The Lock XP installation White Paper # 09995

Size: px
Start display at page:

Download "The Lock XP installation White Paper # 09995"

Transcription

1 The Lock XP installation White Paper # Installing The Lock XP for a single Home computer, with multiple users. The operating system used for this demonstration is Windows XP Professional, but any version of Microsoft Windows 98 or later will work the same way. Download the latest version of The Lock XP installer from CrashCourse Software, and save the file in the C:\Temp folder. The next stop is to decompress the file. Double click the archive file to open the ZIP file so the setup program can be executed. Alternately, if you prefer to use WinZip, simply open the file LOCKXP.ZIP in WinZip and press the Install button. Run SETUP.EXE

2 The Lock XP s installer will start. Follow the prompts by clicking Next, taking any default settings that you are prompted with. Be sure to accept the license agreement to continue.

3 Once all installation settings have been selected, press the Install button to continue. At the end of the installation process, you will be prompted with the following dialog (if this is your first time to install The Lock XP). You will need to select Yes if you play to use any of The Lock XP s on-the-fly file and folder resource restrictions (which you will in this demonstration).

4 Once the installation is comp lete, press Finished to continue.

5 We are now ready to configure The Lock XP. Once you have pressed Finish, the Lock XP s Configuration Utility will load. If you would like to view the Quick Start guide, click yes on the dialog shown below. If this is your first installation of The Lock XP, you will be prompted to create a Master Administrator password. It is important that you make this password easy for you to remember, but difficult for others to guess. This password will give you full Admin istrator access to Lock XP functions, as well as allow you to uninstall the program, as well as grant access to restricted programs, if that feature is enabled. This is the only Master Administrator account. All other Administrator accounts are standard Administrators. The Master Administrator password dialog looks like this one above. The Lock XP installer will also check the logged on Windows user name. If the logged on Windows user is not ADMINISTRATOR, then their user name will be added to The Lock XP under the ADMINISTRATORS security account. Since

6 this account will have full Administrator rights to The Lock XP, you must be sure that your password is not blank, as this would give anybody access to the system that wanted it. The next pro mpt will be asking if you would like to run the Lock XP s Setup Configuration Wizard. For the demonstration, we will select No, then select one of the four defaults from the next dialog window. Since this system is primarily for home use, the option for Home computer has been selected. When you click OK on this dialog, you will be prompted to import existing Windows users. Since there are no other Windows users currently on this system (aside from my account, and the ADMINISTRATOR account), we will select No.

7 Since we are planning to create and configure users manually, we will select No, we do not wish to create any new users right now. Once the dialogs are cleared, The Lock Configuration Utility is displayed. From the image below, we can see there are two user accounts (ROB and ADMINISTRATOR), and two Security groups (ADMINISTRATORS and DEFAULT). We are now ready to create our first Security Group, add users to it, and set it s security. Before starting this process, I usually make a note of what users I plan to create, and what type of security they will need. In this demonstration, I will be creating three users: BECCA, SAMARA and MANDY. BECCA and SAMARA will have two varying levels of security, both based off the Home user default security. MANDY will have no security applied, but will not be an Administrator either.

8 The first step in creating a Lock XP user is to create a Security Group for that user to belong to. In order to accomplish this, select the System (the first entry in the User and Group tree), right click it and select New Group. Alternately, you can open Options, select Group, the New. The first user we are going to create is for a girl named Becca.

9 The New Group dialog is displayed. Create a name for this group. In our demonstration the group name is BECCA. Since she is a home user, we are going to take the default Home restrictions and build our security profile from there. As a note, you may check the option to create this group as a local Windows group as well, but it is not required.

10 We now have a new group called BECCA. The next stop is to add names to the BECCA group. To accomplish this, select the BECCA group from the user and group tree, right click the entry and select New User. Alternately, you could also select the desired group, then click options, Users, New. The User Configuration dialog will appear. Use this dialog to set a user name, and set it s password You will want to be sure to check the option Create Windows user. If you do not have this option checked, you will need to manually create your users in Windows, before they will be permitted to log onto the workstation.

11 A new user has now been created, and the User and Group tree should look like the following dialog.

12 The first thing we are going to do is modify some of the default security selected. Since the BECCA account is for a young person, they will need a little more security applied to them so that they cannot accidentally modify any system settings. When setting group security, I prefer to start with the first tab (Policy) and work my way to the right, to the last tab (Stations). I set the desired security items on each page, as I am working through it. In the above image, we have expanded the System Policy item, then checked the option to Secure Registry Run Keys. This option will allow The Lock XP to restrict having any programs added to the RunOnce, Run and Winlogon keys. I have also checked the option Disable Access to Administration Tools, that is at the top of the current list, and not actually shown on this screen.

13 We also want to restrict the times that she is allowed to be using the computer. These settings are on the Times tab. As can be seen from the image above. The BECCA security group is restricted from accessing the computer at certain times in the evening. Any time BECCA is logged in and time reaches a restricted hour, she will be automatically locked, or logged out, depending on the configuration from above. Any attempts to log into the machine during a restricted hour will result in the same.

14 By default, Home users are allowed to write to any folders that they want, except for the Windows folder, and the Lock s install folder. We will want to add another folder to the restrictions for the BECCA account. We want to add a restriction that will make the C: drive (the system disk) read only for this user. Click the Add button, and the following dialog will appear. Click on the Drives button to specify a type of drive to restrict. In our case, we are going to restrict the System Disk, and set it to Read Only.

15 With this option set, BECCA will not be able to write to any part of the C: drive, including sub folders. She will, however, have full read access to the drive. The next tab in the configuration utility is the Programs tab. On this tab, you will be able to configure programs that the user will be restricted from using (Restricted Programs), or create a list of valid programs the user can access (Allowed Programs), as well as configure a sort of Explorer/Program Manager (Secure Program Manager) that presents the user with a customizable program launching tool. The Secure Program Manger will contain a list of programs that the user may start by double clicking on it s icon. Both the Allowed Programs, and the Secure Program Manger are advanced tools, and will not be addressed in this demonstration. As you can see below, the Default Home security selection has automatically added some default program restrictions.

16 In the list of Restricted Programs, you will find the three items that make up a program identifier. 1) Program Name. This is the executable name that is run to start the program. Explorer.exe is a Program Name. 2) Program Class. This actually refers to the class of the Window, not the program itself. The Class name designates the identifier of Window itself. For example, from the window on the previous page, the Boot Drive Lock entry has a window class named TfBDCfg. 3) Program Title. This is actually the title of the window, and not the title of the program. Using the example from #2, we see the Class for the Boot Drive Lock entry as TfBDCfg, and the title as Boot Drive Lock Control Panel We don t really need to know all this stuff in order to make this feature work. All we need to do is know what window we want to stop our user from accessing. For this demonstration, I want to restrict BECCA from running the Windows XP Tour utility (accessed by selecting the option from the Start Menu, All Programs submenu). I don t know what the program that runs this utility is called, or even what it s main Window Class and Title are. So, how do I restrict this program? Simple. Press the Capture button, and the following dialog appears. Make a note of the key combination stated to activate the capture. In this case, it is CTRL + ALT + SHIFT + F12. Click OK, then run the Windows XP Tour from the Windows Start Menu. When it is started, you should see a window that looks something like this one. Make sure the window you want to capture is in focus (click on it s title bar, just to be sure), then press the hot-key combination (specified in the capture enabled dialog), and you should hear a sound (if you have speakers on your system). This indicates that the entry was recognized by The Lock XP and added to the current configuration.

17 As you can see, a new entry has been added to the Restricted Programs list. The Windows XP Tour starts by running a program called TOURSTART.EXE, wh ich displays a window with a class of #32770 (actually a common Windows class), and a title of Windows XP Tour. As soon as BECCA logs into the computer, The Lock XP will automatically be searching for her trying to use the Windows XP Tour (as well as the other programs on the Restricted Programs list). The last security tab is Stations, and is not going to be used in this demonstration. Basically, this page allows you to specify computer names for systems your users are allowed or not allowed to log into. With our first user created, and her security set, it is time to move onto our second user.

18 Right click the system name again, and select New Group. The name for this security group will be SAMARA. We will select the default security as Home restrictions again, the same as the BECCA Security Group.

19 Once the group is created be sure to check the option Disable Access to Administrator tools under the System heading, right click the name, and select New User. Create the user as SAMARA and set her password. Be sure to check the Create Windows user option before clicking OK.

20 Since SAMARA is the older of the two restricted users, she will need less security applied to her account, but, as shown above, she will still need to have time restrictions applied. The settings above force her to log off the system at 10:00 on week days, and 11:00 on weekends. She also does not have access to the computer during her dinner time hour.

21 Added security does not always need to be applied, but should be applied when the situation warrants such action. In this case, SAMARA would bring floppy disks home from school and put them into the computer. This, of course, creates a huge security risk, so in order to alleviate the problem, we add a No Access file and folder resource entry to block access to floppy disks. This process is performed the same way we added System Disk to the BECCA account.

22 For the SAMARA account, we are not going to add any extra Restricted Programs, but we are going to enable the Allow Administrator Override option. When this option is enabled, any time SAMARA has a Restriction Program notification, the Master Administrator will have the opportunity to type their password, and give SAMARA access to the restricted program until the next time she logs out of the system. This is all the extra configuration we will be doing for the SAMARA account

23 The next step is to create the MANDY security group and user account. As you can see from the above, we have selected the option to not add any security for this group. This will allow users in the MANDY group to have full access to the system, with the exception of access Administrator functions of The Lock XP itself. After the MANDY group is created, right click and select New User, and create the MANDY account, the same as the other accounts above.

24 The only policy item being set for this user is the Enable URL Audit Logging option under Logging Policy. Click this option, and we are done with creating our users. We have one more task to do. We need to turn on User Logging.

25 Click the System Configuration tab, and collapse the entries for Startup, Locking, and Passwords. Expand the entry for Settings, then Logging. Place a check mark in the Enable user logging entry. Now click File, then select Exit. Follow the closing prompts.

26 If you have a registration name and number, select Yes, otherwise select No to install the 30 trial version of The Lock XP. You will enter your registration into a dialog box that looks like the one above. Make sure to select Yes to this dialog box, if you wish to have The Lock XP load and secure your system at every boot. User who are running Windows XP (as is the system in the demonstration) have the use of the Windows Welcome Screen. This is the screen that displays all the users names, and puts a little picture next to their names. Since this is a home computer, it is safe to select the Use Windows Welcome Screen, and Enable Fast User Switching options. Click Done when you are ready to move to the next dialog.

27 The dialog above simply set weather The Lock XP will lock itself once the user logs in, or if it will allow the user logged into Windows to also be logged into The Lock XP automatically. This is an important step to the process. It is highly recommended that you create an Administrator key disk now. If you happen to forget your Master Administrator password, this Administrator key disk is the only way to gain access to some of the Administrator features of The Lock XP. Place a floppy disk into your floppy drive and press the OK button. The above dialog will be displayed if the Administrator key disk was created successfully. Alternately, if you don t have a floppy drive, for example, at the create an emergency access key disk dialog, press and hold Shift, then click OK.

28 The above dialog is then displayed when the file has been successfully created. Save the file from the location noted above to the removable media of your choice, and press OK. You have now installed and configured The Lock XP for a single system, with multiple user accounts. Press Yes now to restart the computer, and start using The Lock XP.

10ZiG Technology. Thin Desktop Quick Start Guide

10ZiG Technology. Thin Desktop Quick Start Guide 10ZiG Technology Thin Desktop Quick Start Guide 2010 05 20 Introduction This document is intended as a quick start guide for installing Thin Desktop. After reading this document, you will know how to:

More information

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

Virtual CD TS 1 Introduction... 3

Virtual CD TS 1 Introduction... 3 Table of Contents Table of Contents Virtual CD TS 1 Introduction... 3 Document Conventions...... 4 What Virtual CD TS Can Do for You...... 5 New Features in Version 10...... 6 Virtual CD TS Licensing......

More information

Installation Instructions for Free Scheduler Plus Software IBS Show Promotion

Installation Instructions for Free Scheduler Plus Software IBS Show Promotion Installation Instructions for Free Scheduler Plus Software IBS Show Promotion Offer ends 1/12/17 limited copies available! Thank you for your decision to use our Free copy of Scheduling Plus to help streamline

More information

Nikon Message Center

Nikon Message Center Nikon Message Center Notice to Users in Europe and the U.S.A 2 Automatic Update 3 Checking for Updates Manually 3 4 Available Messages 5 My Products 6 Scheduling Updates 6 The Download Log 7 Uninstalling

More information

Part 1: Understanding Windows XP Basics

Part 1: Understanding Windows XP Basics 542362 Ch01.qxd 9/18/03 9:54 PM Page 1 Part 1: Understanding Windows XP Basics 1: Starting Up and Logging In 2: Logging Off and Shutting Down 3: Activating Windows 4: Enabling Fast Switching between Users

More information

Storage Security Software (Version )

Storage Security Software (Version ) For Toshiba CANVIO series Storage Security Software (Version 1.00.6904) User s Manual Version 1.00 This document explains the installation process and basic usage of the Storage Security Software designed

More information

LaborKey Version 4.0. Installation Guide. 4.01a FEB 2007

LaborKey Version 4.0. Installation Guide. 4.01a FEB 2007 LaborKey Version 4.0 Installation Guide 4.01a FEB 2007 Install LaborKey Software Activate LaborKey Service Create LaborKey User Accounts Install LaborKey on Multiple Stations Contents Step 1 download LaborKey

More information

Eaglesoft 18.1 Installation Instructions

Eaglesoft 18.1 Installation Instructions Eaglesoft 18.1 Installation Instructions NOTE: We recommend using a static IP address on your Eaglesoft database server machine. 1. Eaglesoft Version 18.1 will require all users to have a password with

More information

ThinkVantage Fingerprint Software

ThinkVantage Fingerprint Software ThinkVantage Fingerprint Software 12 2 1First Edition (February 2006) Copyright Lenovo 2006. Portions Copyright International Business Machines Corporation 2006. All rights reserved. U.S. GOVERNMENT

More information

Installing the application involves several steps. Note that you must install QuickBooks on your computer prior to installing this application.

Installing the application involves several steps. Note that you must install QuickBooks on your computer prior to installing this application. CCRQLABEL OVERVIEW This is an overview (summary) of the CCRQLabel 4.x label printing product. Full documentation is under development INSTALLING CCRQLABEL This document provides a quick review of how to

More information

Changing Settings for ViewMail for Outlook (Version 8.0 Only)

Changing Settings for ViewMail for Outlook (Version 8.0 Only) Changing Settings for ViewMail for Outlook Note This content applies to ViewMail for Outlook version 8.0 only. For later ViewMail versions, see the Quick Start Guide for Cisco ViewMail for Microsoft Outlook

More information

PCLaw Installation and Upgrade Guide

PCLaw Installation and Upgrade Guide PCLaw Installation and Upgrade Guide Version 14.1 2015 LexisNexis. All rights reserved. Copyright and trademark LexisNexis, Lexis, and the Knowledge Burst logo are registered trademarks of Reed Elsevier

More information

Using LaunchPad. Contents. Section 1-7. This section: Describes how to use LaunchPad to run your access control programs.

Using LaunchPad. Contents. Section 1-7. This section: Describes how to use LaunchPad to run your access control programs. Section 1-7 Using LaunchPad This section: Describes how to use LaunchPad to run your access control programs. Describes how to change your login name and password Describes how to add new operators. Describes

More information

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 You log into a system to notify the system who you are. When you log off, any files you have opened are cleaned up, and

More information

Admin Guide. LabelShop 8

Admin Guide. LabelShop 8 Admin Guide LabelShop 8 Administrator s guide DOC-OEMCS80-AG-US-02/03/06 The information in this manual is not binding and may be modified without prior notice. Supply of the software described in this

More information

R9.7 erwin License Server:

R9.7 erwin License Server: R9.7 erwin License Server: Installation and Setup This is a quick guide to setting-up a erwin DM License Server. NOTES: - Concurrent licensing is available for only erwin r8.2 and later releases! - Concurrent

More information

Full file at

Full file at Chapter 2 Solutions Answers to the Chapter 2 Review Questions 1. The Melissa virus was transported by. c. e-mail 2. Which of the following are used for updates in Windows XP Professional? (Choose all that

More information

Print Manager Plus 2010 Workgroup Print Tracking and Control

Print Manager Plus 2010 Workgroup Print Tracking and Control INTRODUCTION: This is intended to assist in the initial installation or evaluation of Print Manager Plus 2010 Workgroup Edition. This will guide you through tracking your printing whether your workgroup

More information

Server Edition Administrator s Guide

Server Edition Administrator s Guide Server Edition Administrator s Guide March 29, 2005 Beagle Software 800 Washington Ave. N, Suite 418 Minneapolis, Minnesota 55401 USA Introduction This document covers FinePrint, pdffactory, and pdffactory

More information

Batch Eligibility Long Term Care claims

Batch Eligibility Long Term Care claims DXC Technology Provider Electronic Solutions software lets Connecticut Medical Assistance Program providers verify patient s eligibility and submit and correct claims for services all electronically. The

More information

GUARD1 PLUS Manual Version 2.8

GUARD1 PLUS Manual Version 2.8 GUARD1 PLUS Manual Version 2.8 2002 TimeKeeping Systems, Inc. GUARD1 PLUS and THE PIPE are registered trademarks of TimeKeeping Systems, Inc. Table of Contents GUARD1 PLUS... 1 Introduction How to get

More information

2. install windows vista

2. install windows vista 2. install windows vista Windows Vista comes preloaded on many brand-new PCs. If you already have a computer with Windows Vista installed, you can go directly to Chapter 3, Move from another PC. If you

More information

Wimba Pronto. Version 3.1. User Guide

Wimba Pronto. Version 3.1. User Guide Wimba Pronto Version 3.1 User Guide Wimba Pronto 3.1 User Guide Welcome to Wimba Pronto 1 Top Wimba Pronto Features 1 What's New in Wimba Pronto? 3 Getting Started 4 Wimba Pronto System Requirements 4

More information

dbdos PRO 2 Quick Start Guide dbase, LLC 2013 All rights reserved.

dbdos PRO 2 Quick Start Guide dbase, LLC 2013 All rights reserved. dbdos PRO 2 Quick Start Guide 1 dbase, LLC 2013 All rights reserved. dbase, LLC may have patents and/or pending patent applications covering subject matter in this document. The furnishing of this document

More information

Windows XP. A Quick Tour of Windows XP Features

Windows XP. A Quick Tour of Windows XP Features Windows XP A Quick Tour of Windows XP Features Windows XP Windows XP is an operating system, which comes in several versions: Home, Media, Professional. The Windows XP computer uses a graphics-based operating

More information

INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook

INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook Sharing Microsoft Outlook Calendar and Contacts without Exchange Server Contents What is OfficeCalendar? Sharing Microsoft Outlook Calendars

More information

Installing the Is2 Onsite Version - HVAC Office System

Installing the Is2 Onsite Version - HVAC Office System Installing the Is2 Onsite Version - HVAC Office System This document describes the full onsite server installation of the Is2 database files, the database server, and the application server. The full program

More information

A0. Special Considerations for Windows Vista a) Consideration during installation b) Runtime considerations

A0. Special Considerations for Windows Vista a) Consideration during installation b) Runtime considerations Table of Contents A0. Special Considerations for Windows Vista a) Consideration during installation b) Runtime considerations A1. SELECT XM License a) Standalone workstations b) Networked workstations

More information

Exam : Title. : A+ OS Technologies

Exam : Title. : A+ OS Technologies Exam : 220-302 Title : A+ OS Technologies QUESTION 1 Under Windows 2000 you consistently receive out of memory messages when running multiple applications. To avoid having to upgrade RAM immediately you?

More information

Print Audit 6. Print Audit 6 Documentation Apr :07. Version: Date:

Print Audit 6. Print Audit 6 Documentation Apr :07. Version: Date: Print Audit 6 Version: Date: 37 21-Apr-2015 23:07 Table of Contents Browse Documents:..................................................... 3 Database Documentation.................................................

More information

Minimum System Requirements The following are the minimum system requirements needed to run and install Premium Pro Enterprise:

Minimum System Requirements The following are the minimum system requirements needed to run and install Premium Pro Enterprise: Overview Premium Pro Enterprise is the next generation of the Premium Pro family of applications. It is a Javabased application that houses multiple products and tax years in a single interface. It requires

More information

Wimba Pronto. Version 2.0. User Guide

Wimba Pronto. Version 2.0. User Guide Wimba Pronto Version 2.0 User Guide Wimba Pronto 2.0 User Guide Welcome to Wimba Pronto 1 What's New in Wimba Pronto 2.0 2 Getting Started 3 Wimba Pronto System Requirements 3 Creating a New Wimba Pronto

More information

OptionPower 3.2. for Office 2007 STARTUP GUIDE. Interactive Audience Response Systems

OptionPower 3.2. for Office 2007 STARTUP GUIDE. Interactive Audience Response Systems OptionPower for Office 2007 3.2 STARTUP GUIDE Interactive Audience Response Systems OptionPower for Office 2007 3.2 STARTUP GUIDE 2008 Option Technologies Interactive This document is the copyrighted and

More information

Employee Web Services. Installation Guide

Employee Web Services. Installation Guide Employee Web Services This is a publication of Abila, Inc. Version 2017.x 2016 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names

More information

Download instructions for DataTrace Pro software

Download instructions for DataTrace Pro software Download instructions for DataTrace Pro software Please follow the steps below to download DataTrace Pro software 1. Go to the DataTrace Pro Downloads web page www.cik-solutions.de/datatrace-support 2.

More information

ThinkVantage Fingerprint Software

ThinkVantage Fingerprint Software ThinkVantage Fingerprint Software 12 2 1First Edition (November 2005) Copyright Lenovo 2005. Portions Copyright International Business Machines Corporation 2005. All rights reserved. U.S. GOVERNMENT

More information

PhotoPDF User Guide. PhotoPDF. Photo to PDF Converter

PhotoPDF User Guide. PhotoPDF. Photo to PDF Converter PhotoPDF Photo to PDF Converter PhotoPDF is a batch-processing tool to convert photos into PDF file. PhotoPDF provides three modes of conversion: Batch Convert, Photos Merge and Thumbnail Page. PhotoPDF

More information

WELCOME TO LACERTE! WE APPRECIATE YOUR BUSINESS.

WELCOME TO LACERTE! WE APPRECIATE YOUR BUSINESS. WELCOME TO LACERTE! WE APPRECIATE YOUR BUSINESS. INSTALLING YOUR LACERTE PROGRAM 1 Install the 2017 program if not currently installed. 2 Install the 2018 program. Important updates to System Requirements

More information

ModeChanger

ModeChanger 35020808-02 2015.11 ModeChanger ModeChanger is a software utility that can switch the drive between normal mode and encrypted mode. Operating in encrypted mode will help protect your data. While the drive

More information

Abila MIP DrillPoint Reports. Installation Guide

Abila MIP DrillPoint Reports. Installation Guide Abila MIP DrillPoint Reports This is a publication of Abila, Inc. Version 16.1 2015 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service

More information

COINS Ti Call Management System Standard Installation Instructions for Citrix Users

COINS Ti Call Management System Standard Installation Instructions for Citrix Users COINS Ti Call Management System Standard Installation Instructions for Citrix Users COINS recommends that the System Administrator or staff trained in both UNIX and Citrix installation processes perform

More information

The ViVo Mouse Versions: Standard & Professional Installation Guide

The ViVo Mouse Versions: Standard & Professional Installation Guide Versions: Standard & Professional Installation Guide Copyright 2010-2014 Vortant Technologies, LLC Table of Contents Installation Guide - ViVo Standard & Professional... 3 Contact Information... 3 Getting

More information

Installing McAfee VirusScan For Windows 95/98 Kyler Kwock, Wilbur Wong Revised by Therese Nakadomari

Installing McAfee VirusScan For Windows 95/98 Kyler Kwock, Wilbur Wong Revised by Therese Nakadomari WIN9X009 March 2000 Installing McAfee VirusScan For Windows 95/98 Kyler Kwock, Wilbur Wong Revised by Therese Nakadomari Overview 1 Product Overview 1 System Requirements 2 Download Instructions 2 Installation

More information

5 MANAGING USER ACCOUNTS AND GROUPS

5 MANAGING USER ACCOUNTS AND GROUPS MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content

More information

Reinstalling Windows 95/98/ME/2000 Professional

Reinstalling Windows 95/98/ME/2000 Professional Reinstalling Windows 95/98/ME/2000 Professional Who needs this handout? If you have been instructed to reinstall Windows on your computer as a result of a recommendation from a computer consulting professional,

More information

STATISTICA VERSION 10 STATISTICA MONITORING AND ALERTING SERVER (MAS) INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA MONITORING AND ALERTING SERVER (MAS) INSTALLATION INSTRUCTIONS Pre-requisites: STATISTICA VERSION 10 STATISTICA MONITORING AND ALERTING SERVER (MAS) INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Monitoring And Alerting Server (MAS) network version

More information

JUN / 04 VERSION 7.1 FOUNDATION PVI EWLUTME

JUN / 04 VERSION 7.1 FOUNDATION PVI EWLUTME JUN / 04 VERSION 7.1 FOUNDATION PVI EWLUTME www.smar.com Specifications and information are subject to change without notice. Up-to-date address information is available on our website. web: www.smar.com/contactus.asp

More information

OneRoof CyberCafePro Client Installation, Setup and User Manual

OneRoof CyberCafePro Client Installation, Setup and User Manual OneRoof CyberCafePro Client Installation, Setup and User Manual Suggestion: View manual on computer at 200% to see screenshot details. Client Manual: Version 6.0.x March 15, 2010 Copyright 2010, OneRoof,

More information

This installation guide is intended for customers who are installing NMIS for the first time. Included are the recommended hardware specifications

This installation guide is intended for customers who are installing NMIS for the first time. Included are the recommended hardware specifications This installation guide is intended for customers who are installing NMIS for the first time. Included are the recommended hardware specifications and sample screens to guide you through the installation

More information

Quick Start Guide. Smarter Surveillance for a Safer World

Quick Start Guide. Smarter Surveillance for a Safer World Quick Start Guide Smarter Surveillance for a Safer World Ocularis Quick Start This quick reference will lead you through a typical new Ocularis installation. Use these steps when installing Ocularis Professional,

More information

ACS Technical Bulletin

ACS Technical Bulletin ACS Technical Bulletin Upgrading Pervasive.SQL to V9 General Guidelines and Instructions for Customers Running AutoEDMS v6.5 Version: 1.0.3, 11-12-2006, RLB Overview & Assumptions The purpose of this document

More information

Mac OS 8 Installation Instructions for Sonnet Presto and Presto Plus Processor Upgrade Cards

Mac OS 8 Installation Instructions for Sonnet Presto and Presto Plus Processor Upgrade Cards Mac OS 8 Installation Instructions for Sonnet Presto and Presto Plus Processor Upgrade Cards What You Need: Sonnet Presto or Presto Plus processor upgrade card. Sonnet Presto 8 Enabler Boot diskette. Macintosh

More information

Installing FileMaker Pro 11 in Windows

Installing FileMaker Pro 11 in Windows Installing FileMaker Pro 11 in Windows Before you begin the installation process, please exit other open programs and save your work. Installation notes Before you install FileMaker Pro, review the following

More information

Team Project Management

Team Project Management TEAM PROJECT MANAGEMENT 149 Team Project Management Tasks of the Project Administrator When working in teams, one person should be the designated administrator. Sets up the Project The project administrator

More information

Impossible Solutions, Inc. JDF Ticket Creator & DP2 to Indigo scripts Reference Manual Rev

Impossible Solutions, Inc. JDF Ticket Creator & DP2 to Indigo scripts Reference Manual Rev Impossible Solutions, Inc. JDF Ticket Creator & DP2 to Indigo scripts Reference Manual Rev. 06.29.09 Overview: This reference manual will cover two separate applications that work together to produce a

More information

Installing AppleWorks 6 FOR WINDOWS

Installing AppleWorks 6 FOR WINDOWS apple Installing AppleWorks 6 FOR WINDOWS 1 Installing AppleWorks 6 This booklet provides instructions for m installing and uninstalling AppleWorks m setting up an AppleWorks Installer on a server, so

More information

Configuring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them

Configuring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them Configuring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them The Content Collection should be the repository for all of the files used in Blackboard. The Content Collection

More information

UPDATING SOCRATES Version Build May 2018

UPDATING SOCRATES Version Build May 2018 UPDATING SOCRATES Version 3.5.8.7 Build 10124 May 2018 10124 Update ALL USERS... 1 MAC USERS... 1 When to run the update... 1 XP USERS... 1 How often to update... 1 Registering to access the client section

More information

Select the Akeni Pro Server installation file that matches your operating system and double-click on the file.

Select the Akeni Pro Server installation file that matches your operating system and double-click on the file. Akeni Pro Server Administration Guide (Version 2) Contents Chapter 1 Chapter 2 Chapter 3 Getting Started.: 1 Pro Server Installation.: 2 Launching Akeni Pro Server.: 3 Pro Client Installation.: 4 Launching

More information

Chapter A2: BankLink Books clients

Chapter A2: BankLink Books clients Chapter A2: BankLink Books clients This chapter is aimed at BankLink Administrators This Chapter covers the options available for processing in BankLink Books. The BankLink Service Agreement permits you

More information

PropertyBoss Upgrade

PropertyBoss Upgrade Installation Guide EMC128-2013 1998-2013 PropertyBoss Solutions. Introduction This document covers 2 upgrade scenarios. Please determine which is required before beginning. Note: The Release version or

More information

Abila MIP. Human Resource Management Installation Guide

Abila MIP. Human Resource Management Installation Guide Human Resource Management Installation Guide This is a publication of Abila, Inc. Version 2017.2 2017 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila

More information

Quick Reference Guide

Quick Reference Guide Quick Reference Guide Command Center Screen Overview Site Tree Icon Descriptions Command Center Screen Elements Command Center Toolbar Notes Store Group File Server Store Detail Information Site Master

More information

WEBSEWSS SINGLE SERVER INSTALLATION INSTRUCTIONS

WEBSEWSS SINGLE SERVER INSTALLATION INSTRUCTIONS 2300 East 14th Street Tulsa, Oklahoma 74104 USA Phone: (918) 749-1119 Fax: (918) 749-2217 e-mail: info@statsoft.com WEB: http://www.statsoft.com Notes: WEBSEWSS SINGLE SERVER INSTALLATION INSTRUCTIONS

More information

SuperNova. Screen Reader. Version 14.0

SuperNova. Screen Reader. Version 14.0 SuperNova Screen Reader Version 14.0 Dolphin Computer Access Publication Date: 09 April 2014 Copyright 1998-2014 Dolphin Computer Access Ltd. Technology House Blackpole Estate West Worcester WR3 8TJ United

More information

Full file at Chapter 2: Securing and Troubleshooting Windows Vista

Full file at   Chapter 2: Securing and Troubleshooting Windows Vista Chapter 2: Securing and Troubleshooting Windows Vista TRUE/FALSE 1. An elevated command prompt can only be attained by an administrator after he or she has responded to a UAC box. T PTS: 1 REF: 70 2. There

More information

Your File System Applications What s running on your machine It s own devices Networking. L07 - Getting to know your computer

Your File System Applications What s running on your machine It s own devices Networking. L07 - Getting to know your computer Getting to Know Your Computer Your File System Applications What s running on your machine It s own devices Networking Your File System My Computer Directories & Folders Hierarchy File Explorer (Rather

More information

Copyright 2017 Softerra, Ltd. All rights reserved

Copyright 2017 Softerra, Ltd. All rights reserved Copyright 2017 Softerra, Ltd. All rights reserved Contents Introduction Security Considerations Installation Configuration Uninstallation Automated Bulk Enrollment Troubleshooting Introduction Adaxes Self-Service

More information

ChromQuest 4.2 Chromatography Data System

ChromQuest 4.2 Chromatography Data System ChromQuest 4.2 Chromatography Data System Installation Guide CHROM-97200 Revision A April 2005 2006 Thermo Electron Corporation. All rights reserved. Surveyor is a registered trademark and ChromQuest is

More information

USB driver and Software Installation. UPS Monitoring and Management Software

USB driver and Software Installation. UPS Monitoring and Management Software USB driver and Software Installation UPS Monitoring and Management Software LEN.MAN.SOF.143 Rev.1.00/2008 Installing USB driver and Easy-Mon X for LEONICS UPS 1. Installing and uninstalling the USB driver

More information

'phred dist acd.tar.z'

'phred dist acd.tar.z' Phred is free for academic use but does require registration and for you to obtain a licence. Please visit http://www.phrap.org/consed/consed.html#howtoget and follow the instructions. A copy of the Phred

More information

Licensing and Activation

Licensing and Activation MapInfo Pro Version 15.0 Licensing and Activation The first time you start MapInfo Pro you are asked to activate your product using the serial number and access code you supplied during the installation.

More information

Lesson 3: Identifying Key Characteristics of Workgroups and Domains

Lesson 3: Identifying Key Characteristics of Workgroups and Domains 1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users

More information

Wimba Pronto. Version 2.1. User Guide

Wimba Pronto. Version 2.1. User Guide Wimba Pronto Version 2.1 User Guide Wimba Pronto 2.1 User Guide Welcome to Wimba Pronto 1 What's New in Wimba Pronto? 2 Getting Started 3 Wimba Pronto System Requirements 3 Creating a New Wimba Pronto

More information

VA Smalltalk Installer

VA Smalltalk Installer INSTANTIATIONS VA Smalltalk Installer Beta 11/15/2012 This document describes the Beta VA Smalltalk product and documentation installers and gives instructions regarding the improved installation process

More information

StrikeRisk v5.0 Getting started

StrikeRisk v5.0 Getting started StrikeRisk v5.0 Getting started Contents 1 Introduction 1 2 Installing StrikeRisk 2 7 2.1 System Requirements 2 2.2 Installing StrikeRisk 2 5 2.3 Installation troubleshooting 6 2.4 Uninstalling StrikeRisk

More information

Comodo LoginPro Software Version 1.0

Comodo LoginPro Software Version 1.0 Comodo LoginPro Software Version 1.0 User Guide Guide Version 1.0.102512 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System

More information

ExData Pro (For IDE Hard Disk Only) User Menu Guide. Revision 2.7

ExData Pro (For IDE Hard Disk Only) User Menu Guide. Revision 2.7 ExData Pro (For IDE Hard Disk Only) User Menu Guide Revision 2.7 1 Table of Contents I. Introduction Welcome 3 Hardware Requirement 3 Operating System Requirement 3 Introduction 4 II. Installation 5 III.

More information

Performer to DP2 Hot Folder Reference Manual Rev There is only one file involved with installing the Performer to DP2 Hot Folder.

Performer to DP2 Hot Folder Reference Manual Rev There is only one file involved with installing the Performer to DP2 Hot Folder. Performer to DP2 Hot Folder Reference Manual Rev. 07.11.05 Install Files: There is only one file involved with installing the Performer to DP2 Hot Folder. The installer file is named PP2DP2_1.x.x.EXE.

More information

Online Backup Client User Manual

Online Backup Client User Manual Software version 3.21 For Mac OS X September 2010 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or

More information

SAS Installation Instructions Windows 2003, XP, 2000, NT. Workstation Installation Guidelines

SAS Installation Instructions Windows 2003, XP, 2000, NT. Workstation Installation Guidelines UCit Instructional and Research Computing, Software Distribution Office, 303B Zimmer Hall, Cincinnati, OH 45221-0088. Phone: (513) 556 9068 Email: Software@uc.edu SAS 9.1.3 Installation Instructions Windows

More information

Sun VirtualBox Installation Tutorial

Sun VirtualBox Installation Tutorial Sun VirtualBox Installation Tutorial Installing Linux Mint 5 LTS Guest OS By Dennis Berry Welcome to the world of virtualization and Linux. This tutorial is intended to help users who are new to the world

More information

EDS Attn: EDI Unit P.O. Box 2991 Hartford, CT

EDS Attn: EDI Unit P.O. Box 2991 Hartford, CT EDS Provider Electronic Solutions software lets Connecticut Medical Assistance providers verify patient s eligibility and submit and correct claims for services all electronically. The software makes submitting

More information

Password Changer User Guide

Password Changer User Guide Active@ Password Changer User Guide Copyright 1999-2017, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative

More information

ESSENTIAL TECHNOLOGY SKILLS AND RESOURCES

ESSENTIAL TECHNOLOGY SKILLS AND RESOURCES FORT OSAGE R-1 SCHOOL DISTRICT ESSENTIAL TECHNOLOGY SKILLS AND RESOURCES 2101 N. TWYMAN ROAD INDEPENDENCE, MO 64058 PHONE 816.650.7000 http://www.fortosage.net Table of Contents Log On to the Network...

More information

Note: Act Today provide this KB article as a courtesy however accept no responsibility for content or the recipient performing these steps

Note: Act Today provide this KB article as a courtesy however accept no responsibility for content or the recipient performing these steps Note: Act Today provide this KB article as a courtesy however accept no responsibility for content or the recipient performing these steps How To Download and Apply Sage ACT! 2011 Premium Service Pack

More information

CCH Client Axcess User Guide

CCH Client Axcess User Guide CCH Client Axcess User Guide Green Hasson Janks Tips Best practice tips and shortcuts Icon Legend Notes Warning Informational notes about functions Important warnings about a function CCH Client Axcess

More information

Installation and Upgrade Guide Zend Studio 9.x

Installation and Upgrade Guide Zend Studio 9.x Installation and Upgrade Guide Zend Studio 9.x By Zend Technologies, Inc. www.zend.com Disclaimer The information in this document is subject to change without notice and does not represent a commitment

More information

Function Point WORKBENCH Release 7.0k INSTALLATION GUIDE TABLE OF CONTENTS

Function Point WORKBENCH Release 7.0k INSTALLATION GUIDE TABLE OF CONTENTS Function Point WORKBENCH Release 7.0k GUIDE TABLE OF CONTENTS FUNCTION POINT WORKBENCH RELEASE 7.0K GUIDE... 1 LICENCE TYPES... 3 Standalone Licence Machine Dependent (Single User)... 3 Network Licence

More information

Procedure to set up an HPIB 82350B card on an M57. M58 or C20x PC. Table 1: Parts required. Part Number Description Qty

Procedure to set up an HPIB 82350B card on an M57. M58 or C20x PC. Table 1: Parts required. Part Number Description Qty 1 OF 21 Procedure to set up an HPIB 82350B card on an M57. M58 or C20x PC Parts required Table 1: Parts required Part Number Description Qty 289000764 Kit, HPIB Card, Inter, PCI 1 Procedure The procedure

More information

Set-up Instructions For Mercedes-Benz WIS CD-Rom

Set-up Instructions For Mercedes-Benz WIS CD-Rom Set-up Instructions For Mercedes-Benz WIS CD-Rom IMPORTANT PLEASE READ ALL INSTRUCTIONS THOROUGHLY BEFORE PROCEEDING WITH INSTALLATION Particularly **..** see: STEP 1 Screen resolution must be set to a

More information

NetIQ Advanced Authentication Framework - Client. User's Guide. Version 5.1.0

NetIQ Advanced Authentication Framework - Client. User's Guide. Version 5.1.0 NetIQ Advanced Authentication Framework - Client User's Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 4 About This Document 4 NetIQ Advanced Authentication Framework Overview

More information

How To Upload Your Newsletter

How To Upload Your Newsletter How To Upload Your Newsletter Using The WS_FTP Client Copyright 2005, DPW Enterprises All Rights Reserved Welcome, Hi, my name is Donna Warren. I m a certified Webmaster and have been teaching web design

More information

Version S Cincinnati, Suite 105 Tulsa, OK (918) Fax (918)

Version S Cincinnati, Suite 105 Tulsa, OK (918) Fax (918) Version 1.0 We pride ourselves in producing good stuff. If you have any questions, problems, or suggestions regarding this product, please contact us at: 810 S Cincinnati, Suite 105 Tulsa, OK 74119 (918)

More information

Guide for K-6 Teachers

Guide for K-6 Teachers Guide for K-6 Teachers 2009 Houghton Mifflin Harcourt Publishing Company. All rights reserved. Houghton Mifflin Harcourt and its logo are trademarks of Houghton Mifflin Harcourt Publishing Company. Microsoft

More information

Read Naturally SE Software Guide. Version 2.0

Read Naturally SE Software Guide. Version 2.0 Read Naturally SE Software Guide Version 2.0 Under the terms of the Read Naturally Software Edition License Agreement, you have permission to use only the levels you purchased with the number of users

More information

Eaglesoft 19 Installation Instructions

Eaglesoft 19 Installation Instructions Eaglesoft 19 Installation Instructions NOTE: We recommend using a static IP address on your Eaglesoft database server machine. 1. Please review all installation instructions before beginning the installation.

More information

TradeGuider VSA Plug-in for NinjaTrader quick install and setup guide.

TradeGuider VSA Plug-in for NinjaTrader quick install and setup guide. TradeGuider VSA Plug-in for NinjaTrader quick install and setup guide. Introduction. This short guide will help you to download and install the TradeGuider VSA Plug-in for the NinjaTrader platform. This

More information

Installing the C++ Development Tools

Installing the C++ Development Tools Installing the C++ Development Tools WindRiver Workbench is the development environment used for creating and loading C++ code onto a crio for FRC. This document describes how to install the Wind River

More information