Computer Networking. First, you will use the ifconfig command to retrieve the IP address of the computer you are using:
|
|
- Meredith Todd
- 8 years ago
- Views:
Transcription
1 Computer Networking Computer Networking... 0 Lesson 0. Addressing... 1 Lesson 1. HTML/HTTP... 2 Lesson 2. SMTP... 3 Lesson 3. HTML... 4 Lesson 0. Addressing First, you will use the ifconfig command to retrieve the IP address of the computer you are using: Step 0. Click 'Applications' -> 'System Tools' -> Terminal Step 1. Click on the command window that appears and type ifconfig. Step 2. What is the IP address of your computer? Next, you will use the traceroute command to determine the route taken by a message sent from your computer to one of your favorite websites: Step 0. Choose a website (like facebook.com or google.com). Step 1. At the command window, type traceroute website, replacing website with the domain name of the website you chose (e.g, tracert google.com). Step 2. How many routers forward messages sent from your computer to the website you chose? Step 3. Switch users and try a different website. Step 4. Do you see the same number of routers for the new website? Step 5. Do you think you would see the same number of routers if you tried this at home?
2 Now, you will use the nslookup command to determine the IP address of the websites you chose in the previous exercise: Step 0. At the command window, type nslookup website, again replacing website with the website you chose. Step 1. How many IP addresses did you find for your website? Step 2. Repeat the traceroute command, replacing the domain name (e.g., google.com), with one of the IP addresses you found for that website. Step 3. Do you see the same set of routers as you did when you used the domain name instead of the IP address? Step 4. Switch users and try a different website. Lesson 1. HTML/HTTP First, you will use the netstat command to look at the status of your computer s network connections, then you will telnet into a web server and view the changes to the network connections: Step 0. At the command window, type netstat. Step 1. Open a second command window ('Applications' -> 'System Tools' -> Terminal). At the prompt, type telnet google.com 80. You may replace google.com with the domain name of another website, or with the IP address of another website if you like, but be sure to include the 80 in any case. Step 2. Go back to the first window and type netstat again. Step 3. Do you notice any new connections? Can you identify the connection you just made? Now, you will retrieve a web page by speaking HTTP directly with a web server.: Step 0. In the window where you typed telnet, type GET /index.html.
3 Step 1. Open a browser window. In the URL bar, type the same domain name and click enter. When the page loads, go to the View menu and select Page Source. Compare the output of the GET command with the output you see in the Page Source window. Are they the same? Step 2. Switch users and start from the beginning using a different website. Next, you will retrieve a web page by using telnet to talk directly to a web server, and compare the HTML you get back from the web server with what you see in your browser window. Step 0. In your browser, open the following web page: Step 1. In one of your command windows, type telnet Step 2. Type GET /~sep2009/htmlexercise.html. Step 3. Compare the HTML you retrieve in the command window with what you see in the browser. Step 4. How do you make text bold? Step 5. How do you make text italic? Step 6. How do you specify the title that appears at the top of the window? Step 7. How do you include text that is not shown by the browser? Lesson 2. SMTP For this exercise, you will telnet directly into a mail server and use SMTP to send an without using a mail client. For each instruction, replace the portion in italics with the appropriate information (e.g, replace your_ with something like president@usa.edu). Make sure to include the pointy brackets where specified. Step 0. At the command window, type telnet mail 25.
4 Step 1. Type HELO your_login_name. Step 2. Type MAIL FROM: <your_ >. Step 3. Type RCPT TO: <receivers_ >. Step 4. Type DATA and hit return. Type as much text as you want in the message, and then hit return, type a period, and hit return again. This will send your message. Step 5. Type QUIT. Step 6. Switch users and try again. Step 7. Now, try misspelling some of the commands (HELO, MAIL FROM, etc) and see what happens. Next, search the web for more information about the SMTP protocol. See if you can figure out how to do the following tasks: Step 0. Specify the Subject in a message. Step 1. Cc another recipient. Step 2. Send the message to three or more people. Lesson 3. HTML This is the sample html we saw in Part 2. <html> <body> <h1>html sample </h1>
5 <p>para with link</p> <a href=" This is a link for Facebook</a> <p>para with image</p> <!-- insert image here --> </body> </html> Step 0. Create a new file: -- 'Applications' --> 'Accessories' --> Text Editor -- Select the above html lines, copy (right click, copy ) and paste(right click, paste) above lines in it. -- 'Save As' --> samplehtmlsep10.html (note directory where you are saving it Step 1. Open this file by double clicking file. -- Your web browser will open the file -- Click on the link -- Does it open 'facebook'? -- if not, what is the error and how to fix it? Step 2. Insert image -- what is the line below ' <p>para with image</p>'? -- Does it appear in your browser? if not, why not? -- below this line ' <p>para with image</p>' insert an image -- refer this link for how to do it: Step 3. 'View Source': -- Go to browser that is displaying your file samplehtmlsep10.html -- Right click: Choose 'View Source' -- What is this? -- Change something here and save -- Does it appear in your browser? -- If not, why not?
6
The Internet (Computer Networking)
The Internet (Computer Networking) In what ways do we use the Internet for? Fun facts about the Internet Almost impossible to measure how much data you can access on the Internet Estimated to take about
More informationLESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP
Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with
More informationNetwork: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
More informationUsing Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
More informationLaboration, Ping, Traceroute, etc
Laboration, Ping, Traceroute, etc KTHNOC 31 augusti 2005 Sammanfattning This lab will introduce you to some networking tools. Name: Personnummer: Date: Signature: 1 1 Ifcong Which interfaces are dened
More informationModern snoop lab lite version
Modern snoop lab lite version Lab assignment in Computer Networking OpenIPLab Department of Information Technology, Uppsala University Overview This is a lab constructed as part of the OpenIPLab project.
More informationLaboratory guide nº 2
Introduction to Computer Networks (IRC) Licenciatura in Electronics Engineering (LEE) Licenciatura in Communication Networks Engineering (LERC) Laboratory guide nº 2 1 Objectives To familiarize your- self
More informationLab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail
More informationDigital Certificate IP Address Test Procedure
Digital Certificate IP Address Test Procedure Testing Firewall Access to New CA IP Addresses May 11 th to 15 th Verizon is making some test servers with the new Certificate Authority (CA) system IP addresses
More informationConfiguring your network settings to use Google Public DNS
Configuring your network settings to use Google Public DNS When you use Google Public DNS, you are changing your DNS "switchboard" operator from your ISP to Google Public DNS. In most cases, the IP addresses
More informationSimple Scan to Email Setup Guide
Simple Scan to Email Setup Guide Document Centre 555/545/535 Dc04cc0336 Scan to Email Scanning to email from a Xerox DC 555/545/535 requires the support of external email services on a network. These services
More informationTerminology. Internet Addressing System
Terminology A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics
More informationMicrosoft Expression Web
Microsoft Expression Web Microsoft Expression Web is the new program from Microsoft to replace Frontpage as a website editing program. While the layout has changed, it still functions much the same as
More informationREMOTE ACCESS DDNS CONFIGURATION MANUAL
REMOTE ACCESS DDNS CONFIGURATION MANUAL Analog DVR Series 1 www.mezory.com INTRODUCTION TO REMOTE ACCESS As the World sinks into one global village, reliable connectivity is one of the most demanding facilities
More informationHowTo: Logging, reporting, log-analysis and log server setup Version 2007nx Release 3. Log server version 2.0
Log server version 2.0 Contents 1 Setting up the log server for the appliance... 4 1.1 Registering the log server on the appliance... 4 1.2 Entering the Syslog server to the appliance... 6 2 Log server...
More informationLab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the nslookup Command on Mail
More informationParallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0
Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:
More informationIP addresses. IP addresses: IPv4: 32 bits: 10.110.4.199
Internet domain region of Internet operated by 1 entity (university, company, etc.) domain name assigned by registrars Top-level domains.edu,.com,.dk Example: login.imada.sdu.dk imada is a subdomain IP
More informationTo install the SMTP service:
To install the SMTP service: From the Start menu, click Control Panel. 2. Double-click Add or Remove Programs. 3. From the left pane, click Add/Remove Windows Components. 4. From the Components list, click
More informationTrend Micro Email Encryption Gateway 5
Trend Micro Email Encryption Gateway 5 Secured by Private Post Quick Installation Guide m Messaging Security Trend Micro Incorporated reserves the right to make changes to this document and to the products
More informationParallels Plesk Control Panel
Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,
More informationPlesk for Windows Copyright Notice
2 Plesk for Windows Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd.
More informationMonitoring and Troubleshooting Microsoft Exchange Server 2007 (5051A) Course length: 2 days
Monitoring and Troubleshooting Microsoft Exchange Server 2007 (5051A) Course length: 2 days Who Should Attend: This workshop is intended for experienced enterprise-level messaging professionals who have
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationCREATING WEB PAGES USING HTML INTRODUCTION
CREATING WEB PAGES USING HTML INTRODUCTION Web Page Creation Using HTML: Introduction 1. Getting Ready What Software is Needed FourSteps to Follow 2. What Will Be On a Page Technical, Content, & Visual
More informationLab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
More informationITIS 2110 Lab 11: Domain Name Server. Tyler Everhart 11/12/2010
ITIS 2110 Lab 11: Domain Name Server Tyler Everhart 11/12/2010 Overview The purpose of Lab 11 was to implement a simple domain name server between the end clients host and the top level domain DNS server.
More informationQuick Guide of HiDDNS Settings (with UPnP)
Quick Guide of HiDDNS Settings (with UPnP) Solution 1: With the development of surveillance systems, more and more users want to use ADSL to realize video surveillance through network. But ADSL gives dynamic
More informationTNote125 Student Locator Framework Email Notification Diagnostics
Technical Note 125 September 25, 2006 TNote125 Student Locator Framework Email Notification Diagnostics The Student Locator Agent uses standard Internet email to notify designated administrators when a
More informationPatented hosting technology protected by U.S.Patents 7,0909,948; 7,076,633. Patents pending in the U.S.
Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 600 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd. All rights reserved
More informationUploading files to a web server using SSH Secure Shell 3.2.9
Uploading files to a web server using SSH Secure Shell 3.2.9 Practical workbook Aims and Learning Objectives By the end of this course you will be able to: Upload your documents (for example HTML files)
More informationWEB & MOBILE DEVELOPMENT. How To: Setup your email address in Windows Vista Mail
WEB & MOBILE DEVELOPMENT How To: Setup your email address in Windows Vista Mail Contents Windows Vista Mail: Setting up Email for the First Time... 2 Windows Vista Mail: Checking Existing Email Settings...
More informationChapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
More informationBasic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
More informationTableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
More informationPenetration Testing Lab. Reconnaissance and Mapping Using Samurai-2.0
Penetration Testing Lab Reconnaissance and Mapping Using Samurai-2.0 Notes: 1. Be careful about running most of these tools against machines without permission. Even the poorest intrusion detection system
More informationThe Transport Layer. Antonio Carzaniga. October 24, 2014. Faculty of Informatics University of Lugano. 2005 2007 Antonio Carzaniga
The Transport Layer Antonio Carzaniga Faculty of Informatics University of Lugano October 24, 2014 Outline Basic concepts in transport-layer protocols Multiplexing/demultiplexing UDP message format Reliable
More informationEmail Marketing Product User s Guide Advanced Internet Technologies, Inc. AIT Center June 1, 2004
Email Marketing Product User s Guide Advanced Internet Technologies, Inc. AIT Center June 1, 2004 Search All Your Favorite Engines from a Single Source with tybit!!! (Download Now) Revision History: This
More informationFundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
More informationOutlook Web App. in Office 365. The Outlook Window. Signing In. (Outlook Exchange Faculty & Staff) Getting Started
Outlook Web App in Office 365 (Outlook Exchange Faculty & Staff) Getting Started The Outlook Window Navigation Bar Settings Navigation Pane View Pane Reading Pane Navigation Bar switch between Outlook,
More informationChapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
More informationTo configure Outlook Express for your InfoMetrics E-mail address:
To configure Outlook Express for your InfoMetrics E-mail address: 1. Open Outlook Express 2. Click the Tools menu, and select Accounts... 3. Internet Accounts window will open, click Add and menu will
More informationWeek Date Teaching Attended 2 Jan 2013 Lab 1: Linux Services/Toolkit Dev t
Week Date Teaching Attended 2 Jan 2013 Lab 1: Linux Services/Toolkit Dev t Aim: The aim of this lab is to investigate the discovery and configuration of services within Linux. It uses a Linux Ubuntu Virtual
More informationChapter 4 Restricting Access From Your Network
Chapter 4 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax NEXT Wireless Router WNR834B to protect your network. You can
More informationUsing etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
More informationInstalling GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
More informationCUSTOMER+ PURL Manager
CUSTOMER+ PURL Manager October, 2009 CUSTOMER+ v. 5.3.1 Section I: Creating the PURL 1. Go to Administration > PURL Management > PURLs 2. Click Add Personalized URL 3. In the Edit PURL screen, Name your
More informationChapter 3 Restricting Access From Your Network
Chapter 3 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax Dual Band Wireless-N Router WNDR3300 to protect your network.
More informationNETWORK SET UP GUIDE FOR
NETWORK SET UP GUIDE FOR USZ11ZS USX21ZS USX31ZAND DVRX16D DVRX32D HDDX13D SUPPORTING ROUTER D-Link Linksys NETGEAR BELKI IP Addresses on the Internet When you connect to the Internet, through dialup connection,
More informationSetting up SMTP in Talis Decisions
Decisions Talis Library Management Suite Setting up SMTP in Talis Decisions This document describes how to configure SMTP (Single Mail Transfer Protocol) in Talis Decisions. It is intended for system administrators
More informationConfiguring Web services
Configuring Web services (Week 13, Tuesday 11/14/2006) Abdou Illia, Fall 2006 1 Learning Objectives Install Internet Information Services programs Configure FTP sites Configure Web sites 70-216:8 @0-13:16/28:39
More informationDevice Log Export ENGLISH
Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,
More informationConfiguration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.
Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them
More informationDC Agent Troubleshooting
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
More informationQuick Scan Features Setup Guide
Xerox WorkCentre 7132 Quick Scan Features Setup Guide 701P45042 This guide includes instructions for: Scan to Email on page 1 Scan to Mailbox Setup (Optional) on page 5 Network Scanning Setup (Optional)
More informationBasic Exchange Setup Guide
Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided
More informationTHE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that
More informationNetwork Pop Quiz 5 Brought to you by www.rmroberts.com please visit our site!
Network Pop Quiz 5 Brought to you by www.rmroberts.com please visit our site! This is a set of questions to help you prepared for the CompTIA Network+ certification examination. You should not exceed twenty
More informationMobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)
More informationConfiguring Security for SMTP Traffic
4 Configuring Security for SMTP Traffic Securing SMTP traffic Creating a security profile for SMTP traffic Configuring a local traffic SMTP profile Assigning an SMTP security profile to a local traffic
More informationCopyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationComputer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
More informationInstalling GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
More informationNovell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
More informationNetwork User's Guide for HL-2070N
f Multi-Protocol On-board Print Server Network User's Guide for HL-2070N Please read this manual thoroughly before using the printer. You can print or view this manual from the Printer CD-ROM at any time,
More informationWebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
More informationConnecting with Computer Science, 2e. Chapter 5 The Internet
Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar
More informationAdministrator Operations Guide
Administrator Operations Guide 1 What You Can Do with Remote Communication Gate S 2 Login and Logout 3 Settings 4 Printer Management 5 Log Management 6 Firmware Management 7 Installation Support 8 Maintenance
More informationClick-To-Talk. ZyXEL IP PBX License IP PBX LOGIN DETAILS. Edition 1, 07/2009. LAN IP: https://192.168.1.12 WAN IP: https://172.16.1.1.
Click-To-Talk ZyXEL IP PBX License Edition 1, 07/2009 IP PBX LOGIN DETAILS LAN IP: https://192.168.1.12 WAN IP: https://172.16.1.1 Username: admin Password: 1234 www.zyxel.com Copyright 2009 ZyXEL Communications
More informationNetwork Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
More informationSerialMailer Manual. For SerialMailer 7.2. Copyright 2010-2011 Falko Axmann. All rights reserved.
1 SerialMailer Manual For SerialMailer 7.2 Copyright 2010-2011 Falko Axmann. All rights reserved. 2 Contents 1 Getting Started 4 1.1 Configuring SerialMailer 4 1.2 Your First Serial Mail 7 1.2.1 Database
More informationData Communication I
Data Communication I Urban Bilstrup (E327) 090901 Urban.Bilstrup@ide.hh.se www2.hh.se/staff/urban Internet - Sweden, Northern Europe SUNET NORDUnet 2 Internet - Internet Addresses Everyone should be able
More informationBasic Exchange Setup Guide
Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided
More informationOwner of the content within this article is www.msexchange.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.msexchange.org Written by Marc Grote www.it-training-grote.de Exchange 2003 SMTP Namespace Sharing Written by Marc Grote - mailto:grotem@it-training-grote.de
More informationThis document details the following four steps in setting up a Web Server (aka Internet Information Services -IIS) on Windows XP:
Wazza s QuickStart: Setting up a Web Server (IIS) Windows XP This document details the following four steps in setting up a Web Server (aka Internet Information Services -IIS) on Windows XP: Configuring
More informationLotus Notes Client Version 8.5 Reference Guide
Lotus Notes Client Version 8.5 Reference Guide rev. 11/19/2009 1 Lotus Notes Client Version 8.5 Reference Guide Accessing the Lotus Notes Client From your desktop, double click the Lotus Notes icon. Logging
More informationOUTLOOK WEB APP (OWA): MAIL
Office 365 Navigation Pane: Navigating in Office 365 Click the App Launcher and then choose the application (i.e. Outlook, Calendar, People, etc.). To modify your personal account settings, click the Logon
More informationQUICK START GUIDE. Cisco C170 Email Security Appliance
1 0 0 1 QUICK START GUIDE Email Security Appliance Cisco C170 303357 Cisco C170 Email Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance
More informationWhite Paper How to Remotely Access Ethernet I/O Over the Internet
White Paper How to Remotely Access Ethernet I/O Over the Internet ACROMAG INCORPORATED Tel: (248) 295-0880 30765 South Wixom Road Fax: (248) 624-9234 P.O. BOX 437 Wixom, MI 48393-7037 U.S.A. Copyright
More informationSETTING UP REMOTE ACCESS FOR Q-SEE DVR SYSTEMS MODEL NUMBER: QC40198
Accessing the DVR from a Computer Attached to the Same Router: If you are only going to access the DVR from a computer that is attached to the same router as the DVR you only need to setup the information
More informationPaperless Meeting Software Installation Instructions
Paperless Meeting Software Installation Instructions Acknowledgments... 1 Overview... 1 Before you begin... 1 Installation... 3 Trouble Shooting... 14 Saving Data... 16 Acknowledgments Thank you for supporting
More informationPlesk 7.6 For Windows E-mail User Guide
SWsoft, Inc. Plesk 7.6 For Windows E-mail User Guide (Revision 1.0) (c) 1999-2006 ISBN: N/A SWsoft, Inc. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703)
More informationM3-R3: INTERNET AND WEB DESIGN
M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER
More informationCourseware Update. (last modified: 3/10/2010)
Internet Business Foundations v2.0 This document contains revisions that have occurred to this course since its most recent public release. NEW VERSION RELEASE: The 2.0 version of Internet Business Foundations
More informationLinux Administrator (Advance)
Linux Administrator (Advance) Mr.Kriangsak Namkot Trainer & Director Jodoi IT&Service Co.,Ltd. jodoi@jodoi.com jodoi1819@hotmail.com http://www.jodoi.com Linux Admin II Day 2 9:00 น. -12.00 น. - Mail Server
More information1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
More informationIntroduction. Friday, June 21, 2002
This article is intended to give you a general understanding how ArGoSoft Mail Server Pro, and en Email, in general, works. It does not give you step-by-step instructions; it does not walk you through
More informationHow to create an email template
How to create an email template Templates are created the same way as you would for any other content page for an html or text email. By checking the box next to the Name this Content field on the Create
More informationUsing the CCNY Server Space with Secure Shell 3.0 for Windows Created by Doris Grasserbauer dgrasserbauer@ccny.cuny.edu
Using the CCNY Server Space with Secure Shell 3.0 for Windows Created by Doris Grasserbauer dgrasserbauer@ccny.cuny.edu Topics: 1. Logging on to the server space 2. How to create a new folder on the server
More informationSetting Up Sharp MX-Color Imagers To Scan To Email
Setting Up Sharp MX-Color Imagers To Scan To Email MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, MX-M850, MX-M950, MX-M1100 Step 1. Click Start > Run
More informationScan to E-mail Quick Setup Guide
Xerox WorkCentre M118i Scan to E-mail Quick Setup Guide 701P42574 This guide provides a quick reference for setting up the Scan to E-mail feature on the Xerox WorkCentre M118i. It includes procedures for:
More informationRoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
More informationWeb Mail Classic Web Mail
April 14 Web Mail Classic Web Mail Version 2.2 Table of Contents 1 Technical Requirements... 4 2 Accessing your Web Mail... 4 3 Web Mail Features... 5 3.1 Home... 5 3.1.1 Mailbox Summary... 5 3.1.2 Announcements...
More informationDDNS Management System User Manual V1.0
DDNS Management System User Manual V1.0 1 03/01/2012 Table of Contents 1. Introduction.3 2. Network Configuration 3 2.1. Configuring DDNS locally through DVR Menu..3 2.2. Configuring DDNS through Internet
More informationLab 3.4.2: Managing a Web Server
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5
More informationSetting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder
Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, *MX-M850, *MX-M950,
More informationFTP Use. Internal NPS FTP site instructions using Internet Explorer:
FTP Use File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP), which transfers
More informationConfiguration Guide for Exchange 2003, 2007 and 2010
Configuration Guide for Exchange 2003, 2007 and 2010 Table of Contents Exchange 2013... 2 Configuring Outbound Smart Host... 2 Configure Access Restriction to Prevent DoS Attacks... 2 Exchange 2007/2010...
More informationSemantic based Web Application Firewall (SWAF - V 1.6)
Semantic based Web Application Firewall (SWAF - V 1.6) Installation and Troubleshooting Manual Document Version 1.0 1 Installation Manual SWAF Deployment Scenario: Client SWAF Firewall Applications Figure
More information