Processes: Check Your PC for Malicious Infections P 24/1. Become a Windows Process Expert: Monitor Your PC For Malicious Software Infection

Size: px
Start display at page:

Download "Processes: Check Your PC for Malicious Infections P 24/1. Become a Windows Process Expert: Monitor Your PC For Malicious Software Infection"

From this document you will learn the answers to the following questions:

  • What is the main component of the Windows system?

  • What does the Windows Task Manager make sure that a new process receives processor time?

  • What is the main operating system that most PC users can use?

Transcription

1 Processes: Check Your PC for Malicious Infections P 24/1 Become a Windows Process Expert: Monitor Your PC For Malicious Software Infection With the information in this article you can: Master malicious or damaged processes and speed up Windows Find out the difference between a program and a process Sort out the good processes from the bad Many PC users do not understand that the programs listed as running on the Windows Taskbar are not all that are currently active. Software does not need an icon in the Notification Area, or to display an interface. Of course, many hidden processes are benign subcomponents of Windows. That said, if Windows seems sluggish, or keeps crashing for no apparent reason, have a good look at the Windows Task Manager. You may find that you have processes running that are not part of Windows or any of the software that you have installed, but are in fact malicious infections. The problem is, with the cryptic names of some of the key Windows components, how can you tell what s good from what s bad? This article will show you what key components you need to keep running and which processes are actually malicious virus infections. Dr Steve North: Have you ever pressed Ctrl + Alt + Delete and wondered what all those processes with strange names are for? This article will name and explain the most common of these processes and how to deal with them when they misbehave. The behind-the-scenes processes that keep your... PC running smoothly... P 24/2 Get to know these 14 Windows background processes... P 24/5 The one Windows XP background task you need to know about... P 24/7 13 default Windows system processes in XP/ P 24/8 The only unique background task in Windows P 24/11 System processes in Windows XP/2000/Me... P 24/11 Common background application processes... P 24/12 Finding common malware programs on your PC... P 24/14 1

2 P 24/2 Your PC can only really do one thing at once. A program that is running becomes a process. Processes share Windows resources. Process names are not easy to understand. There is no Properties option for a Windows process. Processes: Check Your PC for Malicious Infections The Behind-the-scenes Processes that Keep Your PC Running Smoothly Windows has the ability to run many programs at the same time. However, despite its apparent ability to multi-task, your computer can only really perform one activity at a time. Windows switches rapidly between all running programs, creating the illusion that all of your software is running in parallel. When Windows crashes, it becomes stuck on a misbehaving process and refuses to switch back to the remaining tasks. So, what exactly is a process? The terms program or application refer to the executable programming code. When a program or application is executed, it becomes a process. When the user starts a new program in Windows, its process is loaded into Random Access Memory (RAM). Windows Task Manager then adds this new process to its list and makes sure that it receives processor time (CPU), memory (RAM) and other resources. When a process is closed or terminated, all of its resources are reclaimed for distribution amongst the remaining processes. Each process is given an equal share of the CPU s available time. Each chunk of time is called a slice. If a process returns the CPU to Windows control before the end of a time slice, then extra time is available. This is why the CPU usage values for all processes will not always come to 100%. When Windows becomes stuck on a particular process, or a malicious process is intentionally slowing down your PC s performance, you will need to terminate it. Unfortunately, the programmers who name Windows processes seem intent on obscuring their actual function. For example: common process names include: SVCHOST.EXE, LSASS.EXE, CSRSS.EXE, ALG.EXE and SMSS.EXE. Even Windows XP/2000 do not provide a Properties option to find out more about what each process actually does. 2

3 Processes: Check Your PC for Malicious Infections P 24/3 This article provides you with an introductory guide to Windows system processes (those that are packaged with the operating system), benign application processes (those that are created by popular third-party companies, such as Adobe) and malware processes (viruses, spyware etc). Of course, it is impossible to comprehensively list all of the processes available for Windows. Even as this article is being written, programmers somewhere will have created several new ones. The listed system processes will cover most Windows installations. The benign and malware sections are examples of a situation that changes daily. If you encounter a process not listed in this article, search for: <process name> Windows process (without including the quotation marks) using your favourite Internet search engine. To view and terminate processes in Windows XP/2000/Me/98SE: 1. All Windows versions: press Ctrl + Alt + Delete. 2. In Windows XP: click Processes. In Windows 2000: the Windows Security screen will open before Windows Task Manager. Click Task Manger > Processes. In Windows Me/98SE: Windows Task Manager does not have a separate Processes tab. The displayed items are processes, rather than applications, and you are ready to proceed. Note: the opening screen is titled Close Program. 3. All Windows versions: select a process for termination. In Windows XP/2000, there is more information available about CPU usage, etc. which may help to identify a problematic process. In these later versions of Windows, you also click on the column headers to re-sort processes by Image Name (this means process name), User Name, CPU (% of processor used by this task) or Mem Usage (RAM used by this task). Programmers are always developing new processes. View and terminate processes. 3

4 P 24/4 Processes: Check Your PC for Malicious Infections 4. In Windows XP/2000: click End Process. In Windows Me/98SE: click End Task. The Windows Task Manager! Terminating an essential process may cause Windows to crash. Viruses, adware and spyware may hijack a legitimate process name. Please note that terminating the wrong process may crash your PC, requiring you to re-boot (from inside Windows Task Manager, press Ctrl + Alt + Delete for a second time). The good news is that you cannot permanently damage your PC using the Windows Task Manager, or by terminating processes. Malware processes may use the same name as a genuine system or third party process. It is usually possible to confirm the authenticity of a process by checking its folder location. For example, DWWIN.EXE (see later) should be found in: C:\Windows\System32\, C:\Winnt\System32\ or C:\Windows\System\. If you observe a process with this name located elsewhere (C:\Windows\ or C:\Winnt\ is a favourite, because it sounds a plausible location for an operating system component), then it is likely to be malicious. To check the location of an executable that is showing as a process, use Windows search to find the file (for example: DWWIN.EXE) and make a note 4

5 Processes: Check Your PC for Malicious Infections P 24/5 of the folder. For some of the processes in this article, the genuine folder locations have been provided. If in doubt, an Internet search should verify the correct location. Get to Know these 14 Windows Background Processes The processes in this section are common to Windows XP/2000/Me/98SE. If you press Ctrl + Alt + Delete and follow the steps in the last section, you are likely to see many of these active on your PC. EXPLORER.EXE This is the user shell, which we see as the familiar taskbar, Start menu, desktop and Windows Explorer. This process can be stopped and started from the Windows Task Manager without impacting the stability of Windows. However, EXPLORER.EXE may take a while to restart after being stopped. You will see the taskbar disappear. IEXPLORE.EXE This is the Internet Explorer web browser. LSASS.EXE This is the Local Security Authentication Server (it is presumed that the last s stands for Service). This receives authentication requests from Winlogon and calls the appropriate authentication package. This process may load further processes with the names: PolicyAgent, ProtectedStorage or SamSs. MSDTC.EXE Microsoft Distributed Transaction Co-ordinator is a manager for the co-ordination of transactions between different resources managers. For example: Message Queuing and Microsoft SQL Server. It permits applications to include several different sources of data in one transaction. This process runs on all Windows platforms. It is installed by EXPLORER.EXE is a key Windows process but not essential to stability. It can restart itself, without crashing the operating system. 5

6 P 24/6 Processes: Check Your PC for Malicious Infections applications that need to use it, such as Microsoft Personal Web Server, or Microsoft SQL Server. Note: that MSMSGS.EXE is not the same as MSNMSGR.EXE. You will sometimes see multiple copies of RUNDLL32.EXE in Windows Task Manager. This is legitimate but it is also a frequent target for name hijack. SCANREGW is usually active shortly after Windows starts. SVCHOST.EXE may be frequently seen in the Windows Task Manager. MSMSGS.EXE The Microsoft Windows Messenger process is a built-in instant messaging application. This is different from MSN Messenger, which has the process name MSNMSGR.EXE. RUNDLL32.EXE It is common practice for some software to be written in the form of a DLL (Dynamic Link Library). This library of functions may then be reused by other programmers (to avoid repetition), or accessed by some other external method, such as the Command Prompt. RUNDLL32.EXE provides a way to use functions from inside a compatible DLL. This is the 32-bit version found inside Windows XP/2000/Me/98SE. The last two of these Windows versions also contains a 16-bit variant called RUNDLL.EXE. The original file from Microsoft is located at C:\WINDOWS\System32\rundll32.exe. SCANREGW This is Microsoft s Registry Checker and it initialises every time that Windows is started. SERVICES.EXE This is the Services Control Manager, which is responsible for starting, stopping, and interacting with system services. This requires the parent process SVCHOST.EXE (see below) to also be running. SERVICES.EXE also loads the processes EVENTLOG and PLUGPLAY. SVCHOST.EXE This acts as a host for other processes running from DLLs. There may be more than one copy of it running at the same time. Here are some example processes hosted by SVCHOST.EXE: DcomLaunch, RpcSs, AudioSrv, 6

7 Processes: Check Your PC for Malicious Infections P 24/7 BIT, Browser, CryptSvc, Dhcp, dmserver, ERSvc, EventSystem, FastUserSwitchingCompatibility, helpsvc, lanmanserver, lanmanworkstation, Netman, Nla, RasMan, Schedule, seclogon, SENS, SharedAccess, ShellHWDetection, srservice, TapiSrv, Themes, TrkWks, W32Time, winmgmt, wscsvc, wuauserv, WZCSVC, Dnscache, LmHosts, RemoteRegistry, SSDPSRV, WebClient and stisvc. All of these are safe and legitimate processes. SPOOLSV.EXE This manages spooled printer and fax jobs. It will also load another process called SPOOLER. SYSTEM This is the process for most of the core parts of Windows. Do not terminate it! SYSTEM IDLE PROCESS This has the sole task of accounting for processor time when the system is not doing anything else. It runs when no other process is executing. TASKMGR.EXE This is the process for the Windows Task Manager itself. WINLOGON.EXE This manages user logon and logoff. It is only active when the user presses Ctrl + Alt + Delete, at which point it shows the security dialog box. The logon process handles interactive user logons and logoffs. The One Windows XP Background Task You Need to Know About There is only one process in this section. This was added with the release of Windows XP and is not found in any other Windows release. SPOOLSV.EXE enables background printing. SYSTEM is the core process for Windows itself. 7

8 P 24/8 Processes: Check Your PC for Malicious Infections WMIPRVSE.EXE This is the Windows Management Instrumentation Provider Service. It was first introduced in Windows XP. WMIPRVSE.EXE only starts when a specific piece of software requires its facilities. If you are sharing your Internet connection via a local network, you will see ALG.EXE running. 13 Default Windows System Processes in XP/2000 The processes in this section are found in both Windows XP and As such, they are likely to originate from Windows NT, from which all current Windows releases are derived. ALG.EXE This is used for ICS (Internet Connection Sharing). CIDAEMON.EXE CIDAEMON.EXE is the Windows XP/2000 indexing service. When your PC is idle, this process may be cataloguing your files to make searching faster. If CIDAEMON.EXE is using a high percentage of your processor s available cycles, then you may need to consider disabling the service, or setting it to manual start. CSRSS.EXE CSRSS stands for Client Server Run-time Subsystem and is responsible for Command Prompt and some parts of the 16- bit virtual MS-DOS environment in Windows XP/2000. This process is also known as the Win32 subsystem. DLLHOST.EXE Provides a host for applications known as COM+ objects. The DLLHOST.EXE utility will load COM-based DLLs. It will then provide an environment within which other applications can make use of the COM objects functionality. 8

9 Processes: Check Your PC for Malicious Infections P 24/9 DWWIN.EXE This is Microsoft s Dr Watson, which is used by the errorreporting tool. It has been a part of Windows for several versions. In its most recent incarnation, it is buried away and only activates when it detects a potential Windows crash. Sometimes it erroneously prevents an application from running. In this case, you will want to find and disable the service. The executable file will have the name: DWWIN.EXE, DRWATSON.EXE or DRWTSN32.EXE and it will be located in one of the following folders: C:\Windows\System32\, C:\Winnt\System32\ or C:\Windows\System\. INETINFO.EXE INETINFO.EXE, the Internet Information Services (IIS) process, is Microsoft s Web server. INTERNAT.EXE This is the Keyboard Language Indicator Applet. It displays in the System Tray as the EN icon, allowing the user to easily switch between languages. This icon disappears when the process is stopped, but the locality can still be changed through Control Panel. MDM.EXE The Machine Debug Manager is a support process for debugging when applications have crashed. NTVDM.EXE This is the NT Virtual DOS Machine. In Windows XP/2000, it supports the execution of older 16-bit software. SMSS.EXE The SYSTEM process starts SMSS.EXE, which is then responsible for various activities, including launching the WINLOGON and CSRSS processes. After starting these processes, SMSS.EXE waits for either WINLOGON or CSRSS to terminate. DWWIN.EXE is the Dr Watson error-reporting tool. INETINFO.EXE is a web server. The process MDM.EXE is likely to be active after a program has crashed. 9

10 P 24/10 Processes: Check Your PC for Malicious Infections If this happens without errors, then SMSS.EXE triggers a Windows shutdown. If WINLOGON or CSRSS terminate abnormally, then Windows will freeze and refuse to respond. If your computer is a tablet PC, or you are using an external tablet, you will probably require this process. WISPTIS.EXE This executable runs as a system service that handles pen movements from peripheral tablets, or with tablet-based PCs. Its name comes from Windows Ink Services Platform Tablet Input Subsystem. If you re not using a tablet, then this process does not need to be running. The genuine Microsoft file (WISPTIS.EXE) is located at: C:\Windows\System32\, C:\Winnt\System32\ or C:\Windows\System\. WISPTIS.EXE gets installed on your system, when installing Microsoft Office 2003, an Adobe product or Journal Viewer via Windows Update. WINMGMT.EXE Also known as Windows Management Service, this process is used by system administrators to create scripts that handle user accounts. It should be located at: C:\Windows\System32\, C:\Winnt\System32\ or C:\Windows\System\. WOWEXEC.EXE Windows XP/2000 can run older 16-bit applications. As a part of this procedure, 32-bit Windows has a heartbeat process that checks every fifty-five milliseconds to see if any 16-bit window requires action. This is known as Windows On Windows Execution and is handled by WOWEXEC.EXE. 10

11 Processes: Check Your PC for Malicious Infections P 24/11 The Only Unique Background Task in Windows 2000 The single process in this section was introduced with Windows 2000, but was included with other components by the release of Windows XP. MSTASK.EXE This is the task scheduler service, responsible for running tasks at a time predetermined by the user. This file is not essential for Windows XP and if it is observed running with this Windows version, it may be malware. System Processes in Windows XP/2000/Me There is only one system process that can be found in Windows XP/2000/Me, but not in earlier releases of the operating system. WUAUCLT.EXE This is the Windows Update Automatic Client. It should be located at: C:\Windows\System32\ C:\Winnt\System32\ or C:\Windows\System\ Identify Benign Processes in Windows Me/98 There are two processes that are found in the earlier versions of Windows, but not in Windows XP/2000. RNAAPP.EXE RNAAPP.EXE executes when a Dialup Networking connection is instigated. Windows 2000 has one unique process. This is a part of the Windows Update infrastructure. In early versions of Windows, RNAAPP.EXE is active when using Dialup Networking. 11

12 P 24/12 Processes: Check Your PC for Malicious Infections SYSTRAY This controls the area in the bottom right of the Windows desktop that contains the clock and other icons representing active software. In later versions of Windows, it is usually known as the Notification Area. By convention, third party software developers tend not to locate applications in the Windows system folder. Processes that start with the letters ACRO tend to be connected with Adobe Acrobat. CTFMON.EXE is a part of Microsoft Office. Common Background Application Processes In this section, you will find some examples of common processes that relate to third party software. These are all safe (as long as they are the genuine article). Please note that it is unusual for a third party to locate an executable in one of the following folders: C:\Windows\System32\ C:\Winnt\System32\ or C:\Windows\System\ If you find a non-microsoft process running from this location, then there is a high risk that it is a virus, spyware or adware. ACRORD32.EXE This is Adobe Acrobat Reader and is needed when you want to open and view PDF documents. ACROTRAY.EXE This is the Adobe Acrobat Traybar Assistant providing a shortcut to additional configuration options for Adobe products. CTFMON.EXE This is associated with Microsoft Office and it runs in the background, even after you have exited all Office programs. 12

13 Processes: Check Your PC for Malicious Infections P 24/13 CTFMON.EXE monitors active windows and provides text input service support for speech recognition, handwriting recognition, keyboard, translation, and other alternative user input technologies. MSDXM.OCX This process is the Windows Media Player Internet Explorer Plugin. This allows audio and video to play inside your web browser. MSPMSPSV.EXE This is the main process for Windows Media Player. It is a process which normally comes with a specific update of Windows Media Player. It allows for the SDMI protocol (Secure Digital Music Initiative) to be used when dealing with music media. This is a non-essential process. NCLAUNCH.EXE This is a part of SWF Studio. It is used when creating self-installing screen savers. QTTASK.EXE The Quick Time Tray Icon is used as a shortcut to a number of QuickTime related features. Primarily, this relates to playing videos in the.mov format. REALSCHED.EXE This is the main process for Real Player. This schedules manual update checks for Real Networks products. SWEEPSRV.SYS SWEEPSRV.SYS is the Sophos Anti-Virus application. The process MSPMSPSV.EXE is the Windows Media Player. SWEEPSRV.SYS is a Sophos anti-virus tool. 13

14 P 24/14 Here are some examples of processes that are definitely malicious. There are many more Processes: Check Your PC for Malicious Infections Finding Common Malware Programs on Your PC Here are some frequently encountered malicious Windows processes. Hopefully your anti-spyware software will identify any of these programs. If you do see any of these in the Windows task list, run a full scan using your anti-spyware tool. RANDRECO.EXE This is also known as Second Thought. It is adware and may hijack your system. SP.EXE SP.EXE is a keylogger. It will capture every character that you type into the keyboard. Someone attacking your PC may use this application to view personal information. Your Internet Explorer start page will be changed to In this article, we have shown you how to view the processes currently running on your Windows PC, so you now know how to identify the common problems. You should perform an Internet search for processes not mentioned in this article. You have also discovered that a malicious or faulty process can cause your PC to crash, by preventing it from moving on to your other active processes. If you have a process such as this the solution is to TERMINATE! 14

Processos carregados no Windows XP Professional

Processos carregados no Windows XP Professional Processos carregados no Windows XP Professional alg.exe Application Layer Gateway alg.exe is a process belonging to. It is a core process for Microsoft Windows Internet Connection sharing and Internet

More information

Windows XP Home and Professional Service Configurations

Windows XP Home and Professional Service Configurations Windows XP Home and Professional Service Configurations Original content created July 28, 2001 Last update was Sunday, August 31, 2003 Copyright 2001-2003 by Black Viper All Rights Reserved. All trademarks

More information

Print Spooler Service 31 Protected Storage Service 32 QoS RSVP Service 32 Remote Access Auto Connection Manager Service 33 Remote Access Connection

Print Spooler Service 31 Protected Storage Service 32 QoS RSVP Service 32 Remote Access Auto Connection Manager Service 33 Remote Access Connection INDEX INDEX 1 Services Guide for Windows XP 3 Please Read These s Relative To The Services Guide! 3 General tab 5 Log On Tab 6 Recovery tab 7 Tab 8 Explanation table set up for each service 9 GET TO THE

More information

Fingerprinting Through RPC

Fingerprinting Through RPC Fingerprinting Through RPC Hidenobu Seki Urity@SecurityFriday.com Agenda Information gathering for RPC troubleshooting Microsoft RPC Interface IDs of Windows RPC services Info gathering without authentication

More information

Disable Redundant Windows XP Services which are Hogging Your RAM

Disable Redundant Windows XP Services which are Hogging Your RAM X P Services Optimisation X 36/1 Disable Redundant Windows XP Services which are Hogging Your RAM With the information in this article you can: Configure your Windows XP Services for top performance Identify

More information

What's the difference between spyware and a virus? What is Scareware?

What's the difference between spyware and a virus? What is Scareware? What's the difference between spyware and a virus? What is Scareware? Spyware and viruses are both forms of unwanted or malicious software, sometimes called "malware." You can use Microsoft Security Essentials

More information

ScriptBlocking Service... 27 Secondary Logon Service... 28 Security Accounts Manager Service... 28 Security Center... 29 Server Service...

ScriptBlocking Service... 27 Secondary Logon Service... 28 Security Accounts Manager Service... 28 Security Center... 29 Server Service... The table below illustrates how I've set up the information for each service.... 3 Alerter Service... 4 Application Layer Gateway Service... 4 Application Management Service... 4 Automatic Updates Service...

More information

IT Quick Reference Guides Using Windows 7

IT Quick Reference Guides Using Windows 7 IT Quick Reference Guides Using Windows 7 Windows Guides This sheet covers many of the basic commands for using the Windows 7 operating system. WELCOME TO WINDOWS 7 After you log into your machine, the

More information

Windows XP Home and Professional Service Configurations

Windows XP Home and Professional Service Configurations Windows XP Home and Professional Service Configurations Original content created July 28, 2001 Last update was Thursday, October 24, 2002 Copyright 1999-2002 by Black Viper All Rights Reserved. Up to date

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

WINDOWS PROCESSES AND SERVICES

WINDOWS PROCESSES AND SERVICES OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.

More information

Fiery E100 Color Server. Welcome

Fiery E100 Color Server. Welcome Fiery E100 Color Server Welcome 2011 Electronics For Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45098226 27 June 2011 WELCOME 3 WELCOME This Welcome

More information

Speeding up a Slow SuperSalon PC

Speeding up a Slow SuperSalon PC Speeding up a Slow SuperSalon PC Inevitably, a computer will slow down in operation when an improper maintenance and/or set up is a factor. And unfortunately, most salon staff do not double as IT personnel.

More information

Nero MediaStreaming for MCE Manual

Nero MediaStreaming for MCE Manual Nero MediaStreaming for MCE Manual Nero AG Copyright and Trademark Information This manual and all its contents are protected by copyright and are the property of Nero AG. All rights reserved. This manual

More information

How to easily clean an infected computer (Malware Removal Guide)

How to easily clean an infected computer (Malware Removal Guide) How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather

More information

Internet Explorer Settings for Optum CareTracker

Internet Explorer Settings for Optum CareTracker Internet Explorer Settings for Optum CareTracker CareTracker (aka Optum PM and Physician EMR) is a web-based application, which currently only runs on the 32 -bit version of Internet Explorer (to tell,

More information

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without

More information

Operating Systems. and Windows

Operating Systems. and Windows Operating Systems and Windows What is an Operating System? The most important program that runs on your computer. It manages all other programs on the machine. Every PC has to have one to run other applications

More information

ILTA HANDS ON Securing Windows 7

ILTA HANDS ON Securing Windows 7 Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding

More information

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES LESSON 13 Managing Devices OBJECTIVES After completing this lesson, you will be able to: 1. Open System Properties. 2. Use Device Manager. 3. Understand hardware profiles. 4. Set performance options. Estimated

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Installation Guide - Client. Rev 1.5.0

Installation Guide - Client. Rev 1.5.0 Installation Guide - Client Rev 1.5.0 15 th September 2006 Introduction IntraNomic requires components to be installed on each PC that will use IntraNomic. These IntraNomic Client Controls provide advanced

More information

Windows XP Pro: Basics 1

Windows XP Pro: Basics 1 NORTHWEST MISSOURI STATE UNIVERSITY ONLINE USER S GUIDE 2004 Windows XP Pro: Basics 1 Getting on the Northwest Network Getting on the Northwest network is easy with a university-provided PC, which has

More information

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12 Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge

More information

Registry Tuner. Software Manual

Registry Tuner. Software Manual Registry Tuner Software Manual Table of Contents Introduction 1 System Requirements 2 Frequently Asked Questions 3 Using the Lavasoft Registry Tuner 5 Scan and Fix Registry Errors 7 Optimize Registry

More information

Windows Server 2003 default services

Windows Server 2003 default services Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.

More information

In this chapter you will find information on the following subjects:

In this chapter you will find information on the following subjects: 17 1. From XP to Vista Microsoft, the creator of Windows, has published various versions of the Windows operating system over the past two decades. Windows Vista is the latest version, the successor to

More information

Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version.

Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version. Release notes version 7.01 Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version. It s available as a free downloadable upgrade to existing version 7.0 customers

More information

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do

More information

Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08

Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08 Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL Installation and System Administrator's Guide 4MASIN450-08 2011 Sage Software, Inc. All rights reserved. Sage, the Sage logos and the Sage product

More information

Accessing Windows 7 in the Student Labs

Accessing Windows 7 in the Student Labs Accessing Windows 7 in the Student Labs This document explains how to access and use Windows 7 and some of the software installed on Windows 7, such as Microsoft Office 2010, on the student lab computers.

More information

WatchDox for Windows. User Guide. Version 3.9.5

WatchDox for Windows. User Guide. Version 3.9.5 WatchDox for Windows User Guide Version 3.9.5 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to

More information

MICROSOFT WINDOWS NAVIGATION

MICROSOFT WINDOWS NAVIGATION MICROSOFT WINDOWS NAVIGATION MARGARET E. HEGGAN FREE PUBLIC LIBRARY This walkthrough assumes you have a computer with Microsoft Windows 7 installed. Versions of Microsoft Windows are similar, but different

More information

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 2 Introducing Operating Systems

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 2 Introducing Operating Systems A+ Guide to Managing and Maintaining Your PC, 7e Chapter 2 Introducing Operating Systems Objectives Learn about the various operating systems and the differences between them Learn about the components

More information

Getting Started on the Computer With Mouseaerobics! Windows XP

Getting Started on the Computer With Mouseaerobics! Windows XP This handout was modified from materials supplied by the Bill and Melinda Gates Foundation through a grant to the Manchester City Library. Getting Started on the Computer With Mouseaerobics! Windows XP

More information

Understanding Operating System Configurations

Understanding Operating System Configurations Lesson 2 Understanding Operating System Configurations Learning Objectives Students will learn to: Understand Standard User Versus Administrative User Accounts Understand Types of UAC Prompts and Levels

More information

Setting up VPN and Remote Desktop for Home Use

Setting up VPN and Remote Desktop for Home Use Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3 IV. Remote Connect to Your Work Computer... 4

More information

Table of Contents. Speedi WIN Online Page 1 of 44 Speedi-WIN Online Install Instructions

Table of Contents. Speedi WIN Online Page 1 of 44 Speedi-WIN Online Install Instructions Speedi WIN Online Page 1 of 44 Speedi-WIN Online Install Instructions Table of Contents Logging on to Speedi-WIN Online... 3 Installing Citrix Receiver... 7 Launching Speedi-WIN Online... 11 Existing Speedi-WIN

More information

Setting up VPN and Remote Desktop for Home Use

Setting up VPN and Remote Desktop for Home Use Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3-4 IV. Remote Connect to Your Work Computer...

More information

OFFICE KEYBOARD (MT1210 & MT1405) OFFICE FEATURES

OFFICE KEYBOARD (MT1210 & MT1405) OFFICE FEATURES OFFICE KEYBOARD (MT1210 & MT1405) OFFICE FEATURES Thank you for purchasing OFFICE KEYBOARD. This User s manual contains all information that helps you to operate your keyboard. Please keep the software

More information

AliOffice 2.0 Installation Guide

AliOffice 2.0 Installation Guide January 25, 2012 AliOffice 2.0 Installation Guide Overview This document contains instructions for installing AliOffice and readying the application for the completion and submission of compliance evaluations.

More information

ICS Technology. PADS Viewer Manual. ICS Technology Inc PO Box 4063 Middletown, NJ 077748 732-671-5400 www.icstec.com

ICS Technology. PADS Viewer Manual. ICS Technology Inc PO Box 4063 Middletown, NJ 077748 732-671-5400 www.icstec.com ICS Technology PADS Viewer Manual ICS Technology Inc PO Box 4063 Middletown, NJ 077748 732-671-5400 www.icstec.com Welcome to PADS Viewer Page 1 of 1 Welcome to PADS Viewer Welcome to PADS (Public Area

More information

THE GOVERNMENT OF THE REPUBLIC OF SINGAPORE MINISTRY OF MANPOWER WP ONLINE. Technical Guidelines

THE GOVERNMENT OF THE REPUBLIC OF SINGAPORE MINISTRY OF MANPOWER WP ONLINE. Technical Guidelines THE GOVERNMENT OF THE REPUBLIC OF SINGAPORE MINISTRY OF MANPOWER WP ONLINE Technical Guidelines Last Updated: 12-July-2013 Content 1. Technical Guidelines... 3 1.1 Minimum PC Configuration... 4 1.2 Internet

More information

Enterprise Remote Control 5.6 Manual

Enterprise Remote Control 5.6 Manual Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote

More information

Getting Started with VMware Fusion. VMware Fusion for Mac OS X

Getting Started with VMware Fusion. VMware Fusion for Mac OS X Getting Started with VMware Fusion VMware Fusion for Mac OS X 2 Getting Started with VMware Fusion Getting Started with VMware Fusion Item: EN-000189-00 You can find the most up-to-date technical documentation

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

1/5/2013. Technology in Action

1/5/2013. Technology in Action 0 1 2 3 4 5 6 Technology in Action Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management Chapter Topics System software basics Types of operating systems What the

More information

Security Task Manager User Guide

Security Task Manager User Guide Security Task Manager User Guide Enhanced Process Viewer with security risk rating A. & M. Neuber Software GmbH 2 Security Task Manager Table of Contents Part I Features of Security Task Manager 4 Part

More information

Chapter 8 Operating Systems and Utility Programs

Chapter 8 Operating Systems and Utility Programs Operating Systems What are the functions of an? start the computer provide a user interface manage programs Chapter 8 Operating Systems and Utility Programs administer security control a network manage

More information

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome Browser toolbars have been around for years, however, in the last couple of months they became a huge mess. Unfortunately, lots of free software

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

Spyware Doctor Enterprise Technical Data Sheet

Spyware Doctor Enterprise Technical Data Sheet Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware

More information

Using SANDBOXIE to Safely Browse the Internet (verified with ver 4.20) Jim McKnight www.jimopi.net Sandboxie.lwp revised 5-25-2016

Using SANDBOXIE to Safely Browse the Internet (verified with ver 4.20) Jim McKnight www.jimopi.net Sandboxie.lwp revised 5-25-2016 Using SANDBOXIE to Safely Browse the Internet (verified with ver 4.20) Jim McKnight www.jimopi.net Sandboxie.lwp revised 5-25-2016 GENERAL NOTES: These tips are based on my personal experience using Sandboxie.

More information

QACenter Installation and Configuration Guide. Release 4.4.2

QACenter Installation and Configuration Guide. Release 4.4.2 QACenter Installation and Configuration Guide Release 4.4.2 ii Please direct questions about QACenter or comments on this document to: QACenter Technical Support Compuware Corporation 31440 Northwestern

More information

Installation Manual for Multi-purpose Ecological Risk Assessment and Management Tool (AIST-MeRAM) For Windows 8

Installation Manual for Multi-purpose Ecological Risk Assessment and Management Tool (AIST-MeRAM) For Windows 8 Installation Manual for Multi-purpose Ecological Risk Assessment and Management Tool (AIST-MeRAM) For Windows 8 December 25, 2014 National Institute of Advanced Industrial Science and Technology (AIST)

More information

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators

More information

Revo Uninstaller - User's Guide

Revo Uninstaller - User's Guide Table of Contents 1. Overview... 2 2. User Interface... 4 3. Uninstaller... 5 4. Hunter Mode... 10 5. Tools... 12 5.1. AutoRun Manager... 13 5.2. Junk Files Cleaner... 15 5.3. Windows Tools... 16 5.4.

More information

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6. Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All

More information

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29 Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your

More information

Crystal Print Control Installation Instructions for PCs running Microsoft Windows XP and using the Internet Explorer browser

Crystal Print Control Installation Instructions for PCs running Microsoft Windows XP and using the Internet Explorer browser Crystal Print Control Installation Instructions for PCs running Microsoft Windows XP and using the Internet Explorer browser Important Notice: You must have administrative rights to your PC to perform

More information

FileMaker Server 7. Administrator s Guide. For Windows and Mac OS

FileMaker Server 7. Administrator s Guide. For Windows and Mac OS FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark

More information

Introduction to Windows XP

Introduction to Windows XP Introduction to Windows XP Academic Computing Support Information Technology Services Tennessee Technological University January 2003 1. What s new in XP New colorful interface. More stable than 9x/Me

More information

Speeding up PDF display in Acrobat

Speeding up PDF display in Acrobat Speeding up PDF Display (Firefox 2) Speeding up PDF display in Acrobat WHY CHANGE THE PDF DISPLAY BEHAVIOUR?...1 FIREFOX 2...2 INTERNET EXPLORER 7...5 Why change the PDF display behaviour? Why? Because

More information

How to Install Windows 7 software

How to Install Windows 7 software Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly

More information

SOS Suite Installation Guide

SOS Suite Installation Guide SOS Suite Installation Guide rev. 8/31/2010 Contents Overview Upgrading from SOS 2009 and Older Pre-Installation Recommendations Network Installations System Requirements Preparing for Installation Installing

More information

Upgrading to Document Manager 2.7

Upgrading to Document Manager 2.7 Upgrading to Document Manager 2.7 22 July 2013 Trademarks Document Manager and Document Manager Administration are trademarks of Document Logistix Ltd. TokOpen, TokAdmin, TokImport and TokExRef are registered

More information

Bluetooth Installation

Bluetooth Installation Overview Why Bluetooth? There were good reasons to use Bluetooth for this application. First, we've had customer requests for a way to locate the computer farther from the firearm, on the other side of

More information

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation

More information

VirtualXP Users Guide

VirtualXP Users Guide VirtualXP Users Guide Contents Chapter 1: Introduction... 2 Chapter 2: Install and Uninstall VirtualXP... 3 2.1 System Requirement... 3 2.2 Installing VirtualXP... 3 2.3 Uninstalling VirtualXP... 3 Chapter

More information

Table of Contents. FleetSoft Installation Guide

Table of Contents. FleetSoft Installation Guide FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents Page 1 Centran Version 4 Getting Started Guide KABA MAS Kaba Mas Welcome Kaba Mas, part of the world-wide Kaba group, is the world's leading manufacturer and supplier of high security, electronic safe

More information

Attachment E ACCESSING THE FCC NETWORK USING WINDOWS 95/98 FOR ULS FILING

Attachment E ACCESSING THE FCC NETWORK USING WINDOWS 95/98 FOR ULS FILING Attachment E ACCESSING THE FCC NETWORK USING WINDOWS 95/98 FOR ULS FILING This attachment describes how to use Windows 95/98 Dial-Up Networking to establish a direct connection from your PC to the FCC

More information

Windows XP/Vista/7 Directory Structures

Windows XP/Vista/7 Directory Structures Windows XP/Vista/7 Directory Structures System Partition NTLDR boot.ini ntdetect.com bootsect.dos hiberfil.sys pagefile.sys Boot Partition Boot Documents and Settings (XP) Inetpub PerfLogs Program Files

More information

1. System Requirements

1. System Requirements BounceBack Ultimate 14.2 User Guide This guide presents you with information on how to use BounceBack Ultimate 14.2. Contents 1. System Requirements 2. BounceBack Pre-Installation 3. How To Install The

More information

Integrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0

Integrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0 Integrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Using WMI Scripts with BitDefender Client Security

Using WMI Scripts with BitDefender Client Security Using WMI Scripts with BitDefender Client Security Whitepaper Copyright 2009 BitDefender; Table of Contents 1. Introduction... 3 2. Key Benefits... 4 3. Available WMI Script Templates... 5 4. Operation...

More information

MAKING THE MOST OF WINDOWS 7

MAKING THE MOST OF WINDOWS 7 MAKING THE MOST OF WINDOWS 7 Learn how to get your PC to work for you! This seminar will combine the ins and outs of using Windows 7 with information on how to use fundamental commands within the windows

More information

ERserver. iseries. Work management

ERserver. iseries. Work management ERserver iseries Work management ERserver iseries Work management Copyright International Business Machines Corporation 1998, 2002. All rights reserved. US Government Users Restricted Rights Use, duplication

More information

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07 Using MioNet Copyright 2006 by Senvid, Inc. All rights reserved. 2445 Faber Place, Suite 200, Palo Alto, CA 94303 Voice: (650) 354-3613 Fax: (650) 354-8890 1 COPYRIGHT NOTICE No part of this publication

More information

PC Diet and fitness plan

PC Diet and fitness plan PC Diet and fitness plan Revised Apr 2013 Speed up your PC Regain lost storage space Clean out Bugs and viruses Improve your web experience Reduce maintenance costs and downtime This PC Diet and fitness

More information

NOTE: You may want to choose the Word Wrap option from Notepad Edit menu to make this text more readable.

NOTE: You may want to choose the Word Wrap option from Notepad Edit menu to make this text more readable. ------------------ Interactions/Gas Exchange Version 1.2, CD Version Copyright 2003 by John Wiley & Sons, Inc. All rights reserved. ------------------ NOTE: You may want to choose the Word Wrap option

More information

Best Practices for Deploying Behavior Monitoring and Device Control

Best Practices for Deploying Behavior Monitoring and Device Control Best Practices for Deploying Behavior Monitoring and Device Control 1 Contents Overview... 3 Behavior Monitoring Overview... 3 Malware Behavior Blocking... 3 Event Monitoring... 4 Enabling Behavior Monitoring...

More information

Documentum Desktop Client on Windows 2000 Terminal Services

Documentum Desktop Client on Windows 2000 Terminal Services Documentum Desktop Client on Windows 2000 Terminal Services Docbase Version 1.0 May 10, 2001 Documentum Desktop Client on Windows Terminal Services Page 2 Revision History Docbase Version Revised Date

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse

More information

User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved.

User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved. Table of Contents Getting Started... 4 New Features... 4 System Requirements... 4 Configuring Microsoft Internet Explorer... 4 Configuring

More information

SPYWARE & MALWARE. ComputerFixed.co.uk Page: 1 Email: info@computerfixed.co.uk. How do you get infected? Will Anti-virus software protect me?

SPYWARE & MALWARE. ComputerFixed.co.uk Page: 1 Email: info@computerfixed.co.uk. How do you get infected? Will Anti-virus software protect me? ComputerFixed.co.uk Page: 1 Email: info@computerfixed.co.uk SPYWARE & MALWARE How do you get infected? You can get infected by malware (malicious Software) in several ways. Malware often comes bundled

More information

Introduction to Computers

Introduction to Computers Introduction to Computers Parts of a computer Monitor CPU 3 Keyboard 3 4 4 Mouse 3 4 Monitor The monitor displays the content and operations of the computer. It is the visual display of what the computer

More information

new Business Online Technical Troubleshooting Guide

new Business Online Technical Troubleshooting Guide new Business Online Technical Troubleshooting Guide TABLE OF CONTENTS How to install Java 1.6 Page 3 How to install Java 1.6 without ActiveX control Page 6 How to uninstall Java Runtime Environment Page

More information

Copyright 2013 GE Multilin Inc. All rights reserved. CyberSentry SEM software revision 1.00. CyberSentry, Digital Energy, Multilin, and GE Multilin

Copyright 2013 GE Multilin Inc. All rights reserved. CyberSentry SEM software revision 1.00. CyberSentry, Digital Energy, Multilin, and GE Multilin Copyright 2013 GE Multilin Inc. All rights reserved. CyberSentry SEM software revision 1.00. CyberSentry, Digital Energy, Multilin, and GE Multilin are trademarks or registered trademarks of GE Multilin

More information

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

More information

Spyware and Viruses. There is a distinct difference between spyware and viruses.

Spyware and Viruses. There is a distinct difference between spyware and viruses. Spyware and Viruses Spyware and viruses are getting to be the largest problem in the battle of keeping your computer running smoothly and being able to use your computer with any kind of efficiency. There

More information

Microsoft Security Essentials Installation and Configuration Guide

Microsoft Security Essentials Installation and Configuration Guide Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on

More information

Product Description. Licenses Notice. Introduction TC-200

Product Description. Licenses Notice. Introduction TC-200 User Manual TC-200 Introduction TC-200 Product Description The TC-200 provides the fastest Thin Client performance on the market, It runs embedded Linux, swing user interface, Citrix 6.3, Microsoft RDP

More information

Offline Files & Sync Center

Offline Files & Sync Center bonus appendix Offline Files & Sync Center The offline files feature is designed for laptop lovers. It lets you carry off files that gerally live on your office network, so you can get some work done while

More information

How To Use Ezcrt Computer Rental For A Rental

How To Use Ezcrt Computer Rental For A Rental Page 1 www.vsoftwaretools.com IMPORTANT SOME instructions in this document are used ONLY at the RENTAL COMPUTER! DO NOT INSTALL ezcrt CLIENT software on Staff / Front Counter Computers! Version 2.0, Copyright

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

DSD Native DAC Setup Guide

DSD Native DAC Setup Guide CHANNEL D Pure Music DSD Native DAC Setup Guide Release 1.0 Copyright 2012 Channel D www.channel-d.com CHANNEL D Pure Music DSD Native DAC Setup Guide These instructions outline the setup steps required

More information

UNIFIED MEETING 5 HELP

UNIFIED MEETING 5 HELP UNIFIED MEETING 5 HELP Table of Contents Conference Manager... 1 About Conference Manager... 1 From Conference Manager, you can... 1 Signing in to Conference Manager... 2 To sign in to the Conference

More information

Auslogics BoostSpeed 5 Manual

Auslogics BoostSpeed 5 Manual Page 1 Auslogics BoostSpeed 5 Manual [ Installing and using Auslogics BoostSpeed 5 ] Page 2 Table of Contents What Is Auslogics BoostSpeed?... 3 Features... 3 Compare Editions... 4 Installing the Program...

More information