The Lock XP installation White Paper # 09995
|
|
- Annis Davis
- 5 years ago
- Views:
Transcription
1 The Lock XP installation White Paper # Installing The Lock XP for a single Home computer, with multiple users. The operating system used for this demonstration is Windows XP Professional, but any version of Microsoft Windows 98 or later will work the same way. Download the latest version of The Lock XP installer from CrashCourse Software, and save the file in the C:\Temp folder. The next stop is to decompress the file. Double click the archive file to open the ZIP file so the setup program can be executed. Alternately, if you prefer to use WinZip, simply open the file LOCKXP.ZIP in WinZip and press the Install button. Run SETUP.EXE
2 The Lock XP s installer will start. Follow the prompts by clicking Next, taking any default settings that you are prompted with. Be sure to accept the license agreement to continue.
3 Once all installation settings have been selected, press the Install button to continue. At the end of the installation process, you will be prompted with the following dialog (if this is your first time to install The Lock XP). You will need to select Yes if you play to use any of The Lock XP s on-the-fly file and folder resource restrictions (which you will in this demonstration).
4 Once the installation is comp lete, press Finished to continue.
5 We are now ready to configure The Lock XP. Once you have pressed Finish, the Lock XP s Configuration Utility will load. If you would like to view the Quick Start guide, click yes on the dialog shown below. If this is your first installation of The Lock XP, you will be prompted to create a Master Administrator password. It is important that you make this password easy for you to remember, but difficult for others to guess. This password will give you full Admin istrator access to Lock XP functions, as well as allow you to uninstall the program, as well as grant access to restricted programs, if that feature is enabled. This is the only Master Administrator account. All other Administrator accounts are standard Administrators. The Master Administrator password dialog looks like this one above. The Lock XP installer will also check the logged on Windows user name. If the logged on Windows user is not ADMINISTRATOR, then their user name will be added to The Lock XP under the ADMINISTRATORS security account. Since
6 this account will have full Administrator rights to The Lock XP, you must be sure that your password is not blank, as this would give anybody access to the system that wanted it. The next pro mpt will be asking if you would like to run the Lock XP s Setup Configuration Wizard. For the demonstration, we will select No, then select one of the four defaults from the next dialog window. Since this system is primarily for home use, the option for Home computer has been selected. When you click OK on this dialog, you will be prompted to import existing Windows users. Since there are no other Windows users currently on this system (aside from my account, and the ADMINISTRATOR account), we will select No.
7 Since we are planning to create and configure users manually, we will select No, we do not wish to create any new users right now. Once the dialogs are cleared, The Lock Configuration Utility is displayed. From the image below, we can see there are two user accounts (ROB and ADMINISTRATOR), and two Security groups (ADMINISTRATORS and DEFAULT). We are now ready to create our first Security Group, add users to it, and set it s security. Before starting this process, I usually make a note of what users I plan to create, and what type of security they will need. In this demonstration, I will be creating three users: BECCA, SAMARA and MANDY. BECCA and SAMARA will have two varying levels of security, both based off the Home user default security. MANDY will have no security applied, but will not be an Administrator either.
8 The first step in creating a Lock XP user is to create a Security Group for that user to belong to. In order to accomplish this, select the System (the first entry in the User and Group tree), right click it and select New Group. Alternately, you can open Options, select Group, the New. The first user we are going to create is for a girl named Becca.
9 The New Group dialog is displayed. Create a name for this group. In our demonstration the group name is BECCA. Since she is a home user, we are going to take the default Home restrictions and build our security profile from there. As a note, you may check the option to create this group as a local Windows group as well, but it is not required.
10 We now have a new group called BECCA. The next stop is to add names to the BECCA group. To accomplish this, select the BECCA group from the user and group tree, right click the entry and select New User. Alternately, you could also select the desired group, then click options, Users, New. The User Configuration dialog will appear. Use this dialog to set a user name, and set it s password You will want to be sure to check the option Create Windows user. If you do not have this option checked, you will need to manually create your users in Windows, before they will be permitted to log onto the workstation.
11 A new user has now been created, and the User and Group tree should look like the following dialog.
12 The first thing we are going to do is modify some of the default security selected. Since the BECCA account is for a young person, they will need a little more security applied to them so that they cannot accidentally modify any system settings. When setting group security, I prefer to start with the first tab (Policy) and work my way to the right, to the last tab (Stations). I set the desired security items on each page, as I am working through it. In the above image, we have expanded the System Policy item, then checked the option to Secure Registry Run Keys. This option will allow The Lock XP to restrict having any programs added to the RunOnce, Run and Winlogon keys. I have also checked the option Disable Access to Administration Tools, that is at the top of the current list, and not actually shown on this screen.
13 We also want to restrict the times that she is allowed to be using the computer. These settings are on the Times tab. As can be seen from the image above. The BECCA security group is restricted from accessing the computer at certain times in the evening. Any time BECCA is logged in and time reaches a restricted hour, she will be automatically locked, or logged out, depending on the configuration from above. Any attempts to log into the machine during a restricted hour will result in the same.
14 By default, Home users are allowed to write to any folders that they want, except for the Windows folder, and the Lock s install folder. We will want to add another folder to the restrictions for the BECCA account. We want to add a restriction that will make the C: drive (the system disk) read only for this user. Click the Add button, and the following dialog will appear. Click on the Drives button to specify a type of drive to restrict. In our case, we are going to restrict the System Disk, and set it to Read Only.
15 With this option set, BECCA will not be able to write to any part of the C: drive, including sub folders. She will, however, have full read access to the drive. The next tab in the configuration utility is the Programs tab. On this tab, you will be able to configure programs that the user will be restricted from using (Restricted Programs), or create a list of valid programs the user can access (Allowed Programs), as well as configure a sort of Explorer/Program Manager (Secure Program Manager) that presents the user with a customizable program launching tool. The Secure Program Manger will contain a list of programs that the user may start by double clicking on it s icon. Both the Allowed Programs, and the Secure Program Manger are advanced tools, and will not be addressed in this demonstration. As you can see below, the Default Home security selection has automatically added some default program restrictions.
16 In the list of Restricted Programs, you will find the three items that make up a program identifier. 1) Program Name. This is the executable name that is run to start the program. Explorer.exe is a Program Name. 2) Program Class. This actually refers to the class of the Window, not the program itself. The Class name designates the identifier of Window itself. For example, from the window on the previous page, the Boot Drive Lock entry has a window class named TfBDCfg. 3) Program Title. This is actually the title of the window, and not the title of the program. Using the example from #2, we see the Class for the Boot Drive Lock entry as TfBDCfg, and the title as Boot Drive Lock Control Panel We don t really need to know all this stuff in order to make this feature work. All we need to do is know what window we want to stop our user from accessing. For this demonstration, I want to restrict BECCA from running the Windows XP Tour utility (accessed by selecting the option from the Start Menu, All Programs submenu). I don t know what the program that runs this utility is called, or even what it s main Window Class and Title are. So, how do I restrict this program? Simple. Press the Capture button, and the following dialog appears. Make a note of the key combination stated to activate the capture. In this case, it is CTRL + ALT + SHIFT + F12. Click OK, then run the Windows XP Tour from the Windows Start Menu. When it is started, you should see a window that looks something like this one. Make sure the window you want to capture is in focus (click on it s title bar, just to be sure), then press the hot-key combination (specified in the capture enabled dialog), and you should hear a sound (if you have speakers on your system). This indicates that the entry was recognized by The Lock XP and added to the current configuration.
17 As you can see, a new entry has been added to the Restricted Programs list. The Windows XP Tour starts by running a program called TOURSTART.EXE, wh ich displays a window with a class of #32770 (actually a common Windows class), and a title of Windows XP Tour. As soon as BECCA logs into the computer, The Lock XP will automatically be searching for her trying to use the Windows XP Tour (as well as the other programs on the Restricted Programs list). The last security tab is Stations, and is not going to be used in this demonstration. Basically, this page allows you to specify computer names for systems your users are allowed or not allowed to log into. With our first user created, and her security set, it is time to move onto our second user.
18 Right click the system name again, and select New Group. The name for this security group will be SAMARA. We will select the default security as Home restrictions again, the same as the BECCA Security Group.
19 Once the group is created be sure to check the option Disable Access to Administrator tools under the System heading, right click the name, and select New User. Create the user as SAMARA and set her password. Be sure to check the Create Windows user option before clicking OK.
20 Since SAMARA is the older of the two restricted users, she will need less security applied to her account, but, as shown above, she will still need to have time restrictions applied. The settings above force her to log off the system at 10:00 on week days, and 11:00 on weekends. She also does not have access to the computer during her dinner time hour.
21 Added security does not always need to be applied, but should be applied when the situation warrants such action. In this case, SAMARA would bring floppy disks home from school and put them into the computer. This, of course, creates a huge security risk, so in order to alleviate the problem, we add a No Access file and folder resource entry to block access to floppy disks. This process is performed the same way we added System Disk to the BECCA account.
22 For the SAMARA account, we are not going to add any extra Restricted Programs, but we are going to enable the Allow Administrator Override option. When this option is enabled, any time SAMARA has a Restriction Program notification, the Master Administrator will have the opportunity to type their password, and give SAMARA access to the restricted program until the next time she logs out of the system. This is all the extra configuration we will be doing for the SAMARA account
23 The next step is to create the MANDY security group and user account. As you can see from the above, we have selected the option to not add any security for this group. This will allow users in the MANDY group to have full access to the system, with the exception of access Administrator functions of The Lock XP itself. After the MANDY group is created, right click and select New User, and create the MANDY account, the same as the other accounts above.
24 The only policy item being set for this user is the Enable URL Audit Logging option under Logging Policy. Click this option, and we are done with creating our users. We have one more task to do. We need to turn on User Logging.
25 Click the System Configuration tab, and collapse the entries for Startup, Locking, and Passwords. Expand the entry for Settings, then Logging. Place a check mark in the Enable user logging entry. Now click File, then select Exit. Follow the closing prompts.
26 If you have a registration name and number, select Yes, otherwise select No to install the 30 trial version of The Lock XP. You will enter your registration into a dialog box that looks like the one above. Make sure to select Yes to this dialog box, if you wish to have The Lock XP load and secure your system at every boot. User who are running Windows XP (as is the system in the demonstration) have the use of the Windows Welcome Screen. This is the screen that displays all the users names, and puts a little picture next to their names. Since this is a home computer, it is safe to select the Use Windows Welcome Screen, and Enable Fast User Switching options. Click Done when you are ready to move to the next dialog.
27 The dialog above simply set weather The Lock XP will lock itself once the user logs in, or if it will allow the user logged into Windows to also be logged into The Lock XP automatically. This is an important step to the process. It is highly recommended that you create an Administrator key disk now. If you happen to forget your Master Administrator password, this Administrator key disk is the only way to gain access to some of the Administrator features of The Lock XP. Place a floppy disk into your floppy drive and press the OK button. The above dialog will be displayed if the Administrator key disk was created successfully. Alternately, if you don t have a floppy drive, for example, at the create an emergency access key disk dialog, press and hold Shift, then click OK.
28 The above dialog is then displayed when the file has been successfully created. Save the file from the location noted above to the removable media of your choice, and press OK. You have now installed and configured The Lock XP for a single system, with multiple user accounts. Press Yes now to restart the computer, and start using The Lock XP.
10ZiG Technology. Thin Desktop Quick Start Guide
10ZiG Technology Thin Desktop Quick Start Guide 2010 05 20 Introduction This document is intended as a quick start guide for installing Thin Desktop. After reading this document, you will know how to:
More information8 MANAGING SHARED FOLDERS & DATA
MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to
More informationVirtual CD TS 1 Introduction... 3
Table of Contents Table of Contents Virtual CD TS 1 Introduction... 3 Document Conventions...... 4 What Virtual CD TS Can Do for You...... 5 New Features in Version 10...... 6 Virtual CD TS Licensing......
More informationInstallation Instructions for Free Scheduler Plus Software IBS Show Promotion
Installation Instructions for Free Scheduler Plus Software IBS Show Promotion Offer ends 1/12/17 limited copies available! Thank you for your decision to use our Free copy of Scheduling Plus to help streamline
More informationNikon Message Center
Nikon Message Center Notice to Users in Europe and the U.S.A 2 Automatic Update 3 Checking for Updates Manually 3 4 Available Messages 5 My Products 6 Scheduling Updates 6 The Download Log 7 Uninstalling
More informationPart 1: Understanding Windows XP Basics
542362 Ch01.qxd 9/18/03 9:54 PM Page 1 Part 1: Understanding Windows XP Basics 1: Starting Up and Logging In 2: Logging Off and Shutting Down 3: Activating Windows 4: Enabling Fast Switching between Users
More informationStorage Security Software (Version )
For Toshiba CANVIO series Storage Security Software (Version 1.00.6904) User s Manual Version 1.00 This document explains the installation process and basic usage of the Storage Security Software designed
More informationLaborKey Version 4.0. Installation Guide. 4.01a FEB 2007
LaborKey Version 4.0 Installation Guide 4.01a FEB 2007 Install LaborKey Software Activate LaborKey Service Create LaborKey User Accounts Install LaborKey on Multiple Stations Contents Step 1 download LaborKey
More informationEaglesoft 18.1 Installation Instructions
Eaglesoft 18.1 Installation Instructions NOTE: We recommend using a static IP address on your Eaglesoft database server machine. 1. Eaglesoft Version 18.1 will require all users to have a password with
More informationThinkVantage Fingerprint Software
ThinkVantage Fingerprint Software 12 2 1First Edition (February 2006) Copyright Lenovo 2006. Portions Copyright International Business Machines Corporation 2006. All rights reserved. U.S. GOVERNMENT
More informationInstalling the application involves several steps. Note that you must install QuickBooks on your computer prior to installing this application.
CCRQLABEL OVERVIEW This is an overview (summary) of the CCRQLabel 4.x label printing product. Full documentation is under development INSTALLING CCRQLABEL This document provides a quick review of how to
More informationChanging Settings for ViewMail for Outlook (Version 8.0 Only)
Changing Settings for ViewMail for Outlook Note This content applies to ViewMail for Outlook version 8.0 only. For later ViewMail versions, see the Quick Start Guide for Cisco ViewMail for Microsoft Outlook
More informationPCLaw Installation and Upgrade Guide
PCLaw Installation and Upgrade Guide Version 14.1 2015 LexisNexis. All rights reserved. Copyright and trademark LexisNexis, Lexis, and the Knowledge Burst logo are registered trademarks of Reed Elsevier
More informationUsing LaunchPad. Contents. Section 1-7. This section: Describes how to use LaunchPad to run your access control programs.
Section 1-7 Using LaunchPad This section: Describes how to use LaunchPad to run your access control programs. Describes how to change your login name and password Describes how to add new operators. Describes
More informationRecent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004
Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 You log into a system to notify the system who you are. When you log off, any files you have opened are cleaned up, and
More informationAdmin Guide. LabelShop 8
Admin Guide LabelShop 8 Administrator s guide DOC-OEMCS80-AG-US-02/03/06 The information in this manual is not binding and may be modified without prior notice. Supply of the software described in this
More informationR9.7 erwin License Server:
R9.7 erwin License Server: Installation and Setup This is a quick guide to setting-up a erwin DM License Server. NOTES: - Concurrent licensing is available for only erwin r8.2 and later releases! - Concurrent
More informationFull file at
Chapter 2 Solutions Answers to the Chapter 2 Review Questions 1. The Melissa virus was transported by. c. e-mail 2. Which of the following are used for updates in Windows XP Professional? (Choose all that
More informationPrint Manager Plus 2010 Workgroup Print Tracking and Control
INTRODUCTION: This is intended to assist in the initial installation or evaluation of Print Manager Plus 2010 Workgroup Edition. This will guide you through tracking your printing whether your workgroup
More informationServer Edition Administrator s Guide
Server Edition Administrator s Guide March 29, 2005 Beagle Software 800 Washington Ave. N, Suite 418 Minneapolis, Minnesota 55401 USA Introduction This document covers FinePrint, pdffactory, and pdffactory
More informationBatch Eligibility Long Term Care claims
DXC Technology Provider Electronic Solutions software lets Connecticut Medical Assistance Program providers verify patient s eligibility and submit and correct claims for services all electronically. The
More informationGUARD1 PLUS Manual Version 2.8
GUARD1 PLUS Manual Version 2.8 2002 TimeKeeping Systems, Inc. GUARD1 PLUS and THE PIPE are registered trademarks of TimeKeeping Systems, Inc. Table of Contents GUARD1 PLUS... 1 Introduction How to get
More information2. install windows vista
2. install windows vista Windows Vista comes preloaded on many brand-new PCs. If you already have a computer with Windows Vista installed, you can go directly to Chapter 3, Move from another PC. If you
More informationWimba Pronto. Version 3.1. User Guide
Wimba Pronto Version 3.1 User Guide Wimba Pronto 3.1 User Guide Welcome to Wimba Pronto 1 Top Wimba Pronto Features 1 What's New in Wimba Pronto? 3 Getting Started 4 Wimba Pronto System Requirements 4
More informationdbdos PRO 2 Quick Start Guide dbase, LLC 2013 All rights reserved.
dbdos PRO 2 Quick Start Guide 1 dbase, LLC 2013 All rights reserved. dbase, LLC may have patents and/or pending patent applications covering subject matter in this document. The furnishing of this document
More informationWindows XP. A Quick Tour of Windows XP Features
Windows XP A Quick Tour of Windows XP Features Windows XP Windows XP is an operating system, which comes in several versions: Home, Media, Professional. The Windows XP computer uses a graphics-based operating
More informationINSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook
INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook Sharing Microsoft Outlook Calendar and Contacts without Exchange Server Contents What is OfficeCalendar? Sharing Microsoft Outlook Calendars
More informationInstalling the Is2 Onsite Version - HVAC Office System
Installing the Is2 Onsite Version - HVAC Office System This document describes the full onsite server installation of the Is2 database files, the database server, and the application server. The full program
More informationA0. Special Considerations for Windows Vista a) Consideration during installation b) Runtime considerations
Table of Contents A0. Special Considerations for Windows Vista a) Consideration during installation b) Runtime considerations A1. SELECT XM License a) Standalone workstations b) Networked workstations
More informationExam : Title. : A+ OS Technologies
Exam : 220-302 Title : A+ OS Technologies QUESTION 1 Under Windows 2000 you consistently receive out of memory messages when running multiple applications. To avoid having to upgrade RAM immediately you?
More informationPrint Audit 6. Print Audit 6 Documentation Apr :07. Version: Date:
Print Audit 6 Version: Date: 37 21-Apr-2015 23:07 Table of Contents Browse Documents:..................................................... 3 Database Documentation.................................................
More informationMinimum System Requirements The following are the minimum system requirements needed to run and install Premium Pro Enterprise:
Overview Premium Pro Enterprise is the next generation of the Premium Pro family of applications. It is a Javabased application that houses multiple products and tax years in a single interface. It requires
More informationWimba Pronto. Version 2.0. User Guide
Wimba Pronto Version 2.0 User Guide Wimba Pronto 2.0 User Guide Welcome to Wimba Pronto 1 What's New in Wimba Pronto 2.0 2 Getting Started 3 Wimba Pronto System Requirements 3 Creating a New Wimba Pronto
More informationOptionPower 3.2. for Office 2007 STARTUP GUIDE. Interactive Audience Response Systems
OptionPower for Office 2007 3.2 STARTUP GUIDE Interactive Audience Response Systems OptionPower for Office 2007 3.2 STARTUP GUIDE 2008 Option Technologies Interactive This document is the copyrighted and
More informationEmployee Web Services. Installation Guide
Employee Web Services This is a publication of Abila, Inc. Version 2017.x 2016 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names
More informationDownload instructions for DataTrace Pro software
Download instructions for DataTrace Pro software Please follow the steps below to download DataTrace Pro software 1. Go to the DataTrace Pro Downloads web page www.cik-solutions.de/datatrace-support 2.
More informationThinkVantage Fingerprint Software
ThinkVantage Fingerprint Software 12 2 1First Edition (November 2005) Copyright Lenovo 2005. Portions Copyright International Business Machines Corporation 2005. All rights reserved. U.S. GOVERNMENT
More informationPhotoPDF User Guide. PhotoPDF. Photo to PDF Converter
PhotoPDF Photo to PDF Converter PhotoPDF is a batch-processing tool to convert photos into PDF file. PhotoPDF provides three modes of conversion: Batch Convert, Photos Merge and Thumbnail Page. PhotoPDF
More informationWELCOME TO LACERTE! WE APPRECIATE YOUR BUSINESS.
WELCOME TO LACERTE! WE APPRECIATE YOUR BUSINESS. INSTALLING YOUR LACERTE PROGRAM 1 Install the 2017 program if not currently installed. 2 Install the 2018 program. Important updates to System Requirements
More informationModeChanger
35020808-02 2015.11 ModeChanger ModeChanger is a software utility that can switch the drive between normal mode and encrypted mode. Operating in encrypted mode will help protect your data. While the drive
More informationAbila MIP DrillPoint Reports. Installation Guide
Abila MIP DrillPoint Reports This is a publication of Abila, Inc. Version 16.1 2015 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service
More informationCOINS Ti Call Management System Standard Installation Instructions for Citrix Users
COINS Ti Call Management System Standard Installation Instructions for Citrix Users COINS recommends that the System Administrator or staff trained in both UNIX and Citrix installation processes perform
More informationThe ViVo Mouse Versions: Standard & Professional Installation Guide
Versions: Standard & Professional Installation Guide Copyright 2010-2014 Vortant Technologies, LLC Table of Contents Installation Guide - ViVo Standard & Professional... 3 Contact Information... 3 Getting
More informationInstalling McAfee VirusScan For Windows 95/98 Kyler Kwock, Wilbur Wong Revised by Therese Nakadomari
WIN9X009 March 2000 Installing McAfee VirusScan For Windows 95/98 Kyler Kwock, Wilbur Wong Revised by Therese Nakadomari Overview 1 Product Overview 1 System Requirements 2 Download Instructions 2 Installation
More information5 MANAGING USER ACCOUNTS AND GROUPS
MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content
More informationReinstalling Windows 95/98/ME/2000 Professional
Reinstalling Windows 95/98/ME/2000 Professional Who needs this handout? If you have been instructed to reinstall Windows on your computer as a result of a recommendation from a computer consulting professional,
More informationSTATISTICA VERSION 10 STATISTICA MONITORING AND ALERTING SERVER (MAS) INSTALLATION INSTRUCTIONS
Pre-requisites: STATISTICA VERSION 10 STATISTICA MONITORING AND ALERTING SERVER (MAS) INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Monitoring And Alerting Server (MAS) network version
More informationJUN / 04 VERSION 7.1 FOUNDATION PVI EWLUTME
JUN / 04 VERSION 7.1 FOUNDATION PVI EWLUTME www.smar.com Specifications and information are subject to change without notice. Up-to-date address information is available on our website. web: www.smar.com/contactus.asp
More informationOneRoof CyberCafePro Client Installation, Setup and User Manual
OneRoof CyberCafePro Client Installation, Setup and User Manual Suggestion: View manual on computer at 200% to see screenshot details. Client Manual: Version 6.0.x March 15, 2010 Copyright 2010, OneRoof,
More informationThis installation guide is intended for customers who are installing NMIS for the first time. Included are the recommended hardware specifications
This installation guide is intended for customers who are installing NMIS for the first time. Included are the recommended hardware specifications and sample screens to guide you through the installation
More informationQuick Start Guide. Smarter Surveillance for a Safer World
Quick Start Guide Smarter Surveillance for a Safer World Ocularis Quick Start This quick reference will lead you through a typical new Ocularis installation. Use these steps when installing Ocularis Professional,
More informationACS Technical Bulletin
ACS Technical Bulletin Upgrading Pervasive.SQL to V9 General Guidelines and Instructions for Customers Running AutoEDMS v6.5 Version: 1.0.3, 11-12-2006, RLB Overview & Assumptions The purpose of this document
More informationMac OS 8 Installation Instructions for Sonnet Presto and Presto Plus Processor Upgrade Cards
Mac OS 8 Installation Instructions for Sonnet Presto and Presto Plus Processor Upgrade Cards What You Need: Sonnet Presto or Presto Plus processor upgrade card. Sonnet Presto 8 Enabler Boot diskette. Macintosh
More informationInstalling FileMaker Pro 11 in Windows
Installing FileMaker Pro 11 in Windows Before you begin the installation process, please exit other open programs and save your work. Installation notes Before you install FileMaker Pro, review the following
More informationTeam Project Management
TEAM PROJECT MANAGEMENT 149 Team Project Management Tasks of the Project Administrator When working in teams, one person should be the designated administrator. Sets up the Project The project administrator
More informationImpossible Solutions, Inc. JDF Ticket Creator & DP2 to Indigo scripts Reference Manual Rev
Impossible Solutions, Inc. JDF Ticket Creator & DP2 to Indigo scripts Reference Manual Rev. 06.29.09 Overview: This reference manual will cover two separate applications that work together to produce a
More informationInstalling AppleWorks 6 FOR WINDOWS
apple Installing AppleWorks 6 FOR WINDOWS 1 Installing AppleWorks 6 This booklet provides instructions for m installing and uninstalling AppleWorks m setting up an AppleWorks Installer on a server, so
More informationConfiguring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them
Configuring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them The Content Collection should be the repository for all of the files used in Blackboard. The Content Collection
More informationUPDATING SOCRATES Version Build May 2018
UPDATING SOCRATES Version 3.5.8.7 Build 10124 May 2018 10124 Update ALL USERS... 1 MAC USERS... 1 When to run the update... 1 XP USERS... 1 How often to update... 1 Registering to access the client section
More informationSelect the Akeni Pro Server installation file that matches your operating system and double-click on the file.
Akeni Pro Server Administration Guide (Version 2) Contents Chapter 1 Chapter 2 Chapter 3 Getting Started.: 1 Pro Server Installation.: 2 Launching Akeni Pro Server.: 3 Pro Client Installation.: 4 Launching
More informationChapter A2: BankLink Books clients
Chapter A2: BankLink Books clients This chapter is aimed at BankLink Administrators This Chapter covers the options available for processing in BankLink Books. The BankLink Service Agreement permits you
More informationPropertyBoss Upgrade
Installation Guide EMC128-2013 1998-2013 PropertyBoss Solutions. Introduction This document covers 2 upgrade scenarios. Please determine which is required before beginning. Note: The Release version or
More informationAbila MIP. Human Resource Management Installation Guide
Human Resource Management Installation Guide This is a publication of Abila, Inc. Version 2017.2 2017 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila
More informationQuick Reference Guide
Quick Reference Guide Command Center Screen Overview Site Tree Icon Descriptions Command Center Screen Elements Command Center Toolbar Notes Store Group File Server Store Detail Information Site Master
More informationWEBSEWSS SINGLE SERVER INSTALLATION INSTRUCTIONS
2300 East 14th Street Tulsa, Oklahoma 74104 USA Phone: (918) 749-1119 Fax: (918) 749-2217 e-mail: info@statsoft.com WEB: http://www.statsoft.com Notes: WEBSEWSS SINGLE SERVER INSTALLATION INSTRUCTIONS
More informationSuperNova. Screen Reader. Version 14.0
SuperNova Screen Reader Version 14.0 Dolphin Computer Access Publication Date: 09 April 2014 Copyright 1998-2014 Dolphin Computer Access Ltd. Technology House Blackpole Estate West Worcester WR3 8TJ United
More informationFull file at Chapter 2: Securing and Troubleshooting Windows Vista
Chapter 2: Securing and Troubleshooting Windows Vista TRUE/FALSE 1. An elevated command prompt can only be attained by an administrator after he or she has responded to a UAC box. T PTS: 1 REF: 70 2. There
More informationYour File System Applications What s running on your machine It s own devices Networking. L07 - Getting to know your computer
Getting to Know Your Computer Your File System Applications What s running on your machine It s own devices Networking Your File System My Computer Directories & Folders Hierarchy File Explorer (Rather
More informationCopyright 2017 Softerra, Ltd. All rights reserved
Copyright 2017 Softerra, Ltd. All rights reserved Contents Introduction Security Considerations Installation Configuration Uninstallation Automated Bulk Enrollment Troubleshooting Introduction Adaxes Self-Service
More informationChromQuest 4.2 Chromatography Data System
ChromQuest 4.2 Chromatography Data System Installation Guide CHROM-97200 Revision A April 2005 2006 Thermo Electron Corporation. All rights reserved. Surveyor is a registered trademark and ChromQuest is
More informationUSB driver and Software Installation. UPS Monitoring and Management Software
USB driver and Software Installation UPS Monitoring and Management Software LEN.MAN.SOF.143 Rev.1.00/2008 Installing USB driver and Easy-Mon X for LEONICS UPS 1. Installing and uninstalling the USB driver
More information'phred dist acd.tar.z'
Phred is free for academic use but does require registration and for you to obtain a licence. Please visit http://www.phrap.org/consed/consed.html#howtoget and follow the instructions. A copy of the Phred
More informationLicensing and Activation
MapInfo Pro Version 15.0 Licensing and Activation The first time you start MapInfo Pro you are asked to activate your product using the serial number and access code you supplied during the installation.
More informationLesson 3: Identifying Key Characteristics of Workgroups and Domains
1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users
More informationWimba Pronto. Version 2.1. User Guide
Wimba Pronto Version 2.1 User Guide Wimba Pronto 2.1 User Guide Welcome to Wimba Pronto 1 What's New in Wimba Pronto? 2 Getting Started 3 Wimba Pronto System Requirements 3 Creating a New Wimba Pronto
More informationVA Smalltalk Installer
INSTANTIATIONS VA Smalltalk Installer Beta 11/15/2012 This document describes the Beta VA Smalltalk product and documentation installers and gives instructions regarding the improved installation process
More informationStrikeRisk v5.0 Getting started
StrikeRisk v5.0 Getting started Contents 1 Introduction 1 2 Installing StrikeRisk 2 7 2.1 System Requirements 2 2.2 Installing StrikeRisk 2 5 2.3 Installation troubleshooting 6 2.4 Uninstalling StrikeRisk
More informationComodo LoginPro Software Version 1.0
Comodo LoginPro Software Version 1.0 User Guide Guide Version 1.0.102512 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System
More informationExData Pro (For IDE Hard Disk Only) User Menu Guide. Revision 2.7
ExData Pro (For IDE Hard Disk Only) User Menu Guide Revision 2.7 1 Table of Contents I. Introduction Welcome 3 Hardware Requirement 3 Operating System Requirement 3 Introduction 4 II. Installation 5 III.
More informationPerformer to DP2 Hot Folder Reference Manual Rev There is only one file involved with installing the Performer to DP2 Hot Folder.
Performer to DP2 Hot Folder Reference Manual Rev. 07.11.05 Install Files: There is only one file involved with installing the Performer to DP2 Hot Folder. The installer file is named PP2DP2_1.x.x.EXE.
More informationOnline Backup Client User Manual
Software version 3.21 For Mac OS X September 2010 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or
More informationSAS Installation Instructions Windows 2003, XP, 2000, NT. Workstation Installation Guidelines
UCit Instructional and Research Computing, Software Distribution Office, 303B Zimmer Hall, Cincinnati, OH 45221-0088. Phone: (513) 556 9068 Email: Software@uc.edu SAS 9.1.3 Installation Instructions Windows
More informationSun VirtualBox Installation Tutorial
Sun VirtualBox Installation Tutorial Installing Linux Mint 5 LTS Guest OS By Dennis Berry Welcome to the world of virtualization and Linux. This tutorial is intended to help users who are new to the world
More informationEDS Attn: EDI Unit P.O. Box 2991 Hartford, CT
EDS Provider Electronic Solutions software lets Connecticut Medical Assistance providers verify patient s eligibility and submit and correct claims for services all electronically. The software makes submitting
More informationPassword Changer User Guide
Active@ Password Changer User Guide Copyright 1999-2017, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative
More informationESSENTIAL TECHNOLOGY SKILLS AND RESOURCES
FORT OSAGE R-1 SCHOOL DISTRICT ESSENTIAL TECHNOLOGY SKILLS AND RESOURCES 2101 N. TWYMAN ROAD INDEPENDENCE, MO 64058 PHONE 816.650.7000 http://www.fortosage.net Table of Contents Log On to the Network...
More informationNote: Act Today provide this KB article as a courtesy however accept no responsibility for content or the recipient performing these steps
Note: Act Today provide this KB article as a courtesy however accept no responsibility for content or the recipient performing these steps How To Download and Apply Sage ACT! 2011 Premium Service Pack
More informationCCH Client Axcess User Guide
CCH Client Axcess User Guide Green Hasson Janks Tips Best practice tips and shortcuts Icon Legend Notes Warning Informational notes about functions Important warnings about a function CCH Client Axcess
More informationInstallation and Upgrade Guide Zend Studio 9.x
Installation and Upgrade Guide Zend Studio 9.x By Zend Technologies, Inc. www.zend.com Disclaimer The information in this document is subject to change without notice and does not represent a commitment
More informationFunction Point WORKBENCH Release 7.0k INSTALLATION GUIDE TABLE OF CONTENTS
Function Point WORKBENCH Release 7.0k GUIDE TABLE OF CONTENTS FUNCTION POINT WORKBENCH RELEASE 7.0K GUIDE... 1 LICENCE TYPES... 3 Standalone Licence Machine Dependent (Single User)... 3 Network Licence
More informationProcedure to set up an HPIB 82350B card on an M57. M58 or C20x PC. Table 1: Parts required. Part Number Description Qty
1 OF 21 Procedure to set up an HPIB 82350B card on an M57. M58 or C20x PC Parts required Table 1: Parts required Part Number Description Qty 289000764 Kit, HPIB Card, Inter, PCI 1 Procedure The procedure
More informationSet-up Instructions For Mercedes-Benz WIS CD-Rom
Set-up Instructions For Mercedes-Benz WIS CD-Rom IMPORTANT PLEASE READ ALL INSTRUCTIONS THOROUGHLY BEFORE PROCEEDING WITH INSTALLATION Particularly **..** see: STEP 1 Screen resolution must be set to a
More informationNetIQ Advanced Authentication Framework - Client. User's Guide. Version 5.1.0
NetIQ Advanced Authentication Framework - Client User's Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 4 About This Document 4 NetIQ Advanced Authentication Framework Overview
More informationHow To Upload Your Newsletter
How To Upload Your Newsletter Using The WS_FTP Client Copyright 2005, DPW Enterprises All Rights Reserved Welcome, Hi, my name is Donna Warren. I m a certified Webmaster and have been teaching web design
More informationVersion S Cincinnati, Suite 105 Tulsa, OK (918) Fax (918)
Version 1.0 We pride ourselves in producing good stuff. If you have any questions, problems, or suggestions regarding this product, please contact us at: 810 S Cincinnati, Suite 105 Tulsa, OK 74119 (918)
More informationGuide for K-6 Teachers
Guide for K-6 Teachers 2009 Houghton Mifflin Harcourt Publishing Company. All rights reserved. Houghton Mifflin Harcourt and its logo are trademarks of Houghton Mifflin Harcourt Publishing Company. Microsoft
More informationRead Naturally SE Software Guide. Version 2.0
Read Naturally SE Software Guide Version 2.0 Under the terms of the Read Naturally Software Edition License Agreement, you have permission to use only the levels you purchased with the number of users
More informationEaglesoft 19 Installation Instructions
Eaglesoft 19 Installation Instructions NOTE: We recommend using a static IP address on your Eaglesoft database server machine. 1. Please review all installation instructions before beginning the installation.
More informationTradeGuider VSA Plug-in for NinjaTrader quick install and setup guide.
TradeGuider VSA Plug-in for NinjaTrader quick install and setup guide. Introduction. This short guide will help you to download and install the TradeGuider VSA Plug-in for the NinjaTrader platform. This
More informationInstalling the C++ Development Tools
Installing the C++ Development Tools WindRiver Workbench is the development environment used for creating and loading C++ code onto a crio for FRC. This document describes how to install the Wind River
More information