MultiBase and Cosmos. Particularities about the database engine installation on client-server architecture. BASE 100, S.A.

Size: px
Start display at page:

Download "MultiBase and Cosmos. Particularities about the database engine installation on client-server architecture. BASE 100, S.A."

Transcription

1 Particularities about the database engine installation on client-server architecture BASE 100, S.A.

2 Index 1. CLIENT-SERVER INSTALLATION SERVER SIDE COMPUTER Linux or Unix Windows CLIENT SIDE COMPUTER ANNEX I. THE INETD PROCESS TO INVOKE THE DATABASE ENGINE IN SOME LINUX VERSIONS VARIATIONS TO THIS CONFIGURATION ANNEX II. PROFILE OF THE STARTING SERVICE USER ANNEX III. ACTIVATION OF SECURITY POLICIES DOMAIN SERVERS Policies for domain servers SERVERS WITHOUT DOMAIN Policies for servers without domain ANNEX IV. ACTIVATION OF THE CTSQL SERVICE IN WINDOWS SERVERS CTSQLMONITOR Copyright BASE 100, S.A. All rights reserved. All products mentioned in this document are trademark or registered trademark of their respective owners. [NT_client-server_v3_en.doc] Pág. 2

3 1. Client-server installation When installing your License in client-server mode you should take into account the peculiarities discussed bellow. IMPORTANT: If you are using a firewall, you must open the port defined in the "services" file for the clientserver connection. Note that some antivirus software installs a firewall software. 1.1 Server side computer Linux or Unix The services file ( /etc/services ) must be modified. This file is placed in the "/etc" directory. In that file you must define the name of the database engine ("CTSQL", for example), with the associated port number. In this file you must add the next line: For example: ctsql <port number>/tcp ctsql ctsql 5555/tcp ctsql The <port number> must be unique in the /etc/services file. In the "/etc" directory exists a file called "inetd.conf", where we must insert the next line: ctsql stream tcp nowait root /home/ctl/lib/ctsql ctsql system NET On some Linux versions the file inetd.conf doesn t exists. The way to invoke the database engine in such cases is described in Annex I Windows The services file must be modified. This file is placed in: windows en Windows 9x. windows\system32\drivers\etc on the other Windows versions. You must add the next line: For example: ctsql <port number>/tcp ctsql ctsql 5555/tcp The port number must be unique in the services file. Pág. 3

4 The ctsql service will be activated in Windows servers when is installed following the steps detailed bellow: The user that starts the service must be an user with administrative privileges in the local domain. The user s name length must not be longer than 8 characters (see Annex II), and the security policies described in Annex III must be active. The database users must be local users of the local server domain, and must have active the security policies described in the previous case. The service must be registered with the register.exe file, placed in the bin directory of the MultiWay installation. In order to activate the service in Windows servers, you must exec the mwlisten program (see Annex IV). NOTE: The security policies activation process is different in domain servers than servers without domain (see Annex III). 1.2 Client side computer Insert the same line shown in the previous section in the services file: windows on Windows 9x. windows\system32\drivers\etc on the other Windows versions. /etc in UNIX and Linux. The <port number> must be the same tan in the server side and must be unique. If that line is in the last line, you must insert a page break. Pág. 4

5 2. Annex I. The inetd process to invoke the database engine in some Linux versions In some cases the inetd.conf file doesn t exists. Instead there is a directory called xinetd.d, where are placed all the defined services, and where you must add the new file for the ctsql service called ctsql, with the same file permissions than the other files in the directory. For that you must follow the next steps with the root user: cd /etc cd xinetd.d vi ctsql You must add the next lines: # default: on # description: The ctsql server serves ctsql sessions service ctsql { socket_type protocol wait = stream = tcp = no instances = 100 user server server_args log_on_failure = root = $TRANSDIR/lib/ctsql = system NET += USERID port = 5555 } You must replace the $TRANSDIR string with the path where is installed the Unix/Linux Multibase license. You must replace the port number with the port shown in the services file for the ctsql service. You must restart the inetd process in order to take effect these changes: Kill 1 <inetd process number> In some OS the command can be: kill 10 (check the manual man kill ). The command restart service xinetd is also valid. In other systems (Linux systems with xinetd daemon instead of inetd daemon), you must exec the /etc/init.d/xinetd restart. Pág. 5

6 2.1 Variations to this configuration The instances parameter is optional. With this parameter you set the max number of instances of the ctsql service. In the server_args section, and only if the previous configuration doesn t works, you can try to put ctsql before the system string. If you want to activate the user identification option with the -dm parameter, you must replace the system word with the -dm word. For example: -dm NET In the server_args section, the system 3.0 string shows the installed CTL version. The 0.0 string can be replaced with the absolute path of the CTSQL environment file. NOTE: In the /tmp/startsql.log file you can see the results of the ctsql start process. Pág. 6

7 3. Annex II. Profile of the starting service user The user that starts the service must have a local user with administrative privileges. Computer Management Local users and groups Users. In Windows Vista/7 select User accounts in the Control Panel. Click with the mouse s right button on the Users folder and select New User. The next window will be shown: Pág. 7

8 From Computer Management Local Users and groups Groups : If the new user is not an Administrators group member, push the Add button. Select the computer name where we have created the new user. You must push the Location button. In the edit field you must insert the user name. Pág. 8

9 4. Annex III. Activation of security policies 4.1 Domain Servers Control Panel Administrative Tools Domain Controller Security Policy : Policies for domain servers You must add the next policies: Act as part of the operating system. Log on as batch job. Log on as service. Allow log on locally. Pág. 9

10 4.2 Servers without domain Control Panel Administrative Tools Local security policies : Pág. 10

11 4.2.1 Policies for servers without domain You must add the next policies: Act as part of the operating system. Log on as batch job. Log on as service. Pág. 11

12 5. Annex IV. Activation of the CTSQL service in Windows servers Follow the next steps to activate the ctsql service: 1. Select the option menu Run in the Windows Start menú and write: c:\multiway\mwlisten.exe install ctsql Click Ok. 2. Repeat the process with: c:\multiway\mwlisten.exe d ctsql When you click Ok the next window will be shown: Click Activar Cambiar Salir. On Windows Vista/7/Server 2003/2008, instead of execute the mwlisten command from the start-run menu, you must execute the cmd command with Run As Administrator in order to have the correct permissions to execute successfully the command. Pág. 12

13 5.1 CTSQLMonitor If the CTSQL engine version is 3.4 o higher, you must start the CTSQLMonitor program. Exec the command monitor.exe : c:\multiway\bin\monitor.exe This window will be shown: To start the CTSQLMonitor you must execute the option Start in the Options menu or click the icon. To stop the CTSQLMonitor select Stop option in the Options menú or click the icon. If the installation is in a Unix or Linux server, to start the CTSQLMonitor you must execute the next statement:./monitor start To stop the CTSQLMonitor you must execute:./monitor stop Pág. 13

TELE 301 Lecture 8: Post

TELE 301 Lecture 8: Post Last Lecture System installation This Lecture Post installation Next Lecture Wireless networking Overview TELE 301 Lecture 8: Post 1 Post-configuration Create user accounts and environments Sort out the

More information

TCP Wrapper. Provides host-based access control to network services

TCP Wrapper. Provides host-based access control to network services 1 TCP Wrapper Provides host-based access control to network services It has the following features: Logging Access Control Host Name Verification User Name Verification Spoofing Protection 2 TCP Wrapper

More information

RTC 502 and its Git adapter, Git and its prerequisite

RTC 502 and its Git adapter, Git and its prerequisite RTC 502 and its Git adapter, Git and its prerequisite software installation and setup guide In this doc, OS is RedHat Enterprise Server 6.4. Note: Why? Because open source software installation sometimes

More information

LPR for Windows 95/98/Me/2000 TCP/IP Printing User s Guide

LPR for Windows 95/98/Me/2000 TCP/IP Printing User s Guide LPR for Windows 95/98/Me/2000 TCP/IP Printing User s Guide Rev. 02 (August, 2001) Copyright Statement Trademarks Copyright 1997 No part of this publication may be reproduced in any form or by any means

More information

Multiservice servers. Stefan D. Bruda. Winter 2018

Multiservice servers. Stefan D. Bruda. Winter 2018 Multiservice servers Stefan D. Bruda Winter 2018 MULTISERVICE SERVERS Why? Because it sounds like fun Because we may need it E.g., a database server might receive requests from clients, but also from other

More information

Globus Installation Procedure

Globus Installation Procedure Globus Installation Procedure M. H. Eres, G. E. Pound, and S. J. Cox {eres, gep, sjc}@soton.ac.uk Southampton Regional e-science Centre School of Engineering Sciences University of Southampton Highfield,

More information

Linux Networking: network services

Linux Networking: network services Linux Networking: network services David Morgan Client and server: matched pairs Client process inter-process communication Server process 1 OK as long as there s a way to talk Client process Server process

More information

Chap2: Operating-System Structures

Chap2: Operating-System Structures Chap2: Operating-System Structures Objectives: services OS provides to users, processes, and other systems structuring an operating system how operating systems are designed and customized and how they

More information

Xinted. 1.1 Brief introduction. 1.2 Configuration of Xinetd

Xinted. 1.1 Brief introduction. 1.2 Configuration of Xinetd Xinted 1.1 Brief introduction Xinetd provides visiting control, improved log function and resource management. It is standard super guardian process of Internet in Asianux 2.0 system. Inetd is called super

More information

cron How-To How to use cron to Schedule rsync Synchronizations September 29, 2004

cron How-To How to use cron to Schedule rsync Synchronizations September 29, 2004 cron How-To How to use cron to Schedule rsync Synchronizations September 29, 2004 615-0006-01 2004 Net Integration Technologies Inc. All company and product names are registered trademarks off their respective

More information

Red Hat Ceph Storage 3

Red Hat Ceph Storage 3 Red Hat Ceph Storage 3 Monitoring Ceph for Red Hat Enterprise Linux with Nagios Monitoring Ceph for Red Hat Enterprise Linux with Nagios Core. Last Updated: 2018-06-21 Red Hat Ceph Storage 3 Monitoring

More information

Global Array Manager

Global Array Manager NEC Express Server Express5800 series NEC Express5800/100,ft Series Global Array Manager Ver. 5.00 Installation Manual [Linux Server Edition] Trademarks Microsoft, Windows and Windows NT are registered

More information

CS370 Operating Systems

CS370 Operating Systems CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2016 Lecture 5 Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 User Operating System Interface - CLI CLI

More information

14. Configuring Telnet in Knoppix

14. Configuring Telnet in Knoppix 14. Configuring Telnet in Knoppix Estimated Time: 45 Minutes Objective In this lab, the student will learn how to configure the Telnet service on a system so that the user can remotely administer a Knoppix

More information

StormTracker EMS 2.3 Installation Instructions. Contents. Document Number EMS-A2-GN10-00 July 2002

StormTracker EMS 2.3 Installation Instructions. Contents. Document Number EMS-A2-GN10-00 July 2002 StormTracker EMS 2.3 Installation Instructions Document Number EMS-A2-GN10-00 July 2002 Contents Overview... 2 Basic StormTracker EMS Functionality... 2 Oware and StormTracker EMS... 2 Supported Systems...

More information

Using Symantec NetBackup 6.5 with Symantec Security Information Manager 4.7

Using Symantec NetBackup 6.5 with Symantec Security Information Manager 4.7 Using Symantec NetBackup 6.5 with Symantec Security Information Manager 4.7 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2010 Symantec Corporation. All rights

More information

UNIX Spawner Program. Starting the UNIX Spawner Program CHAPTER 36

UNIX Spawner Program. Starting the UNIX Spawner Program CHAPTER 36 479 CHAPTER 36 UNIX Spawner Program Starting the UNIX Spawner Program 479 Examples of Starting and Connecting to the UNIX Spawner Program 482 Ending the UNIX Spawner Program 483 Starting the UNIX Spawner

More information

Batch Watermark Creator Software

Batch Watermark Creator Software PhotoX Batch Watermark Creator Software PhotoX helps you to add watermark stamp to your photos in a batch. The watermark can be generated from text or from an image. PhotoX also provides other tools likes

More information

CS420: Operating Systems. OS Services & System Calls

CS420: Operating Systems. OS Services & System Calls OS Services & System Calls James Moscola Department of Engineering & Computer Science York College of Pennsylvania Based on Operating System Concepts, 9th Edition by Silberschatz, Galvin, Gagne Operating

More information

Chapter 2: Operating-System Structures. Operating System Concepts 9 th Edit9on

Chapter 2: Operating-System Structures. Operating System Concepts 9 th Edit9on Chapter 2: Operating-System Structures Operating System Concepts 9 th Edit9on Silberschatz, Galvin and Gagne 2013 Objectives To describe the services an operating system provides to users, processes, and

More information

TEMPO INSTALLATION I O A. Platform Independent Notes 1. Installing Tempo 3. Installing Tools for the Plugins 5. v0.2.

TEMPO INSTALLATION I O A. Platform Independent Notes 1. Installing Tempo 3. Installing Tools for the Plugins 5. v0.2. TEMPO INSTALLATION v0.2.2 (BETA) 2/7/2008 Platform Independent Notes 1 On Windows: 2 On Linux: 2 On OS X (Tiger 10.4.7 and later) 2 I O A Installing Tempo 3 Installing on Windows (Vista/XP/W2K) 3 Installing

More information

STA 303 / 1002 Using SAS on CQUEST

STA 303 / 1002 Using SAS on CQUEST STA 303 / 1002 Using SAS on CQUEST A review of the nuts and bolts A.L. Gibbs January 2012 Some Basics of CQUEST If you don t already have a CQUEST account, go to www.cquest.utoronto.ca and request one.

More information

RFC RFC. Configuring FTP Server. FTP Clients

RFC RFC. Configuring FTP Server. FTP Clients RFC slide 1 RFC slide 2 as a network manager it is important to understand some of the subtle issues within networking within the TCP/IP suite of protocols including: TCP, UDP, IP, SNMP, ICMP, SMTP, FTP,

More information

Users Manual SX. 5. Using PRICOM in UNIX/Linux Environment

Users Manual SX. 5. Using PRICOM in UNIX/Linux Environment 5. This chapter explains how to configure PRICOM in UNIX/Linux environment and how to print using LPD and FTP. For further information not covered in this manual, refer to the manual of workstation you

More information

5. UNIX/Linux Environment

5. UNIX/Linux Environment 5. This chapter will explain how to print using LPD and FTP in a UNIX/Linux environment. This chapter contains examples; please refer to the manual of the workstation for specific details. Before proceeding,

More information

Tcpdump. For this exercise you must again be root. Login and obtain root privileges: Note that we use three computers for this exercise.

Tcpdump. For this exercise you must again be root. Login and obtain root privileges: Note that we use three computers for this exercise. 1 For this exercise you must again be root. Login and obtain root privileges: sudo su Note that we use three computers for this exercise. C S H 2 Create an account on the server that can be used from the

More information

Enabling ARM Instrumentation for Platform LSF and Platform Process Manager for SAS. November 2006

Enabling ARM Instrumentation for Platform LSF and Platform Process Manager for SAS. November 2006 Enabling ARM Instrumentation for Platform LSF and Platform Process Manager for SAS November 2006 Copyright Document redistribution and translation Internal redistribution Trademarks Third-party license

More information

Basic UNIX commands. HORT Lab 2 Instructor: Kranthi Varala

Basic UNIX commands. HORT Lab 2 Instructor: Kranthi Varala Basic UNIX commands HORT 59000 Lab 2 Instructor: Kranthi Varala Client/Server architecture User1 User2 User3 Server (UNIX/ Web/ Database etc..) User4 High Performance Compute (HPC) cluster User1 Compute

More information

Immotec Systems, Inc. SQL Server 2008 Installation Document

Immotec Systems, Inc. SQL Server 2008 Installation Document SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor

More information

RELEASE NOTES LABEL ARCHIVE May, Table of Contents. System Requirements

RELEASE NOTES LABEL ARCHIVE May, Table of Contents. System Requirements RELEASE NOTES LABEL ARCHIVE 2015.01 10 May, 2016 Table of Contents System Requirements New Features & Enhancements New Device Support Fixed Defects Known Limitations Compatibility with other TEKLYNX Software

More information

Linux & Shell Programming 2014

Linux & Shell Programming 2014 Unit -1: Introduction to UNIX/LINUX Operating System Practical Practice Questions: Find errors (if any) otherwise write output or interpretation of following commands. (Consider default shell is bash shell.)

More information

Integrated Mirroring SAS User s Guide for Windows Server 2008

Integrated Mirroring SAS User s Guide for Windows Server 2008 CA97232-0006-01EN Integrated Mirroring SAS User s Guide for Windows Server 2008 1 / 8 Contents Before reading this manual...3 Product Names (page 3)...3 3.1 Updating Device Driver (page 50)...4 Updating

More information

HELIX to CCD Translator Setup Check List

HELIX to CCD Translator Setup Check List 1 Translator setup requirements: HELIX to CCD Translator Setup Check List 1.1 CCD must be installed and operational. If you plan to open a Helix model from CCD interactively, a CCD license is required.

More information

Systems Programming/ C and UNIX

Systems Programming/ C and UNIX Systems Programming/ C and UNIX Alice E. Fischer Lecture 6: Processes October 9, 2017 Alice E. FischerLecture 6: Processes Lecture 5: Processes... 1/26 October 9, 2017 1 / 26 Outline 1 Processes 2 Process

More information

Operating Systems. Copyleft 2005, Binnur Kurt

Operating Systems. Copyleft 2005, Binnur Kurt 3 Operating Systems Copyleft 2005, Binnur Kurt Content The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail.

More information

Operating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing

Operating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing Content 3 Operating Systems The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail. How to log into (and out

More information

Can Delete Sharing Folder Windows 7 Access Denied

Can Delete Sharing Folder Windows 7 Access Denied Can Delete Sharing Folder Windows 7 Access Denied File and folder permissions on Windows are pretty great when they're working for you but when the OS suddenly decides to deny access to a folder on your

More information

How to Demonstrate Junos Pulse L3 VPN - Android

How to Demonstrate Junos Pulse L3 VPN - Android How to Demonstrate Junos Pulse L3 VPN - Android 1 Setup and Demonstration 1.1 Demonstrating Junos Pulse L3 VPN on Android 4 Setup and Demonstration How to Demonstrate Junos Pulse L3 VPN - Android - 3 Juniper

More information

Chapter 2: System Structures. Operating System Concepts 9 th Edition

Chapter 2: System Structures. Operating System Concepts 9 th Edition Chapter 2: System Structures Silberschatz, Galvin and Gagne 2013 Chapter 2: System Structures Operating System Services User Operating System Interface System Calls Types of System Calls System Programs

More information

Immotec Systems, Inc. SQL Server 2008 Installation Document

Immotec Systems, Inc. SQL Server 2008 Installation Document SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor

More information

Diagnosing SAS Enterprise Guide 4.1 Connectivity Problems Using the SAS Integration Technologies Configuration Utility TS-790

Diagnosing SAS Enterprise Guide 4.1 Connectivity Problems Using the SAS Integration Technologies Configuration Utility TS-790 Diagnosing SAS Enterprise Guide 4.1 Connectivity Problems Using the SAS Integration Technologies Configuration Utility TS-790 Diagnosing SAS Enterprise Guide Connectivity Problems Using the SAS Integration

More information

EventSentry Quickstart Guide

EventSentry Quickstart Guide Contents I Part I About This Guide 2 Part II Overview 3 Part III Installing EventSentry 6 1 Installation with... Setup 7 2 Management Application... 8 3 Configuration... 9 4 Remote Update... 12 5 Heartbeat

More information

(MCQZ-CS604 Operating Systems)

(MCQZ-CS604 Operating Systems) command to resume the execution of a suspended job in the foreground fg (Page 68) bg jobs kill commands in Linux is used to copy file is cp (Page 30) mv mkdir The process id returned to the child process

More information

OPERATING SYSTEMS. Božo Krstajić, PhD, University of Montenegro Podgorica.

OPERATING SYSTEMS. Božo Krstajić, PhD, University of Montenegro Podgorica. OPERATING SYSTEMS Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu 1 The /etc/rc.d directory The system initialization files are stored in the /etc/rc.d directory. Each task or runlevel

More information

VMware Infrastructure 3 Primer Update 2 and later for ESX Server 3.5, ESX Server 3i version 3.5, VirtualCenter 2.5

VMware Infrastructure 3 Primer Update 2 and later for ESX Server 3.5, ESX Server 3i version 3.5, VirtualCenter 2.5 Update 2 and later for ESX Server 3.5, ESX Server 3i version 3.5, VirtualCenter 2.5 VMware Infrastructure 3 Primer Revision: 20090313 Item: EN-000021-02 You can find the most up-to-date technical documentation

More information

Users Manual SX2. 2. Register this product host name and IP address to /etc/hosts file.

Users Manual SX2. 2. Register this product host name and IP address to /etc/hosts file. 5. This chapter will explain how to print using LPD and FTP in a UNIX/Linux environment. This chapter contains examples; please refer to the manual of the workstation for specific details. Before proceeding,

More information

Installation Guide Install Guide Centre Park Drive Publication Date: Feb 11, 2010

Installation Guide Install Guide Centre Park Drive Publication Date: Feb 11, 2010 EventTracker Install Guide 8815 Centre Park Drive Publication Date: Feb 11, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install and configure

More information

Processes are subjects.

Processes are subjects. Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path TCP wrappers Race conditions NOTE: filenames may differ between OS/distributions

More information

OPERATING SYSTEMS LINUX

OPERATING SYSTEMS LINUX OPERATING SYSTEMS LINUX Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu Process management Linux operating systems work with processes. Basically a process consists of program code

More information

User s Manual for H4S & NetPoint 2.2

User s Manual for H4S & NetPoint 2.2 User s Manual for H4S & NetPoint 2.2 2015 BIGPOND TECHNOLOGY Co., Ltd. All rights reserved. www.sunde.net.pk USER MANUAL FOR NETPOINT2.2 AND H4S 1 2015 BIGPOND TECHNOLOGY Co., Ltd. All rights reserved.

More information

Installation and Configuration Instructions. SAS Model Manager API. Overview

Installation and Configuration Instructions. SAS Model Manager API. Overview Installation and Configuration Instructions SAS Model Manager 2.1 This document is intended to guide an administrator through the pre-installation steps, the installation process, and post-installation

More information

PhotoPDF User Guide. PhotoPDF. Photo to PDF Converter

PhotoPDF User Guide. PhotoPDF. Photo to PDF Converter PhotoPDF Photo to PDF Converter PhotoPDF is a batch-processing tool to convert photos into PDF file. PhotoPDF provides three modes of conversion: Batch Convert, Photos Merge and Thumbnail Page. PhotoPDF

More information

SUNDE. User s Manual for NetPoint2.2 & H4S USER MANUAL FOR NETPOINT2.2 AND H4S 1

SUNDE. User s Manual for NetPoint2.2 & H4S USER MANUAL FOR NETPOINT2.2 AND H4S 1 SUNDE User s Manual for NetPoint2.2 & H4S USER MANUAL FOR NETPOINT2.2 AND H4S 1 2015 Huiyuan Co., Ltd. All rights reserved. www.sundenc.com THANK YOU FOR PURCHASING SUNDE NETWORK TERMINAL. PLEASE READ

More information

This section explains the operating environment for updating the firmware.

This section explains the operating environment for updating the firmware. Model No. SP 377 Series Firmware Update Guide This manual explains how to update the firmware of the following machine: Multifunctional Printer: SP 377SNwX/377SFNwX Printer: SP 377DNwX You can download

More information

Find out where you currently are in the path Change directories to be at the root of your home directory (/home/username) cd ~

Find out where you currently are in the path Change directories to be at the root of your home directory (/home/username) cd ~ CIS 105 Working with directories You have using directories in a Windows environment extensively. Often in Windows we are calling them folders. They are important in order to organize our files. It is

More information

Tagprint 3.0. Single User and Network Installation Instructions

Tagprint 3.0. Single User and Network Installation Instructions Tagprint 3.0 Single User and Network Installation Instructions System Requirements TagPrint Pro Standalone/TagPrint Pro Client PC running Microsoft Windows XP SP3, Vista SP1 or later, Windows 7 The single

More information

IntelliTrack DMS (Data Management System) v8.1 Quick Start Guide Preliminary Copy (July 2011) Copyright 2011 IntelliTrack, Inc.

IntelliTrack DMS (Data Management System) v8.1 Quick Start Guide Preliminary Copy (July 2011) Copyright 2011 IntelliTrack, Inc. Quick Start Guide Reasonable measures have been taken to ensure that the information included in this guide is complete and accurate. However, IntelliTrack reserves the right to change any specifications

More information

Remove Windows Service Manually Command Line Net Start

Remove Windows Service Manually Command Line Net Start Remove Windows Service Manually Command Line Net Start (Redirected from How do I start/stop/create/remove/check a service) Use Speed78's NSIS Simple Service Plugin, Execute the NET command (use Exec, Execute

More information

Human Resource Suite Instructions for Standard Installation for Citrix Users

Human Resource Suite Instructions for Standard Installation for Citrix Users Human Resource Suite Instructions for Standard Installation for Citrix Users COINS USA recommends that the System Administrator or staff trained in both UNIX and Citrix installation processes perform the

More information

FreeFlow Accxes version January Xerox FreeFlow Accxes Account Management Tool Customer Release Notes

FreeFlow Accxes version January Xerox FreeFlow Accxes Account Management Tool Customer Release Notes FreeFlow Accxes version 14.01.12 January 2010 Xerox FreeFlow Accxes Account Management Tool Customer Release Notes 2010 Xerox Corporation. All rights reserved. Xerox and the sphere of connectivity design,

More information

eftp Application User Guide

eftp Application User Guide Team A eftp User Guide 1/30 eftp Application User Guide Table of Contents Page 1. Acknowledgement 2 2. Introduction a. Welcome eftp Audience 3 b. What s in this manual 3 c. Manual Conventions 3 d. Getting

More information

Centrify for QRadar Integration Guide

Centrify for QRadar Integration Guide Centrify for QRadar Integration Guide November 2017 Centrify Corporation Abstract This integration guide is to help our Centrify Infrastructure Services customers easily integrate Centrify events into

More information

Mid Term from Feb-2005 to Nov 2012 CS604- Operating System

Mid Term from Feb-2005 to Nov 2012 CS604- Operating System Mid Term from Feb-2005 to Nov 2012 CS604- Operating System Latest Solved from Mid term Papers Resource Person Hina 1-The problem with priority scheduling algorithm is. Deadlock Starvation (Page# 84) Aging

More information

Chapter 2: System Structures

Chapter 2: System Structures Chapter 2: System Structures Chapter 2: System Structures 2.1 Operating-System Services 2.2 User and Operating-System Interface 2.3 System Calls 2.4 Types of System Calls 2.5 System Programs 2.6 Operating-System

More information

EASYLABEL Net Print Server

EASYLABEL Net Print Server EASYLABEL Net Print Server Introduction EASYLABEL Net Print Server (ELNPS) is an application that provides a web browser-based interface for label selection and printing. Users of web browsers on Windows

More information

Viewtier Parabuild 4.3. Installation Guide

Viewtier Parabuild 4.3. Installation Guide Viewtier Parabuild 4.3 Installation Guide Viewtier Parabuild 4.3: Installation Guide Copyright 2004-2016 Viewtier Systems Table of Contents Preface... vi About This Manual... vi Audience... vi Technical

More information

FieldView. Management Suite

FieldView. Management Suite FieldView The FieldView Management Suite (FMS) system allows administrators to view the status of remote FieldView System endpoints, create and apply system configurations, and manage and apply remote

More information

FreeFlow FreeFlow Accxes Client Tools Customer Release Notes. Version

FreeFlow FreeFlow Accxes Client Tools Customer Release Notes. Version FreeFlow FreeFlow Accxes Client Tools Customer Release Notes Version 12.07.26 Table of Contents 1 Introduction... 2 2 New in ACT Version 12.07.26... 3 2.1 Vista Support...3 2.2 IPv6 Support...3 3 Release

More information

Chapter 2: Operating-System Structures

Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls Types of System Calls System Programs Operating System

More information

Red Hat Ceph Storage 3

Red Hat Ceph Storage 3 Red Hat Ceph Storage 3 Monitoring Ceph for Ubuntu with Nagios Monitoring Ceph for Ubuntu with Nagios Core. Last Updated: 2018-09-07 Red Hat Ceph Storage 3 Monitoring Ceph for Ubuntu with Nagios Monitoring

More information

The UNIX Operating System. HORT Lecture 2 Instructor: Kranthi Varala

The UNIX Operating System. HORT Lecture 2 Instructor: Kranthi Varala The UNIX Operating System HORT 59000 Lecture 2 Instructor: Kranthi Varala Operating Systems Image By Golftheman - Own work, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=4558519 Operating

More information

Objectives. Chapter 2: Operating-System Structures. 2.1 Operating System Services

Objectives. Chapter 2: Operating-System Structures. 2.1 Operating System Services Objectives Chapter 2: Operating-System Structures To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system

More information

FUJITSU Software ServerView Mission Critical Option

FUJITSU Software ServerView Mission Critical Option FUJITSU Server PRIMEQUEST2000 Series FUJITSU Software ServerView Mission Critical Option User Manual Version 1.2 Copyright Fujitsu Limited 2014 All hardware and software names used are trademarks of their

More information

User Account Manager

User Account Manager CHAPTER 4 Note User accounts can be accessed only when operating in Internal Directory mode. To access User tasks, log in to the system (see Logging In section on page 2-1). Then, from the Home page, click

More information

EECS Software Tools. Lab 2 Tutorial: Introduction to UNIX/Linux. Tilemachos Pechlivanoglou

EECS Software Tools. Lab 2 Tutorial: Introduction to UNIX/Linux. Tilemachos Pechlivanoglou EECS 2031 - Software Tools Lab 2 Tutorial: Introduction to UNIX/Linux Tilemachos Pechlivanoglou (tipech@eecs.yorku.ca) Sep 22 & 25, 2017 Material marked with will be in your exams Sep 22 & 25, 2017 Introduction

More information

RSA NetWitness Logs. Oracle Directory Server. Event Source Log Configuration Guide. Last Modified: Thursday, June 29, 2017

RSA NetWitness Logs. Oracle Directory Server. Event Source Log Configuration Guide. Last Modified: Thursday, June 29, 2017 RSA NetWitness Logs Event Source Log Configuration Guide Oracle Directory Server Last Modified: Thursday, June 29, 2017 Event Source Product Information: Vendor: Oracle Event Source: Oracle Directory Server

More information

CSE Linux VM. For Microsoft Windows. Based on opensuse Leap 42.2

CSE Linux VM. For Microsoft Windows. Based on opensuse Leap 42.2 CSE Linux VM For Microsoft Windows Based on opensuse Leap 42.2 Dr. K. M. Flurchick February 2, 2017 Contents 1 Introduction 1 2 Requirements 1 3 Procedure 1 4 Usage 3 4.1 Start/Stop.................................................

More information

Chapter 2. Operating-System Structures

Chapter 2. Operating-System Structures Chapter 2 Operating-System Structures 2.1 Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls Types of System Calls System Programs Operating System

More information

HP JetDirect Print Servers. HP JetAdmin. Setup Guide

HP JetDirect Print Servers. HP JetAdmin. Setup Guide R HP JetDirect Print Servers HP JetAdmin Setup Guide Setup Guide HP JetAdmin Copyright Hewlett-Packard Company 2000 All rights reserved. Reproduction, adaptation, or translation without prior written

More information

ZBG 100 Gateway Recovery Guide Version 02 ZBG pikkerton GmbH ZBG Gateway Recovery Guide.docx Page 1/11

ZBG 100 Gateway Recovery Guide Version 02 ZBG pikkerton GmbH ZBG Gateway Recovery Guide.docx Page 1/11 2015 pikkerton GmbH ZBG.docx Page 1/11 1 History DVers.: Date Modified by Changes State 01 04.06.2015 PI FG Born Release 02 13.10.2015 PI FG Update of file links Release 2015 pikkerton GmbH ZBG.docx Page

More information

RSA NetWitness Logs. Bind DNS. Event Source Log Configuration Guide. Last Modified: Thursday, October 19, 2017

RSA NetWitness Logs. Bind DNS. Event Source Log Configuration Guide. Last Modified: Thursday, October 19, 2017 RSA NetWitness Logs Event Source Log Configuration Guide Bind DNS Last Modified: Thursday, October 19, 2017 Event Source Product Information: Vendor: Bind Event Source: Bind DNS Logs Versions: Bind DNS:

More information

Perceptive Interact for Microsoft Dynamics AX

Perceptive Interact for Microsoft Dynamics AX Perceptive Interact for Microsoft Dynamics AX Installation and Setup Guide Version 1.2 Compatible with ImageNow, version 6.7.x Written by: Product Documentation, R&D Date: September 2016 2013 Perceptive

More information

Network Connection Guide

Network Connection Guide EN MA1703-A Network Connection Guide Be sure to keep all user documentation handy for future reference. To obtain the latest version of this manual visit the website at the URL below. http://world.casio.com/manual/projector/

More information

Copyright FUJITSU LIMITED

Copyright FUJITSU LIMITED ******************************************************************************** ** ** ** Systemwalker Templates Installation (readme) ** ** - Event Monitor Templates ** ** - Process Monitor Templates

More information

Installation Guide. Copyright 2011 Bitdefender

Installation Guide. Copyright 2011 Bitdefender Installation Guide Copyright 2011 Bitdefender Bitdefender Total Security 2012 Installation Guide Publication date 2011.07.15 Copyright 2011 Bitdefender Legal Notice All rights reserved. No part of this

More information

Lab Authentication, Authorization, and Accounting

Lab Authentication, Authorization, and Accounting Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices

More information

Infor ES Application Service Manager Administration Guide

Infor ES Application Service Manager Administration Guide Infor ES Application Service Manager Administration Guide Copyright 2016 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and contains

More information

ETERNUS SF AdvancedCopy Manager V13.3 Message Guide

ETERNUS SF AdvancedCopy Manager V13.3 Message Guide B1WW-8881-05ENZ0 (00) ETERNUS SF AdvancedCopy Manager V13.3 Message Guide ii Preface About This Manual This manual explains the messages output by ETERNUS SF AdvancedCopy Manager. Intended Reader This

More information

Lab Working with Linux Command Line

Lab Working with Linux Command Line Introduction In this lab, you will use the Linux command line to manage files and folders and perform some basic administrative tasks. Recommended Equipment A computer with a Linux OS, either installed

More information

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos

More information

LAB #7 Linux Tutorial

LAB #7 Linux Tutorial Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing

More information

Dell EMC ME4 Series vsphere Client Plug-in

Dell EMC ME4 Series vsphere Client Plug-in Dell EMC ME4 Series vsphere Client Plug-in User's Guide Regulatory Model: E09J, E10J, E11J Regulatory Type: E09J001, E10J001, E11J001 Notes, cautions, and warnings NOTE: A NOTE indicates important information

More information

BOOTP. 1. Verify that the bootpd and bootptab files are in the correct. 2. Edit the hosts file to add the printer internet addresses and names:

BOOTP. 1. Verify that the bootpd and bootptab files are in the correct. 2. Edit the hosts file to add the printer internet addresses and names: BOOTP Bootstrap protocol, BOOTP, is the recommended way to establish communications from the host to the printer in an internet protocol environment. BOOTP obtains booting data from the bootptab file.

More information

Altova CbC Reporting Solution. Installation Guide

Altova CbC Reporting Solution. Installation Guide Installation Guide Installation Guide All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping,

More information

Troubleshooting the Installation

Troubleshooting the Installation APPENDIX A This appendix provides troubleshooting information for CD One installation. It contains: Checking Files and Directories After Installation Viewing and Changing Process Status Understanding Installation

More information

Plan 9 Authentication in Linux

Plan 9 Authentication in Linux Plan 9 Authentication in Linux Ashwin Ganti University of Illinois at Chicago aganti@cs.uic.edu ABSTRACT This paper talks about the implementation of the Plan 9 authentication mechanisms for Linux. As

More information

ThinPoint Quick Installation Guide - 1 -

ThinPoint Quick Installation Guide - 1 - ThinPoint Quick Start Guide ThinPoint Quick Installation Guide - 1 - ThinPoint Quick Start Guide (Fourth Edition, April 2008) Published by: NetLeverage Pty. Ltd. Suite 17, 17 International Business Centre

More information

GNU/Linux: An Essential Guide for Students Undertaking BLOSSOM

GNU/Linux: An Essential Guide for Students Undertaking BLOSSOM Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative

More information

GridPro v6.0 INSTALLATION GUIDE

GridPro v6.0 INSTALLATION GUIDE GridPro v6.0 INSTALLATION GUIDE TABLE OF CONTENTS 1. DOWNLOADING GridPro 1 2. CD CONTENTS 1 3. REQUIRED PACKAGES 1 4. SYSTEM REQUIREMENTS 2 5. INSTALLATION PROCEDURE 2 5.1 INSTALLATION PROCEDURE FOR WINDOWS

More information

Backup using Quantum vmpro with Symantec Backup Exec release 2012

Backup using Quantum vmpro with Symantec Backup Exec release 2012 Backup using Quantum vmpro with Symantec Backup Exec release 2012 Step 1) If the vmpro appliance name and IP address are not resolved through DNS, update the Windows hosts file to include the IP address

More information