Internet Security Software

Size: px
Start display at page:

Download "Internet Security Software"

Transcription

1 Internet Security Software Adding Exceptions for RailMaster and TrackMaster (Revision November 2014) Copyright by Invicto Systems Limited. All rights reserved.

2

3 Preface It is a sad fact today that there are many criminal gangs, unscrupulous organisations and individuals who take pleasure in destroying data on other peoples computers, stealing data and holding users to ransom through data extortion. More and more sophisticated methods are being used by criminals around the world to achieve these goals and anybody who connects to the Internet, opens s or reads USB memory sticks can introduce a virus or malware onto their computers. Genuine websites can be hacked by criminals so that any visitor will automatically and silently download their malicious programs. To counter these threats, software companies are producing ever more sophisticated and aggressive Internet security package s which encompass antivirus and firewall protection. Antivirus (also known as anti-malware) software protects your computer from downloading malicious programs in the first place and if downloaded should be able to remove them from your system, however, antivirus software is only ever 95% effective even immediately after updating their virus definitions. The simple reason is that the creators of antivirus software must work on a cure for new viruses all the time and there are millions of them. Firewall software is designed to prevent active communications intrusion to your computer by criminals in a remote location. It also stops programs running on your computer from communicating with the outside world. There are two principal side-effects of using Internet security software. A) at some point you will get a false positive, where the antivirus program believes it has found a virus or malware signature within a file, when in reality the file is safe. B) some firewall software blocks programs without notification so you can spend a great deal of time finding out why your program does not work properly, only to discover that you need to add it as an exception to your firewall. This can happen with RailMaster or TrackMaster. On occasion, RailMaster and Hornby TrackMaster can be blocked by some Internet security software without warning and then it can be difficult to add the

4 program as an exception. This guide aims to show you how to add both RailMaster and TrackMaster as full exceptions to the Firewall element of the most popular Internet security software. A Note About Routers On very rare occasions a router can block RailMaster or TrackMaster s activation process. Generally, all routers allow these programs to access our secure activation servers, however around 1 in 5,000 times it is the router that blocks the activation process rather than the installed Inte rnet security software on the computer. In these circumstances the router must have been specifically told to block additional Internet protocols and in this case you will need to reset your router to its default settings or unblock all protocols that were blocked. All routers, when they come from the factory, do not block the secure protocols used by RailMaster and TrackMaster to perform activations, deactivations, automatic updates and allow Help Requests. It is important that you read ensure the following:- 1. You have correctly added RailMaster/TrackMaster as a full exception to the Windows firewall if it is running 2. You have correctly added RailMaster/TrackMaster as a full exception your antivirus software (and its built-in firewall) 3. You have set RailMaster/TrackMaster to run with administrator rights 4. You have set the read-only status and permissions of your RailMaster/TrackMaster program folder.

5 CONTENTS Adding exceptions to the Windows Firewall 7 McAfee Internet Security 11 Norton Internet Security 15 Avast! Free Antivirus 19 AVG Internet Security 25 Avira Internet Security Suite 31 Kaspersky Internet Security 35 HandHeld app and RailMaster 39 Read-Only status of RailMaster Folder 40 Setting permissions on the RailMaster Folder 41

6

7 Windows Firewall: Adding Exceptions When you install most third-party Internet security software they will turn off Windows own Firewall. Rarely, the Windows Firewal l may be left on so that two firewalls are running on your computer. It is unwise to have two Firewall programs running at the same time on the same computer, so one of them should be turned off. The third party Internet security software creators suggest that the Windows Firewall is turned off in favour of their own installed offerings. If your Windows Firewall is active, possibly because you are also using the default Windows Defender antivirus program, then when you run RailMaster or TrackMaster you will be invited to allow or block the program in the Firewall. You should always allow the software through your Firewall on both private and public networks. You can check the Windows firewall at any time. Adding an exception, i.e. a program which is not to be blocked, to the Windows Firewall, is relatively straightforward. The first thing you need to do is to get to the Windows Control panel. This is done in different ways depending on which version of Windows you have. Once in the control panel you will see an entry called Windows Firewall. Double click this and you will see the Firewall screen:- Page 7

8 If the Windows Firewall is indeed running you will see two green shields. If not then the shields will be red. This is usually an indication that another Firewall package is running on your computer. On some earlier versions of Windows the firewall screen will have a tabbed interface and you will need to click on Exceptions, otherwise click on Allow an app or feature through Windows Firewall. You will then see a window similar to the following:- Click on Edit settings and you will be able to add a program to the Firewall using the Allow another app.. button. You should first scroll down the list to see whether RailMaster or TrackMaster are already listed as you may only need to ensure that both the Private and Public boxes are both checked. If RailMaster or TrackMaster is not listed you can add it by clicking on the Allow another app.. button. The name of this button may be different on some earlier versions of Windows. A list of installed programs will then appear similar to that shown.

9 Simply scroll down the list to locate either RailMaster or TrackMaster and add them by clicking the Add button. This will now revise the earlier list to include the program(s) you added. You should ensure that both the Public and Private boxes have been checked. If you follow these instructions carefully the Windows Firewall will allow the program you have added through, which will mean you can activate and deactivate (RailMaster only), order upgrades, use the Help Request system (RailMaster only) and benefit from automatic program updates. You will need to repeat the process above for each program you wish to add to the Windows Firewall. Page 9

10

11 McAfee Internet Security McAfee s Internet security software is one of the most popular in the world and also among the most aggressive at blocking programs. The McAfee Internet security software tends to block programs without notifying the computer user. Then, it is not very intuitive to add a program exception to McAfee s Firewall, so this guide should hopefully make things clearer. Start by locating the McAfee icon in the system tray of your computer (bottom righthand corner of the Windows main screen). You may need to press a small left or uppointing chevron or arrow to show a pop-up menu containing additional system tray icons. Click (or double click depending on which version of Windows you have) to open a window on which you will see the following area called Web and Protection. Within this panel is a link View firewall and anti-spam settings. You should click on this link to see a window with an entry entitled Firewall: On, similar to the following:- Click on Firewall to see a window showing the current Firewall status, On or Off and also additional options to configure the McAfee Firewall. Page 11

12 You will need to click on the entry Internet Connections for Programs and you will see another windows with an area similar to the following, listing all programs currently listed in the McAfee Firewall. Click on Add to add a program to the Firewall and you will be able to browse to the folder containing the program you wish to add. In this case we want to add RailMaster to the McAfee Firewall so we navigate to the C:\Program Files (x86)\railmaster folder. On Windows 32-bit systems the folder is C:\Program Files\RailMaster. You then need to highlight the program RailMaster.exe (the extension exe may not be shown on some versions of Windows) and click Open

13 Once you have added the chosen program to the McAfee Firewall you will see a window which allows you to tell the McAfee Firewall how to deal with the program. Ensure you select Full from the Access pull-down list and also set Net Guard to Off and click Save. You will then see the entry on the previous list. Page 13

14 In the above example we have added both RailMaster and TrackMaster. When browsing to the program you wish to add, if it is TrackMaster then you will need to navigate to the C:\Program Files (x96)\trackmaster folder and add the program Trakplan.exe. The folder is C:\Program Files\TrackMaster on 32-bit Windows systems. Special note to McAfee users: We have found McAfee to be by far the most aggressive and also troublesome antivirus product on the market. On rare occasions, even when you have followed the above procedure s, McAfee will still block RailMaster or TrackMaster. In the event that you still cannot send a Help Request or order the Pro-Pack upgrade or activate the program and you have also set the permissions and read-only status on the program folder (see later in this guide) then you should uninstall McAfee completely, then do what you need to do on RailMaster or TrackMaster and then you can reinstall McAfee if you want to. Remember that Windows has its own firewall which will be turned back on and its own antivirus software (on most versions).

15 Norton Internet Security Norton is another popular Internet Security package, which also has the tendency to block programs without letting you know and then, like McAfee, not making it very easy to add exceptions to the Firewall. Start by locating the Norton icon in the system tray of your computer (bottom right-hand corner of the Windows main screen). You may need to press a small left or up-pointing chevron or arrow to show a pop-up menu containing additional system tray icons. Click (or double click depending on which version of Windows you have) to open a window similar to the following:- From this window click on Settings at the top and you will be taken into the Norton Settings window. Page 15

16 From this window click on the link Configure [+] to the right of Program Rules on the right of the window. This will take you into a list of all programs currently being dealt with by the Norton Firewall. You can add RailMaster or TrackMaster by clicking on the Add button, which will invite you to browser to the program you want to add.

17 In this case we want to add RailMaster to the Norton Firewall so we navigate to the C:\Program Files (x86)\railmaster folder. On Windows 32-bit systems the folder is C:\Program Files\RailMaster. You then need to highlight the program RailMaster.exe (the extension exe may not be shown on some versions of Windows) and click Open. Page 17

18 This will show you a window where you can tell Norton s Firewall how to deal with the program. You should ensure Allow always is selected then click OK. This will now list RailMaster or TrackMaster in the Firewall entries. When browsing to the program you wish to add, if it is Hornby TrackMaster then you will need to navigate to the C:\Program Files (x96)\trackmaster folder and add the program Trakplan.exe. The folder is C:\Program Files\TrackMaster on 32-bit Windows systems.

19 Avast! Free Antivirus Avast! is a popular free antivirus program, with the option to upgrade to a more powerful fee-paid version. Start by locating the Avast! icon in the system tray of your computer (bottom right-hand corner of the Windows main screen). You may need to press a small left or up-pointing chevron or arrow to show a pop-up menu containing additional system tray icons. Click (or double click depending on which version of Windows you have) to open a window similar to the following:- Within this window you need to click on Tools on the left hand side and you will be shown a sub-menu which slides out to the right. From within that submenu click on Firewall and you will be taken to the Firewall window. Page 19

20 Avast! works slightly differently to other Firewall packages in that, rather than simply adding a program to allow through the Firewall, you need to set up a group first. To do this click on the link Application Rules at the bottom of the window. This will take you to the window where you can add groups.

21 Click on the button New Group and type a name into the new box which appears, for example Trains. When you have entered the new group name click on the Button New Application Rule and a small pop-up menu will appear listing all groups. Page 21

22 Click on the name of the new group you just entered and you will be invited to browse to the location where RailMaster or TrackMaster is. In this case we want to add RailMaster to the Firewall so we navigate to the C:\Program Files (x86)\railmaster folder. On Windows 32-bit systems the folder is C:\Program Files\RailMaster. You then need to highlight the program RailMaster.exe (the extension exe may not be shown on some versions of Windows) and click Open and the program will be added to the Firewall with the default setting Internet out (otherwise autodecide).

23 full access through the Avast! Firewall. You should use your mouse pointer to click on the last orange bar, which will set the option to All connections, allowing RailMaster or TrackMaster You can then click on the Close button to save the settings. When browsing to the program you wish to add, if it is TrackMaster then you will need to navigate to the C:\Program Files (x96)\trackmaster folder and add the program Trakplan.exe. The folder is C:\Program Files\TrackMaster on 32-bit Windows systems. Page 23

24

25 AVG Internet Security AVG is another popular free program with the ability to upgrade to a more powerful paid-for version. Start by locating the AVG icon in the system tray of your computer (bottom right-hand corner of the Windows main screen). You may need to press a small left or up-pointing chevron or arrow to show a pop-up menu containing additional system tray icons. Click (or double click depending on which version of Windows you have) to open a window similar to the following:- From this window it is a simple case of clicking on the Firewall option to be taken into Firewall options. Page 25

26 Within the Firewall options window, click on the Settings button at the bottom and you will be taken into the Firewall settings window from where you can add applications to allow through the Firewall. Click on Applications on the left hand side and you will see a list of all programs currently being controlled by the AVG Firewall.

27 Press on the Add button to add RailMaster or TrackMaster as an exception. You will be presented with a small pop-up window asking you for details of the program you want to add to AVG s Firewall. The simplest way to do this is the click on the button with... Page 27

28 In this case we want to add RailMaster to the AVG Firewall so we navigate to the C:\Program Files (x86)\railmaster folder. On Windows 32-bit systems the folder is C:\Program Files\RailMaster. You then need to highlight the program RailMaster.exe (the extension exe may not be shown on some versions of Windows) and click Open and the program will be entered into the previous window. in the Firewall programs list. If you click on the Create button you will then see a window similar to the one on the left, where you can ensure that the Application Action is set to Allow. When finished press the OK button and the program will now be listed In the above example we have added both RailMaster and TrackMaster to the Firewall. When browsing to the program you wish to add, if it is TrackMaster then you will need to navigate to the C:\Program Files (x96)\trackmaster folder and add the program Trakplan.exe.

29 The folder is C:\Program Files\TrackMaster on 32-bit Windows systems. Page 29

30

31 Avira Internet Security Start by locating the Avira icon in the system tray of your computer (bottom right-hand corner of the Windows main screen). You may need to press a small left or up-pointing chevron or arrow to show a pop-up menu containing additional system tray icons. Click (or double click depending on which version of Windows you have) to open a window similar to the following:- From the above opening Avira Screen click on Firewall on the left panel and a window similar to the following will appear:- Page 31

32 If you then click on Application Rules you will see a list of programs currently being controlled by the Avira Firewall. Click on Add application to add either RailMaster or TrackMaster to the list of allowed applicati ons. You will see a list of available applications and you will need to click Add again to add the desired program. In this case we want to add RailMaster to the Firewall so we navigate to the C:\Program Files (x86)\railmaster folder. On Windows 32-bit systems the folder is C:\Program Files\RailMaster.

33 You then need to highlight the program RailMaster.exe (the extension exe may not be shown on some versions of Windows) and click Open and the program will be added to the Firewall. The screen shows both RailMaster and TrackMaster added to the Avira Firewall. Page 33

34 Click OK to finish. When browsing to the program you wish to add, if it is TrackMaster then you will need to navigate to the C:\Program Files (x96)\trackmaster folder and add the program Trakplan.exe. The folder is C:\Program Files\TrackMaster on 32-bit Windows systems.

35 Kaspersky Internet Security Start by locating the Kaspersky icon in the system tray of your computer (bottom right-hand corner of the Windows main screen). You may need to press a small left or up-pointing chevron or arrow to show a pop-up menu containing additional system tray icons. window similar to the following:- Click (or double click depending on which version of Windows you have) to open a An important note regarding Kaspersky is that before adding either RailMaster or TrackMaster as a Firewall exception you must first run the program for it to appear in the list of programs to be added. When you have done this click on Settings at the bottom of the window. Page 7

36 On the above window you then need to click on Protection Center on the left hand panel. Scroll down the list of options until you can see the Firewall entry and click on that.

37 In the Firewall Settings window click on Configure application rules and you will see a list of programs currently being controlled by the Kaspersky Firewall. Page 37

38 Scroll down until you see RailMaster or TrackMaster and then right click on the program name. A pop-up menu will appear on which you select Restrictions. Another pop-up menu will then appear. You need to select Trusted. You can repeat this process for both RailMaster and TrackMaster, if you have both programs installed. The summary will show the program(s) you added. You can now close the Kaspersky window.

39 HandHeld App and RailMaster When using the RailMaster HandHeld app on an Apple, Android, Windows CE/Mobile or Palm device there are a few things to note regarding antivirus and Firewall software. Some Firewall software, as well as block ing programs, also block communications ports. When setting up your wireless network for the RailMaster HandHeld app, it is advisable to set a static IP address on both your RailMaster PC and your handheld device. In fact, it is good practice to set static IP addresses on all devices on your network. This makes troubleshooting much easier and in some cases can speed up connections and communications. See the separate RailMaster HandHeld app guide installed with RailMaster. If you experience communications problems between your PC and hand-held device then your Internet Security software could be the cause, blocking the IP address of your device. For example, if your hand-held device has a static IP address of you should add this address to your Firewall software. Not all Firewall software manages IP addresses as well as programs. Also, you may need to specify the port too, for example 30. In its default mode, the RailMaster HandHeld app will use ports 30 to 37 on the IP address and so will your PC. You may need to experiment a little until you have your network set up and Firewalled correctly. Page 39

40 Read-Only Status of RailMaster Folder In some cases the RailMaster program folder can have a read-only status and this can prevent activation, deactivation and order submission. You can check this simply by opening Windows Explorer (My Computer) and navigating to the C:\Program Files (x86)\railmaster folder. On 32-bit Windows systems the folder is C:\Program Files\RailMaster. This assumes you installed RailMaster into its default folder. You should always install into the default RailMaster folder. Right click on the RailMaster folder and select Properties. There may be a security tab to click also, depending on your version of Windows. If the Readonly checkbox is ticked you must un-tick this and save the settings by clicking OK. You may be asked if you want this to affect all files and subfolders. Answer Yes.

41 Read-Only Status of RailMaster Folder In some cases the permissions on the RailMaster folder can prevent Help Requests from being sent, activations and Pro-Pack order submissions. If you are 100% sure that you have checked the Windows firewall and your antivirus software as per earlier in this guide then you should also set the permissions on your RailMaster program folder. This should not apply to Windows XP users. You can check this simply by opening Windows Explorer (My Computer) and navigating to the C:\Program Files (x86)\railmaster folder. On 32-bit Windows systems the folder is C:\Program Files\RailMaster. This assumes you installed RailMaster into its default folder. You should always install into the default RailMaster folder. Right click on the RailMaster Program folder and choose the option Security. On the pop-up window that appears click on the Security or Permissions tab and you will see a window showing the list of users and permissions. Page 41

42 You should click on the Edit button then highlight every group or user liste d on the next pop-up window (see example on previous page), one at a time, and check the box Full control. This will automatically insert a tick into all of the boxes below. When you have finished you can click the OK button. Special note to McAfee users: We have found McAfee to be by far the most aggressive and also troublesome antivirus product on the market. On rare occasions, even when you have followed the above procedures, McAfee will still block RailMaster or TrackMaster. In the event that you still cannot send a Help Request or order the Pro-Pack upgrade or activate the program and you have also set the permissions and read-only status on the program folder then you should uninstall McAfee completely, then do what you need to do on RailMaster or TrackMaster and then you can reinstall McAfee if you want to. Remember that Windows has its own firewall which will be turned back on and its own antivirus software (on most versions).

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

Windows XP with Symantec AntiVirus 10 Corporate Edition

Windows XP with Symantec AntiVirus 10 Corporate Edition NC State University 1 of 7 Windows XP with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows xp with symantec antivirus 10 corporate edition Install SAV10 on Windows XP only

More information

Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition

Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition NC State University 1 of 5 Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows server 2003 x64 with symantec antivirus 10 corporate edition CAUTION:

More information

2. PMP New Computer Installation. & Networking Instructions

2. PMP New Computer Installation. & Networking Instructions ONTARIO CHIROPRACTIC ASSOCIATION PATIENT MANAGEMENT PROGRAM PUTTING EXPERIENCE INTO PRACTICE PMP New Computer Installation & Networking Instructions This document provides installation instructions for

More information

PIGCHAMP MOBILE. PigCHAMP Knowledge Software. Installation Guide for Mobile Units

PIGCHAMP MOBILE. PigCHAMP Knowledge Software. Installation Guide for Mobile Units PIGCHAMP MOBILE PigCHAMP Knowledge Software Installation Guide for Mobile Units Table of Contents: Important Note:... 4 Chapter 1: PC Setup... 5 A. Install PigCHAMP Mobile Manager on Windows XP...5 B.

More information

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

Movie Cube. User s Guide to Wireless Function

Movie Cube. User s Guide to Wireless Function Movie Cube User s Guide to Wireless Function Table of Contents 1. WLAN USB Adapter Connection...3 2. Wireless Setup...4 2.1 Infrastructure (AP)...5 2.2 Peer to Peer (Ad Hoc)...7 2.3 Settings for PC...8

More information

If you are experiencing difficulty joining a session, determine which scenario is applicable to you and follow the recommended guidelines.

If you are experiencing difficulty joining a session, determine which scenario is applicable to you and follow the recommended guidelines. Join Help If you are experiencing difficulty joining a session, determine which scenario is applicable to you and follow the recommended guidelines. I can't join a session. If you're having trouble joining

More information

CLEARONE DOCUMENT 801-000-002 (REVISION 1.0) October, 2008. with Converge Pro Units

CLEARONE DOCUMENT 801-000-002 (REVISION 1.0) October, 2008. with Converge Pro Units APPLICATION NOTES Converge Pro Products CLEARONE DOCUMENT 801-000-002 (REVISION 1.0) October, 2008. Troubleshooting USB Connections with Converge Pro Units Description This document explains how to connect

More information

Installing Remote Desktop Connection

Installing Remote Desktop Connection SETTING UP YOUR REMOTE DESKTOP This section will assist you in setting you Remote Desktop Connection. This will allow you to create an icon for easy access to your virtual desktop. DISCLAIMER: All images

More information

Important Notes for WinConnect Server ES Software Installation:

Important Notes for WinConnect Server ES Software Installation: Important Notes for WinConnect Server ES Software Installation: 1. Only Windows 8/8.1 Enterprise, Windows 8/8.1 Professional (32-bit & 64-bit) or Windows Server 2012 (64-bit) or Windows Server 2012 Foundation

More information

Safe internet for business use: Getting Started Guide

Safe internet for business use: Getting Started Guide Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial

More information

Troubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727)

Troubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727) Troubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727) If you are unable to resolve your issue using the Troubleshooting steps below, please contact Sprint Customer

More information

Virtual Office Remote Installation Guide

Virtual Office Remote Installation Guide Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...

More information

How to set up popular firewalls to work with Web CEO

How to set up popular firewalls to work with Web CEO How to set up popular firewalls to work with Web CEO Contents How to set up popular firewalls to work with Web CEO... 1 Setting up Agnitum Outpost Firewall 2.5... 2 Setting up Black ICE 3... 6 Setting

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

...2. Standard Installation...4. Example Installation Scenarios...5. Network Installation...8. Advanced Settings...10. Product Requirements

...2. Standard Installation...4. Example Installation Scenarios...5. Network Installation...8. Advanced Settings...10. Product Requirements ...2. Standard Installation...4. Example Installation Scenarios...5. Network Installation...8. Advanced Settings...10. Product Requirements ProjectMatrix 1 Standard Installation Install ProjectNotify from

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

BSDI Advanced Fitness & Wellness Software

BSDI Advanced Fitness & Wellness Software BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc INSTRUCTION SHEET FOR MOVING YOUR DATABASE FROM ONE COMPUTER TO ANOTHER This document will outline the steps

More information

Cox Business Premium Security Service FAQs

Cox Business Premium Security Service FAQs FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed

More information

Malware Protection White Paper

Malware Protection White Paper Malware Protection White Paper Rohde & Schwarz recognizes the potential risk of computer virus infection when connecting Windows -based test instrumentation to other computers via local area networks (LANs),

More information

Oracle Beehive. Using Windows Mobile Device Release 2 (2.0.1.7)

Oracle Beehive. Using Windows Mobile Device Release 2 (2.0.1.7) Oracle Beehive Using Windows Mobile Device Release 2 (2.0.1.7) E28326-01 July 2012 Document updated July, 2012 This document describes how to access Oracle Beehive from your Windows Mobile device using

More information

Table of Contents. Rebit 5 Help

Table of Contents. Rebit 5 Help Rebit 5 Help i Rebit 5 Help Table of Contents Getting Started... 1 Making the First Recovery Point... 1 Don't Forget to Create a Recovery Media... 1 Changing Backup Settings... 1 What Does Rebit 5 Do?...

More information

How to Install Windows 7 software

How to Install Windows 7 software Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly

More information

HP MediaSmart Server Software Upgrade from v.1 to v.3

HP MediaSmart Server Software Upgrade from v.1 to v.3 HP MediaSmart Server Software Upgrade from v.1 to v.3 Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New... 3 Features That Will Change... 4 Prepare

More information

All Rights Reserved. Copyright 2006

All Rights Reserved. Copyright 2006 All Rights Reserved Copyright 2006 The use, disclosure, modification, transfer, or transmittal of this work for any purpose, in any form, or by any means, without the written permission of the copyright

More information

What is OneDrive for Business at University of Greenwich? Accessing OneDrive from Office 365

What is OneDrive for Business at University of Greenwich? Accessing OneDrive from Office 365 This guide explains how to access and use the OneDrive for Business cloud based storage system and Microsoft Office Online suite of products via a web browser. What is OneDrive for Business at University

More information

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29 Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you

More information

Kaspersky Endpoint Security 8 for Smartphone for Android OS

Kaspersky Endpoint Security 8 for Smartphone for Android OS Kaspersky Endpoint Security 8 for Smartphone for Android OS User Guide PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and

More information

Follow the instructions below for first-time users only

Follow the instructions below for first-time users only Whittier Law School Law Library Cisco NAC Agent Wireless Installation Guide For Microsoft Windows In order to access the wireless network on campus, Microsoft Windows laptop users must go through the Cisco

More information

Guide to Installing BBL Crystal MIND on Windows 7

Guide to Installing BBL Crystal MIND on Windows 7 Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP

More information

Hosting Strat games on Game Lobby may require Port Forwarding

Hosting Strat games on Game Lobby may require Port Forwarding Hosting Strat games on Game Lobby may require Port Forwarding By Jack Mitchell Game Lobby is a valuable feature of Strat-O-Matic Computer Baseball that allows head-to-head play by gamers whose computers

More information

First of all Let's look at how you would connect your laptop via Ethernet, as it is the easier of the two methods.

First of all Let's look at how you would connect your laptop via Ethernet, as it is the easier of the two methods. How to get a Internet Connection on your laptop This guide will help you to get an internet connection on your laptop either via Wi-Fi (e.g. in a café or hotel) or via Ethernet (the RJ45 type connector

More information

Configuring Your Firewall for Client Access in Professional Edition

Configuring Your Firewall for Client Access in Professional Edition Configuring Your Firewall for Client Access in Professional Edition In a network environment, in order for the clients to communicate with the server, you will need to configure your firewall to allow

More information

HP MediaSmart Server Software Upgrade from v.2 to v.3

HP MediaSmart Server Software Upgrade from v.2 to v.3 HP MediaSmart Server Software Upgrade from v.2 to v.3 Table of Contents Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New 3 Features That Will

More information

How to Configure Windows Firewall on a Single Computer

How to Configure Windows Firewall on a Single Computer Security How to Configure Windows Firewall on a Single Computer Introduction Windows Firewall is a new feature of Microsoft Windows XP Service Pack 2 (SP2) that is turned on by default. It monitors and

More information

The Discovery Series

The Discovery Series The Discovery Series Multi-User License Installation This document provides information needed to install and to operate The Discovery Series multi-user licensing capability. This document is for individuals

More information

STATIC IP SET UP GUIDE VERIZON 7500 WIRELESS ROUTER/MODEM

STATIC IP SET UP GUIDE VERIZON 7500 WIRELESS ROUTER/MODEM STATIC IP SET UP GUIDE VERIZON 7500 WIRELESS ROUTER/MODEM Verizon High Speed Internet for Business Verizon High Speed Internet for Business SETTING UP YOUR NEW STATIC IP CONNECTION AND IP ADDRESS(ES) This

More information

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender Security Practices Essentials Viruses McAfee Virus Software Critical Windows Updates Network Settings Spyware Adaware Spybot Windows Defender Security Practices Essentials: All computer passwords should

More information

How can I ensure that I have the correct version of the McAfee epo client with VirusScan & AntiSpyware?

How can I ensure that I have the correct version of the McAfee epo client with VirusScan & AntiSpyware? C&C s effectiveness when responding to virus activity can only be improved with the continued cooperation of our clients. Clients are therefore strongly cautioned against opening email attachments from

More information

Apple Mac VPN Service Setting up Remote Desktop

Apple Mac VPN Service Setting up Remote Desktop Apple Mac VPN Service Setting up Remote Desktop After you have successfully connected via the VPN client to the University network you will then need to make the connection to your machine. To do this

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

Using XP Service Pack 2 with Cameleon

Using XP Service Pack 2 with Cameleon 1.1 What do I need to know about installing XP Service Pack 2 (XPSP2)? The Microsoft website has information about the service pack. Go to http://www.microsoft.com/windowsxp/sp2/default.mspx for more information

More information

Important Notes for WinConnect Server VS Software Installation:

Important Notes for WinConnect Server VS Software Installation: Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),

More information

Docufide Client Installation Guide for Windows

Docufide Client Installation Guide for Windows Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is

More information

Tournament Pairing Program Installation Instructions for Windows 7

Tournament Pairing Program Installation Instructions for Windows 7 Tournament Pairing Program Installation Instructions for Windows 7 Please refer to the installation instructions and follow the steps outlined. It is important that all instructions be followed in the

More information

Installing FileMaker Pro 11 in Windows

Installing FileMaker Pro 11 in Windows Installing FileMaker Pro 11 in Windows Before you begin the installation process, please exit other open programs and save your work. Installation notes Before you install FileMaker Pro, review the following

More information

Configuring NXT Hardware with Mercury Inside into Doors.NET TM Application Note

Configuring NXT Hardware with Mercury Inside into Doors.NET TM Application Note 1.0 Installing the Mercury SCP Gateway The MSC/SCP gateway must be installed to interface with Mercury hardware. This gateway must be chosen during the installation of the software, or it can be added

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

Paramount Unified School District Technology and Ed Services Departments Computer In-service

Paramount Unified School District Technology and Ed Services Departments Computer In-service 4 Paramount Unified School District Technology and Ed Services Departments Computer In-service Distribute notebooks / Test logins Login information Login contexts (see Page 2) Logging in at other sites

More information

extranet.airproducts.com Windows XP Client Configuration

extranet.airproducts.com Windows XP Client Configuration extranet.airproducts.com Windows XP Client Configuration To successfully connect to the Air Products extranet.airproducts.com website and have full functionality, the client computer needs to have the

More information

User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1

User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 User's Manual Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 VirusBarrier Server 2 and VirusBarrier Mail Gateway 2 for Macintosh 2008 Intego. All Rights Reserved Intego

More information

TECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer

TECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer i-stat TECHNICAL BULLETIN Configuring Wireless Settings in an i-stat 1 Wireless Analyzer Before configuring wireless settings, please enable the wireless functionality by referring to the Technical Bulletin

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

Citrix Remote Access Portal U s e r M a n u a l

Citrix Remote Access Portal U s e r M a n u a l Citrix Remote Access Portal U s e r M a n u a l 1 P a g e Table of Contents Table of Contents... 2 Introduction... 3 1. What is Citrix and how does it work?... 4 2. PC Setup/Internet Explorer - Connecting

More information

vpn.airproducts.com Windows XP Client Configuration

vpn.airproducts.com Windows XP Client Configuration vpn.airproducts.com Windows XP Client Configuration To successfully connect to the Air Products vpn.airproducts.com website and have full functionality, the client computer needs to have the following

More information

LEARNING RESOURCE CENTRE. Guide to Microsoft Office Online and One Drive

LEARNING RESOURCE CENTRE. Guide to Microsoft Office Online and One Drive LEARNING RESOURCE CENTRE Guide to Microsoft Office Online and One Drive LEARNING RESOURCE CENTRE JULY 2015 Table of Contents Microsoft Office Online... 3 How to create folders... 6 How to change the document

More information

Trusteer Rapport. User Guide. Version 3.5.1307 April 2014

Trusteer Rapport. User Guide. Version 3.5.1307 April 2014 Trusteer Rapport User Guide Version 3.5.1307 April 2014 Contents About this Guide 1 Need More Information about Trusteer Rapport? 1 Sending us Feedback 1 1. What is Trusteer Rapport? 3 Antivirus: A False

More information

MyNetFone Virtual Fax. Virtual Fax Installation

MyNetFone Virtual Fax. Virtual Fax Installation Table of Contents MyNetFone Virtual Fax MyNetFone Virtual Fax Installation... 1 Changing the SIP endpoint details for the fax driver... 11 Uninstalling Virtual Fax... 13 Virtual Fax Installation Follow

More information

Citrix Client Install Instructions

Citrix Client Install Instructions Citrix Client Install Instructions If you are using Citrix remotely, Information Technology Services recommends updating Citrix client to the newest version available online. You must be an administrator

More information

Immotec Systems, Inc. SQL Server 2005 Installation Document

Immotec Systems, Inc. SQL Server 2005 Installation Document SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

1. CONFIGURING REMOTE ACCESS TO SQL SERVER EXPRESS

1. CONFIGURING REMOTE ACCESS TO SQL SERVER EXPRESS 1. CONFIGURING REMOTE ACCESS TO SQL SERVER EXPRESS From the Start menu, point to All Programs, point to Microsoft SQL Server 2005, point to Configuration Tools, and then click SQL Server Configuration

More information

Remote Console Installation & Setup Guide. November 2009

Remote Console Installation & Setup Guide. November 2009 Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission

More information

Network/Floating License Installation Instructions

Network/Floating License Installation Instructions Network/Floating License Installation Instructions Installation steps: On the Windows PC that will act as License Manager (SERVER): 1. Install HASP Run-time environment, SERVER 2. Plug in the red USB hardware

More information

Contents. Will AVG CloudCare remove my existing AVG products before installing

Contents. Will AVG CloudCare remove my existing AVG products before installing FAQ version 3.0 Contents AVG CloudCare Installation 6 How do I deploy AVG CloudCare to devices? AVG Antivirus 8 What firewall settings are available within the AntiVirus service? How do I add specific

More information

Hot Spot (Unsecured) Wireless Access Initial Setup and Login for MCC_HOTSPOT

Hot Spot (Unsecured) Wireless Access Initial Setup and Login for MCC_HOTSPOT CLIENT INSTRUCTIONS PRIMARY KNOWLEDGE AREA Hot Spot (Unsecured) Wireless Access Initial Setup and Login for MCC_HOTSPOT Wireless Purpose: Wireless Initial Setup sets the parameters and options associated

More information

EBOX Digital Content Management System (CMS) User Guide For Site Owners & Administrators

EBOX Digital Content Management System (CMS) User Guide For Site Owners & Administrators EBOX Digital Content Management System (CMS) User Guide For Site Owners & Administrators Version 1.0 Last Updated on 15 th October 2011 Table of Contents Introduction... 3 File Manager... 5 Site Log...

More information

How to Use Windows Firewall With User Account Control (UAC)

How to Use Windows Firewall With User Account Control (UAC) Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Table of Contents. 1. Overview... 3. 1.1 Materials Required. 3 1.2 System Requirements. 3 1.3 User Mode 3. 2. Installation Instructions..

Table of Contents. 1. Overview... 3. 1.1 Materials Required. 3 1.2 System Requirements. 3 1.3 User Mode 3. 2. Installation Instructions.. Table of Contents 1. Overview..... 3 1.1 Materials Required. 3 1.2 System Requirements. 3 1.3 User Mode 3 2. Installation Instructions.. 4 2.1 Installing the On Call Diabetes Management Software. 4 2.2

More information

Setting up and creating a Local Area Network (LAN) within Windows XP by Buzzons

Setting up and creating a Local Area Network (LAN) within Windows XP by Buzzons Setting up and creating a Local Area Network (LAN) within Windows XP by Buzzons Step 1) Open the start menu, navigate to control panel, and select your network card: Step 2) Click the network card, to

More information

M100 System File Manager Help

M100 System File Manager Help Copyright (c) Vuzix Corporation 2013-2014. All Rights Reserved. M100 System File Manager Help Section I) Installation of the M100 Section II) General Information Section III) Troubleshooting Section IV)

More information

Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition

Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Basic Setup Guide Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading

More information

TM Online Storage: StorageSync

TM Online Storage: StorageSync TM Online Storage: StorageSync 1 Part A: Backup Your Profile 1: How to download and install StorageSync? Where to download StorageSync? You may download StorageSync from your e-storage account. Please

More information

Use this guide if you are no longer able to scan to Sharpdesk. Begin with section 1 (easiest) and complete all sections only if necessary.

Use this guide if you are no longer able to scan to Sharpdesk. Begin with section 1 (easiest) and complete all sections only if necessary. Use this guide if you are no longer able to scan to Sharpdesk Instructions: Begin with section 1 (easiest) and complete all sections only if necessary. 1 Section 1 Complete pages 3-5. Scan to the desired

More information

RAPID BROADBAND INSTALLATION RAPID BROADBAND SUPPORT CONTACT DETAILS. support@rapidbroadband.ie AND TROUBLESHOOTING GUIDE. Email: Tel: 076 6708787

RAPID BROADBAND INSTALLATION RAPID BROADBAND SUPPORT CONTACT DETAILS. support@rapidbroadband.ie AND TROUBLESHOOTING GUIDE. Email: Tel: 076 6708787 RAPID BROADBAND INSTALLATION AND TROUBLESHOOTING GUIDE RAPID BROADBAND SUPPORT CONTACT DETAILS Email: support@rapidbroadband.ie Tel: 076 6708787 January 2008 1 INTERNET CONNECTION TROUBLESHOOTING GUIDE

More information

Single Product Review - Bitdefender Security for Virtualized Environments - November 2012

Single Product Review - Bitdefender Security for Virtualized Environments - November 2012 Single Product Review Bitdefender Security for Virtualized Environments Language: English November 2012 Last Revision: 1 st December 2012 Review commissioned by Bitdefender - 1 - Bitdefender Security for

More information

Microsoft Security Essentials Installation and Configuration Guide

Microsoft Security Essentials Installation and Configuration Guide Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on

More information

Centurion PLUS CPC4 Download Guide

Centurion PLUS CPC4 Download Guide Centurion PLUS CPC4 Download Guide using C4 File Transfer Utility. 1010537 03 01 10 Section 50 1.0 Background: 1.1 The Centurion PLUS Control system consists of a Centurion PLUS Core (CPC4 1) and Color

More information

CODESOFT Installation Scenarios

CODESOFT Installation Scenarios CODESOFT Installation Scenarios NOTES: CODESOFT is a separate install from existing versions of CODESOFT. You will need to make note of your current settings (default directories, etc.) so you can duplicate

More information

Installation Instructions for SAS Enterprise Miner and Text Miner Workstation 12.3 on Windows.

Installation Instructions for SAS Enterprise Miner and Text Miner Workstation 12.3 on Windows. Installation Instructions for SAS Enterprise Miner and Text Miner Workstation 12.3 on Windows. 1. Before you begin installing the SAS software, ensure that there are no antivirus or firewall services running

More information

PREDICTIVE DIALER AND REMOTE AGENT SETUP GUIDE

PREDICTIVE DIALER AND REMOTE AGENT SETUP GUIDE PREDICTIVE DIALER AND REMOTE AGENT SETUP GUIDE RELEASE 7 VOICENT AGENTDIALER TM TABLE OF CONTENT I. Overview II. Install and Setup Server III. Test AgentDialer on the Server IV. Use a better headset V.

More information

QIAsymphony Management Console User Manual

QIAsymphony Management Console User Manual April 2012 QIAsymphony Management Console User Manual For use with software version 4.0 Sample & Assay Technologies Trademarks QIAGEN, QIAsymphony, Rotor-Gene (QIAGEN Group). InstallShield (Informer Technologies,

More information

1 Minimum system requirements

1 Minimum system requirements Metrohm AG CH-9101 Herisau Switzerland Phone +41 71 353 85 85 Fax +41 71 353 89 01 info@metrohm.com www.metrohm.com Installation MagIC Net 2.x 1 Minimum system requirements Operating system RAM Memory

More information

Email client configuration guide. Business Email

Email client configuration guide. Business Email Email client configuration guide Business Email August 2013 Contents 1. Mac Email Clients 1.1 Downloading Microsoft Outlook (Professional Plan Users) 1.2 Configuring Microsoft Outlook (Full Exchange Server

More information

Secondly, if your device is running a Microsoft Windows or Macintosh OS X operating system you will also need to:

Secondly, if your device is running a Microsoft Windows or Macintosh OS X operating system you will also need to: What is Safe Connect and why is it being used? Safe Connect is part of TAMUK's effort to help keep computers on its network as free as possible from viruses, spyware, and operating system security holes.

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Computing Guide. How to set up McAfee virus scanning software and become computer virus savvy

Computing Guide. How to set up McAfee virus scanning software and become computer virus savvy Computing Guide THE LIBRARY www.salford.ac.uk/library How to set up McAfee virus scanning software and become computer virus savvy A virus infection of your workstation can seriously disrupt your learning,

More information

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL Version 2.0 Updated: March 2011 Contents 1. Mac Email Clients... 3 1.1 Configuring Microsoft Outlook 2011... 3 1.2 Configuring Entourage 2008... 4 1.3.

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

How To Use A Pvpn On A Pc Or Mac Or Ipad (For Pc) With A Password Protected (For Mac) On A Network (For Windows) On Your Computer (For Ipad) On An Ipad Or Ipa

How To Use A Pvpn On A Pc Or Mac Or Ipad (For Pc) With A Password Protected (For Mac) On A Network (For Windows) On Your Computer (For Ipad) On An Ipad Or Ipa VPN User Guide For PC System Requirements Operating System: Windows XP, Windows Vista, or Windows 7. (Windows 8 is not officially supported, but does work for some users.) Internet Browser: Internet Explorer

More information

BioWin Network Installation

BioWin Network Installation BioWin Network Installation Introduction This document outlines the procedures for installing the network version of BioWin. There are three parts to the network version installation: 1. The installation

More information

Dexcom Portrait on the Web User Guide For Use with the Dexcom G4 PLATINUM Continuous Glucose Monitoring System

Dexcom Portrait on the Web User Guide For Use with the Dexcom G4 PLATINUM Continuous Glucose Monitoring System Dexcom Portrait on the Web User Guide For Use with the Dexcom G4 PLATINUM Continuous Glucose Monitoring System LBL 0123491 Rev 10 Table of Contents 1 Introduction to Dexcom Portrait on the Web... 3 1.1

More information

Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access

Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Version 1 Revised 11/29/2007 Table of Contents Java Installation:...4 Browser Configuration:...4 Citrix Client Installation:...8 Attempting

More information

AXIS Camera Station Quick Installation Guide

AXIS Camera Station Quick Installation Guide AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera

More information

What is a NAS drive...?

What is a NAS drive...? What is a NAS drive...? Setting up a NAS drive allows your digital music to be played through the NP30, even if your computer isn t switched on. A NAS (Network Attached Storage) drive is essentially a

More information

Remote Access Using The New York Eye & Ear Infirmary of Mount Sinai Secure Web VPN

Remote Access Using The New York Eye & Ear Infirmary of Mount Sinai Secure Web VPN Remote Access Using The New York Eye & Ear Infirmary of Mount Sinai Secure Web VPN OVERVIEW The New York Eye & Ear Infirmary of Mount Sinai Remote Access (VPN) home page allows remote access to the Infirmary

More information