Internet Security Software
|
|
- Benedict Burns
- 8 years ago
- Views:
Transcription
1 Internet Security Software Adding Exceptions for RailMaster and TrackMaster (Revision November 2014) Copyright by Invicto Systems Limited. All rights reserved.
2
3 Preface It is a sad fact today that there are many criminal gangs, unscrupulous organisations and individuals who take pleasure in destroying data on other peoples computers, stealing data and holding users to ransom through data extortion. More and more sophisticated methods are being used by criminals around the world to achieve these goals and anybody who connects to the Internet, opens s or reads USB memory sticks can introduce a virus or malware onto their computers. Genuine websites can be hacked by criminals so that any visitor will automatically and silently download their malicious programs. To counter these threats, software companies are producing ever more sophisticated and aggressive Internet security package s which encompass antivirus and firewall protection. Antivirus (also known as anti-malware) software protects your computer from downloading malicious programs in the first place and if downloaded should be able to remove them from your system, however, antivirus software is only ever 95% effective even immediately after updating their virus definitions. The simple reason is that the creators of antivirus software must work on a cure for new viruses all the time and there are millions of them. Firewall software is designed to prevent active communications intrusion to your computer by criminals in a remote location. It also stops programs running on your computer from communicating with the outside world. There are two principal side-effects of using Internet security software. A) at some point you will get a false positive, where the antivirus program believes it has found a virus or malware signature within a file, when in reality the file is safe. B) some firewall software blocks programs without notification so you can spend a great deal of time finding out why your program does not work properly, only to discover that you need to add it as an exception to your firewall. This can happen with RailMaster or TrackMaster. On occasion, RailMaster and Hornby TrackMaster can be blocked by some Internet security software without warning and then it can be difficult to add the
4 program as an exception. This guide aims to show you how to add both RailMaster and TrackMaster as full exceptions to the Firewall element of the most popular Internet security software. A Note About Routers On very rare occasions a router can block RailMaster or TrackMaster s activation process. Generally, all routers allow these programs to access our secure activation servers, however around 1 in 5,000 times it is the router that blocks the activation process rather than the installed Inte rnet security software on the computer. In these circumstances the router must have been specifically told to block additional Internet protocols and in this case you will need to reset your router to its default settings or unblock all protocols that were blocked. All routers, when they come from the factory, do not block the secure protocols used by RailMaster and TrackMaster to perform activations, deactivations, automatic updates and allow Help Requests. It is important that you read ensure the following:- 1. You have correctly added RailMaster/TrackMaster as a full exception to the Windows firewall if it is running 2. You have correctly added RailMaster/TrackMaster as a full exception your antivirus software (and its built-in firewall) 3. You have set RailMaster/TrackMaster to run with administrator rights 4. You have set the read-only status and permissions of your RailMaster/TrackMaster program folder.
5 CONTENTS Adding exceptions to the Windows Firewall 7 McAfee Internet Security 11 Norton Internet Security 15 Avast! Free Antivirus 19 AVG Internet Security 25 Avira Internet Security Suite 31 Kaspersky Internet Security 35 HandHeld app and RailMaster 39 Read-Only status of RailMaster Folder 40 Setting permissions on the RailMaster Folder 41
6
7 Windows Firewall: Adding Exceptions When you install most third-party Internet security software they will turn off Windows own Firewall. Rarely, the Windows Firewal l may be left on so that two firewalls are running on your computer. It is unwise to have two Firewall programs running at the same time on the same computer, so one of them should be turned off. The third party Internet security software creators suggest that the Windows Firewall is turned off in favour of their own installed offerings. If your Windows Firewall is active, possibly because you are also using the default Windows Defender antivirus program, then when you run RailMaster or TrackMaster you will be invited to allow or block the program in the Firewall. You should always allow the software through your Firewall on both private and public networks. You can check the Windows firewall at any time. Adding an exception, i.e. a program which is not to be blocked, to the Windows Firewall, is relatively straightforward. The first thing you need to do is to get to the Windows Control panel. This is done in different ways depending on which version of Windows you have. Once in the control panel you will see an entry called Windows Firewall. Double click this and you will see the Firewall screen:- Page 7
8 If the Windows Firewall is indeed running you will see two green shields. If not then the shields will be red. This is usually an indication that another Firewall package is running on your computer. On some earlier versions of Windows the firewall screen will have a tabbed interface and you will need to click on Exceptions, otherwise click on Allow an app or feature through Windows Firewall. You will then see a window similar to the following:- Click on Edit settings and you will be able to add a program to the Firewall using the Allow another app.. button. You should first scroll down the list to see whether RailMaster or TrackMaster are already listed as you may only need to ensure that both the Private and Public boxes are both checked. If RailMaster or TrackMaster is not listed you can add it by clicking on the Allow another app.. button. The name of this button may be different on some earlier versions of Windows. A list of installed programs will then appear similar to that shown.
9 Simply scroll down the list to locate either RailMaster or TrackMaster and add them by clicking the Add button. This will now revise the earlier list to include the program(s) you added. You should ensure that both the Public and Private boxes have been checked. If you follow these instructions carefully the Windows Firewall will allow the program you have added through, which will mean you can activate and deactivate (RailMaster only), order upgrades, use the Help Request system (RailMaster only) and benefit from automatic program updates. You will need to repeat the process above for each program you wish to add to the Windows Firewall. Page 9
10
11 McAfee Internet Security McAfee s Internet security software is one of the most popular in the world and also among the most aggressive at blocking programs. The McAfee Internet security software tends to block programs without notifying the computer user. Then, it is not very intuitive to add a program exception to McAfee s Firewall, so this guide should hopefully make things clearer. Start by locating the McAfee icon in the system tray of your computer (bottom righthand corner of the Windows main screen). You may need to press a small left or uppointing chevron or arrow to show a pop-up menu containing additional system tray icons. Click (or double click depending on which version of Windows you have) to open a window on which you will see the following area called Web and Protection. Within this panel is a link View firewall and anti-spam settings. You should click on this link to see a window with an entry entitled Firewall: On, similar to the following:- Click on Firewall to see a window showing the current Firewall status, On or Off and also additional options to configure the McAfee Firewall. Page 11
12 You will need to click on the entry Internet Connections for Programs and you will see another windows with an area similar to the following, listing all programs currently listed in the McAfee Firewall. Click on Add to add a program to the Firewall and you will be able to browse to the folder containing the program you wish to add. In this case we want to add RailMaster to the McAfee Firewall so we navigate to the C:\Program Files (x86)\railmaster folder. On Windows 32-bit systems the folder is C:\Program Files\RailMaster. You then need to highlight the program RailMaster.exe (the extension exe may not be shown on some versions of Windows) and click Open
13 Once you have added the chosen program to the McAfee Firewall you will see a window which allows you to tell the McAfee Firewall how to deal with the program. Ensure you select Full from the Access pull-down list and also set Net Guard to Off and click Save. You will then see the entry on the previous list. Page 13
14 In the above example we have added both RailMaster and TrackMaster. When browsing to the program you wish to add, if it is TrackMaster then you will need to navigate to the C:\Program Files (x96)\trackmaster folder and add the program Trakplan.exe. The folder is C:\Program Files\TrackMaster on 32-bit Windows systems. Special note to McAfee users: We have found McAfee to be by far the most aggressive and also troublesome antivirus product on the market. On rare occasions, even when you have followed the above procedure s, McAfee will still block RailMaster or TrackMaster. In the event that you still cannot send a Help Request or order the Pro-Pack upgrade or activate the program and you have also set the permissions and read-only status on the program folder (see later in this guide) then you should uninstall McAfee completely, then do what you need to do on RailMaster or TrackMaster and then you can reinstall McAfee if you want to. Remember that Windows has its own firewall which will be turned back on and its own antivirus software (on most versions).
15 Norton Internet Security Norton is another popular Internet Security package, which also has the tendency to block programs without letting you know and then, like McAfee, not making it very easy to add exceptions to the Firewall. Start by locating the Norton icon in the system tray of your computer (bottom right-hand corner of the Windows main screen). You may need to press a small left or up-pointing chevron or arrow to show a pop-up menu containing additional system tray icons. Click (or double click depending on which version of Windows you have) to open a window similar to the following:- From this window click on Settings at the top and you will be taken into the Norton Settings window. Page 15
16 From this window click on the link Configure [+] to the right of Program Rules on the right of the window. This will take you into a list of all programs currently being dealt with by the Norton Firewall. You can add RailMaster or TrackMaster by clicking on the Add button, which will invite you to browser to the program you want to add.
17 In this case we want to add RailMaster to the Norton Firewall so we navigate to the C:\Program Files (x86)\railmaster folder. On Windows 32-bit systems the folder is C:\Program Files\RailMaster. You then need to highlight the program RailMaster.exe (the extension exe may not be shown on some versions of Windows) and click Open. Page 17
18 This will show you a window where you can tell Norton s Firewall how to deal with the program. You should ensure Allow always is selected then click OK. This will now list RailMaster or TrackMaster in the Firewall entries. When browsing to the program you wish to add, if it is Hornby TrackMaster then you will need to navigate to the C:\Program Files (x96)\trackmaster folder and add the program Trakplan.exe. The folder is C:\Program Files\TrackMaster on 32-bit Windows systems.
19 Avast! Free Antivirus Avast! is a popular free antivirus program, with the option to upgrade to a more powerful fee-paid version. Start by locating the Avast! icon in the system tray of your computer (bottom right-hand corner of the Windows main screen). You may need to press a small left or up-pointing chevron or arrow to show a pop-up menu containing additional system tray icons. Click (or double click depending on which version of Windows you have) to open a window similar to the following:- Within this window you need to click on Tools on the left hand side and you will be shown a sub-menu which slides out to the right. From within that submenu click on Firewall and you will be taken to the Firewall window. Page 19
20 Avast! works slightly differently to other Firewall packages in that, rather than simply adding a program to allow through the Firewall, you need to set up a group first. To do this click on the link Application Rules at the bottom of the window. This will take you to the window where you can add groups.
21 Click on the button New Group and type a name into the new box which appears, for example Trains. When you have entered the new group name click on the Button New Application Rule and a small pop-up menu will appear listing all groups. Page 21
22 Click on the name of the new group you just entered and you will be invited to browse to the location where RailMaster or TrackMaster is. In this case we want to add RailMaster to the Firewall so we navigate to the C:\Program Files (x86)\railmaster folder. On Windows 32-bit systems the folder is C:\Program Files\RailMaster. You then need to highlight the program RailMaster.exe (the extension exe may not be shown on some versions of Windows) and click Open and the program will be added to the Firewall with the default setting Internet out (otherwise autodecide).
23 full access through the Avast! Firewall. You should use your mouse pointer to click on the last orange bar, which will set the option to All connections, allowing RailMaster or TrackMaster You can then click on the Close button to save the settings. When browsing to the program you wish to add, if it is TrackMaster then you will need to navigate to the C:\Program Files (x96)\trackmaster folder and add the program Trakplan.exe. The folder is C:\Program Files\TrackMaster on 32-bit Windows systems. Page 23
24
25 AVG Internet Security AVG is another popular free program with the ability to upgrade to a more powerful paid-for version. Start by locating the AVG icon in the system tray of your computer (bottom right-hand corner of the Windows main screen). You may need to press a small left or up-pointing chevron or arrow to show a pop-up menu containing additional system tray icons. Click (or double click depending on which version of Windows you have) to open a window similar to the following:- From this window it is a simple case of clicking on the Firewall option to be taken into Firewall options. Page 25
26 Within the Firewall options window, click on the Settings button at the bottom and you will be taken into the Firewall settings window from where you can add applications to allow through the Firewall. Click on Applications on the left hand side and you will see a list of all programs currently being controlled by the AVG Firewall.
27 Press on the Add button to add RailMaster or TrackMaster as an exception. You will be presented with a small pop-up window asking you for details of the program you want to add to AVG s Firewall. The simplest way to do this is the click on the button with... Page 27
28 In this case we want to add RailMaster to the AVG Firewall so we navigate to the C:\Program Files (x86)\railmaster folder. On Windows 32-bit systems the folder is C:\Program Files\RailMaster. You then need to highlight the program RailMaster.exe (the extension exe may not be shown on some versions of Windows) and click Open and the program will be entered into the previous window. in the Firewall programs list. If you click on the Create button you will then see a window similar to the one on the left, where you can ensure that the Application Action is set to Allow. When finished press the OK button and the program will now be listed In the above example we have added both RailMaster and TrackMaster to the Firewall. When browsing to the program you wish to add, if it is TrackMaster then you will need to navigate to the C:\Program Files (x96)\trackmaster folder and add the program Trakplan.exe.
29 The folder is C:\Program Files\TrackMaster on 32-bit Windows systems. Page 29
30
31 Avira Internet Security Start by locating the Avira icon in the system tray of your computer (bottom right-hand corner of the Windows main screen). You may need to press a small left or up-pointing chevron or arrow to show a pop-up menu containing additional system tray icons. Click (or double click depending on which version of Windows you have) to open a window similar to the following:- From the above opening Avira Screen click on Firewall on the left panel and a window similar to the following will appear:- Page 31
32 If you then click on Application Rules you will see a list of programs currently being controlled by the Avira Firewall. Click on Add application to add either RailMaster or TrackMaster to the list of allowed applicati ons. You will see a list of available applications and you will need to click Add again to add the desired program. In this case we want to add RailMaster to the Firewall so we navigate to the C:\Program Files (x86)\railmaster folder. On Windows 32-bit systems the folder is C:\Program Files\RailMaster.
33 You then need to highlight the program RailMaster.exe (the extension exe may not be shown on some versions of Windows) and click Open and the program will be added to the Firewall. The screen shows both RailMaster and TrackMaster added to the Avira Firewall. Page 33
34 Click OK to finish. When browsing to the program you wish to add, if it is TrackMaster then you will need to navigate to the C:\Program Files (x96)\trackmaster folder and add the program Trakplan.exe. The folder is C:\Program Files\TrackMaster on 32-bit Windows systems.
35 Kaspersky Internet Security Start by locating the Kaspersky icon in the system tray of your computer (bottom right-hand corner of the Windows main screen). You may need to press a small left or up-pointing chevron or arrow to show a pop-up menu containing additional system tray icons. window similar to the following:- Click (or double click depending on which version of Windows you have) to open a An important note regarding Kaspersky is that before adding either RailMaster or TrackMaster as a Firewall exception you must first run the program for it to appear in the list of programs to be added. When you have done this click on Settings at the bottom of the window. Page 7
36 On the above window you then need to click on Protection Center on the left hand panel. Scroll down the list of options until you can see the Firewall entry and click on that.
37 In the Firewall Settings window click on Configure application rules and you will see a list of programs currently being controlled by the Kaspersky Firewall. Page 37
38 Scroll down until you see RailMaster or TrackMaster and then right click on the program name. A pop-up menu will appear on which you select Restrictions. Another pop-up menu will then appear. You need to select Trusted. You can repeat this process for both RailMaster and TrackMaster, if you have both programs installed. The summary will show the program(s) you added. You can now close the Kaspersky window.
39 HandHeld App and RailMaster When using the RailMaster HandHeld app on an Apple, Android, Windows CE/Mobile or Palm device there are a few things to note regarding antivirus and Firewall software. Some Firewall software, as well as block ing programs, also block communications ports. When setting up your wireless network for the RailMaster HandHeld app, it is advisable to set a static IP address on both your RailMaster PC and your handheld device. In fact, it is good practice to set static IP addresses on all devices on your network. This makes troubleshooting much easier and in some cases can speed up connections and communications. See the separate RailMaster HandHeld app guide installed with RailMaster. If you experience communications problems between your PC and hand-held device then your Internet Security software could be the cause, blocking the IP address of your device. For example, if your hand-held device has a static IP address of you should add this address to your Firewall software. Not all Firewall software manages IP addresses as well as programs. Also, you may need to specify the port too, for example 30. In its default mode, the RailMaster HandHeld app will use ports 30 to 37 on the IP address and so will your PC. You may need to experiment a little until you have your network set up and Firewalled correctly. Page 39
40 Read-Only Status of RailMaster Folder In some cases the RailMaster program folder can have a read-only status and this can prevent activation, deactivation and order submission. You can check this simply by opening Windows Explorer (My Computer) and navigating to the C:\Program Files (x86)\railmaster folder. On 32-bit Windows systems the folder is C:\Program Files\RailMaster. This assumes you installed RailMaster into its default folder. You should always install into the default RailMaster folder. Right click on the RailMaster folder and select Properties. There may be a security tab to click also, depending on your version of Windows. If the Readonly checkbox is ticked you must un-tick this and save the settings by clicking OK. You may be asked if you want this to affect all files and subfolders. Answer Yes.
41 Read-Only Status of RailMaster Folder In some cases the permissions on the RailMaster folder can prevent Help Requests from being sent, activations and Pro-Pack order submissions. If you are 100% sure that you have checked the Windows firewall and your antivirus software as per earlier in this guide then you should also set the permissions on your RailMaster program folder. This should not apply to Windows XP users. You can check this simply by opening Windows Explorer (My Computer) and navigating to the C:\Program Files (x86)\railmaster folder. On 32-bit Windows systems the folder is C:\Program Files\RailMaster. This assumes you installed RailMaster into its default folder. You should always install into the default RailMaster folder. Right click on the RailMaster Program folder and choose the option Security. On the pop-up window that appears click on the Security or Permissions tab and you will see a window showing the list of users and permissions. Page 41
42 You should click on the Edit button then highlight every group or user liste d on the next pop-up window (see example on previous page), one at a time, and check the box Full control. This will automatically insert a tick into all of the boxes below. When you have finished you can click the OK button. Special note to McAfee users: We have found McAfee to be by far the most aggressive and also troublesome antivirus product on the market. On rare occasions, even when you have followed the above procedures, McAfee will still block RailMaster or TrackMaster. In the event that you still cannot send a Help Request or order the Pro-Pack upgrade or activate the program and you have also set the permissions and read-only status on the program folder then you should uninstall McAfee completely, then do what you need to do on RailMaster or TrackMaster and then you can reinstall McAfee if you want to. Remember that Windows has its own firewall which will be turned back on and its own antivirus software (on most versions).
Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
More informationWindows XP with Symantec AntiVirus 10 Corporate Edition
NC State University 1 of 7 Windows XP with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows xp with symantec antivirus 10 corporate edition Install SAV10 on Windows XP only
More informationWindows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition
NC State University 1 of 5 Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows server 2003 x64 with symantec antivirus 10 corporate edition CAUTION:
More information2. PMP New Computer Installation. & Networking Instructions
ONTARIO CHIROPRACTIC ASSOCIATION PATIENT MANAGEMENT PROGRAM PUTTING EXPERIENCE INTO PRACTICE PMP New Computer Installation & Networking Instructions This document provides installation instructions for
More informationPIGCHAMP MOBILE. PigCHAMP Knowledge Software. Installation Guide for Mobile Units
PIGCHAMP MOBILE PigCHAMP Knowledge Software Installation Guide for Mobile Units Table of Contents: Important Note:... 4 Chapter 1: PC Setup... 5 A. Install PigCHAMP Mobile Manager on Windows XP...5 B.
More informationavast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide
avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even
More informationSecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
More informationMovie Cube. User s Guide to Wireless Function
Movie Cube User s Guide to Wireless Function Table of Contents 1. WLAN USB Adapter Connection...3 2. Wireless Setup...4 2.1 Infrastructure (AP)...5 2.2 Peer to Peer (Ad Hoc)...7 2.3 Settings for PC...8
More informationIf you are experiencing difficulty joining a session, determine which scenario is applicable to you and follow the recommended guidelines.
Join Help If you are experiencing difficulty joining a session, determine which scenario is applicable to you and follow the recommended guidelines. I can't join a session. If you're having trouble joining
More informationCLEARONE DOCUMENT 801-000-002 (REVISION 1.0) October, 2008. with Converge Pro Units
APPLICATION NOTES Converge Pro Products CLEARONE DOCUMENT 801-000-002 (REVISION 1.0) October, 2008. Troubleshooting USB Connections with Converge Pro Units Description This document explains how to connect
More informationInstalling Remote Desktop Connection
SETTING UP YOUR REMOTE DESKTOP This section will assist you in setting you Remote Desktop Connection. This will allow you to create an icon for easy access to your virtual desktop. DISCLAIMER: All images
More informationImportant Notes for WinConnect Server ES Software Installation:
Important Notes for WinConnect Server ES Software Installation: 1. Only Windows 8/8.1 Enterprise, Windows 8/8.1 Professional (32-bit & 64-bit) or Windows Server 2012 (64-bit) or Windows Server 2012 Foundation
More informationSafe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
More informationTroubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727)
Troubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727) If you are unable to resolve your issue using the Troubleshooting steps below, please contact Sprint Customer
More informationVirtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
More informationHow to set up popular firewalls to work with Web CEO
How to set up popular firewalls to work with Web CEO Contents How to set up popular firewalls to work with Web CEO... 1 Setting up Agnitum Outpost Firewall 2.5... 2 Setting up Black ICE 3... 6 Setting
More informationAirtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
More information...2. Standard Installation...4. Example Installation Scenarios...5. Network Installation...8. Advanced Settings...10. Product Requirements
...2. Standard Installation...4. Example Installation Scenarios...5. Network Installation...8. Advanced Settings...10. Product Requirements ProjectMatrix 1 Standard Installation Install ProjectNotify from
More informationESET Mobile Security Business Edition for Windows Mobile
ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security
More informationBSDI Advanced Fitness & Wellness Software
BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc INSTRUCTION SHEET FOR MOVING YOUR DATABASE FROM ONE COMPUTER TO ANOTHER This document will outline the steps
More informationCox Business Premium Security Service FAQs
FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed
More informationMalware Protection White Paper
Malware Protection White Paper Rohde & Schwarz recognizes the potential risk of computer virus infection when connecting Windows -based test instrumentation to other computers via local area networks (LANs),
More informationOracle Beehive. Using Windows Mobile Device Release 2 (2.0.1.7)
Oracle Beehive Using Windows Mobile Device Release 2 (2.0.1.7) E28326-01 July 2012 Document updated July, 2012 This document describes how to access Oracle Beehive from your Windows Mobile device using
More informationTable of Contents. Rebit 5 Help
Rebit 5 Help i Rebit 5 Help Table of Contents Getting Started... 1 Making the First Recovery Point... 1 Don't Forget to Create a Recovery Media... 1 Changing Backup Settings... 1 What Does Rebit 5 Do?...
More informationHow to Install Windows 7 software
Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly
More informationHP MediaSmart Server Software Upgrade from v.1 to v.3
HP MediaSmart Server Software Upgrade from v.1 to v.3 Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New... 3 Features That Will Change... 4 Prepare
More informationAll Rights Reserved. Copyright 2006
All Rights Reserved Copyright 2006 The use, disclosure, modification, transfer, or transmittal of this work for any purpose, in any form, or by any means, without the written permission of the copyright
More informationWhat is OneDrive for Business at University of Greenwich? Accessing OneDrive from Office 365
This guide explains how to access and use the OneDrive for Business cloud based storage system and Microsoft Office Online suite of products via a web browser. What is OneDrive for Business at University
More informationContents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29
Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your
More informationSophos Endpoint Security and Control standalone startup guide
Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you
More informationKaspersky Endpoint Security 8 for Smartphone for Android OS
Kaspersky Endpoint Security 8 for Smartphone for Android OS User Guide PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and
More informationFollow the instructions below for first-time users only
Whittier Law School Law Library Cisco NAC Agent Wireless Installation Guide For Microsoft Windows In order to access the wireless network on campus, Microsoft Windows laptop users must go through the Cisco
More informationGuide to Installing BBL Crystal MIND on Windows 7
Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP
More informationHosting Strat games on Game Lobby may require Port Forwarding
Hosting Strat games on Game Lobby may require Port Forwarding By Jack Mitchell Game Lobby is a valuable feature of Strat-O-Matic Computer Baseball that allows head-to-head play by gamers whose computers
More informationFirst of all Let's look at how you would connect your laptop via Ethernet, as it is the easier of the two methods.
How to get a Internet Connection on your laptop This guide will help you to get an internet connection on your laptop either via Wi-Fi (e.g. in a café or hotel) or via Ethernet (the RJ45 type connector
More informationConfiguring Your Firewall for Client Access in Professional Edition
Configuring Your Firewall for Client Access in Professional Edition In a network environment, in order for the clients to communicate with the server, you will need to configure your firewall to allow
More informationHP MediaSmart Server Software Upgrade from v.2 to v.3
HP MediaSmart Server Software Upgrade from v.2 to v.3 Table of Contents Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New 3 Features That Will
More informationHow to Configure Windows Firewall on a Single Computer
Security How to Configure Windows Firewall on a Single Computer Introduction Windows Firewall is a new feature of Microsoft Windows XP Service Pack 2 (SP2) that is turned on by default. It monitors and
More informationThe Discovery Series
The Discovery Series Multi-User License Installation This document provides information needed to install and to operate The Discovery Series multi-user licensing capability. This document is for individuals
More informationSTATIC IP SET UP GUIDE VERIZON 7500 WIRELESS ROUTER/MODEM
STATIC IP SET UP GUIDE VERIZON 7500 WIRELESS ROUTER/MODEM Verizon High Speed Internet for Business Verizon High Speed Internet for Business SETTING UP YOUR NEW STATIC IP CONNECTION AND IP ADDRESS(ES) This
More informationSecurity Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender
Security Practices Essentials Viruses McAfee Virus Software Critical Windows Updates Network Settings Spyware Adaware Spybot Windows Defender Security Practices Essentials: All computer passwords should
More informationHow can I ensure that I have the correct version of the McAfee epo client with VirusScan & AntiSpyware?
C&C s effectiveness when responding to virus activity can only be improved with the continued cooperation of our clients. Clients are therefore strongly cautioned against opening email attachments from
More informationApple Mac VPN Service Setting up Remote Desktop
Apple Mac VPN Service Setting up Remote Desktop After you have successfully connected via the VPN client to the University network you will then need to make the connection to your machine. To do this
More informationNet Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
More informationUsing XP Service Pack 2 with Cameleon
1.1 What do I need to know about installing XP Service Pack 2 (XPSP2)? The Microsoft website has information about the service pack. Go to http://www.microsoft.com/windowsxp/sp2/default.mspx for more information
More informationImportant Notes for WinConnect Server VS Software Installation:
Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),
More informationDocufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
More informationTournament Pairing Program Installation Instructions for Windows 7
Tournament Pairing Program Installation Instructions for Windows 7 Please refer to the installation instructions and follow the steps outlined. It is important that all instructions be followed in the
More informationInstalling FileMaker Pro 11 in Windows
Installing FileMaker Pro 11 in Windows Before you begin the installation process, please exit other open programs and save your work. Installation notes Before you install FileMaker Pro, review the following
More informationConfiguring NXT Hardware with Mercury Inside into Doors.NET TM Application Note
1.0 Installing the Mercury SCP Gateway The MSC/SCP gateway must be installed to interface with Mercury hardware. This gateway must be chosen during the installation of the software, or it can be added
More informationNetwork Connect Installation and Usage Guide
Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing
More informationParamount Unified School District Technology and Ed Services Departments Computer In-service
4 Paramount Unified School District Technology and Ed Services Departments Computer In-service Distribute notebooks / Test logins Login information Login contexts (see Page 2) Logging in at other sites
More informationextranet.airproducts.com Windows XP Client Configuration
extranet.airproducts.com Windows XP Client Configuration To successfully connect to the Air Products extranet.airproducts.com website and have full functionality, the client computer needs to have the
More informationUser's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1
User's Manual Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 VirusBarrier Server 2 and VirusBarrier Mail Gateway 2 for Macintosh 2008 Intego. All Rights Reserved Intego
More informationTECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer
i-stat TECHNICAL BULLETIN Configuring Wireless Settings in an i-stat 1 Wireless Analyzer Before configuring wireless settings, please enable the wireless functionality by referring to the Technical Bulletin
More informationHow To Use Senior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
More informationCitrix Remote Access Portal U s e r M a n u a l
Citrix Remote Access Portal U s e r M a n u a l 1 P a g e Table of Contents Table of Contents... 2 Introduction... 3 1. What is Citrix and how does it work?... 4 2. PC Setup/Internet Explorer - Connecting
More informationvpn.airproducts.com Windows XP Client Configuration
vpn.airproducts.com Windows XP Client Configuration To successfully connect to the Air Products vpn.airproducts.com website and have full functionality, the client computer needs to have the following
More informationLEARNING RESOURCE CENTRE. Guide to Microsoft Office Online and One Drive
LEARNING RESOURCE CENTRE Guide to Microsoft Office Online and One Drive LEARNING RESOURCE CENTRE JULY 2015 Table of Contents Microsoft Office Online... 3 How to create folders... 6 How to change the document
More informationTrusteer Rapport. User Guide. Version 3.5.1307 April 2014
Trusteer Rapport User Guide Version 3.5.1307 April 2014 Contents About this Guide 1 Need More Information about Trusteer Rapport? 1 Sending us Feedback 1 1. What is Trusteer Rapport? 3 Antivirus: A False
More informationMyNetFone Virtual Fax. Virtual Fax Installation
Table of Contents MyNetFone Virtual Fax MyNetFone Virtual Fax Installation... 1 Changing the SIP endpoint details for the fax driver... 11 Uninstalling Virtual Fax... 13 Virtual Fax Installation Follow
More informationCitrix Client Install Instructions
Citrix Client Install Instructions If you are using Citrix remotely, Information Technology Services recommends updating Citrix client to the newest version available online. You must be an administrator
More informationImmotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
More informationCreating client-server setup with multiple clients
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
More information1. CONFIGURING REMOTE ACCESS TO SQL SERVER EXPRESS
1. CONFIGURING REMOTE ACCESS TO SQL SERVER EXPRESS From the Start menu, point to All Programs, point to Microsoft SQL Server 2005, point to Configuration Tools, and then click SQL Server Configuration
More informationRemote Console Installation & Setup Guide. November 2009
Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission
More informationNetwork/Floating License Installation Instructions
Network/Floating License Installation Instructions Installation steps: On the Windows PC that will act as License Manager (SERVER): 1. Install HASP Run-time environment, SERVER 2. Plug in the red USB hardware
More informationContents. Will AVG CloudCare remove my existing AVG products before installing
FAQ version 3.0 Contents AVG CloudCare Installation 6 How do I deploy AVG CloudCare to devices? AVG Antivirus 8 What firewall settings are available within the AntiVirus service? How do I add specific
More informationHot Spot (Unsecured) Wireless Access Initial Setup and Login for MCC_HOTSPOT
CLIENT INSTRUCTIONS PRIMARY KNOWLEDGE AREA Hot Spot (Unsecured) Wireless Access Initial Setup and Login for MCC_HOTSPOT Wireless Purpose: Wireless Initial Setup sets the parameters and options associated
More informationEBOX Digital Content Management System (CMS) User Guide For Site Owners & Administrators
EBOX Digital Content Management System (CMS) User Guide For Site Owners & Administrators Version 1.0 Last Updated on 15 th October 2011 Table of Contents Introduction... 3 File Manager... 5 Site Log...
More informationHow to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
More informationLab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
More informationTable of Contents. 1. Overview... 3. 1.1 Materials Required. 3 1.2 System Requirements. 3 1.3 User Mode 3. 2. Installation Instructions..
Table of Contents 1. Overview..... 3 1.1 Materials Required. 3 1.2 System Requirements. 3 1.3 User Mode 3 2. Installation Instructions.. 4 2.1 Installing the On Call Diabetes Management Software. 4 2.2
More informationSetting up and creating a Local Area Network (LAN) within Windows XP by Buzzons
Setting up and creating a Local Area Network (LAN) within Windows XP by Buzzons Step 1) Open the start menu, navigate to control panel, and select your network card: Step 2) Click the network card, to
More informationM100 System File Manager Help
Copyright (c) Vuzix Corporation 2013-2014. All Rights Reserved. M100 System File Manager Help Section I) Installation of the M100 Section II) General Information Section III) Troubleshooting Section IV)
More informationBasic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition
Basic Setup Guide Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading
More informationTM Online Storage: StorageSync
TM Online Storage: StorageSync 1 Part A: Backup Your Profile 1: How to download and install StorageSync? Where to download StorageSync? You may download StorageSync from your e-storage account. Please
More informationUse this guide if you are no longer able to scan to Sharpdesk. Begin with section 1 (easiest) and complete all sections only if necessary.
Use this guide if you are no longer able to scan to Sharpdesk Instructions: Begin with section 1 (easiest) and complete all sections only if necessary. 1 Section 1 Complete pages 3-5. Scan to the desired
More informationRAPID BROADBAND INSTALLATION RAPID BROADBAND SUPPORT CONTACT DETAILS. support@rapidbroadband.ie AND TROUBLESHOOTING GUIDE. Email: Tel: 076 6708787
RAPID BROADBAND INSTALLATION AND TROUBLESHOOTING GUIDE RAPID BROADBAND SUPPORT CONTACT DETAILS Email: support@rapidbroadband.ie Tel: 076 6708787 January 2008 1 INTERNET CONNECTION TROUBLESHOOTING GUIDE
More informationSingle Product Review - Bitdefender Security for Virtualized Environments - November 2012
Single Product Review Bitdefender Security for Virtualized Environments Language: English November 2012 Last Revision: 1 st December 2012 Review commissioned by Bitdefender - 1 - Bitdefender Security for
More informationMicrosoft Security Essentials Installation and Configuration Guide
Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on
More informationCenturion PLUS CPC4 Download Guide
Centurion PLUS CPC4 Download Guide using C4 File Transfer Utility. 1010537 03 01 10 Section 50 1.0 Background: 1.1 The Centurion PLUS Control system consists of a Centurion PLUS Core (CPC4 1) and Color
More informationCODESOFT Installation Scenarios
CODESOFT Installation Scenarios NOTES: CODESOFT is a separate install from existing versions of CODESOFT. You will need to make note of your current settings (default directories, etc.) so you can duplicate
More informationInstallation Instructions for SAS Enterprise Miner and Text Miner Workstation 12.3 on Windows.
Installation Instructions for SAS Enterprise Miner and Text Miner Workstation 12.3 on Windows. 1. Before you begin installing the SAS software, ensure that there are no antivirus or firewall services running
More informationPREDICTIVE DIALER AND REMOTE AGENT SETUP GUIDE
PREDICTIVE DIALER AND REMOTE AGENT SETUP GUIDE RELEASE 7 VOICENT AGENTDIALER TM TABLE OF CONTENT I. Overview II. Install and Setup Server III. Test AgentDialer on the Server IV. Use a better headset V.
More informationQIAsymphony Management Console User Manual
April 2012 QIAsymphony Management Console User Manual For use with software version 4.0 Sample & Assay Technologies Trademarks QIAGEN, QIAsymphony, Rotor-Gene (QIAGEN Group). InstallShield (Informer Technologies,
More information1 Minimum system requirements
Metrohm AG CH-9101 Herisau Switzerland Phone +41 71 353 85 85 Fax +41 71 353 89 01 info@metrohm.com www.metrohm.com Installation MagIC Net 2.x 1 Minimum system requirements Operating system RAM Memory
More informationEmail client configuration guide. Business Email
Email client configuration guide Business Email August 2013 Contents 1. Mac Email Clients 1.1 Downloading Microsoft Outlook (Professional Plan Users) 1.2 Configuring Microsoft Outlook (Full Exchange Server
More informationSecondly, if your device is running a Microsoft Windows or Macintosh OS X operating system you will also need to:
What is Safe Connect and why is it being used? Safe Connect is part of TAMUK's effort to help keep computers on its network as free as possible from viruses, spyware, and operating system security holes.
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationComputing Guide. How to set up McAfee virus scanning software and become computer virus savvy
Computing Guide THE LIBRARY www.salford.ac.uk/library How to set up McAfee virus scanning software and become computer virus savvy A virus infection of your workstation can seriously disrupt your learning,
More informationDESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL
DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL Version 2.0 Updated: March 2011 Contents 1. Mac Email Clients... 3 1.1 Configuring Microsoft Outlook 2011... 3 1.2 Configuring Entourage 2008... 4 1.3.
More informationSpector 360 Deployment Guide. Version 7.3 January 3, 2012
Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server
More informationHow To Use A Pvpn On A Pc Or Mac Or Ipad (For Pc) With A Password Protected (For Mac) On A Network (For Windows) On Your Computer (For Ipad) On An Ipad Or Ipa
VPN User Guide For PC System Requirements Operating System: Windows XP, Windows Vista, or Windows 7. (Windows 8 is not officially supported, but does work for some users.) Internet Browser: Internet Explorer
More informationBioWin Network Installation
BioWin Network Installation Introduction This document outlines the procedures for installing the network version of BioWin. There are three parts to the network version installation: 1. The installation
More informationDexcom Portrait on the Web User Guide For Use with the Dexcom G4 PLATINUM Continuous Glucose Monitoring System
Dexcom Portrait on the Web User Guide For Use with the Dexcom G4 PLATINUM Continuous Glucose Monitoring System LBL 0123491 Rev 10 Table of Contents 1 Introduction to Dexcom Portrait on the Web... 3 1.1
More informationInstallation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access
Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Version 1 Revised 11/29/2007 Table of Contents Java Installation:...4 Browser Configuration:...4 Citrix Client Installation:...8 Attempting
More informationAXIS Camera Station Quick Installation Guide
AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera
More informationWhat is a NAS drive...?
What is a NAS drive...? Setting up a NAS drive allows your digital music to be played through the NP30, even if your computer isn t switched on. A NAS (Network Attached Storage) drive is essentially a
More informationRemote Access Using The New York Eye & Ear Infirmary of Mount Sinai Secure Web VPN
Remote Access Using The New York Eye & Ear Infirmary of Mount Sinai Secure Web VPN OVERVIEW The New York Eye & Ear Infirmary of Mount Sinai Remote Access (VPN) home page allows remote access to the Infirmary
More information