8 Ways Quick Application Installations Ruin Performance
|
|
- Kelly Lloyd
- 8 years ago
- Views:
Transcription
1 Published on 7 Tutorials ( Home > 8 Ways Quick Application Installations Ruin Performance 8 Ways Quick Application Installations Ruin Performance [1] By Ciprian Adrian Rusen [2] on Tue, 12/13/ :37 A while back, we published an article about Risks to Watch For When Downloading & Installing Free Software [3]. While we had an idea of how damaging it can be to perform quick (or typical) application installations, without carefully reading what you are about to install, we really wanted to have numbers and real tests done to evaluate the full impact. I managed to find two days to spend on making such tests and here are the results: 8 real ways you will ruin both the performance of your system and your computing experience, if you choose to make quick (or typical) applications, without reading through the installation steps. Testing Procedure I took a laptop with a freshly installed Windows 7. I installed Soluto [4], to measure the average time needed for my system to boot, prior to making my tests and after they were done. This gave me a good picture of the impact all the installed applications had on the boot time. Then, I selected a total of 33 free and popular applications to download, each representative for the type of functionality being offered. To choose the applications, I looked at Softpedia [5], Download.com [6] and Ninite [7], to see the most popular applications for each category. The list of applications can be viewed in the screenshots included in the next section. They are all very popular and should be familiar to most readers. The applications were downloaded from their official websites or from the websites where I was redirected to: Download.com, SourceForge, etc. I selected only stable releases. I did not install any beta versions. I installed all the applications one by one, using their default selections which mean I ve done mostly Quick (or Typical) installations. When I was asked to install additional software I might not want, I accepted all the dialogues since they were presented by each application as something recommended to the user. 1/8
2 When evaluating the unwanted things installed by each application, I did not consider a desktop shortcut as being unwanted. Also, other applications that were required by an application so that it can function without problems, such as Microsoft Visual C++ Redistributables, Java or drivers, I considered them to be legitimate prerequisites and I have not counted them as unwanted software" in the tables you are about to see. Test Results Major Web Browsers are the Safest! The safest category of applications is Internet Browsers. As you can see from the table, they do not install anything you might not want to have on your system. Even though I did not evaluate Internet Explorer [8], Google Chrome or Opera, they all have clean default installations, without any unwanted items included. * Some might argue that itunes actually installs only software it needs to function. However, I do not agree. itunes installs lots of software, some of it not really needed by everyone, including Bonjour (required for network printing in a network with both Windows and OS X computers) or Apple Mobile Device which is required only by owners of Apple devices who want to connect them with their Windows computers. Also, some of the additional software installed, runs at the Windows startup and contributes to slowing the boot procedure. 2/8
3 ** Open Office was the only application which left its installation files in a folder on the Desktop, requiring the user to manually delete it. *** AVG and Avast! antivirus applications set themselves to start at the Windows startup. Unlike with other applications, I did not consider this to be unwanted behavior. It is needed to receive the required protection against viruses and malware. Also, they both installed browser add ons, so that they can scan Internet browsing traffic. Again, I did not consider this to be unwanted behavior. 3/8
4 ^ PeaZip does not create a Windows startup entry for itself. However, it installs unwanted software (the Registry Mechanic from PC Tools) which, in turn, creates a startup entry for itself. Therefore I considered this as unwanted behavior added by PeaZip. Also, Advanced System Care Free does not install a desktop gadget for itself. It installs unwanted software (a trial version of WinZip) which, in turn, installs a desktop gadget. ^^ Daemon Tools Lite and Virtual CloneDrive set themselves to start at the Windows startup. Due to the fact that they are drive emulators, this is considered desired behavior and was not highlighted as being a bad. 4/8
5 Those of you who want to view the results in a better way or download them, can use the PDF file attached at the end of this article. Main Conclusions Less Than Half of Applications Will Be on Good Behavior Looking at the statistics resulted from this experiment, I can draw several conclusions: Only 14 out of the 33 applications I tested installed only the things I expected to have installed. That s 42% of the applications that were tested. Considering my previous experience with applications, I would say this is pretty close to reality in general. Open source software tends to behave much better than other software. With one exception (PeaZip), all open source software did not bundle any thing I would not want or that was not critical to its good functioning. 39% (13 out of 33) of installed applications set themselves to run at the Windows startup even though, in most cases, the functionality being offered is not required by the user at each Windows startup. The only exceptions to this rule are security software or drive emulators. The end result is longer boot timings and added user annoyance with each login. All the applications added a total of 46 seconds to my system s initial 52 seconds boot timing. To put things in perspective, this makes for boot procedure slower by 88% compared to the initial timings on my clean computer. To contribute to my annoyance, at each startup I was also welcomed by a huge number of open windows (all requesting something from me), unwanted desktop gadgets and lots of desktop shortcuts. Being welcomed with a screen similar to the one below, makes for a very bad computing 5/8
6 experience. 24% (8 out of 33) of applications will install an unwanted browser toolbar which takes over precious screenspace and slows down the Internet browsing experience. Another 24% will change the default search engine used by your browser. At the end of all installations, my Internet Explorer looked like in the screenshot below. Not a pretty sight! Plus, it started and worked terribly slow. What once was a very fast browser, has become a sluggish monster, barely allowing me to search for information and browse the web. Also, the default search engine I ended up with, was crappy and helped little in finding the information I needed. 24 % of applications will install other unwanted applications. These can be either 6/8
7 other free applications or trial versions of commercial applications. The applications bundled are very diverse, ranging from Internet browsers such as Google Chrome (installed by Google Earth, for example) to system optimisation tools (such as Uniblue s Driver Scanner or the Registry Mechanic from PC Tools) or PDF readers. Another problem with the unwanted applications was the most of them were old versions. Therefore they either prompted for updates or did not fully function unless they were upgraded to the latest version. This increased the annoyance level even more. Another 18% (6 out of 33) of applications mess up your browser further, by installing unwanted add ons. The most annoying was installed by Winamp and it was an add on which checked if other applications changed my default search provider from AOL to something else. Each time this happened, when I started Internet Explorer or opened a new tab, I got an annoying message, asking if I want to keep the new search provider or not. After seeing it for the fourth time, I got really mad and let it use AOL Web Search so that I could quietly continue my testing. Really shady practices from AOL! Also, some of the unwanted browser add ons were not compatible with the latest versions of Internet browsers. Therefore, Firefox chose to disable them while Internet Explorer was sensibly slowed down but those which were not compatible. 15% (5 out of 33) of applications will change your browser s homepage, 12% will install desktop gadgets you might not want, while another 6% will add unwanted shortcuts on your desktop, to different paid services, websites or applications. Related articles: Risks to Watch For When Downloading & Installing Free Software [3] Recommended articles: 7/8
8 Why do people fall for Trojans? [9] Stay safe online: 5 secrets every PC (and Mac) owner should know [10] Attachment Detailed Test Results [11] Size KB Content: Programs [12] System and Security [13] Windows 8 [14] Windows 7 [15] Blog [16] This work is licensed under a Creative Commons Attribution Noncommercial Share Alike 3.0 Unported License. Microsoft, Windows and the Windows logo are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Microsoft Corporation in no way endorses or is affiliated with our site. All other products mentioned are registered trademarks and/or trademarks of their respective companies. This blog is running on the Drupal CMS the best Content Management Platform. Source URL (retrieved on 01/11/ :26): ways performing quick applicationinstallations ruin performance Links: [1] ways performing quick application installations ruin performance [2] adrian rusen [3] watch when downloading installing free software [4] [5] [6] [7] [8] explorer [9] do people fall for trojans/3715 [10] safe online 5 secrets every pc and mac owner should know/3542 [11] [12] [13] and security [14] 8 [15] 7 [16] 8/8
Citrix : Remediation - MAC
Citrix : Remediation - MAC Key Points: 1. 2. 3. 4. 5. 6. 7. Understanding End Point Scan Analysis Supported anti-virus and firewall products Configuring AVAST/SOPHOS and the Mac OS X Firewall Installing
More informationFree and Legal Software You Can Download By Tom Krauser
Free and Legal Software You Can Download By Tom Krauser Here is a list of free programs that you can download for your personal use. They are legal and free for you to install. Some may have restrictions
More informationHow to easily clean an infected computer (Malware Removal Guide)
How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather
More informationPC Security & Housekeeping March 2015
PC Security & Housekeeping March 2015 Anti-malware programs Always keep your firewall, anti-virus, and anti-spyware products up to date! There are many good commercial products available, such as: o Norton
More informationKeeping you and your computer safe in the digital world.
Keeping you and your computer safe in the digital world. After completing this class, you should be able to: Explain the terms security and privacy as applied to the digital world Identify digital threats
More informationContent. PCKeeper Live. 1. Introduction. 2. Test Environment. 3. Tests Description. 4. Test Machines. 4.1. Specifications
Content 1. Introduction 2. Test Environment 3. Tests Description 4. Test Machines 4.1. Specifications 5. Boot Performance & Shutdown Duration Test 5.1. Desktop PC 5.2. Laptop 6. File Handling & Photo Handling
More informationFreshly Installed Pre Malware
How Does Spyware, Malware or Crapware Get on My Computer? Have you ever wondered how malware, spyware, scareware, crapware, or other undesirable software might get on a computer? First we ll illustrate
More informationPC Diet and fitness plan
PC Diet and fitness plan Revised Apr 2013 Speed up your PC Regain lost storage space Clean out Bugs and viruses Improve your web experience Reduce maintenance costs and downtime This PC Diet and fitness
More informationavast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide
avast! Free Antivirus for Mac Quick Start Guide 1 Introduction Welcome to avast! Free Antivirus for Mac. avast! Free Antivirus for Mac contains the same ICSA Certified scan engine as all avast! antivirus
More informationhttp://vpn.madeleyacademy.com
Madeley Academy Remote Access http://vpn.madeleyacademy.com Members of Staff and Sixth form students are able to log into the shared and their user areas from home. System requirements Antivirus Trusted
More informationStudent ANGEL FAQs. General Issues: System Requirements:
Student ANGEL FAQs General Issues: What is ANGEL? How do I log in? What is my username and password? How do I activate my account? I forgot my C number/password, what do I do? I registered after the first
More informationMalware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services
Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the
More information1. Right click using your mouse on the desktop and select New Shortcut.
offers 3 login page styles: Standard Login, List Login or Quick Time Punch. Each login page can be saved as a shortcut to your desktop or as a bookmark for easy fast login access. For quicker access to
More informationHow to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
More information8x8 Click2Pop User Guide
USER GUIDE 8x8 User Guide Getting Started with April 2014 Contents Introduction... 3 What s new.... 3 8x8.... 3 Here is how works...4 8x8 Click2Connect.... 4 Requirements.... 4 Installation on Microsoft
More informationThinPoint Quick Start Guide
ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...
More informationAccessing Websites. Mac/PC Compatibility: QuickStart Guide for Business
Accessing Websites Mac/PC Compatibility: QuickStart Guide for Business 2 Accessing Websites QuickStart Guide for Business The Basics People use the web for research, entertainment, and business. And it
More informationGrandView. Web Client Software Requirements and Recommendations. Revision 2012.9.26
GrandView Web Client Software Requirements and Recommendations Revision 2012.9.26 RoviSys 1455 Danner Drive Aurora, OH 44202 330-562-8600 grandviewbusinesssolutions.com TABLE OF CONTENTS Introduction...
More informationFileMaker Server 12. Getting Started Guide
FileMaker Server 12 Getting Started Guide 2007 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
More informationAdwareMedic. About AdwareMedic... 2. How to use AdwareMedic... 3. Frequently Asked Questions... 7. Version History... 9 License Agreement...
AdwareMedic http://www.adwaremedic.com thomas@thesafemac.com About AdwareMedic... 2 System Requirements... 2 Limitations... 2 How to use AdwareMedic... 3 Scan for Adware... 4 Optional items... 5 Firefox
More informationWhat you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
More informationSophos Computer Security Scan startup guide
Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4
More informationBI 4.1 Quick Start Guide (for Online Report Users)
BI 4.1 Quick Start Guide (for Online Report Users) Contents Introduction... 3 Logging in... 3 Home Screen... 4 Preferences... 6 Setting Up Preferences to Display Online Reporting Folders... 7 Running a
More informationSTUDENT ADMINISTRATION TRAINING GUIDE SETTING YOUR BROWSER FOR PEOPLESOFT DOWNLOADS
STUDENT ADMINISTRATION TRAINING GUIDE SETTING YOUR BROWSER FOR PEOPLESOFT DOWNLOADS Table of Contents How to check the browser version... 3 PC - Internet Explorer... 8 Internet Explorer V9 Compatibility
More informationHow To Use Moodle Online Class On A Pc Or Mac Or Ipad (For Acedo) On A Computer Or Mac) On Your Computer Or Ipod Or Ipo (For An Ipo) For Acedor Or Mac (
Welcome to Stanly Online, This document has been sent to you to supply the information you need to: access our online learning system AND find help, should the need arise Accessing : Your online class
More informationBefore You Begin, Your Computer Must Meet the System Requirements
Before You Begin, Your Computer Must Meet the System Requirements Windows: Minimum: Windows Vista SP2 or Windows 7 & 8 Remote Desktop Protocol (connection) 7.1 or higher 150 MB hard drive space 2 GB RAM
More informationFileMaker Server 13. Getting Started Guide
FileMaker Server 13 Getting Started Guide 2007 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
More informationWindows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook
Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For
More informationOutlook Web Access 2003 Remote User Guide
UNITED STATES COAST GUARD Outlook Web Access 2003 Remote User Guide Using Common Access Card Access TISCOM TIS-42 07/29/2008 Version 1.0 CAC Enabled Outlook Web Access CAC Enabled OWA is a way to view
More informationBefore You Begin Your Computer Must Meet the System Requirements to Access Cloud9
Before You Begin Your Computer Must Meet the System Requirements to Access Cloud9 If you are not working from a Windows 7 or 8 computer, you will need to update: Windows XP to Service Pack 3 Windows Vista
More informationSetting up Client Browsers Oracle FLEXCUBE Universal Banking Release 11.3.0 [May] [2011]
Setting up Client Browsers Oracle FLEXCUBE Universal Banking Release 11.3.0 [May] [2011] Table of Contents 1. SETTING UP CLIENT BROWSERS... 1-1 1.1 INTRODUCTION... 1-1 1.2 LIST OF CLIENT BROWSERS... 1-1
More informationUser Guide. Windows 8 Upgrade Assistant. Laplink Software, Inc. MN-PCM-UpgdAssist-EN-08 (REV. 10/2012)
1 Windows 8 Upgrade Assistant User Guide Laplink Software, Inc. For technical support issues or questions, please visit: http://www.laplink.com/contact For other inquiries, please see contact details below:
More informationRemove ANY TOOLBAR from Internet Explorer, Firefox and Chrome
Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome Browser toolbars have been around for years, however, in the last couple of months they became a huge mess. Unfortunately, lots of free software
More informationStudent Desktop@ Home
Student Desktop@ Home Full Off Campus Access to your Programs and Files Full Access to the University from Home You can access the University from any computer with an internet connection. This system
More informationUser Manual Version 0.9.9.p BETA III December 23rd, 2015
User Manual Version 0.9.9.p BETA III December 23rd, 2015 Disclaimer: This document is provided as-is. Information and views expressed in this document, including URL and other Internet website references,
More informationAdobe Reader 7.0 Frequently Asked Questions for Digital Edition Users
FAQ Adobe Reader 7.0 TOPICS 1 General 4 Adobe DRM 4 digital edition support 4 Activation 5 Mac OS support 6 PDA support General Q: What is a digital edition (formerly known as an ebook)? A: A digital edition
More informationRemote Access End User Reference Guide for SHC Portal Access
Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required
More informationNew Online Banking Guide for FIRST time Login
New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms
More informationFileMaker Server 10. Getting Started Guide
FileMaker Server 10 Getting Started Guide 2007-2009 FileMaker, Inc. All rights reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker, the file folder logo, Bento and
More informationWorking Together - Your Apple Mac and Microsoft Windows
Contains information about complex concepts and /or requires technical knowledge to get the most out of the article. Aimed at the more experienced / ambitious ICT manager or accidental techie. Working
More informationPearson Onscreen Platform (POP) Using POP Offline testing system guide
Pearson Onscreen Platform (POP) Version 1.0 October 2014 02 What s in this guide? Contents 1 Before you start 2 Download a test 3 Play test 4 Upload response Read more Read more Read more Read more 03
More informationHow to File the FBAR Electronically. The following steps describe the process of filing an FBAR electronically with our system.
Prerequisite How to File the FBAR Electronically The following steps describe the process of filing an FBAR electronically with our system. Our site requires use of the free Adobe Reader product to properly
More informationPC Instructions for Miller LiveArc Software
PC Instructions for Miller LiveArc Software Contents Instructions for Installing LiveArc Software on a PC... 2 Instructions for Loading Data from the LiveArc System onto a PC... 10 Instructions for Transferring
More informationInstall and End User Reference Guide for Direct Access to Citrix Applications
Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a
More informationSecurity Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender
Security Practices Essentials Viruses McAfee Virus Software Critical Windows Updates Network Settings Spyware Adaware Spybot Windows Defender Security Practices Essentials: All computer passwords should
More informationET2 System Requirements.docx
ET2 System Requirements Version 1.0 Online Training and Assessment Services Project Customer ET2 ET2 Admin Author PSI Creation Date 09 February 2016 Electronic File Name Information Category ET2 System
More informationStandard Client Configuration Requirements
Test Developer s Studio (TDS) Standard Client Configuration Requirements Information Technologies (IT) Content Applications Development Group (CADG) Version 1.0 February 20, 2008 Copyright 2008 by NCS
More informationWeb24 Supported Software
Web24 Supported Software Browser & OS Requirements Connectivity, hardware and browser support are critical to providing the best user experience within Web24. We work hard to make sure that Web24 renders
More informationQuick Reference Guide
Simplified Web Interface for Teachers Quick Reference Guide Online Development Center Site Profile 5 These fields will be pre-populated with your information { 1 2 3 4 Key 1) Website Title: Enter the name
More informationwww.notapennydown.com
All You Need to Know About Spyware What is spyware? Recent studies from a joint project between Dell Computer and the Internet Education Foundation have found that an estimated 90% or more home computers
More informationWhat is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.
USER Manual Table of Contents Getting Started What is PC Matic?...4 System Requirements....4 Launching PC Matic.5 How to Purchase a PC Matic Subscription..6 Additional Installations. 6 Registration...6
More information4.0 SP1 (4.0.1.0) November 2014 702P03296. Xerox FreeFlow Core Installation Guide: Windows Server 2008 R2
4.0 SP1 (4.0.1.0) November 2014 702P03296 Installation Guide: Windows Server 2008 R2 2014 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, FreeFlow, and VIPP are trademarks of Xerox Corporation
More informationConnecting to the Staff Desktop Service
Connecting to the Staff Desktop Service Access your programs and files just like you were in the office Get Setup The first step to use our Remote Connection service is to check that you have the free
More informationQuick Start. Guide. The area s ONLY 100% fiber optic network. epbfi.com
Quick Start Guide The area s ONLY 100% fiber optic network epbfi.com Welcome to Fi-Speed Internet from EPB Fiber Optics SM You re now connected to the area s ONLY 100% fiber optic network. What does that
More informationSend technical support questions to tmss@support.trendmicro.com. In the United States, call the technical support team toll-free at 1-866-787-TMSS
Quick Start Guide Send technical support questions to tmss@support.trendmicro.com. In the United States, call the technical support team toll-free at 1-866-787-TMSS (1-866-787-8677). For online support
More informationGeorgia Military College Columbus Online Services Guide
Georgia Military College Columbus Online Services Guide Never Fear! We will answer your questions here! *If you complete every section of this packet, you will not need to visit the Technology Station
More informationIntelligent Office: Web Optimisation Guide. Published Date: 06/11/2015. Version: 3.3
Intelligent Office: Web Optimisation Guide Published Date: 06/11/2015 Version: 3.3 Table of Contents System Requirements:... 3 Introduction... 3 Difficulties Logging on to Intelligent Office (io)... 3
More informationDesktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationRemote Desktop Web Access. Using Remote Desktop Web Access
Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off
More informationSSD Old System vs HDD New
SSD technology enjoys many advantages over traditional spinning disk / s. No moving parts makes it more rugged, more resistant to shock and vibration but performance is undoubtedly the biggest benefit
More informationWeb Conferencing Version 8.3 Troubleshooting Guide
System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which
More informationUser Manual for Web. Help Desk Authority 9.0
User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
More informationREMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM
REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM This document explains the various ways to connect to your network files and group share data. In addition, staff and full-time faculty are
More informationKUB Website Troubleshooting
KUB Website Troubleshooting Are you having problems getting to the KUB website at http://www.kub.org/? If you type in your user ID and password and press the login button, are you routed right back to
More informationOBIEE : Browser and Operating System Compatibility. Including Known Issues and Solutions
OBIEE : Browser and Operating System Compatibility Including Known Issues and Solutions Contents PREFACE... 2 SUPPORTED BROWSERS AND OPERATING SYSTEMS... 3 SUMMARY OF KNOWN BROWSER/OS ISSUES:... 4 ISSUE
More informationQuick Start Guide to Logging in to Online Banking
Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s
More informationVersion 14.4. Client Setup Guide
Version 14.4 Client Setup Guide Copyright 2005-2015 Imagine Learning, Inc. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic, mechanical,
More informationFileMaker Server 11. Getting Started Guide
FileMaker Server 11 Getting Started Guide 2004 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
More informationSOFTWARE UNIT 1 PART B C O M P U T E R T E C H N O L O G Y ( S 1 O B J 2 2-3 A N D O B J 3-2)
SOFTWARE UNIT 1 PART B C O M P U T E R T E C H N O L O G Y ( S 1 O B J 2 2-3 A N D O B J 3-2) SOFTWARE CATEGORIES There are two main type of software categories Operating Systems Software Application Software
More informationCitrix XenApp 6.5 User Guide. For Windows and OS X
Citrix XenApp 6.5 User Guide For Windows and OS X Table of Contents Target Audience... 3 Prerequisites... 3 Windows:... 3 OS X:... 3 Installing Client... 4 Downloading the Client:... 4 Launching the Installer...
More information1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
More informationUser Guide for the Identity Shield
User Guide for the Identity Shield Copyright Webroot SecureAnywhere User Guide for the Identity Shield January, 2013 2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and
More informationBitdefender Internet Security 2015 User's Guide
USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted
More informationWireless Presentation Gateway. User Guide
User Guide Table of Contents 1 Initial Setup Present Anything Without Wires p. 3 2 From A Laptop (Windows or Mac) First, download he client p. 4 Now connect p. 5 Additional Features p. 6 3 From An ios
More informationWelcome. Thank you for choosing Cogeco High Speed Internet.
Welcome Welcome Thank you for choosing Cogeco High Speed Internet. Welcome to the endless range of possibilities available to you with your new High Speed Internet service. When it comes to speed, you
More informationTwo Factor Authentication - USER GUIDE
Two Factor Authentication - USER GUIDE Two Factor Authentication (or 2FA) is a two step verification process that provides an extra layer of security for you when accessing your account within Online Services.
More informationKony MobileFabric Messaging. Demo App QuickStart Guide. (Building a Sample Application
Kony MobileFabric Kony MobileFabric Messaging Demo App QuickStart Guide (Building a Sample Application Apple ios) Release 6.5 Document Relevance and Accuracy This document is considered relevant to the
More informationSMS for Outlook. Installation, Configuration and Usage Guide
SMS for Outlook Installation, Configuration and Usage Guide INTRODUCTION Installing TxTStream s SMS for Outlook is easy and will only take a minute or two. We will be using screen shots from a Windows
More informationHigh Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
More informationFileMaker Server 15. Getting Started Guide
FileMaker Server 15 Getting Started Guide 2007 2016 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
More informationCitrix Introduction and FAQs
Citrix Introduction and FAQs Introduction to Citrix... 2 Why should I use this?... 2 What about Support?... 2 What browser should I use?... 2 Known Issues... 2 System Requirements for Windows-based computers...
More informationGetting Started with your Chromebook
Getting Started with your Chromebook A Free ebook from Chrome Story - A Blog for Chrome, Chrome OS and Chromebooks By Dinsan Francis dinzan@gmail.com 1 Contents Getting To Know The Keyboard The Search
More informationVIVIDESK Desktops can be accessed with a Macintosh Computer by one of two methods:
VIVIDESK Desktops can be accessed with a Macintosh Computer by one of two methods: 1. If you have Macintosh OS version IX, then VIVIDESK is best viewed using Windows emulation software. 2. If you have
More informationEndpoint Protection Small Business Edition 2013?
Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,
More informationVancouver Community College Web Orientation
Access the myvcc Web Portal The myvcc portal provides a secure environment for VCC students to: Access VCC s Moodle online learning environment Access your student email (Microsoft Office365) Check your
More informationQlik Sense Desktop. Qlik Sense 2.0.6 Copyright 1993-2015 QlikTech International AB. All rights reserved.
Qlik Sense Desktop Qlik Sense 2.0.6 Copyright 1993-2015 QlikTech International AB. All rights reserved. Copyright 1993-2015 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik Sense, QlikView,
More informationRemote VPN: Remote access for personal devices
Remote VPN: Remote access for personal devices Documentation Team. March 2013. About Remote VPN Remote VPN 1 provides staff and students with secure, authenticated remote access to personal and shared
More informationADOBE FLASH PLAYER Local Settings Manager
ADOBE FLASH PLAYER Local Settings Manager Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Storage...............................................................................................................
More informationSymantec Encryption Satellite for Windows Version 3.3 Release
Page 1 of 5 Symantec Encryption Satellite for Windows Version 3.3 Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release
More informationANDRA ZAHARIA MARCOM MANAGER
10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal
More informationBasic Computer Maintenance
Basic Computer Maintenance Presented by East Central Regional Library The Institute of, a Federal Agency that fosters innovation, leadership and a lifetime of learning, in conjunction with State Library
More informationAirtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
More informationFollow the instructions below for first-time users only
Whittier Law School Law Library Cisco NAC Agent Wireless Installation Guide For Microsoft Windows In order to access the wireless network on campus, Microsoft Windows laptop users must go through the Cisco
More informationFlexSim LAN License Server
FlexSim LAN License Server Installation Instructions Rev. 20150318 Table of Contents Introduction... 2 Using lmtools... 2 1. Download the installation files... 3 2. Install the license server... 4 3. Connecting
More informationCarroll Hospital Center
Carroll Hospital Center Citrix Remote Access What is Citrix? Citrix is a technology that allows you to securely access a published application remotely from any device. Carroll Hospital Center uses this
More informationUser's Guide. Copyright 2013 Bitdefender
User's Guide Copyright 2013 Bitdefender Bitdefender Total Security User's Guide Publication date 08/12/2013 Copyright 2013 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced
More informationSMART Vantage. Installation guide
SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the
More informationCUNY TUMBLEWEED (SECURE TRANSPORT) USER GUIDE
CUNY TUMBLEWEED (SECURE TRANSPORT) USER GUIDE INTRODUCTION Tumbleweed (Secure Transport) is used to provide secure file transfer of critical business files, financial transactions and sensitive data such
More informationTIMETABLE ADMINISTRATOR S MANUAL
2015 TIMETABLE ADMINISTRATOR S MANUAL Software Version 5.0 BY GEOFFPARTRIDGE.NET TABLE OF CONTENTS TOPIC PAGE 1) INTRODUCTION 1 2) TIMETABLE SPECIFICATIONS 1 3) SOFTWARE REQUIRED 1 a. Intranet Server (XAMPP
More informationFrequently Asked Questions Cabinet WEB 9.0
Frequently Asked Questions Cabinet WEB 9.0 Quick Start Guide December 2013 Page 1 Frequently Asked Questions None of my documents will download. When I try to view document a popup is displayed briefly
More information