My computer has become infected with Malware, how do I remove it? PLEASE ENSURE ALL WORK IS SAVED AND ANY NON-ESSENTIAL PROGRAMS ARE CLOSED

Size: px
Start display at page:

Download "My computer has become infected with Malware, how do I remove it? PLEASE ENSURE ALL WORK IS SAVED AND ANY NON-ESSENTIAL PROGRAMS ARE CLOSED"

Transcription

1 My computer has become infected with Malware, how do I remove it? No Anti-Virus and/or Anti-Malware solution is 100% guaranteed to remove all threats. In the unlikely eventuality that your computer becomes infected, you will need to know how to remove the threat. No single program is able to check all areas of your system and you will therefore have to run multiple tools, to ensure the threat is removed completely. PLEASE ENSURE ALL WORK IS SAVED AND ANY NON-ESSENTIAL PROGRAMS ARE CLOSED This guide will take you through the use of third-party tools (Malwarebytes & CCleaner) but please note, this is only a guide, Norman is unable to provide direct support for these tools. Also please note, all third-party tools are used at your own risk. Malware by its nature will try to avoid being removed by any means possible. Therefore there is no singular program that can cover all eventualities and remove all Malware threats. Due to this, you will have to run a few programs to check the areas which some tools miss. The first thing you will need to do is to download all of the tools that we will need to remove the threat. You will need to download the following products: Norman Malware Cleaner Removes Viruses. CCleaner Deletes all temporary files and folders where malware maybe located. Malwarebytes Removes Spyware. Stage 1 - Downloading Norman Malware Cleaner You will need to go to the following website: 1) Mid-way down the page you will see a link to download Norman Malware Cleaner. Single Left-Click on the Norman Malware Cleaner link to start the download. Page 1

2 2) A download prompt will then appear. Single Left-Click on 1Save > 2Desktop > 3Save and, when the download has completed, 4Close. 4. Stage 2 - Downloading & Installing Malwarebytes Anti-Malware You will need to go to the following website: 1) On the left-hand side of the website you will see a box Download Free version. Single Left-Click on this box. 2) This will then link to a download site for their software (the site may vary from the one shown). Single Left-Click on Download Now. Page 2

3 3) Then Repeat Step 2 from Downloading Norman Malware Cleaner (Top Page 2) The steps are identical apart from the filename. 4) Go to your Desktop and Double Left-Click on the Malwarebytes Program. 5) In the next dialogues Single Left-Click 1Run > 2OK > 3Next. 6) Continuing on, Single Left-Click 1I Accept > 2Next > 3Next. Page 3

4 7) Continuing on, Single Left-Click 1Next > 2Next. 8) Continuing on, Single Left-Click on Install At the next screen remove the tick 2 (single left-click) next to Launch Malwarebytes.... Then Single Left-Click on Finish 9) You will then be shown a prompt that verifies the program has been updated. Single Left-Click on OK. Page 4

5 Stage 3 - Downloading & Installing CCleaner. You will need to go to the following website: 1) Single Left-Click on the Download link at the top of the page. 2) Scroll Down the page until you see the download links. Single Left-Click on the Download from FileHippo.com link. Page 5

6 3) Single Left-Click on the Download Latest Version link. 4) On the next page single left-click on the If not then please click..., if your download doesn t automatically begin. 5) Then Repeat Step 2 from Downloading Norman Malware Cleaner (Top Page 2) The step is identical apart from the filename. Page 6

7 6) Go to your Desktop and Double Left-Click on the CCleaner Program. 7) In the next dialogues Single Left-Click 1Run > 2OK > 3Next. 8) Continuing on, Single Left-Click 1I Agree > 2Next. Page 7

8 9) Single Left-Click in the tick box next to Add CCleaner Yahoo! Toolbar 1, to remove the tick. Then Single Left-Click on Install Then Single Left-Click on Finish Stage 4 - Running CCleaner. The next stage is to run CCleaner. This will remove all of the temporary folders and files from your machine. This is not only a possible place for malicious files to be stored but also decreases the amount of time a scan will take. 1) CCleaner should have launched after Step 9 in the last section. Single Left-Click on Options1 > Advanced 2> Remove the tick from Only delete files older than 24 hours Page 8

9 2) Then Single Left-Click on Cleaner 1 > Run Cleaner A dialogue will then pop-up, Single Left-Click on OK 3) Once the Cleaner has completed close the program by Single Left-Clicking the X in the top right corner. Stage 5 - Disconnecting from the Network In order to prevent a virus/malware from re-downloading itself, we will need to disconnect your computer from the network. This can be done in one of two ways: 1) For a wired network simply remove the cable from the computer. It should look similar to the image below. Page 9

10 2) For a wireless network you will need to disable your network adapter. This can be done by Single Left- Clicking on Start 1> Control Panel 2> Network and Internet Connections 3>Network Connections ) This will then open the Network Connections window. Single Right-Click 1 on the Wireless connection and Single Left-Click 2 on Disable from the menu. The icon should then change to verify that it is disabled. Stage 6 - Run Malwarebytes Next we will need to run Malwarebytes. This program will remove the majority of spyware that may be present. 1) Double Left-Click on the Malwarebytes icon that is on your desktop. Page 10

11 2) When Malwarebytes launches, Single Left-Click on the Perform full scan 1 radio button. Then Single Left- Click on Scan 3) A window will then appear asking which storage devices you wish to scan. Ensure there is a tick next to all of your hard disk drives 1 (The other drives shown in the example below are the DVD player and USB device). Then Single Left-Click on Start Scan Page 11

12 4) The scan will then run (this may take some time). Once it has finished you will then see a prompt, Single Left-Click on OK A log file will then appear, close this by Single Left-Clicking on the X 2 in the top right. 5) You can then close Malwarebytes by Single Left-Clicking the X in the top right. Stage 7 - Run Norman Malware Cleaner You will now need to run Norman Malware cleaner which is great at detecting and removing viruses. 1) Double Left-Click on Norman Malware Cleaner, which should be located on your desktop. Page 12

13 2) In the next dialogues Single Left-Click 1Run > 2Accept. 3) In the next screen Single Left-Click on Start scan. Please note that this scan is very thorough and may take some time. Page 13

14 4) Once the scan is complete Single Left-Click on Quit to exit the program. Stage 8 - Restart your Computer You will then need to restart your computer to finalize the changes made and refresh the system memory/cache. 1) Single Left-Click on Start 1 > Shutdown 2 then Single Left-Click on Restart 3 from the options shown. Page 14

15 Stage 9 Repeating the Scans You will next need to repeat the scans, using both Malwarebytes and Norman Malware Cleaner. This ensures any malicious files that where potentially missed will be found and removed. Please repeat: Stage 6 Run Malwarebytes Stage 7 Run Norman Malware Cleaner Stage 8 Restart your Computer Once your system has been restarted your system should now be free of malicious files. If your system is still showing signs of infection then please contact Norman Support Staff. Stage 10 Enabling your network Connection We will now need to enable your network connection. 1) For a wired network simply insert the Cable into the computer. It should look similar to the image below. 2) For a wireless network you will need to disable your network adapter. This can be done by Single Left- Clicking on Start 1> Control Panel 2> Network and Internet Connections 3>Network Connections Page 15

16 3) This will then open the Network Connections window. Single Right-Click on the Wireless connection 1 and Single Left-Click on Enable 2 from the menu. The icon should then change to verify that it is enabled. If you experience any further problems, or this does not resolve your problem, please contact Norman Technical Support. Page 16

Malwarebytes Anti-Malware 1.42

Malwarebytes Anti-Malware 1.42 Downloading Installing And First-Time Use Updating and Scanning Malwarebytes Anti-Malware 1.42 DOWNLOADING Download the latest version of Malwarebytes Anti-Malware (currently 1.42) from http://www.download.com.

More information

Passport installation Windows 8 + Firefox

Passport installation Windows 8 + Firefox Passport installation Windows 8 + Firefox OS Version Windows 8 System Type 32-bit and 64-bit Browser name & version Firefox 23 Before you begin Check you have Anti Virus software installed on your computer

More information

Passport Installation. Windows 8 + Internet Explorer 10

Passport Installation. Windows 8 + Internet Explorer 10 Passport Installation Windows 8 + Internet Explorer 10 OS Version Windows 8 System Type 32bit and 64bit Browser Name & version Internet Explorer 10 Before you begin Make sure you have Anti Virus software

More information

Passport Installation. Windows XP + Internet Explorer 8

Passport Installation. Windows XP + Internet Explorer 8 Passport Installation Windows XP + Internet Explorer 8 OS Version Windows XP System Type 32bit or 64bit Browser & version Internet Explorer 8 Before you begin.. Make sure you have Anti Virus software installed

More information

Print Server Application Guide. This guide applies to the following models.

Print Server Application Guide. This guide applies to the following models. Print Server Application Guide This guide applies to the following models. TL-WR842ND TL-WR1042ND TL-WR1043ND TL-WR2543ND TL-WDR4300 CONTENTS Chapter 1. Overview... 1 Chapter 2. Before Installation...

More information

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome Browser toolbars have been around for years, however, in the last couple of months they became a huge mess. Unfortunately, lots of free software

More information

How to Install a Network-Licensed Version of IBM SPSS Statistics 19

How to Install a Network-Licensed Version of IBM SPSS Statistics 19 How to Install a Network-Licensed Version of IBM SPSS Statistics 19 Important: IBM SPSS Statistics 19 requires either Windows XP Professional or later. IBM SPSS Statistics 19 installs from a DVD and your

More information

Protecting Your Computer from Viruses and Spyware

Protecting Your Computer from Viruses and Spyware Protecting Your Computer from Viruses and Spyware PROTECTING YOUR COMPUTER FROM VIRUSES AND SPYWARE A virus is a program that runs on your computer without asking permission and makes copies of itself.

More information

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware MacScan MacScan User Guide Detect, Isolate and Remove Spyware Part 1 1.1 Introduction MacScan is a spyware detection utility for Macintosh OS X that finds and removes spyware and other Internet files

More information

How to easily clean an infected computer (Malware Removal Guide)

How to easily clean an infected computer (Malware Removal Guide) How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather

More information

VirtualXP Users Guide

VirtualXP Users Guide VirtualXP Users Guide Contents Chapter 1: Introduction... 2 Chapter 2: Install and Uninstall VirtualXP... 3 2.1 System Requirement... 3 2.2 Installing VirtualXP... 3 2.3 Uninstalling VirtualXP... 3 Chapter

More information

Bloomfield Hills Schools VPN and Viewconnect Instructions

Bloomfield Hills Schools VPN and Viewconnect Instructions Connect to Bloomfield Hills Schools VPN - Open Internet Explorer. - Type https://vpn.bloomfield.org into the address bar. - Click Continue to this website (not recommended). if prompted. - If this is your

More information

Microsoft Windows Installation and Troubleshooting Guide

Microsoft Windows Installation and Troubleshooting Guide Remote Access Services Microsoft Windows - Installation and Troubleshooting Guide Version 2.1 February 19, 2013 1 P age TABLE OF CONTENTS 1 MICROSOFT WINDOWS XP INSTALLATION PROCEDURES... 3 2 MICROSOFT

More information

Information Technology

Information Technology Information Technology Symantec Endpoint Protection Download and Installation The packages on the web include virus and spyware protection for 32 and 64 bit Microsoft Windows systems. Minimum system requirements:

More information

Housekeeping Your PC

Housekeeping Your PC for WINDOW 7 Course documentation Material at:sussex.ac.uk/its/training/material/housekeeping University of Sussex Updated: June 2011 IT Services Created: December 2002 University of Sussex IT Services

More information

Installing Your Multifunction to Your Network for the First Time

Installing Your Multifunction to Your Network for the First Time > Installing Your Multifunction to Your Network for the First Time PIXMA MX452 Mac OS 1 > Installing Your Multifunction to Your Network for the First Time PIXMA MX452

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

MiraCosta College now offers two ways to access your student virtual desktop.

MiraCosta College now offers two ways to access your student virtual desktop. MiraCosta College now offers two ways to access your student virtual desktop. We now feature the new VMware Horizon View HTML access option available from https://view.miracosta.edu. MiraCosta recommends

More information

5.6.3 Lab: Registry Backup and Recovery in Windows XP

5.6.3 Lab: Registry Backup and Recovery in Windows XP 5.6.3 Lab: Registry Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up a computer registry. You will also perform a recovery of a computer registry.

More information

MyNetFone Virtual Fax. Virtual Fax Installation

MyNetFone Virtual Fax. Virtual Fax Installation Table of Contents MyNetFone Virtual Fax MyNetFone Virtual Fax Installation... 1 Changing the SIP endpoint details for the fax driver... 11 Uninstalling Virtual Fax... 13 Virtual Fax Installation Follow

More information

Recommended Settings for PACS HRS-d/eJacket via Remote Access

Recommended Settings for PACS HRS-d/eJacket via Remote Access The Main Line Health (MLH) system can be accessed through the Internet using the MLH Extranet Portal. The Extranet Portal gives users access to the MLH Intranet, PACS Horizon RadStation Distributed (HRS-d),

More information

XConsole GUI setup communication manual September 2010.

XConsole GUI setup communication manual September 2010. XConsole GUI setup communication manual September 2010. XConsole is compatible with Microsoft XP, Vista and Windows 7. The software will also work if using Boot camp on a Mac. IMPORTANT NOTES: - Do NOT

More information

Microsoft Security Essentials Installation and Configuration Guide

Microsoft Security Essentials Installation and Configuration Guide Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on

More information

Symantec Endpoint Encryption (SEE Client) Installation Instructions. Version 8.2

Symantec Endpoint Encryption (SEE Client) Installation Instructions. Version 8.2 Symantec Endpoint Encryption (SEE Client) Installation Instructions Version 8.2 Warning: This software is labor intensive, therefore it is important to validate that the hard drive is healthy by first

More information

PIGCHAMP MOBILE. PigCHAMP Knowledge Software. Installation Guide for Mobile Units

PIGCHAMP MOBILE. PigCHAMP Knowledge Software. Installation Guide for Mobile Units PIGCHAMP MOBILE PigCHAMP Knowledge Software Installation Guide for Mobile Units Table of Contents: Important Note:... 4 Chapter 1: PC Setup... 5 A. Install PigCHAMP Mobile Manager on Windows XP...5 B.

More information

Print Server Application Guide

Print Server Application Guide Print Server Application Guide TD W8968 TD W8970 / TD W8970B TD W8980 / TD W8980B Rev: 1.0.0 1910010772 Contents Overview...1 Installation for Windows OS...2 Application for Windows OS...7 How to launch/exit

More information

How To Install Database Oasis On A Computer Or Computer (For Free)

How To Install Database Oasis On A Computer Or Computer (For Free) INSTALLATION INSTRUCTIONS Table of Contents Installation Instructions 1 Table of Contents 1 System Requirements 2 Installation 3 Selecting where to Install the Professional Server 3 Installing Prerequisites

More information

Disabling Microsoft SharePoint in order to install the OneDrive for Business Client

Disabling Microsoft SharePoint in order to install the OneDrive for Business Client Disabling Microsoft SharePoint in order to install the OneDrive for Business Client If you try to setup and sync your OneDrive online documents with the client software and Microsoft SharePoint opens,

More information

16.4.3 Lab: Data Backup and Recovery in Windows XP

16.4.3 Lab: Data Backup and Recovery in Windows XP 16.4.3 Lab: Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment The

More information

1 Disabling Access to USB Mass Storage Devices

1 Disabling Access to USB Mass Storage Devices ZENworks 11 Endpoint Security Management - USB Device Control January 20154 This document provides test scenarios that show you how to use ZENworks Endpoint Security Management to control users access

More information

Basic Virus Removal Steps

Basic Virus Removal Steps Basic Virus Removal Steps The following are basic instructions on how to remove most virus and spyware that infect Windows XP/Vista computers. By providing these, we hope that users will be able to remove

More information

DRIVER INSTALLATION PROCEDURE WINDOWS 8 (32 or 64 BIT)

DRIVER INSTALLATION PROCEDURE WINDOWS 8 (32 or 64 BIT) DRIVER INSTALLATION PROCEDURE WINDOWS 8 (32 or 64 BIT) N-Com Wizard 2.0 (and higher) IDENTIFYING THE OPERATING SYSTEM INSTALLED ON YOUR PC 1. Look for the Control Panel icon (on the Start menu or on the

More information

F.A.Q. Mustek A3 scanners 600-1200-2400

F.A.Q. Mustek A3 scanners 600-1200-2400 F.A.Q. Mustek A3 scanners 600-1200-2400 Q- When I connect the scanner there is no light on the scanner, is the scanner working? A- There is no LED on the scanner that indicates if the scanner is switched

More information

Installing Your Multifunction to Your Network for the First Time

Installing Your Multifunction to Your Network for the First Time > Installing Your Multifunction to Your Network for the First Time PIXMA MX452 Windows OS 1 > Installing Your Multifunction to Your Network for the First Time PIXMA

More information

How to Install Windows 7 software

How to Install Windows 7 software Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly

More information

Installing VPN for PC v1.3

Installing VPN for PC v1.3 Follow these instructions to access your Public/Private folders from home. Please Note: If you are having connectivity issues after installing or upgrading VPN, please refer to Troubleshooting Connectivity

More information

Please apply to the DIOS Helpdesk (see Information and communication at the end of this document) for further assistance.

Please apply to the DIOS Helpdesk (see Information and communication at the end of this document) for further assistance. Student manual FSW Secure Access Portal Faculty of Social and Behavioural Sciences FSW Secure Access Portal The FSW Secure Access Portal (short: Portal) provides safe access from outside to the Faculty

More information

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS data analysis data mining quality improvement web-based analytics Notes STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS 1. The installation of the Concurrent network

More information

A. BACK UP YOUR CURRENT DATA. QuickBooks Business Accounting Software 2006 2009 for Windows Account Conversion Instructions

A. BACK UP YOUR CURRENT DATA. QuickBooks Business Accounting Software 2006 2009 for Windows Account Conversion Instructions QuickBooks Business Accounting Software 2006 2009 for Windows Account Conversion Instructions As your financial institution completes its system conversion, you will need to modify your QuickBooks settings

More information

Optimal Browser Settings for Internet Explorer Running on Microsoft Windows

Optimal Browser Settings for Internet Explorer Running on Microsoft Windows Optimal Browser Settings for Internet Explorer Running on Microsoft Windows If you have Internet Explorer 7 or 8: Each time you log in to our web site, it evaluates whether you are using the same computer

More information

webiress connection problems: Troubleshooting

webiress connection problems: Troubleshooting webiress connection problems: Troubleshooting 1 webiress Checklist: Delete the webiress Object ~ Page 5 Delete the Temporary Internet Files ~ Page 5 Check for Sun Java 2 Runtime environment ~ Page 6 Review

More information

Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum

Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum Maintenance Guide Outpost Firewall 4.0 Personal Firewall Software from Agnitum Abstract This document is intended to assist Outpost Firewall users in installing and maintaining Outpost Firewall and gets

More information

Copying Files to a Flash Drive or SD Card:

Copying Files to a Flash Drive or SD Card: Copying Files to a Flash Drive or SD Card: Teachers: 1. Open My Computer from the Start Menu and see which drives are shown. Most computers, for example, have a hard disk drive such as a C: Local Disk

More information

How to Configure Sophos Anti-Virus for Home Systems

How to Configure Sophos Anti-Virus for Home Systems How to Configure Sophos Anti-Virus for Home Systems When you download and install Sophos on your home computer, on-access scanning is enabled. However, the settings for scheduled scans and scanning for

More information

Rev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs

Rev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs Rev. 06 JAN. 2008 Document Control User Guide: Using Outlook within Skandocs Introduction By referring to this user guide, it is assumed that the user has an advanced working knowledge of Skandocs (i.e.

More information

Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition

Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition NC State University 1 of 5 Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows server 2003 x64 with symantec antivirus 10 corporate edition CAUTION:

More information

Installing Your Multifunction to Your Network for the First Time

Installing Your Multifunction to Your Network for the First Time > Installing Your Multifunction to Your Network for the First Time PIXMA MP499 Mac OS 1 > Installing Your Multifunction to Your Network for the First Time PIXMA MP499

More information

POWERSEARCH Basic Tech Support

POWERSEARCH Basic Tech Support POWERSEARCH Basic Tech Support Contents: General Errors Norton Internet Security 2009 Norton Internet Security 2011 Norton Internet Security 2013, Norton 360 Norton 360 Anti-Virus (older version) Norton

More information

Using BitLocker to encrypt a Windows 8 device

Using BitLocker to encrypt a Windows 8 device Using BitLocker to encrypt a Windows 8 device 1. Before BitLocker can be used to encrypt the portable device, the Trusted Platform Module must be turned on via the BIOS. Boot the device and press F2, F10,

More information

Restoring your Computer from a Backup in Windows 8 (File History)

Restoring your Computer from a Backup in Windows 8 (File History) Restoring your Computer from a Backup in Windows 8 (File History) Introduction 1. The File History tool in Windows 8 and Windows 8.1 is used to restore files and folders to your computer from a backup.

More information

This document provides instructions for updating and running the free versions of Ad- Aware, Spybot Search & Destroy, and Spyware Blaster.

This document provides instructions for updating and running the free versions of Ad- Aware, Spybot Search & Destroy, and Spyware Blaster. How to Use Anti-Spyware Tools Spyware are programs that get installed on your computer without your permission. Some spyware is relatively harmless, and some spyware can destroy your computer. Most anti-virus

More information

10.3.1.6 Lab - Data Backup and Recovery in Windows XP

10.3.1.6 Lab - Data Backup and Recovery in Windows XP 5.0 10.3.1.6 Lab - Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment

More information

CougarTrack Troubleshooting - Internet Explorer 8

CougarTrack Troubleshooting - Internet Explorer 8 CougarTrack Troubleshooting - Internet Explorer 8 If you are having difficulty accessing pages in CougarTrack, please read through the following information and make any applicable changes to your computer.

More information

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender Security Practices Essentials Viruses McAfee Virus Software Critical Windows Updates Network Settings Spyware Adaware Spybot Windows Defender Security Practices Essentials: All computer passwords should

More information

Contents. VPN Instructions. VPN Instructions... 1

Contents. VPN Instructions. VPN Instructions... 1 VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit

More information

TAMUS Terminal Server Setup BPP SQL/Alva

TAMUS Terminal Server Setup BPP SQL/Alva We have a new method of connecting to the databases that does not involve using the Texas A&M campus VPN. The new way of gaining access is via Remote Desktop software to a terminal server running here

More information

Introduction to Windows XP Operating System

Introduction to Windows XP Operating System Introduction to Windows XP Operating System Introduction to Windows XP Operating System Document Syllabus Course Description: This workshop will introduce basic Windows operating system concepts. Using

More information

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved.

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved. Vess A2000 Series NVR Storage Appliance Windows Recovery Instructions Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Different ways to backup the system disk 2 Before

More information

Remote Access Services Microsoft Windows - Installation Guide

Remote Access Services Microsoft Windows - Installation Guide Remote Access Services Microsoft Windows - Installation Guide Version 3.1 February 23, 2015 1 P age Contents GETTING STARTED... 3 JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... 3 Windows XP... 3

More information

Trusted Relationships. Sending Invitations. Sending Invitations from Outlook

Trusted Relationships. Sending Invitations. Sending Invitations from Outlook Trusted Relationships Establishing Trusted Relationships through the invitation process are core to the Securencrypt security process. This insures that you can only share secure documents with someone

More information

Time Stamp. Instruction Booklet

Time Stamp. Instruction Booklet Time Stamp Instruction Booklet Time Stamp Introductions Time stamp is a useful solution for backing up and restoring system, it backs up the entire computer system to the Backup Zone. Time Stamp is used

More information

Wireless Network Adapter Installation

Wireless Network Adapter Installation Belkin 54 Mbps Wireless Network Adapter Installation Version 1.0 Copyright Copyright 2013 Watthour Engineering Co., Inc.. All rights reserved. Information in this document is subject to change without

More information

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

1. Open the preferences screen by opening the Mail menu and selecting Preferences... Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window

More information

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security... Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4

More information

Windows XP with Symantec AntiVirus 10 Corporate Edition

Windows XP with Symantec AntiVirus 10 Corporate Edition NC State University 1 of 7 Windows XP with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows xp with symantec antivirus 10 corporate edition Install SAV10 on Windows XP only

More information

Supplement I.B: Installing and Configuring JDK 1.6

Supplement I.B: Installing and Configuring JDK 1.6 Supplement I.B: Installing and Configuring JDK 1.6 For Introduction to Java Programming Y. Daniel Liang This supplement covers the following topics: Downloading JDK 1.6 ( 1.2) Installing JDK 1.6 ( 1.3)

More information

Migrating documents from Business Objects Reporter to Web Intelligence XI R2

Migrating documents from Business Objects Reporter to Web Intelligence XI R2 Migrating documents from Business Objects Reporter to Web Intelligence XI R2 1. This document describes how to migrate documents from Business Objects Reporter to Web Intelligence documents. They can then

More information

ThinkVantage Rescue and Recovery 4.5 Windows 7

ThinkVantage Rescue and Recovery 4.5 Windows 7 CREATING A BACK-UP ThinkVantage Rescue and Recovery 4.5 Windows 7 This process saves an image of the entire system, which includes all operating system files, settings, personal files, and any installed

More information

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29 Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your

More information

Install and Troubleshoot Java

Install and Troubleshoot Java 01 IG Markets Install and Troubleshoot Java Java software from Sun Microsystems is required to be installed to enable the use of IT-Finance Charts. If Java is not installed, or if there is a problem with

More information

Intelligent Office: Web Optimisation Guide. Published Date: 06/11/2015. Version: 3.3

Intelligent Office: Web Optimisation Guide. Published Date: 06/11/2015. Version: 3.3 Intelligent Office: Web Optimisation Guide Published Date: 06/11/2015 Version: 3.3 Table of Contents System Requirements:... 3 Introduction... 3 Difficulties Logging on to Intelligent Office (io)... 3

More information

ViRobot Desktop 5.5. User s Guide

ViRobot Desktop 5.5. User s Guide ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,

More information

STUDENT ADMINISTRATION TRAINING GUIDE SETTING YOUR BROWSER FOR PEOPLESOFT DOWNLOADS

STUDENT ADMINISTRATION TRAINING GUIDE SETTING YOUR BROWSER FOR PEOPLESOFT DOWNLOADS STUDENT ADMINISTRATION TRAINING GUIDE SETTING YOUR BROWSER FOR PEOPLESOFT DOWNLOADS Table of Contents How to check the browser version... 3 PC - Internet Explorer... 8 Internet Explorer V9 Compatibility

More information

Table of Contents. 1. Overview... 3. 1.1 Materials Required. 3 1.2 System Requirements. 3 1.3 User Mode 3. 2. Installation Instructions..

Table of Contents. 1. Overview... 3. 1.1 Materials Required. 3 1.2 System Requirements. 3 1.3 User Mode 3. 2. Installation Instructions.. Table of Contents 1. Overview..... 3 1.1 Materials Required. 3 1.2 System Requirements. 3 1.3 User Mode 3 2. Installation Instructions.. 4 2.1 Installing the On Call Diabetes Management Software. 4 2.2

More information

How to use SURA in three simple steps:

How to use SURA in three simple steps: How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.

More information

1. System Requirements

1. System Requirements BounceBack Ultimate 14.2 User Guide This guide presents you with information on how to use BounceBack Ultimate 14.2. Contents 1. System Requirements 2. BounceBack Pre-Installation 3. How To Install The

More information

How To Install & Use Metascan With Policy Patrol

How To Install & Use Metascan With Policy Patrol Policy Patrol 9 technical documentation June 16, 2014 How To Install & Use Metascan With Policy Patrol No antivirus engine is perfect. With over 220,000 new threats emerging daily, it would be impossible

More information

Sophos Anti-virus Basic Level Handout

Sophos Anti-virus Basic Level Handout Sophos Anti-virus Basic Level Handout Sophos Anti-Virus provides cross-platform protection against: Computer viruses Potentially Unwanted Applications (PUA s) such as spyware and adware Host intrusions

More information

Troubleshooting Guide

Troubleshooting Guide How to remove Windows XP Service Pack 2 from your computer Company web site: Support email: support@ Support telephone: +44 20 3287-7651 +1 646 233-1163 2 Some of the EMCO Products don't work properly

More information

Royal Mail Despatch Manager Online Printer Installation Guide

Royal Mail Despatch Manager Online Printer Installation Guide Royal Mail Despatch Manager Online Printer Installation Guide Getting you started Thank you for opting to use Royal Mail s Despatch Manager Online (DMO) system. To help get you started successfully please

More information

Sophos Enterprise Console Help

Sophos Enterprise Console Help Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

Personal Computer Checklist (Windows 10 and Internet Explorer 11.0) RealPage, Inc.

Personal Computer Checklist (Windows 10 and Internet Explorer 11.0) RealPage, Inc. Personal Computer Checklist (Windows 10 and Internet Explorer 11.0) RealPage, Inc. IMPORTANT NOTICE: YOUR USE OF THESE MATERIALS SHALL BE DEEMED TO CONSTITUTE YOUR AGREEMENT THAT SUCH USE SHALL BE GOVERNED

More information

Lesson 2. From computer to USB

Lesson 2. From computer to USB Lesson 2 From computer to USB How do I save my designs from my computer to a USB Flash drive to stitch out on my BERNINA? So now you have designs on your computer and want to put them onto your BERNINA

More information

Banner Frequently Asked Questions (FAQs)

Banner Frequently Asked Questions (FAQs) Banner Frequently Asked Questions (FAQs) How do I install Java?...1 Banner prompts me to download and install Java. Is this OK?....1 What Java version should I use?...2 How do I check what version of Java

More information

CANON FAX L360 SOFTWARE MANUAL

CANON FAX L360 SOFTWARE MANUAL CANON FAX L360 SOFTWARE MANUAL Before You Begin the Installation: a Checklist 2 To ensure a smooth and successful installation, take some time before you begin to plan and prepare for the installation

More information

Preparing Your Personal Computer to Connect to the VPN

Preparing Your Personal Computer to Connect to the VPN Preparing Your Personal Computer to Connect to the VPN (Protecting Your Personal Computer Running Windows) Using the VPN to connect your computer to the campus network is the same as bringing your computer

More information

Introduction. This white paper provides technical information on how to approach these steps with Symantec Antivirus Corporate edition.

Introduction. This white paper provides technical information on how to approach these steps with Symantec Antivirus Corporate edition. Introduction The process of updating virus definitions on workstations protected by Deep Freeze Enterprise involves three fundamental steps: 1. Rebooting the workstations into a Thawed state so the updates

More information

Sophos Anti-Virus for Mac OS X: Home Edition Help

Sophos Anti-Virus for Mac OS X: Home Edition Help Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

HOW TO BURN A CD/DVD IN WINDOWS XP. Data Projects

HOW TO BURN A CD/DVD IN WINDOWS XP. Data Projects Page 1 HOW TO BURN A CD/DVD IN WINDOWS XP There are two ways to burn files to a CD or DVD using Windows XP: 1. Using Sonic RecordNow! Plus or 2. Using the Windows Explorer CD Burning with Sonic Recordnow!

More information

LOS ANGELES UNIFIED SCHOOL DISTRICT Information Technology Division INSTALLATION INSTRUCTIONS

LOS ANGELES UNIFIED SCHOOL DISTRICT Information Technology Division INSTALLATION INSTRUCTIONS INSTALLATION INSTRUCTIONS Table of Contents A. Installing Symantec Anti-Virus 8.1 For Windows (32-Bit) From CD B. Installing Norton Anti-Virus 7.61 For Windows 95 From CD C. Installing Norton Anti-Virus

More information

USB DATA Link Cable USER MANUAL. (Model: DA-70011-1) GO! Suite Quick Start Guide

USB DATA Link Cable USER MANUAL. (Model: DA-70011-1) GO! Suite Quick Start Guide USB DATA Link Cable USER MANUAL (Model: DA-70011-1) GO! Suite Quick Start Guide - GO! Suite Introduction - GO! Bridge Introduction - Remote Share Introduction - Folder Sync - Outlook Sync GO! Bridge for

More information

NAS 253 Introduction to Backup Plan

NAS 253 Introduction to Backup Plan NAS 253 Introduction to Backup Plan Create backup jobs using Backup Plan in Windows A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Create backup

More information

22 Feb 2011 v1.00 SV. Installing Microsoft Security Essentials on Hippotizer.

22 Feb 2011 v1.00 SV. Installing Microsoft Security Essentials on Hippotizer. Installing Microsoft Security Essentials on Hippotizer. 22 Feb 2011 v1.00 SV. Microsoft Security Essentials is an Anti- Virus product provided by Microsoft. As a free product for Windows XP systems we

More information

DRIVER INSTALLATION PROCEDURE WINDOWS 8 (32 OR 64 BIT)

DRIVER INSTALLATION PROCEDURE WINDOWS 8 (32 OR 64 BIT) DRIVER INSTALLATION PROCEDURE WINDOWS 8 (32 OR 64 BIT) IDENTIFYING THE OPERATING SYSTEM INSTALLED ON YOUR PC 1. Look for the Control Panel icon (on the Start menu or on the desktop, depending on the running

More information

Remote Desktop Web Access. Using Remote Desktop Web Access

Remote Desktop Web Access. Using Remote Desktop Web Access Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off

More information

How to Download Images Using Olympus Auto-Connect USB Cameras and Olympus Master

How to Download Images Using Olympus Auto-Connect USB Cameras and Olympus Master How to Download Images Using Olympus Auto-Connect USB Cameras and Olympus Master Introduction Auto-Connect USB is a feature that allows Olympus digital cameras to emulate a Hard disk drive when connected

More information

Table of Contents. Rebit 5 Help

Table of Contents. Rebit 5 Help Rebit 5 Help i Rebit 5 Help Table of Contents Getting Started... 1 Making the First Recovery Point... 1 Don't Forget to Create a Recovery Media... 1 Changing Backup Settings... 1 What Does Rebit 5 Do?...

More information

Use your mobile phone as Modem. Intel Easy Steps 1 2012 Intel Corporation All rights reserved.

Use your mobile phone as Modem. Intel Easy Steps 1 2012 Intel Corporation All rights reserved. Use your mobile phone as Modem Intel Easy Steps 1 2012 Intel Corporation Mobile phone as Modem Use your mobile phone as Modem In order to connect your computer to the internet you need to use the services

More information

Colorfly Tablet Upgrade Guide

Colorfly Tablet Upgrade Guide Colorfly Tablet Upgrade Guide (PhoenixSuit) 1. Downloading the Firmware and Upgrade Tool 1. Visit the official website http://www.colorful.cn/, choose 产 品 > 数 码 类 > 平 板 电 脑, and click the product to be

More information

Schools of Distance Education. Computer check-up for students using Mac OS X 10.10 (Yosemite) devices

Schools of Distance Education. Computer check-up for students using Mac OS X 10.10 (Yosemite) devices Schools of Distance Education Computer check-up for students using Mac OS X 10.10 (Yosemite) devices The check-up summary Start of each term 1. Check your internet connection 2. Clean your computer 3.

More information