The customer.inf setup is only available for the Barracuda VPN Client. It requires administrator rights on the target system.

Size: px
Start display at page:

Download "The customer.inf setup is only available for the Barracuda VPN Client. It requires administrator rights on the target system."

Transcription

1 In this Article: Preparing a The customer.inf setup is only available for the Barracuda VPN Client. It requires administrator rights on the target system. Customer.inf setup is a comprehensive installation method, allowing you to fully preconfigure all Network Access Client settings on multiple installation systems remotely. This method addresses the experienced system administrator. In addition to pure installation and basic configuration, it allows you to: Preconfigure an arbitrary number of connection profiles on the Network Access Client. Import license (.lic) files and X.509 certificates into the Network Access Client. Import preconfigured rule sets into the Personal Firewall. Exemplary script files required for (customer.inf, silent.cmd) are available on the Application thumb drive or on the Template Code: Customer Install Files (customer.inf) [1] page, allowing you to adapt the remote configuration procedure. Proceed as follows to prepare a completely customized setup: Edit the customer.inf file. For more information on this, see [2]. Edit the silent.cmd file. For more information on this, see [3]. Copy the following files to the folder containing the setup.exe file: 1. customer.inf 2. silent.cmd 3. active.i_fwrule (optional) 4. [LicenseName].lic (optional) 5. [CertificateName].pem (optional) Execute the silent.cmd file. The customer.inf File The syntax examples below are partly arranged in abstracts only. If needed as template, refer to the full exemplary customer.inf file found on this [4] page. The customer.inf file directs the copying of required files and the insertion of registry entries. It is divided into three sections of interest (Customer Areas): Section 1: Customer Area / [PhionCustomerCopyFiles] [5] Section 2: Customer Area / [CustomerReg] [6] Section 3: Customer Area / [SourceDisksFiles] [7] Do not rename the customer.inf file. 1 / 8

2 Remove nonessential parameters from the customer.inf file before applying it for custom setup. Both files customer.inf and silent.cmd are adapted for inclusion of a customer.lic file. If you are not importing a license (.lic) file during installation, delete the corresponding entries in both files. If you are using another name for the.lic file, do not forget to respectively edit the installation files. The content of the customer.inf file is treated case sensitive. Section 1: Customer Area / [PhionCustomerCopyFiles] Example for Section [PhionCustomerCopyFiles] [PhionCustomerCopyFiles] ; destination-file-name[,source-file-name][,temporary-file-name][,flag] customer.inf,,,2 ; important, do not remove<br/>customer.lic,,,2 ; if importing a license file<br/>active.i_fwrule,,,2 ; if importing a firewall rule set Optionally, the following file directives may be detailed: Directive destination-file-name source-file-name temporary-file-name File Directives Applicable in the Customer Area / [CustomerCopyFiles] Comment Name of the destination file. If no source-file-name is given, this specification is also the name of the source file. Name of the source file. If the source and destination file names for the file copy operation are the same, source-file-name can be omitted. Name of a temporary file to be created in the copy operation, if a file of the same name on the destination is open or currently in use. Only used on Windows 9x/Me platforms. The NTbased operating system automatically generates temporary file names when necessary and renames the copied source files the next time the operating system is started. flags These optional flags, expressed in hexadecimal notation or as a decimal value in a section entry, can be used to control how (or whether) a particular source file is copied to the destination. One or more (ORed) values for the following system-defined flags can be specified, but some of these are mutually exclusive: 0x <br/>(COPYFLG_REPLACEONLY) 0x <br/>(COPYFLG_NODECOMP) 0x <br/>(COPYFLG_FORCE_FILE_IN_USE) Copy the source file to the destination directory only if the file is already present in the destination directory. Copy the source file to the destination directory without decompressing the source file if it is compressed. Force file-in-use behavior. Do not copy over an existing file of the same name if it is currently open. Instead, copy the given source file with a temporary name so that it can be renamed and used when the next reboot occurs. 2 / 8

3 0x <br/>(COPYFLG_NO_OVERWRITE) 0x <br/>(COPYFLG_REPLACE_BOOT_FILE) 0x <br/>(COPYFLG_NOPRUNE) 0x <br/>(COPYFLG_NO_VERSION_DIALOG) 0x <br/>(COPYFLG_NOVERSIONCHECK) 0x <br/>(COPYFLG_OVERWRITE_OLDER_ONLY) 0x <br/>(COPYFLG_WARN_IF_SKIP) 0x <br/>(COPYFLG_NOSKIP) Do not replace an existing file in the destination directory with a source file of the same name. This flag cannot be combined with any other flags. This file is required by the system loader. The system will prompt the user to reboot the system. Do not delete this operation to effectuate optimization. For example, Setup might determine that the file copy operation is not necessary because the file already exists. However, the writer of the INF knows that the operation is required and directs Setup to override its optimization and perform the file operation. This flag can be used to ensure that files are copied if they are also specified in an INF DelFiles directive or an INF RenFiles directive. Do not overwrite a file in the destination directory with the source file if the existing file is newer than the source file. This flag is irrelevant to digitally signed INF files. If a driver package is digitally signed, Setup installs the package as a whole and does not selectively omit files in the package based on other versions already present on the machine. Ignore file versions and overwrite existing files in the destination directory. This flag and the next two are mutually exclusive. This flag is irrelevant to digitally signed INF files. Copy the source file to the destination directory only if the file on the destination will be superseded by a newer version. This flag is irrelevant to digitally signed INF files. Send a warning if the user selects to not copy a file. This flag and the next are mutually exclusive, and both are irrelevant to INF files that are digitally signed. Do not allow the user to skip copying a file. This flag is implied if the driver package is signed. Do not change the name of the firewall rule set entry (active.i_fwrule). If you do not intend installing the Personal Firewall with a predefined rule set meeting company policy, uncomment or delete this line. Section 2: Customer Area / [CustomerReg] This section controls the configuration of profiles set up during installation. Profile settings are saved to HKEY_USERS\.DEFAULT\Software\Phion\phionvpn\Profile. The structure is the following: HKU,.DEFAULT\Software\Phion\phionvpn\Profile\1,dhcp,0x ,1<br/> Registry Path<br/> Profile Path<br/> - Profile ID For automated VPN profile creation, the following syntax is applicable in the customer.inf file: 3 / 8

4 reg-root, [subkey], [value-entry-name], [flags], [value] This section is used for creating profiles and defining default values. Directive reg-root HKCR HKCU HKLM HKU subkey value-entry-name Directives Applicable in the Customer Area / [CustomerReg] Comment Identifies the root of the registry tree for other values supplied in this entry. The value can be one of the following: Abbreviation for HKEY_CLASSES_ROOT. Abbreviation for HKEY_CURRENT_USER. Abbreviation for HKEY_LOCAL_MACHINE. Abbreviation for HKEY_USERS. Optional; formed either as a %strkey% token defined in a Strings section of the INF or as a registry path under the given reg-root (key1\key2\key3 ), specifies one of the following: A new subkey to be added to the registry at the end of the given registry path. An existing subkey in which the additional values specified in this entry will be written (possibly replacing the value of an existing named value entry of the given subkey). Both a new subkey to be added to the registry together with its initial value entry. Optional; either names an existing value entry in the given (existing) subkey or creates the name of a new value entry to be added in the specified subkey, whether it already exists or is a new key to be added to the registry. This value can be expressed either as "quoted string" or as a %strkey% token that is defined in the INFs Strings section. (If this is omitted for a string-type value, the value entry name is the default unnamed value entry for this key.) The operating system supports some system-defined special value-entryname keywords. See the end of this comments section for more information. 4 / 8

5 value Optionally specifies a new value for the specified value-entry-name to be added to the given registry key. Such a value can be a replacement value for an existing named value entry in an existing key, a value to be appended (flag value 0x ) to an existing named REG_MULTI_SZ-type value entry in an existing key, a new value entry to be written into an existing key, or the initial value entry for a new subkey to be added to the registry. The expression of such a value depends on the registry type specified for the flag as follows: A registry string-type value can be expressed either as a "quoted string" or as a %strkey% token defined in a Strings section of the INF file. Such an INF-specified value must not include a NULL terminator at the end of each string. A registry numerical-type value can be expressed as a hexadecimal (using 0x notation) or decimal number. flags Optional hexadecimal value, expressed as an ORed bitmask of system-defined low word and high word flag values, defines the data type for a value entry and/or controls the add-registry operation. Bitmask values for each of these flags are as follows: 0x <br/>(FLG_ADDREG_BINVALUETYPE) 0x <br/>(FLG_ADDREG_NOCLOBBER) 0x <br/>(FLG_ADDREG_DELVAL) 0x <br/>(FLG_ADDREG_APPEND) 0x <br/>(FLG_ADDREG_KEYONLY) 0x <br/>(FLG_ADDREG_OVERWRITEONLY) 0x <br/>(FLG_ADDREG_64BITKEY) 0x (FLG_ADDREG_KEYONLY_COMMON) 0x <br/>(FLG_ADDREG_32BITKEY) The given value is raw data. This value is identical to the FLG_ADDREG_TYPE_BINARY. Prevent a given value from replacing the value of an existing value entry. Delete the given subkey from the registry, or delete the specified value-entry-name from the specified registry subkey. Append a given value to that of an existing named value entry. This flag is valid only if FLG_ADDREG_TYPE_MULTI_SZ is also set. The specified string value is not appended if it already exists. Create the given subkey, but ignore any supplied value-entry-name and/or value. Reset to the supplied value only if the specified value-entry-name already exists in the given subkey. Make the specified change in the 64-bit registry. If not specified, the change is made to the native registry. Only Windows XP and later. Same as FLG_ADDREG_KEYONLY but also works in a del-registry-section (see INF DelReg Directive). Only Windows XP and later. Make the specified change in the 32-bit registry. If not specified, the change is made to the native registry. Only Windows XP and alter. 5 / 8

6 0x <br/>(FLG_ADDREG_TYPE_SZ) 0x (FLG_ADDREG_TYPE_MULTI_SZ) 0x <br/>(FLG_ADDREG_TYPE_EXPAND_SZ) 0x <br/>(FLG_ADDREG_TYPE_DWORD) 0x <br/>(FLG_ADDREG_TYPE_NONE) REG_SZ. Note that this is the default type for a specified value entry, so the flag's value can be omitted from any regroot line in an add-registry section that operates on a value entry of this type. REG_MULTI_SZ. This specification does not require any NULL terminator for a given string value. REG_EXPAND_SZ. REG_DWORD. REG_NONE. The following describes only the minimum required information. You may add any other Barracuda Networks registry entry. 1. Edit Default Entry HKU,.DEFAULT\Software\Phion\phionvpn\Profile\1, Default, 0x , 1 Value 1 sets a profile to the default profile of the Barracuda VPN Client. All other profiles take the value Edit DHCP Entry HKU,.DEFAULT\Software\Phion\phionvpn\Profile\1, dhcp, 0x , 1 Editing this value changes the value of the Virtual Adapter Configuration parameter: Assign IP address manually Use internal DHCP assignment (default) Direct assignment 3. Edit Profile Name HKU,.DEFAULT\Software\Phion\phionvpn\Profile\1, description, 0x , "profile name" 4. Name the License (customer.lic) HKU,.DEFAULT\Software\Phion\phionvpn\Profile\1, license, 0x , "%65600%\customer.lic" %65600% is used as a placeholder for the installation directory 5. Enter IP Address of the VPN Server HKU,.DEFAULT\Software\Phion\phionvpn\Profile\1, server, 0x , " " Section 3: Customer Area / [SourceDisksFiles] 6 / 8 Example for Section [SoruceDisksFiles]

7 [SourceDisksFiles]<br/>; Files for disk Customer Files #1<br/>; filename = diskid[,[ subdir][, size]] customer.inf,,,1<br/>customer.lic,,,1 ; if a license file is imported<br/>active.i_fwrule,,,1 ; if a firewall rule set is imported A SourceDisksFiles section names the source files used during installation, identifies the installation disks that contain these files, and provides the path to the subdirectories, if any, on the distribution disks containing individual files. The following directives are applicable: filename = diskid[,[ subdir][, size]] File Directives Applicable in the Customer Area / [SourceDisksFiles] Directive Comment filename Name of the file on the source disk. diskid subdir size Integer identifying the source disk that contains the file. This value and the initial path to the subdir(ectory), if any, containing the named file must be defined in a SourceDisksNames section of the same INF. Subdirectory (relative to the SourceDisksNames path specification, if any) on the source disk where the named file resides. If this value is omitted from an entry, the named source file is assumed to be in the path directory that was specified in the SourceDisksNames section for the given disk or, if no path directory was specified, in the installation root. Optional; uncompressed size, in bytes, of the given file. Do not change the name of the firewall rule set entry (active.i_fwrule). If you do not intend installing the Personal Firewall with a predefined rule set meeting company policy, then remove this line. The silent.cmd File Save the following to a.cmd file and execute this file to trigger an unattended customer setup. Separate multiple properties with off<br/>setup.exe /s /v"/qr CUSTOMER_INF=customer.inf PROGTYPE=R8 FW_NOTINSTALL=1" Specific properties must be inserted into one row. For an overview of the available properties, see the Unattended Setup [8] page. 7 / 8

8 Links 8 / 8

Description of the Microsoft Windows Registry

Description of the Microsoft Windows Registry Page 1 of 5 Microsoft Knowledge Base Article - 256986 Description of the Microsoft Windows Registry The information in this article applies to: Microsoft Windows Server 2003, 64-Bit Datacenter Edition

More information

Registry Functions. Each of the W/32 registry functions has a syntax of the form: CALL creg ( key%,, ADDROF(result%) )

Registry Functions. Each of the W/32 registry functions has a syntax of the form: CALL creg ( key%,, ADDROF(result%) ) Registry Functions Introduction The registry is a system-defined database that applications and Microsoft Windows system components use to store and retrieve configuration data. This appendix to the W/32

More information

File: Racket File Format Libraries

File: Racket File Format Libraries File: Racket File Format Libraries Version 5.1 February 14, 2011 1 Contents 1 Convertible: Data-Conversion Protocol 3 2 gzip Compression and File Creation 4 3 gzip Decompression 5 4 zip File Creation 7

More information

WEEK 2.0. Any sufficiently advanced technology is indistinguishable from magic.

WEEK 2.0. Any sufficiently advanced technology is indistinguishable from magic. WEEK 2.0 Any sufficiently advanced technology is indistinguishable from magic. Recycler A recycle bin for each user Created upon file deletion Only for RB aware programs ie Office, not command line tools

More information

How to Create a *.vpn File

How to Create a *.vpn File You can import VPN profiles and Barracuda Personal Licenses to the Barracuda Network Access Client and the Barracuda VPN Client using configuration files with the suffix *.vpn that can be configured and

More information

Lesson 2: Editing the Registry

Lesson 2: Editing the Registry Lesson 2: Editing the Registry Lesson 2 Editing the Registry 4-15 Windows XP Professional stores hardware and software settings centrally in a hierarchical database called the Registry, which replaces

More information

COPYRIGHTED MATERIAL. What Is a Registry and Why? Chapter 1

COPYRIGHTED MATERIAL. What Is a Registry and Why? Chapter 1 Chapter 1 What Is a Registry and Why? Some users of Windows know exactly what the registry is a system designed to cause users and administrators to lose their hair. I know this is true because I can no

More information

Deploying Windows 98 Using Batch 98 and Infinst.exe

Deploying Windows 98 Using Batch 98 and Infinst.exe Deploying Windows 98 Using Batch 98 and Infinst.exe The Msbatch.inf Msbatch.inf may be used to configure almost all portions of Windows 98 setup for use in corporate environments. Many portions of Windows

More information

CA IT Client Manager. Packager and Installer for Windows Administration Guide. Release 12.8

CA IT Client Manager. Packager and Installer for Windows Administration Guide. Release 12.8 CA IT Client Manager Packager and Installer for Windows Administration Guide Release 12.8 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter

More information

Product Administration Guide

Product Administration Guide Product Dependable MSI and Application Virtualization Packaging, Workflow, and Package Editing IT Asset Management Tools for the Cloud Era www.scalable.com Page 4 Page 14 Page 43 Table of Contents Product

More information

M-FILES SETUP: ADVANCED USER'S GUIDE

M-FILES SETUP: ADVANCED USER'S GUIDE M-FILES CORPORATION M-FILES SETUP: ADVANCED USER'S GUIDE CUSTOMIZATION, COMMAND-LINE OPTIONS, AND CENTRALIZED DEPLOYMENT VERSION 1.5 CONTENTS 1. Change History... 4 2. Overview... 4 2.1. M-Files Installation

More information

Disk Operating System

Disk Operating System In the name of Allah Islamic University of Gaza Faculty of Engineering Computer Engineering Department Introduction To Computer Lab Lab # 1 Disk Operating System El-masry 2013 Objective To be familiar

More information

Application Profiler Administrator s Guide

Application Profiler Administrator s Guide Application Profiler Administrator s Guide VMware User Environment Manager V E R S I O N 8. 7.0 You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/

More information

Windows Registry. Windows Registry. A Wealth of Evidence. What is the Registry? Some Evidence that Can Be Recovered. Registry History: Windows 3.

Windows Registry. Windows Registry. A Wealth of Evidence. What is the Registry? Some Evidence that Can Be Recovered. Registry History: Windows 3. Windows Registry Windows Registry Week 3 Part 1 A great source of evidence and headaches What is the Registry? A Wealth of Evidence Collection of files that, together, form all the settings needed by applications

More information

File: Racket File Format Libraries

File: Racket File Format Libraries File: Racket File Format Libraries Version 5.3.6 August 9, 2013 1 Contents 1 Convertible: Data-Conversion Protocol 3 2 gzip Compression and File Creation 5 3 gzip Decompression 6 4 zip File Creation 7

More information

Legal Notices. AccessData Corp.

Legal Notices. AccessData Corp. Legal Notices AccessData Corp. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability

More information

Getting Started with VMware View View 3.1

Getting Started with VMware View View 3.1 Technical Note Getting Started with VMware View View 3.1 This guide provides an overview of how to install View Manager components and provision virtual desktops. Additional View Manager documentation

More information

Session 26 Backup/Restore and The Registry

Session 26 Backup/Restore and The Registry Session 26 Backup/Restore and The Registry Nassau Community College ITE153 Operating Systems 1 Overview Set Up a Backup Five Types of Backup Volume Shadow Copy Best Practices The Registry Required: Windows

More information

AppSense DataNow. Windows Client Advanced Configuration Guide Version 4.0

AppSense DataNow. Windows Client Advanced Configuration Guide Version 4.0 AppSense DataNow Windows Client Advanced Configuration Guide Version 4.0 AppSense Limited, 2016 All rights reserved. No part of this document may be produced in any form (including photocopying or storing

More information

VMware User Environment Manager Application Profiler Administration Guide. VMware User Environment Manager 9.4

VMware User Environment Manager Application Profiler Administration Guide. VMware User Environment Manager 9.4 VMware User Environment Manager Application Profiler Administration Guide VMware User Environment Manager 9.4 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

VMware User Environment Manager Application Profiler Administration Guide. VMware User Environment Manager 9.2

VMware User Environment Manager Application Profiler Administration Guide. VMware User Environment Manager 9.2 VMware User Environment Manager Application Profiler Administration Guide VMware User Environment Manager 9.2 VMware User Environment Manager Application Profiler Administration Guide You can find the

More information

Tweaking the Windows 7 Registry

Tweaking the Windows 7 Registry CHAPTER 12 Tweaking the Windows 7 Registry IN THIS CHAPTER. Firing Up the Registry Editor. Getting to Know the Registry. Understanding the Registry Files. Keeping the Registry Safe It is almost everywhere

More information

SyAM Management Utilities can be used for silent deployment of Microsoft Office 2007 or 2010 to client systems.

SyAM Management Utilities can be used for silent deployment of Microsoft Office 2007 or 2010 to client systems. SyAM Management Utilities can be used for silent deployment of Microsoft Office 2007 or 2010 to client systems. Requirements: Office 2007 or 2010 installation media must be for a volume-licensed edition.

More information

infoxpert Support Article

infoxpert Support Article infoxpert Support Article Version Date: March 2011 infoxpert Version: infoxpert Version 8.0.43 and above. Document Distribution This document is of a technical nature and is targeted to I.T. staff. Details

More information

PrimoPDF Enterprise User Guide, Version 5.0

PrimoPDF Enterprise User Guide, Version 5.0 Table of Contents Installation... 3 Reference Links... 3 Uninstallation... 4 Creating PDF Documents... 4 PrimoPDF Document Settings... 5 PDF Creation Profiles... 5 Document Properties... 6 PDF Security...

More information

TZWorks NTFS Copy Utility (ntfscopy) Users Guide

TZWorks NTFS Copy Utility (ntfscopy) Users Guide TZWorks NTFS Copy Utility (ntfscopy) Users Guide Abstract ntfscopy is a standalone, command-line tool that can copy any file on a NTFS volume. It can operate on a live NTFS volume, an image of an NTFS

More information

Ascent 6.1 Release Script for FileNet Content Manager 3.0. Release Notes

Ascent 6.1 Release Script for FileNet Content Manager 3.0. Release Notes Ascent 6.1 Release Script for FileNet Content Manager 3.0 Release Notes 10001303-000 Revision A November 16, 2004 Copyright Copyright 2004 Kofax Image Products, Inc. All Rights Reserved. Printed in USA.

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 11 Optimizing Windows

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 11 Optimizing Windows Chapter 11 Optimizing Windows Objectives Learn about Windows utilities and tools you can use to solve problems with Windows Learn how to optimize Windows to improve performance Learn how to manually remove

More information

Cannot open attachments in Microsoft Outlook

Cannot open attachments in Microsoft Outlook Page 1 of 5 Cannot open attachments in Microsoft Outlook Important This article contains information about modifying the registry. Before you modify the registry, make sure to back it up and make sure

More information

PrimoPDF User Guide, Version 5.0

PrimoPDF User Guide, Version 5.0 Table of Contents Getting Started... 3 Installing PrimoPDF... 3 Reference Links... 4 Uninstallation... 5 Creating PDF Documents... 5 PrimoPDF Document Settings... 6 PDF Creation Profiles... 6 Document

More information

File Manager Trainer

File Manager Trainer File Manager Trainer The File Manager is designed to be used as a tool to help the user to manipulate AS400 files as easily as if they were on their PC. The File Manager can be very easy to use. The following

More information

IV Workstation Imaging

IV Workstation Imaging IV Workstation Imaging The following sections provide information on ZENworks for Desktops (ZfD) Workstation Imaging procedures and features that you might need to use generally or from time to time as

More information

How to Restore a Windows System to Bare Metal

How to Restore a Windows System to Bare Metal This article refers to the Barracuda Backup Legacy Release firmware or newer, except where noted. Bare metal recovery allows you to restore a complete Microsoft Windows system, including data, settings,

More information

windows maurizio pizzonia roma tre university

windows maurizio pizzonia roma tre university windows maurizio pizzonia roma tre university 1 references M. Russinovich, D. A. Solomon Windows Internals: Including Windows Server 2008 and Windows Vista 5 th ed. Microsoft Press 2 architecture overview

More information

Unity Loader V2.3 Readme

Unity Loader V2.3 Readme Unity Loader V2.3 Readme Table of Contents 1 SYSTEM REQUIREMENTS... 2 2 SETUP PROCEDURE... 2 2.1 Recommendations before installation... 2 2.2 Unity Loader Setup procedure... 2 2.3 Communication Drivers

More information

Creating Workflows. Viewing the Task Library. Creating a Workflow. This chapter contains the following sections:

Creating Workflows. Viewing the Task Library. Creating a Workflow. This chapter contains the following sections: This chapter contains the following sections: Viewing the Task Library, page 1 Creating a Workflow, page 1 Example: Creating a Workflow, page 13 Resolving Workflow Validation Issues, page 16 Changing Flow

More information

SafeGuard LAN Crypt Client help

SafeGuard LAN Crypt Client help SafeGuard LAN Crypt Client help Product version: 3.95 Document date: September 2016 Contents 1 What is SafeGuard LAN Crypt?...3 1.1 Data protection using SafeGuard LAN Crypt...3 1.2 SafeGuard LAN Crypt

More information

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 14 Optimizing Windows

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 14 Optimizing Windows A+ Guide to Managing and Maintaining Your PC, 7e Chapter 14 Optimizing Windows Objectives Learn about Windows utilities and tools you can use to solve problems with Windows Learn how to optimize Windows

More information

TextPlus Release Module for Ascent Capture 3.0 Release Notes

TextPlus Release Module for Ascent Capture 3.0 Release Notes TextPlus Release Module for Ascent Capture 3.0 Release Notes v 3.00 Beta June 1999 Page 1 1. Introduction This document provides information on the TextPlus release script which is a sample script available

More information

Software Images. About Software Images. Dependent Factors. Send documentation comments to CHAPTER

Software Images. About Software Images. Dependent Factors. Send documentation comments to CHAPTER CHAPTER 10 This chapter describes how to install and upgrade software images, and introduces the file system. It includes the following sections: About, page 10-1 Essential Upgrade Prerequisites, page

More information

Micro Focus Desktop Containers 12.3 User Guide. June 2018

Micro Focus Desktop Containers 12.3 User Guide. June 2018 Micro Focus Desktop Containers 12.3 User Guide June 2018 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,

More information

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Release Notes. Release 8.1 January 2013

Release Notes. Release 8.1 January 2013 Release Notes Release 8.1 January 2013 IKAN Solutions N.V. Schaliënhoevedreef 20A B-2800 Mechelen BELGIUM Copyright 2013, IKAN Solutions N.V. No part of this document may be reproduced or transmitted in

More information

Managing & Supporting Windows XP

Managing & Supporting Windows XP UI 9 Managing & Supporting Windows X Definitions User - individual granted access to the system roups - logical collection of users Accounts - ogical construct containing all information that defines a

More information

Building MSI Updates and Patches

Building MSI Updates and Patches WHITE PAPER Building MSI Updates and Patches by Robert Dickau Principal Technical Training Writer, Flexera Software Introduction This white paper describes the changes you make to a Windows Installer (MSI)

More information

Administration Guide - NetApp File Archiver

Administration Guide - NetApp File Archiver Page 1 of 100 Administration Guide - NetApp File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method

More information

Binary Markup Toolkit Quick Start Guide Release v November 2016

Binary Markup Toolkit Quick Start Guide Release v November 2016 Binary Markup Toolkit Quick Start Guide Release v1.0.0.1 November 2016 Overview Binary Markup Toolkit (BMTK) is a suite of software tools for working with Binary Markup Language (BML). BMTK includes tools

More information

COURSE OUTLINE. Division of Business and Technology NET 239. WAN Data Communications. Credits: 3 Class Hours: 2 Lab Hours: 2

COURSE OUTLINE. Division of Business and Technology NET 239. WAN Data Communications. Credits: 3 Class Hours: 2 Lab Hours: 2 COURSE OUTLINE Division of Business and Technology NET 239 WAN Data Communications Approved Catalog Description Covers the technology and terminology required to use routing and switching technologies

More information

3.3 Audio Import Manager (AIM)

3.3 Audio Import Manager (AIM) 162 STORQ Technical Operation 3.3 Audio Import Manager (AIM) The Audio Import Manager or AIM offers multiple ways of ingesting audio content into the STORQ system. Files can be imported multiple ways using

More information

File: Racket File Format Libraries

File: Racket File Format Libraries File: Racket File Format Libraries Version 5.0.2 November 6, 2010 1 Contents 1 gzip Compression and File Creation 3 2 gzip Decompression 4 3 zip File Creation 6 4 tar File Creation 7 5 MD5 Message Digest

More information

Windows Client Advanced Configuration Guide Version 4.4

Windows Client Advanced Configuration Guide Version 4.4 Windows Client Advanced Configuration Guide Version 4.4 Copyright Notice This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates (referred to

More information

Agilent MassHunter Workstation Software Offline Qualitative and Quantitative Analysis

Agilent MassHunter Workstation Software Offline Qualitative and Quantitative Analysis Agilent MassHunter Workstation Software Offline Qualitative and Quantitative Analysis Installation Guide Step 1. Remove Older Versions of MassHunter and Microsoft Excel Software 2 Step 2. Install Microsoft

More information

VMware User Environment Manager Administration Guide. VMware User Environment Manager 9.5

VMware User Environment Manager Administration Guide. VMware User Environment Manager 9.5 VMware User Environment Manager Administration Guide VMware User Environment Manager 9.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you

More information

UC Export Folders Version 3.5 for Worksite 8.x, 9.x x86

UC Export Folders Version 3.5 for Worksite 8.x, 9.x x86 UC Export Folders Version 3.5 for Worksite 8.x, 9.x x86 Exports folders and subfolders directly from workspaces, tabs and folders Filter documents and email messages Integrated into Filesite and Desksite

More information

ProDoc Tech Tip. Downloading and Installing ProDoc, Step-by-Step

ProDoc Tech Tip. Downloading and Installing ProDoc, Step-by-Step ProDoc Tech Tip Downloading and The following instructions will show you step-by-step how to download and install the student version of ProDoc. These instructions were written for the Microsoft Internet

More information

The AbleDiskTool Utility

The AbleDiskTool Utility The AbleDiskTool Utility Release 5.2.2 of SynclavierX includes a command-line utility called AbleDiskTool. The AbleDiskTool utility is designed to quickly convert Synclavier files to formats that are native

More information

These notes describe how to use the USB configuration program to program the EEPOM for operation as an N2PK VNA USB interface.

These notes describe how to use the USB configuration program to program the EEPOM for operation as an N2PK VNA USB interface. These notes describe how to use the USB configuration program to program the EEPOM for operation as an N2PK VNA USB interface. Below are the step by step instructions followed by some notes on the program.

More information

wybuild & wyupdate File Specifications

wybuild & wyupdate File Specifications wybuild & wyupdate File Specifications Version: 2.6.18 August 2012 General This document is licensed under the BSD License. Copyright 2017 wyday. Any questions can be asked on the wyday forum. File format

More information

HTML2Text Program Documentation

HTML2Text Program Documentation Program Documentation Copyright 1998-2006 ABOUT THIS PROGRAM converts HTML files into displayable text very quickly. The program is perfect for both small and large applications: for summarizing web pages,

More information

CC Remote Execution Page

CC Remote Execution Page This article describes the functionalities of the Remote Execution page and provides a setup example. Remote execution can be used to execute nonrecurring tasks, such as the removal of unwanted files or

More information

Version 11. NOVASTOR CORPORATION NovaBACKUP

Version 11. NOVASTOR CORPORATION NovaBACKUP NOVASTOR CORPORATION NovaBACKUP Version 11 2009 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

AppSense DataNow. Windows Client Advanced Configuration Guide Version 4.1

AppSense DataNow. Windows Client Advanced Configuration Guide Version 4.1 AppSense DataNow Windows Client Advanced Configuration Guide Version 4.1 AppSense Limited, 2016 All rights reserved. No part of this document may be produced in any form (including photocopying or storing

More information

Dec2005: Released with v6.u1u1. Other than the title, the document is unchanged relative to v6.1.

Dec2005: Released with v6.u1u1. Other than the title, the document is unchanged relative to v6.1. Sablime v6.1 Update 1 Visual Studio* Plug-in Guide April 2005 Dec2005: Released with v6.u1u1. Other than the title, the document is unchanged relative to v6.1. What this Guide Covers This guide provides

More information

SpanDisc. U s e r s G u i d e

SpanDisc. U s e r s G u i d e SpanDisc U s e r s G u i d e Introduction SpanDisc User s Guide SpanDisc is a complete disc archival and backup solution. SpanDisc uses the automation features or Rimage Corporation s Digital Publishing

More information

Converter. Dynamic Concepts' suite of conversion utilities for those migrating from. IMS to dl4

Converter. Dynamic Concepts' suite of conversion utilities for those migrating from. IMS to dl4 IMS to dl4 Converter Dynamic Concepts' suite of conversion utilities for those migrating from IMS to dl4 The IMS Converter requires dl4 version 5.2.1 or higher. Contact Dynamic Concepts if a dl4 upgrade

More information

Fingerprint - Database Fingerprinting

Fingerprint - Database Fingerprinting Fingerprint - Database Fingerprinting Reference From Websense Data Security Help 7.6 Page 111-128 Contents Content Fingerprint............................................... 1 Database fingerprinting......................................1

More information

Creating Workflows. Viewing the Task Library. Creating a Workflow. This chapter contains the following sections:

Creating Workflows. Viewing the Task Library. Creating a Workflow. This chapter contains the following sections: This chapter contains the following sections: Viewing the Task Library, page 1 Creating a Workflow, page 1 Example: Creating a Workflow, page 12 Resolving Workflow Validation Issues, page 15 Changing Flow

More information

File: PLT File Format Libraries

File: PLT File Format Libraries File: PLT File Format Libraries Version 4.0 June 11, 2008 1 Contents 1 gzip Compression and File Creation 3 2 gzip Decompression 4 3 zip File Creation 6 4 tar File Creation 7 5 MD5 Message Digest 8 6 GIF

More information

Skype for Business Configuration

Skype for Business Configuration Skype for Business Configuration Architecture Since Spring 2017, Imagicle Queue Manager Enterprise provides native integration with Microsoft Lync / Skype for Business, as a Trusted UCMA Application registered

More information

CC Box Execution Page

CC Box Execution Page This article describes the functionalities of the Box Execution view of the Barracuda NG Control Center. Introduction The Barracuda NG Control Center control facility allows remote execution of scripts

More information

See Types of Data Supported for information about the types of files that you can import into Datameer.

See Types of Data Supported for information about the types of files that you can import into Datameer. Importing Data When you import data, you import it into a connection which is a collection of data from different sources such as various types of files and databases. See Configuring a Connection to learn

More information

HTML 5 and CSS 3, Illustrated Complete. Unit L: Programming Web Pages with JavaScript

HTML 5 and CSS 3, Illustrated Complete. Unit L: Programming Web Pages with JavaScript HTML 5 and CSS 3, Illustrated Complete Unit L: Programming Web Pages with JavaScript Objectives Explore the Document Object Model Add content using a script Trigger a script using an event handler Create

More information

LiveVault. Agent Guide

LiveVault. Agent Guide LiveVault Software Version: 7.82 Agent Guide Note The guide primarily provides instruction on how to install the LiveVault agent on Windows and Linux servers. Additionally it provides information about

More information

HELP Use the help command to list all the following supported commands:

HELP Use the help command to list all the following supported commands: Available commands within Windows Recovery Console The following commands are available within the Windows Recovery Console. The commands are not case-sensitive. HELP Use the help command to list all the

More information

Chapter 11: Basic Operating Systems

Chapter 11: Basic Operating Systems Chapter 11: Basic Operating Systems Complete CompTIA A+ Guide to PCs, 6e To identify and use common desktop and home screen icons To manipulate files and folders in Windows and mobile devices How to modify

More information

Document Redirection Module User Guide

Document Redirection Module User Guide Document Redirection Module User Guide Page 1 of 6 Introduction The IDS Document Redirection Module provides a way to download document files from an IDS server to an attached IDS client computer. This

More information

Proactive-CCTV Server Installation Guide v1.0

Proactive-CCTV Server Installation Guide v1.0 v1.0 For Support Email: michael@proactive-cctv.com www.proactive-cctv.com 1. Getting Started Welcome to the Proactive-CCTV. Please Read Before Starting Installation Initial Setup & Requirements Operating

More information

OpenEnterprise Version 3x Upgrade Guide D301827X012 July 2018

OpenEnterprise Version 3x Upgrade Guide D301827X012 July 2018 OpenEnterprise Version 3x Upgrade Guide Remote Automation Solutions System Training A well-trained workforce is critical to the success of your operation. Knowing how to correctly install, configure, program,

More information

Description of the Windows XP Recovery Console for advanced users

Description of the Windows XP Recovery Console for advanced users Page 1 of 11 Article ID: 314058 - Last Review: September 22, 2008 - Revision: 5.4 Description of the Windows XP Recovery Console for advanced users System Tip This article applies to a different version

More information

Restoring Files and Folders

Restoring Files and Folders Applicable Products These instructions apply to the following products: Barracuda Intronis Backup - MSP Files and Folders Restore Overview You can restore Files and Folders by: Folder Hierarchy Daily Snapshots

More information

BootManage Administrator Installation Manual

BootManage Administrator Installation Manual BootManage Administrator Installation Manual 1 Contents INTRODUCTION... 4 WHAT IS THE BOOTMANAGE ADMINISTRATOR (BMA)... 5 REQUIREMENTS FOR THE BOOTMANAGE ADMINISTRATOR:... 5 PXE... 5 BOOTMANAGE TCP/IP

More information

EasyMorph Server Administrator Guide

EasyMorph Server Administrator Guide EasyMorph Server Administrator Guide Version 3.9.2 December, 24 th 2018 Table of Contents TABLE OF CONTENTS... 1 PREREQUISITES... 2 Memory requirements... 2 INSTALLATION... 2 License key... 3 SERVER SERVICE

More information

Corel Painter Installation Guide

Corel Painter Installation Guide Installation Guide Cel Painter Installation Guide The Cel Painter Installation Guide documents installation options so system administrats can carry out an unattended ( silent) installation and specify

More information

Informatica PowerExchange for Microsoft Azure Blob Storage 10.2 HotFix 1. User Guide

Informatica PowerExchange for Microsoft Azure Blob Storage 10.2 HotFix 1. User Guide Informatica PowerExchange for Microsoft Azure Blob Storage 10.2 HotFix 1 User Guide Informatica PowerExchange for Microsoft Azure Blob Storage User Guide 10.2 HotFix 1 July 2018 Copyright Informatica LLC

More information

Other Templates. Overview. URL Shortener & Redirect Page

Other Templates. Overview. URL Shortener & Redirect Page Other Templates Overview In addition to the standard templates for new page and section creation, the implementation for an institution may include additional templates may be available, including a URL

More information

Installing IPM on Windows

Installing IPM on Windows CHAPTER 5 This chapter describes how to install the IPM server software on Windows NT, Windows 2000 Professional, or Windows 2000 Server system, and how to install the IPM client software on a Windows

More information

Perceptive Enterprise Deployment Suite

Perceptive Enterprise Deployment Suite Perceptive Enterprise Deployment Suite Getting Started Guide PEDS Version: 1.2 Written by: Product Documentation, R&D Date: July 2014 2014 Perceptive Software. All rights reserved CaptureNow, ImageNow,

More information

User's Guide c-treeace SQL Explorer

User's Guide c-treeace SQL Explorer User's Guide c-treeace SQL Explorer Contents 1. c-treeace SQL Explorer... 4 1.1 Database Operations... 5 Add Existing Database... 6 Change Database... 7 Create User... 7 New Database... 8 Refresh... 8

More information

Packet Capture (PCAP) Trace

Packet Capture (PCAP) Trace Feature Information, page 1 Feature Description, page 2 Configuring PCAP Trace, page 2 Monitoring and Troubleshooting PCAP Trace, page 9 Feature Information Summary Data Applicable Product(s) or Functional

More information

LCE Splunk Client 4.6 User Manual. Last Revised: March 27, 2018

LCE Splunk Client 4.6 User Manual. Last Revised: March 27, 2018 LCE Splunk Client 4.6 User Manual Last Revised: March 27, 2018 Table of Contents Getting Started with the LCE Splunk Client 3 Standards and Conventions 4 Install, Configure, and Remove 5 Download an LCE

More information

Internal Commands COPY and TYPE

Internal Commands COPY and TYPE Internal Commands COPY and TYPE Ch 5 1 Overview Will review file-naming rules. Ch 5 2 Overview Will learn some internal commands that can be used to manage and manipulate files. Ch 5 3 Overview The value

More information

USB Type-C to Serial Adapter

USB Type-C to Serial Adapter USB Type-C to Serial Adapter Quick Installation Guide DA-70166 This is elegant way to connect serial devices, for example weather stations, sensors, motor controls, set-top-boxes, gaming consoles etc.

More information

RIS Installation Steps

RIS Installation Steps RIS Installation Steps The basic steps for installing a RIS server are as follows: Install Windows 2003 Server Install Remote Installation Services Run the Remote Installation Services Setup Wizard Authorise

More information

Barracuda NextGen Report Creator

Barracuda NextGen Report Creator The creates customized reports using statistics and logs collected on Barracuda NextGen F-Series Firewalls. Each report can be configured to use multiple appliances, custom or predefined report data templates,

More information

Product: DQ Order Manager Release Notes

Product: DQ Order Manager Release Notes Product: DQ Order Manager Release Notes Subject: DQ Order Manager v7.1.29 Version: 1.0 January 20, 2017 Distribution: ODT Customers DQ OrderManager v7.1.29 *** requires db update 20170120 or newer ***

More information

Management Mechanisms

Management Mechanisms Chapter 4 Management Mechanisms This chapter describes three fundamental mechanisms in Microsoft Windows that are critical to the management and configuration of the system: The registry Services The Registry

More information

User Guide. ZENworks Application Virtualization Novell ZENworks Application Virtualization. July 18, docsys (en) 27 June 2012

User Guide. ZENworks Application Virtualization Novell ZENworks Application Virtualization. July 18, docsys (en) 27 June 2012 Novell ZENworks Application Virtualization www.novell.com/documentation docsys (en) 27 June 2012 User Guide ZENworks Application Virtualization 9.0.1 July 18, 2012 Legal Notices Novell, Inc., makes no

More information

Grapevine web hosting user manual. 12 August 2005

Grapevine web hosting user manual. 12 August 2005 Grapevine web hosting user manual 12 August 2005 Grapevine web hosting user manual 2 Contents Contents... 2 Introduction... 4 System features... 4 How it looks... 5 Main navigation... 5 Reports... 6 Web

More information

Model 5200 Logging & FTP Client Applications Guide

Model 5200 Logging & FTP Client Applications Guide CONTROL TECHNOLOGY CORPORATION Model 5200 Logging & FTP Client Applications Guide Model 5200 Logging & FTP Client Applications Guide Copyright 2004-2006 All Rights Reserved. WARNING: Use of CTC Controllers

More information

Instructions for upgrading firmware on a

Instructions for upgrading firmware on a These instructions were created to allow the upgrading of firmware on a Bӧwe Bell and Howell (BBH) branded Ngenuity scanner. This firmware update may be done for customers who wish to upgrade to the latest

More information