetStat Page: 19 Dialog NetStat This tool is a replacement of the standard Windows netstat command-line utility. It displays all the inbound and outbound connections to your computer and lists all open ports. Additionally, NetStat maps open ports and established connections to the owning application. Right-clicking on the window brings up a menu with the following commands: Copy all Copies the result table to the clipboard. Copy selected cell Copies selected cell to the clipboard. Copy selected row Copies selected row to the clipboard. Perform Ping on remote address Sends the selected IP address to Ping tool. Perform Traceroute on remote address Sends the selected IP address to Traceroute tool. Perform Whois on remote address Sends the selected IP address to Whois tool.

20 Dialog NetStat Page: 20 Perform DNS on hostname Sends the selected IP address to DNS tool. Task Properties Displays the task properties dialog of the selected task. You can customize the NetStat configuration by clicking the Settings button or click Extras => Settings. See Settings for more information.

21 Dialog Interfaces Page: 21 Dialog Interfaces The dialog Interfaces views a list of installed network adapters and their properties. Here you will get information of transmitted bytes, packets and other protocol statistics.

22 Dialog Tasks Page: 22 Dialog Tasks Tasks is a tool that shows the list of the applications and services currently running on your computer. The Name column shows the program name, the Windows title column shows the available window title, the Description column shows the file description, the Vendor column shows the name of the file manufacturer, the Start time column shows the exactly start time, the User column shows the name of the user, the PID column shows the unique process ID and the Path column shows the full path to the program's executable file. Tasks is a simple tool for identifying hidden applications, killing running processes, and managing the usage of your PC's resources more effectively. Right-clicking on the window brings up a menu with the following commands: Copy all Copies the Running Tasks table to the clipboard. Copy selected cell Copies selected cell to the clipboard. Copy selected row Copies selected row to the clipboard. Terminate Task Terminates the selected task after a security request.

23 Dialog Tasks Page: 23 Task Properties Views detailed information about the application.

24 Dialog Tools Page: 24 Dialog Tools Here you will find the useful tools IDN converter, Subnet calculator, check, SPF check and Open Relay check. International Domain Names This tool encodes or decodes a international domain name (IDN) containing special characters to RFC822 compatible address. As result you will get shown the normalized name and the ACE string (info@xn--mller-kva.de) as RFC822 compatible address. Address/-Domain Enter here an address or an domain name which you would to encode or decode; e.g. info@müller.de or spaß.net. Encode Encodes an entered address or domain name which contains special characters to RFC822 compatible address.

25 Dialog Tools Page: 25 Decode Decodes an entered RFC822 compatible address. Normally this should be a valid ACE string. Normalized name Views the normalized name; e.g. info@müller.de or spass.net. Encoded Name Views the encoded or decoded result; e.g. info@xn--mller-kva.de or spass.net. Subnet Calculator This tool calculates the properties of a given subnet. Enter a valid IP-address and the subnet mask or the numbers of bits in the subnet. IP Address Enter here a valid IP-address; e.g

26 Dialog Tools Page: 26 Subnet Mask Enter here the subnet mask, e.g or work with the Numbers of Bits. or the Numbers of Bits Enter here the Numbers of Bits; e.g. 27. Calculate Calculates the properties of the given subnet. Subnet Address Views the subnet IP-address; e.g Subnet Mask Views the corresponding subnet mask; e.g First IP Address Views the first IP-address of the subnet; e.g Last IP Address Views the last IP-address of the subnet; e.g Check The check feature is able to find out if a address exists or not. Because of the growing security requirements, it is not always possible get clear results..

27 Dialog Tools Page: 27 address Enter here a valid address; e.g. info@atrium-software.com. Lookup Starts the check. Results Views the result of the check.

28 Dialog Tools Page: 28 SPF Check SPF (Sender Policy Framework) Check provides you to check that a is coming from a host who has the right permission to send that . You may want to obtain information about an domain or hostname to find out who is the real sender of an message. Domain/Hostname Enter here a valid domain or hostname; e.g. atrium-software.com or mail.atriumsoftware.com. Lookup Starts the SPF query. Results Views the result of the SPF query.

29 Dialog Tools Page: 29 Open Relay Check Open relay databases provide information of blacklisted mail servers in the internet. You can check here if a given address or hostname is blacklisted in a open relay database. The Open Relay query will be send to each given Open Relay database server which are entered in the Open Relay Settings. IP-Address/Hostname Enter here a valid IP-address or hostname; e.g or mail.atriumsoftware.com. Lookup Starts the Open Relay Check. Results Views the result of the Open Relay Check.

30 Dialog Reports Page: 30 Dialog Report The dialog Report provides you to create a report for a given domain or host name. The report shows registered names and addresses, as well as detailed information about domain owners and network providers. To create a domain/host report enter a domain or hostname, and click Lookup.

31 Dialog Settings Page: 31 Dialog Settings The DNS tab provides you to configure some settings for the DNS queries. Name server Auto detect Use this checkbox to enable this feature. Use special name server Enable this option and enter a specially name server which you want to use. Timeout Provides you to set the time limit for DNS query. If no information is received during the specified time, the query is cancelled. Depending on the speed of your Internet connection and the accessibility of name servers you may want to increase or decrease the query timeout. Options Recursive query Use this checkbox to enable this feature. Inverse query Use this checkbox to enable this feature.

32 Dialog Settings Page: 32 Whois Settings The Whois tab lets you define a specially whois server or to work with the auto detect option. Whois server Auto detect Use this checkbox to enable this feature. Use special whois server Enable this option and enter a specially whois server which should be use.

33 Dialog Settings Page: 33 Ping Settings The Ping tab provides you to configure some settings for the Ping queries. Packet count Provides you to set the number of packets to be sent to the remote host. Depending on the speed of your Internet connection and the accessibility of the remote server you may want to increase or decrease the number of packets. Endless Use this checkbox to enable this feature. Maximum Enable this option and enter a maximum value of packets which should be send. Packet size Provides you to set the size (in bytes) of the data portion of the ICMP packet. Depending on the speed of your Internet connection and the accessibility of the remote server you may want to increase or decrease the packet size. Timeout Provides you to set the the maximum time (in seconds) Ping will wait for the response from a host. If no information is received during the specified time, the ping is cancelled. Depending on the speed of your Internet connection and the accessibility of the remote host you may want to increase or decrease the timeout. Delay Provides you to set the interval (in milliseconds) between pings. Depending on the speed of your Internet connection and the accessibility of the remote host you may want to increase or decrease the delay time. Time-To-Live Provides you to set the Time-To-Live value for the Ping.

34 Dialog Settings Page: 34 Options Resolve hostname If this box is checked, the program will try to resolve the host name for the entered IP address when you send a query. Traceroute Settings The Traceroute tab provides you to configure some settings for the Traceroute queries. Maximum hops Allows you to limit the number of hops to trace. Depending on the speed of your Internet connection and the accessibility of the remote host you may want to increase or decrease the max. number of hops. Packet size Provides you to set the size (in bytes) of the data portion of the ICMP packet. Depending on the speed of your Internet connection and the accessibility of the remote server you may want to increase or decrease the packet size. Timeout Provides you to set the the maximum time (in seconds) Traceroute will wait for the response from a router. If no information is received during the specified time, the traceroute is cancelled. Depending on the speed of your Internet connection and the accessibility of the remote host you may want to increase or decrease the timeout. Delay Provides you to set the interval (in milliseconds) between pings. Depending on the speed of your Internet connection and the accessibility of the remote host you may want to increase or decrease the delay time. Options Resolve hostname

35 Dialog Settings Page: 35 If this box is checked, the program will try to resolve the host name for the entered IP address when you send a query. NetStat Settings The NetStat tab provides you to configure some settings for the Network statistics. Statistics Show TCP statistics Check this box if you want to have TCP connections listed in the Network Statistics window. Show UDP statistics Check this box if you want to have UDP connections listed in the Network Statistics window. Show Loopback statistics Check this box if you want to have Loopback statistics listed in the Network Statistics window. Show established connections only Check this box if you want the Network Statistics window to list established connections only. All other connections (listening, closing, etc.) will not be listed. Resolve hostnames Check this box if you want the program to perform reverse DNS lookups of the IP addresses. If you check it, the hostname will be shown in the hostname column if available. Interval Allows you to set the auto-refresh interval (in seconds) for NetStat.

36 Dialog Settings Page: 36 Open Relay Settings The Open Relay tab lets you define a list of Open Relay database server which should be use with the Open Relay Check. All given Open Relay database server will be use for a single query of the entered IP address or hostname. The query uses the name server defined on the Settings/DNS tab. These suffix values are used for the DNS query. They will be attached to the entered IP-address or the hostname (e.g relays.ordb.org). In this way, the DNS query reaches the server of the Open Relay database. If the server responds with a valid return value, the address is in the database. So, the IP-address or the host is blacklisted as Open Relay. Please note that such services are not always free. You will find more details at for more details.

37 Dialog Settings Page: 37 Dialog Information This dialog contains information about your installed version of. Here you will see the product and file version of inetquery. You may use the link to visit our website or write us an to our info address. atrium software international Idsteinerstraße Niedernhausen GERMANY

38 Other Products Page: 38 Other Products MERCUR Messaging 2005 Dispatching electronic messages within an Intranet or the Internet is an essential service for most businesses. MERCUR Messaging 2005 offers the necessary features to provide an efficient and effective communications medium. These include Security features using IP-Caching Firewall, check open relay database by using DNS, Remote Configuration via a Web Browser, Dial- Up-connectivity (Modem, ISDN-Card), dedicated connectivity (ISDN-Router) or connectivity over the network (Router) to your ISP. MERCUR Messaging 2005 is designed for Windows NT 4.0 Workstation and Server, Windows 2000 Professional and Server, Windows 2003 Server as well as Windows XP acquire a server all the Extras. CARTHAGO Groupware 2005 Access your anytime, whether you are sitting at a cafe, in a public library, at work or in the privacy of your home. With CARTHAGO Groupware you have access to your , personal contacts, personal calendar, organizer, address book, all via your browser. CARTHAGO Groupware allows message access via any standard browser. CARTHAGO is fully optimized to integrate with MERCUR Messaging 2005 or you can integrate it with any other standard SMTP, POP3 server on the market. The services use an ISAPI-DLL, that supports either Microsoft IIS 5.0, Apache Webserver (Apache requires that the ISAPI.dll be implemented, currently the ISAPI.dll for Apache Web Server is beta) or VisNetic WebSite. CARTHAGO Groupware supports SSL Secured Socket Layer Protocol when integrated with either of the above mentioned web server applications. With CARTHAGO Groupware all your messages, contacts, appointments, tasks, system and user settings are stored in a database format using either Microsoft Access or Microsoft SQL Server. CARTHAGO uses Microsoft Data Access Objects (MDAC), other major database applications are also supported by CARTHAGO Groupware. Full database support ensures that all your daily data can be secured and easily backed up. CARTHAGO Groupware is available in English and German. Language selection is available at the user level. CARTHAGO is fully customized, end users can customize the look and feel of the product. Administrators can also customize the look and feel of CARTHAGO Groupware. CAMELOT Security 2005 CAMELOT Security is a server side based Spam filtering solution that behaves very much like a gateway or firewall that sits in front of the SMTP Mail Server. Messages are delivered through the CAMELOT gateway to either the SMTP and/or picked up by the POP3 for an external mail server. When a thorough analysis and authentication by CAMELOT's Security Services are completed, messages will then forward to the actual SMTP Mail Server. The following steps listed below briefly describe how CAMELOT uses the Security Services in analyzing . CAMELOT implements a 3-state logic known as FUZZY LOGIC on the header processing. The third state analyzes the header processes for questionable or uncertain parameters allowing CAMELOT to analyze headers process with a YES or NO or DON'T KNOW scenario. This is extremely useful, when dealing with a process using multiple algorithms. In addition to the fuzzy logic technology CAMELOT implements two types of text analysis, a text pattern analyzer and a bayesian text classifier. These two algorithms work hand in hand. The

39 Other Products Page: 39 combination of fuzzy logic and the Bayesian methods are part of what is called neural networking, or also known as artificial intelligence.

CARTHAGO Groupware User Guide

CARTHAGO Groupware User Guide User Guide Table of Contents Page: 2 License Agreement...4 Features...7 Product Features...7 CARTHAGO License...8 CARTHAGO Online-Help...9 The "help" menu CARTHAGO Configuration...9 Direct help...9 CARTHAGO

More information

DME-N Network Driver Installation Guide for M7CL

DME-N Network Driver Installation Guide for M7CL DME-N Network Driver Installation Guide for M7CL ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED

More information

Sam Spade 1.14 Open Source Security Tool by Steve Atkins

Sam Spade 1.14 Open Source Security Tool by Steve Atkins CS 413 Spring 2005 Max Konovalov Sam Spade 1.14 Open Source Security Tool by Steve Atkins University of Alaska Anchorage Department of Mathematical Sciences This paper describes Sam Spade 1.14 open source

More information

SOFTWARE LICENSE LIMITED WARRANTY

SOFTWARE LICENSE LIMITED WARRANTY ANALYTICAL TOOL GUIDE VERSION: 5..0..6 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of any

More information

Network-MIDI Driver Installation Guide

Network-MIDI Driver Installation Guide Network-MIDI Driver Installation Guide ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED TO USE

More information

CAMELOT Configuration Overview Step-by-Step

CAMELOT Configuration Overview Step-by-Step General Mode of Operation Page: 1 CAMELOT Configuration Overview Step-by-Step 1. General Mode of Operation CAMELOT consists basically of three analytic processes running in a row before the email reaches

More information

OfficeServ Link User Manual

OfficeServ Link User Manual OfficeServ Link User Manual Every effort has been made to eliminate errors and ambiguities in the information contained in this guide. Any questions concerning information presented here should be directed

More information

CHAPTER 7 ADVANCED ADMINISTRATION PC

CHAPTER 7 ADVANCED ADMINISTRATION PC ii Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband ADSL Router Features... 1 Package Contents... 3 Physical Details... 4 CHAPTER 2 INSTALLATION... 6 Requirements... 6 Procedure... 6 CHAPTER 3 SETUP...

More information

General Network Troubleshooting

General Network Troubleshooting Overview Contents This document outlines some basic network troubleshooting techniques that can be used to test network connectivity. They are useful when troubleshooting issues with Crystal Enterprise

More information

Stellar WAB to PST Converter 1.0

Stellar WAB to PST Converter 1.0 Stellar WAB to PST Converter 1.0 1 Overview Stellar WAB to PST Converter software converts Outlook Express Address Book, also known as Windows Address Book (WAB) files to Microsoft Outlook (PST) files.

More information

System Administrators Guide

System Administrators Guide System Administrators Guide Standalone Version Freezerworks Unlimited Version 6.0 PO Box 174 Mountlake Terrace, WA 98043 www.freezerworks.com support@freezerworks.com 425-673-1974 877-289-7960 U.S. Toll

More information

Secure Com Port Redirector User Guide

Secure Com Port Redirector User Guide Secure Com Port Redirector User Guide Part Number 900-324 Revision B December 2004 Copyright and Trademark 2004, Lantronix. All rights reserved. No part of the contents of this book may be transmitted

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

CS 457 Lecture 11 More IP Networking. Fall 2011

CS 457 Lecture 11 More IP Networking. Fall 2011 CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol

More information

UIP1869V User Interface Guide

UIP1869V User Interface Guide UIP1869V User Interface Guide (Firmware version 0.1.8 and later) Table of Contents Opening the UIP1869V's Configuration Utility... 3 Connecting to Your Broadband Modem... 5 Setting up with DHCP... 5 Updating

More information

Table of Contents 1 System Maintaining and Debugging Commands 1-1

Table of Contents 1 System Maintaining and Debugging Commands 1-1 Table of Contents 1 System Maintaining and Debugging Commands 1-1 System Maintaining Commands 1-1 ping 1-1 tracert 1-4 System Debugging Commands 1-6 debugging 1-6 display debugging 1-7 i 1 System Maintaining

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Customer Support: For more information or support, please visit or at Product Release Information...

Customer Support: For more information or support, please visit   or  at Product Release Information... Product Release Information Product: Cyberoam Release Number: 9.3.0 build 5 Release Date: 19th July 2006 Compatible versions: 9.2.0 build 2 Upgrade Mode: Manual 1 Important note Upgrade removes all the

More information

E-swipe User Guide. Escan Technologies Corporation

E-swipe User Guide. Escan Technologies Corporation Escan Technologies Corporation E-swipe User Guide Escan Technologies Corp. 12140 Severn Way Riverside, CA 92503 Phone (909) 270-0043 Fax (909) 270-0920 USER GUIDE ESCAN TECHNOLOGIES CORPORATION E-swipe

More information

Report Viewer Version 8.1 Getting Started Guide

Report Viewer Version 8.1 Getting Started Guide Report Viewer Version 8.1 Getting Started Guide Entire Contents Copyright 1988-2017, CyberMetrics Corporation All Rights Reserved Worldwide. GTLRV8.1-11292017 U.S. GOVERNMENT RESTRICTED RIGHTS This software

More information

VW INTERFACE. The AutoSoft DMS and Finance Assistant Integration with VW OEM and VCI. The ASI and VW OEM Interface Solution

VW INTERFACE. The AutoSoft DMS and Finance Assistant Integration with VW OEM and VCI. The ASI and VW OEM Interface Solution AUTOSOFT INTEGRATION WITH VW OEM & VCI VW INTERFACE The AutoSoft DMS and Finance Assistant Integration with VW OEM and VCI These pages list all the Volkswagen OEM and VCI Interfaces available for your

More information

FlukeView Forms. Documenting Software. Getting Started

FlukeView Forms. Documenting Software. Getting Started FlukeView Forms Documenting Software Getting Started PN 1574021 September 2000 2000 Fluke Corporation. All rights reserved. Printed in USA All product names are trademarks of their respective companies.

More information

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period Name Date Period TCP/IP Fundamentals Introduction For the Network+ Certification exam, you should be able to identify the class of an IP address, an APIPA IP address, and a private IP address as well as

More information

LevelOne FBR User s Manual. 1W, 4L 10/100 Mbps ADSL Router. Ver

LevelOne FBR User s Manual. 1W, 4L 10/100 Mbps ADSL Router. Ver LevelOne FBR-1416 1W, 4L 10/100 Mbps ADSL Router User s Manual Ver 1.00-0510 Table of Contents CHAPTER 1 INTRODUCTION... 1 FBR-1416 Features... 1 Package Contents... 3 Physical Details... 3 CHAPTER 2

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

Table of Contents 1 System Maintenance and Debugging Commands 1-1

Table of Contents 1 System Maintenance and Debugging Commands 1-1 Table of Contents 1 System Maintenance and Debugging Commands 1-1 System Maintenance Commands 1-1 ping 1-1 ping ipv6 1-5 tracert 1-6 tracert ipv6 1-7 System Debugging Commands 1-8 debugging 1-8 display

More information

Broadband Router DC-202. User's Guide

Broadband Router DC-202. User's Guide Broadband Router DC-202 User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband Router Features... 1 Package Contents... 3 Physical Details...3 CHAPTER 2 INSTALLATION... 5 Requirements...

More information

Stonesoft Management Center. Release Notes for Version 5.6.1

Stonesoft Management Center. Release Notes for Version 5.6.1 Stonesoft Management Center Release Notes for Version 5.6.1 Updated: January 9, 2014 Table of Contents What s New... 3 Fixes... 3 System Requirements... 6 Basic Management System Hardware Requirements...

More information

AT&T Digital Subscriber Line Service

AT&T Digital Subscriber Line Service AT&T Digital Subscriber Line Service Windows 2000 Professional PC Configuration Guide Overview Welcome to AT&T DSL Internet Service! This guide is designed to help you configure your PC to access the Internet

More information

Administrator s Guide

Administrator s Guide Administrator s Guide Version 2.3 LogiTel SecurVue 1 LogiTel SecurVue 2 Contents Introduction 4 Features 4 Hardware and Software Requirements 4 Installing SecurVue 5 Selecting a Database 6 Creating an

More information

Redirector User Guide

Redirector User Guide Redirector User Guide Revision B November 04, 2005 Part Number GC-800-235 Copyright and Trademark Copyright 2004, Grid Connect, Inc. All rights reserved. No part of this manual may be reproduced or transmitted

More information

Converter. Stellar DBX To Windows Live Mail. Stellar DBX To Windows Live Mail Converter 1.0 User Guide

Converter. Stellar DBX To Windows Live Mail. Stellar DBX To Windows Live Mail Converter 1.0 User Guide Converter Stellar DBX To Windows Live Mail Stellar DBX To Windows Live Mail Converter 1.0 User Guide 1 Overview Stellar DBX To Windows Live Mail Converter converts Microsoft Outlook Express (DBX) files

More information

TOSHIBA Bar Code Printer. Network Tool Operation Manual

TOSHIBA Bar Code Printer. Network Tool Operation Manual TOSHIBA Bar Code Printer Network Tool Operation Manual Fifth Edition: February 3, 2009 Table of Contents TABLE OF CONTENTS 3 INTRODUCTION 1 SUPPORTED PRINTERS... 1 SOFTWARE LICENSE AGREEMENT... 1 FEATURES...

More information

0Introduction. Overview. This introduction contains general information and tips for using your Avaya CD-ROM.

0Introduction. Overview. This introduction contains general information and tips for using your Avaya CD-ROM. 0 Overview Purpose This introduction contains general information and tips for using your Avaya CD-ROM. Features This offer is designed for all users who want the ease of accessing documentation electronically.

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2004 Kerio Technologies. All Rights Reserved. Printing Date: April 25, 2004 This guide provides detailed description on configuration of the local network

More information

Configuring a Microsoft Windows 2000 DHCP and DNS Server

Configuring a Microsoft Windows 2000 DHCP and DNS Server Configuring a Microsoft Windows 2000 DHCP and DNS Server White Paper Abstract This white paper sets out to describe the steps necessary to install a Brother printer into a Windows 2000 network that is

More information

FONT SOFTWARE END USER LICENSE AGREEMENT. We recommend that you print this Font Software End User License Agreement for further reference.

FONT SOFTWARE END USER LICENSE AGREEMENT. We recommend that you print this Font Software End User License Agreement for further reference. FONT SOFTWARE END USER LICENSE AGREEMENT We recommend that you print this Font Software End User License Agreement for further reference. This Font Software End User License Agreement (the Agreement )

More information

Lab 6.7.1: Ping and Traceroute

Lab 6.7.1: Ping and Traceroute Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central Eagle Server S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0

More information

DC-228. ADSL2+ Modem/Router. User Manual. -Annex A- Version: 1.0

DC-228. ADSL2+ Modem/Router. User Manual. -Annex A- Version: 1.0 DC-228 ADSL2+ Modem/Router -Annex A- User Manual Version: 1.0 TABLE OF CONTENTS 1 PACKAGE CONTENTS...3 2 PRODUCT LAYOUT...4 3 NETWORK + SYSTEM REQUIREMENTS...6 4 DC-228 PLACEMENT...6 5 SETUP LAN, WAN...7

More information

vippaq Main App. User Guide

vippaq Main App. User Guide vippaq Main App. User Guide Edition 1d July 2008 Contents 1 INTRODUCTION 3 1.1 3 2 SYSTEM PREPARATION 4 2.1.1 Measuring Head Connection 5 2.1.2 Position the Measuring Heads 5 2.1.3 Start Job 5 3 MEASURE

More information

Stellar Phoenix Password Recovery For Windows Server. Version 2.0. User Guide

Stellar Phoenix Password Recovery For Windows Server. Version 2.0. User Guide Stellar Phoenix Password Recovery For Windows Server Version 2.0 User Guide Overview Stellar Phoenix Password Recovery For Windows Server is a powerful application that helps you reset a Windows Server

More information

Lab DHCP Client Setup

Lab DHCP Client Setup Lab 9.3.5 DHCP Client Setup Objective The purpose of this lab is to introduce Dynamic Host Configuration Protocol (DHCP) and the process for setting up a network computer as a DHCP client to use DHCP services.

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

History Page. Barracuda NextGen Firewall F

History Page. Barracuda NextGen Firewall F The Firewall > History page is very useful for troubleshooting. It provides information for all traffic that has passed through the Barracuda NG Firewall. It also provides messages that state why traffic

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2650 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

Manual NEWBASE WebShot 1.4. Copyright by NEWBASE GmbH, Hamburg, Germany

Manual NEWBASE WebShot 1.4. Copyright by NEWBASE GmbH, Hamburg, Germany Manual NEWBASE WebShot 1.4 Copyright by NEWBASE GmbH, Hamburg, Germany Table of contents Copyright... 3 NEWBASE License Agreement... 3 Maintenance... 4 Manual Conventions... 5 Installation 6 Starting and

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling

More information

Stellar Phoenix. Repair for SQLite 1.0 User Guide

Stellar Phoenix. Repair for SQLite 1.0 User Guide Stellar Phoenix Repair for SQLite 1.0 User Guide Overview Stellar Phoenix Repair for SQLite software is an easy to use application designed to repair corrupt or damaged SQLite database (DB / SQLITE) files

More information

Notice to Users. Serial Number

Notice to Users. Serial Number E-SWIIPE Veerrssiion 2..0 USER S GUIDE Notice to Users The E-swipe user documentation has been written by Escan Technologies Corp. No part of this publication may be reproduced or distributed in any form

More information

Console Management Guide (Version 5.0.5)

Console Management Guide (Version 5.0.5) Console Management Guide (Version 5.0.5) Important Notice Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of

More information

CASHDESK APPLICATION USER GUIDE. Version: 1-4. Date: 10 January 2010

CASHDESK APPLICATION USER GUIDE. Version: 1-4. Date: 10 January 2010 CASHDESK APPLICATION USER GUIDE Version: 1-4 Date: 10 January 2010 This software is licensed for installation and use on a single computer. Please refer to the license conditions in Appendix 3. Contents

More information

FirePoint 8. Setup & Quick Tour

FirePoint 8. Setup & Quick Tour FirePoint 8 Setup & Quick Tour Records Management System Copyright (C), 2006 End2End, Inc. End2End, Inc. 6366 Commerce Blvd #330 Rohnert Park, CA 94928 PLEASE READ THIS LICENSE AND DISCLAIMER OF WARRANTY

More information

Avalanche Remote Control User Guide. Version 4.1

Avalanche Remote Control User Guide. Version 4.1 Avalanche Remote Control User Guide Version 4.1 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

Configure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch

Configure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch Configure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch Introduction When using static routing, you may experience a situation where a static route is active, but the destination network

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2006 Kerio Technologies. All Rights Reserved. Printing Date: May 3, 2006 This guide provides detailed description on configuration of the local network

More information

Configuring Commonly Used IP ACLs

Configuring Commonly Used IP ACLs Configuring Commonly Used IP ACLs Document ID: 26448 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration Examples Allow a Select Host to Access the Network Deny a

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network Chapter 17 Windows Resources on a Network Objectives Learn how to support some client/server applications Learn how to share and secure files and folders on the network Learn how to troubleshoot network

More information

RIM AUTOSOFT DMS. affordable, simpler, innovative. p: f:

RIM AUTOSOFT DMS. affordable, simpler, innovative. p: f: AUTOSOFT DMS GM & RIM The AutoSoft DMS and GM RIM Solution General Motors is in the process of switching to an ebxml communication method known as General Motors rth America Exchange. Through this ebxml

More information

If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows:

If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows: IMPORTANT: READ THIS AGREEMENT CAREFULLY. THIS IS A LEGAL AGREEMENT BETWEEN AVG TECHNOLOGIES CZ, s.r.o. ( AVG TECHNOLOGIES ) AND YOU (ACTING AS AN INDIVIDUAL OR, IF APPLICABLE, ON BEHALF OF THE INDIVIDUAL

More information

LKR Port Broadband Router. User's Manual. Revision C

LKR Port Broadband Router. User's Manual. Revision C LKR-604 4-Port Broadband Router User's Manual Revision C 1 Contents 1 Introduction... 4 1.1 Features... 4 1.2 Package Contents... 4 1.3 Finding Your Way Around... 5 1.3.1 Front Panel... 5 1.3.2 Rear Panel

More information

HP FlexFabric 5700 Switch Series

HP FlexFabric 5700 Switch Series HP FlexFabric 5700 Switch Series Layer 3 - IP Routing Configuration Guide Part number: 5998-6688 Software version: Release 2416 Document version: 6W100-20150130 Legal and notice information Copyright 2015

More information

Chapter 1 Introduction to TCP/IP

Chapter 1 Introduction to TCP/IP Chapter 1 Introduction to TCP/IP Published: November 02, 2004 Updated: April 16, 2007 Writer: Joe Davies 1 Abstract This chapter introduces Transmission Control Protocol/Internet Protocol (TCP/IP), both

More information

MULTIFUNCTIONAL DIGITAL SYSTEMS. Software Installation Guide

MULTIFUNCTIONAL DIGITAL SYSTEMS. Software Installation Guide MULTIFUNCTIONAL DIGITAL SYSTEMS Software Installation Guide 2013 TOSHIBA TEC CORPORATION All rights reserved Under the copyright laws, this manual cannot be reproduced in any form without prior written

More information

Table of Contents TRIMS Grounds Management Software Installation Guide

Table of Contents TRIMS Grounds Management Software Installation Guide Table of Contents TRIMS Grounds Management Software Installation Guide Software License Agreement... 1 Limited Warranty... 2 Starting the Installation... 2 Select Installation Type... 3 Stand Alone Desktop

More information

Stellar Repair for Video

Stellar Repair for Video Stellar Repair for Video 1. Overview Stellar Repair for Video lets you repair corrupted or damaged video les from storage media like ash drives, memory cards, hard drives and external hard drives. Some

More information

MegaStat Installation Instructions

MegaStat Installation Instructions MegaStat Installation Instructions 1. Download MegaStatInstallationFilesWindows.zip from the website. When you click the download link you will see options at the bottom of the screen that will depend

More information

Getting Started (No installation necessary) Windows On Windows systems, simply double click the AntGram icon to launch the program.

Getting Started (No installation necessary) Windows On Windows systems, simply double click the AntGram icon to launch the program. AntGram (Windows) Build 1.0 (Released September 22, 2018) Laurence Anthony, Ph.D. Center for English Language Education in Science and Engineering, School of Science and Engineering, Waseda University,

More information

RX3041. User's Manual

RX3041. User's Manual RX3041 User's Manual Table of Contents 1 Introduction... 2 1.1 Features and Benefits... 3 1.2 Package Contents... 3 1.3 Finding Your Way Around... 4 1.4 System Requirements... 6 1.5 Installation Instruction...

More information

Access Anywhere for Windows Networking and SQL. Software Manual

Access Anywhere for Windows Networking and SQL. Software Manual Access Anywhere for Windows Networking and SQL Software Manual Software License This is a legal agreement between you, the end user, and Toye Corporation, a California corporation ("Toye"), regarding your

More information

Table of Contents 1 System Maintaining and Debugging 1-1

Table of Contents 1 System Maintaining and Debugging 1-1 Table of Contents 1 System Maintaining and Debugging 1-1 System Maintaining and Debugging 1-1 Ping 1-1 Introduction 1-1 Configuring Ping 1-1 Ping Configuration Example 1-2 Tracert 1-4 Introduction 1-4

More information

Lab - Troubleshooting ACL Configuration and Placement Topology

Lab - Troubleshooting ACL Configuration and Placement Topology Topology 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway HQ G0/1 192.168.1.1

More information

Installation and Configuration Manual. Price List Utilities. for Microsoft Dynamics CRM Dynamics Professional Solutions Ltd 1 / 14

Installation and Configuration Manual. Price List Utilities. for Microsoft Dynamics CRM Dynamics Professional Solutions Ltd 1 / 14 Installation and Configuration Manual Price List Utilities for Microsoft Dynamics CRM 2011 Dynamics Professional Solutions Ltd 1 / 14 Copyright Warranty disclaimer Limitation of liability License agreement

More information

Unit 4: Firewalls (I)

Unit 4: Firewalls (I) Unit 4: Firewalls (I) What is a firewall? Types of firewalls Packet Filtering Statefull Application and Circuit Proxy Firewall services and limitations Writing firewall rules Example 1 Example 2 What is

More information

Stellar Phoenix Entourage Repair

Stellar Phoenix Entourage Repair Stellar Phoenix Entourage Repair User Guide Version 2.0 Overview Microsoft Entourage is an e-mail client software used to manage personal information like notes, address book, personalized calendar, tasks

More information

Configuring IP Services

Configuring IP Services CHAPTER 8 Configuring IP Services This chapter describes how to configure optional IP services supported by the Cisco Optical Networking System (ONS) 15304. For a complete description of the commands in

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Release Date: March 16, 2007 This guide provides detailed description on configuration of the local network which

More information

Ping, tracert and system debugging commands

Ping, tracert and system debugging commands Contents Ping, tracert and system debugging commands 1 Ping and tracert commands 1 ping 1 ping ipv6 5 tracert 7 tracert ipv6 9 System debugging commands 10 debugging 10 display debugging 11 i Ping, tracert

More information

Quick Heal for Novell Netware User Guide

Quick Heal for Novell Netware User Guide QUICK HEAL TECHNOLOGIES (P) LTD. Quick Heal for Novell Netware User Guide QUICK HEAL FOR NOVELL NETWARE User Guide Quick Heal Technologies (P) Ltd. 603, Mayfair Towers II, Wakdewadi, Shivajinagar, Pune-

More information

USER'S MANUAL AGG Software

USER'S MANUAL AGG Software USER'S MANUAL TCP Splitter All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information

More information

Chapter 5: Trouble shooting of a network

Chapter 5: Trouble shooting of a network 5 Troubleshooting TCP/IP Fig 5 show trouble shooting a TCP/IP Chapter 5: Trouble shooting of a network Steps 1 First, determines whether your local host is properly configured. Step 2 Next, uses the ping

More information

Made in U.S.A. 1

Made in U.S.A.   1 Made in U.S.A. www.smartavi.com 1 1-800-AVI-2131 TABLE OF CONTENTS INTRODUCTION & FEATURES 2 Getting Started and Installation 3 Start-Up 4 Managing Streams and Environment 5 Frequently Asked Questions

More information

Firewall Policy. Edit Firewall Policy/ACL CHAPTER7. Configure a Firewall Before Using the Firewall Policy Feature

Firewall Policy. Edit Firewall Policy/ACL CHAPTER7. Configure a Firewall Before Using the Firewall Policy Feature CHAPTER7 The feature lets you view and modify firewall configurations access rules and CBAC inspection rules in the context of the interfaces whose traffic they filter. Using a graphical representation

More information

Table of Contents TABLE OF CONTENTS... 1 INTRODUCTION... 3 FEATURES... 3 CONNECTING TO OVIDA... 4 INSTALLATION WIZARD... 5

Table of Contents TABLE OF CONTENTS... 1 INTRODUCTION... 3 FEATURES... 3 CONNECTING TO OVIDA... 4 INSTALLATION WIZARD... 5 Table of Contents TABLE OF CONTENTS... 1 INTRODUCTION... 3 FEATURES... 3 CONNECTING TO OVIDA... 4 INSTALLATION WIZARD... 5 ADSL WIZARD... 6 ISDN WIZARD... 7 PC SETTINGS... 8 USING THE INTERNET... 8 LOCAL

More information

User Guide. Portable Calibration Module

User Guide. Portable Calibration Module Portable Calibration Module User Guide CyberMetrics Corporation 1523 W. Whispering Wind Drive Suite 100 Phoenix, Arizona 85085 USA Toll-free: 1-800-777-7020 (USA) Phone: (480) 922-7300 Fax: (480) 922-7400

More information

11Mbps Wireless LAN Smart Station Adapter

11Mbps Wireless LAN Smart Station Adapter 11Mbps Wireless LAN Smart Station Adapter Quick Start Guide Version 1.6 The next-generation wireless LAN device 11Mbps Wireless LAN Smart Station adapter, brings Ethernet-like performance to the wireless

More information

Price List Utilities. For Dynamics CRM 2016

Price List Utilities. For Dynamics CRM 2016 Price List Utilities For Dynamics CRM 2016 Page 1 of 19 Price List Utilities 2016 Copyright Warranty disclaimer Limitation of liability License agreement Copyright 2016 Dynamics Professional Solutions.

More information

MCSE Windows 2000 Network Infrastructure Training Guide Exam (70-216) Dave Bixler, Larry Chambers, and Joseph Phillips

MCSE Windows 2000 Network Infrastructure Training Guide Exam (70-216) Dave Bixler, Larry Chambers, and Joseph Phillips MCSE Windows 2000 Network Infrastructure Training Guide Exam (70-216) 0-7357-0966-1 Dave Bixler, Larry Chambers, and Joseph Phillips Copyright 2000 by New Riders Publishing Warning and Disclaimer: Every

More information

The Administration Tab - Diagnostics

The Administration Tab - Diagnostics The Administration Tab - Diagnostics The diagnostic tests (Ping and Traceroute) allow you to check the connections of your network components. Ping Test. The Ping test will check the status of a connection.

More information

TOOLS for n Version2 Update Guide

TOOLS for n Version2 Update Guide TOOLS for n Version2 Update Guide SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED TO USE THIS SOFTWARE

More information

MULTIFUNCTIONAL DIGITAL SYSTEMS. Software Installation Guide

MULTIFUNCTIONAL DIGITAL SYSTEMS. Software Installation Guide MULTIFUNCTIONAL DIGITAL SYSTEMS Software Installation Guide 2013 TOSHIBA TEC CORPORATION All rights reserved Under the copyright laws, this manual cannot be reproduced in any form without prior written

More information

Deployment Guide Installing WhatsUp Gold Distributed Edition to Central and Remote Sites

Deployment Guide Installing WhatsUp Gold Distributed Edition to Central and Remote Sites Deployment Guide Installing WhatsUp Gold Distributed Edition to Central and Remote Sites This guide provides information about installing and configuring WhatsUp Gold Central and Remote Sites. Contents

More information

TCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER

TCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER CHAPTER 11 Main Dialog Box To access this dialog box (Figure 11-1), select Global/Filtering/ from the Device View. Figure 11-1 Main Configuration Dialog Box Route Filters Button This button brings up a

More information

Using ICMP to Troubleshoot TCP/IP Networks

Using ICMP to Troubleshoot TCP/IP Networks Laura Chappell Using ICMP to Troubleshoot TCP/IP Networks Illustration: Norman Felchle Editor s Note: This article is based on Laura Chappell s upcoming book TCP/IP Analysis and Troubleshooting, which

More information

GENERATOR BACKUP Web Server

GENERATOR BACKUP Web Server ADI 9523-A GENERATOR BACKUP Web Server INSTALLATION AND USER S GUIDE Carefully Read These Instructions Before Operating Carefully Read These Controls Corporation of America 1501 Harpers Road Virginia Beach,

More information

Getting Started (No installation necessary)

Getting Started (No installation necessary) ProtAnt (Windows) Build 1.2.1 (Released March 21, 2017) Laurence Anthony, Ph.D. Center for English Language Education in Science and Engineering, School of Science and Engineering, Waseda University, 3-4-1

More information

PROMISE ARRAY MANAGEMENT ( PAM) USER MANUAL

PROMISE ARRAY MANAGEMENT ( PAM) USER MANUAL PROMISE ARRAY MANAGEMENT ( PAM) USER MANUAL Copyright 2002, Promise Technology, Inc. Copyright by Promise Technology, Inc. (Promise Technology). No part of this manual may be reproduced or transmitted

More information

R227. Terms Code Discount per Sales Code Qty Ordered AR-1227

R227. Terms Code Discount per Sales Code Qty Ordered AR-1227 DSD Business Systems MAS 90/200 Enhancements R227 Terms Code Discount per Sales Code Qty Ordered AR-1227 Version 5.10 2 Terms Code Discount per Sales Code Qty Ordered Information in this document is subject

More information

TotalShredder USB. User s Guide

TotalShredder USB. User s Guide TotalShredder USB User s Guide Copyright Notice No part of this publication may be copied, transmitted, stored in a retrieval system or translated into any language in any form or by any means without

More information

PATGuard Time Manager 2

PATGuard Time Manager 2 PATGuard Time Manager 2 User Manual - i - Contents Disclaimer...iv License Agreement...v Introduction...6 Installing PATGuard Time Manager...6 Starting the Program...6 Program Overview...7 Open File...8

More information