1 Hardlock in a Network Aladdin Document: HL-mn (11/2002) 1.1-A03909 Revision: 7.2 Date: November 28, 2002
3 Hardlock Documentation Hardlock Documentation The Hardlock documentation gives you comprehensive information about the components of the Hardlock product range and about the possibilities for protecting your software. The documentation is made up of the following parts: The Hardlock Technical Manual shows you the principles according to which software protection functions with Hardlock and informs you about the entire Hardlock product range. In this way, you can find the right protection for your application. The for HL-Bistro Manual provides you with an introduction to the HL-Bistro program package. This enables you to work with the Windows functionality you are familiar with when protecting your software. The Manual shows you how to proceed when you want to use Hardlock in a network. The HL-Crypt Manual provides you with an introduction to automatically encrypting your programs. The HL-API Manual provides you with an overview of the HL-API functions for manual implementation in your programs. The Terminology Manual gives you an explanation of the core terms used in Hardlock. The manuals are supplemented by online help for the various programs. In each case, you will find the most up-to-date information in the readme files supplied with the programs. The following formatting types are used in the manuals and the online help: Formatting Function Example Bold Interface terminology and menu commands Products File/CTV from Hardlock Hardlock Twin CAPITAL Files and paths HLDRV.EXE LETTERS COURIER Syntax hlpatchup -m 29809
4 1-2 : Hardlock in a Network The Hardlock documentation describes the most important features of the Hardlock protection system. We have taken a great deal of care to ensure that this documentation is complete and accurate. However, Aladdin Knowledge Systems Germany is unable to accept any liability for damage or loss resulting from omissions or mistakes in the documentation.
5 Contents Contents 1 : Hardlock in a Network General Testing Mode of Working and Resources On the Client On the Server Supported LANs Types Installation Testing the Installation Aladdin Monitor Aladdin DiagnostiX Hardlock End-Users Manual Implementation and Licensing Licensing with and HL-LiMaS Licensing without HL-LiMaS Automatic Implementation with Espresso/HL-Crypt Manual Implementation with Hardlock API as Win32 Application (HLS32) General Command Line Switches The Interface (HLS32.EXE) as NT Service (HLS32SVC) General
6 1-2 : Hardlock in a Network 4.2 Command Line Switches for Installation Command Line Switches for Control (HLS32CMD.EXE) Control Using the Aladdin Monitor for Linux General Installation Command Line Switches Stopping the as Netware NLM Application General Installation Command Line Switches as DOS TSR General Installation Command Lines for DOS TSR Interfaces for DOS TSR Using the Menu Interface Description of Menus and Functions Status Menu Install Menu System Menu Local Menu Remote Menu Exit Menu Command Line Switches Switch:[Arguments] (Version)...8-4
8 1-4 : Hardlock in a Network 11 Error Messages Troubleshooting, Tips and Notes Searching for the HL-RUS License File (ALF) Specifying the Search Sequence Background Syntax Client for TCP/IP Search Strategy Comments Ports, Sockets and Filters What to Do When the Computer Crashes? TSR and Other TSR Programs Multitasking, Windows & OS/2 and DOS TSR Windows 3.x and DOS TSR Windows for Workgroups and DOS TSR Windows 9.x/ME, Windows NT/2000/XP OS/2 DOS Box, LAN Server and DOS TSR Several Systems in a Network One Hidden Additional License Novell NetBios Emulation Extreme Network Load Time (DOS) Index
9 : Hardlock in a Network : Hardlock in a Network 1.1 General makes it possible to use the Hardlock protection system in a network. The Hardlock module which enables your protected applications to be run, is connected to a central server computer. The protected applications then access this protection module via the network. You can define how many accesses to the Hardlock module (without HL-LiMaS) or the individual slots (with HL-LiMaS) can take place at the same time. In order to use, your customers need to have a functioning network, a parallel, USB, or internal Hardlock Server module, installed software to control access to the Hardlock module as a Win32 application or a Windows NT/2000/XP Service, Linux application or daemon, and the classic variants for NetWare (NLM) and DOS (TSR).), optional Aladdin Monitor for central administration of several in the network. Please refer to chapter 1.3 for information about possible operating systems and protocols. Relevant terminology is explained in chapter 10. Network access to the Hardlock module must be allowed for during implementation (manual or automatic). However, you do not then have to decide on only one access type; you can also allow both access types. In that case, the system first searches for the Hardlock module locally and then on the network. Please refer to chapter 2 for more information about implementation when using and the licensing options with and without LiMaS. 1.2 Testing You can test all functions in demo mode. automatically activates demo mode (can handle 10 login entries) if you specified you were using the demo Hardlock during installation. The demo Hardlock required has been assigned module address All examples in this manual are based on this module address.
10 1-2 : Hardlock in a Network 1.3 Mode of Working and Resources On the Client Applications which use a Hardlock supplied by the log themselves on to the (Login) and can then use this remote Hardlock as they would a local Hardlock connected directly to the computer. Libraries for remote access are integrated in the application to be protected either automatically with HL-Crypt (see the HL-Crypt Manual) or manually (see the Hardlock API Manual). All other stations in the network that want to use one of the Hardlocks supplied by HL- Server do not require any additional software other than the necessary protocol drivers. The following protocols are possible for the various applications: Possible client protocols Protocol DOS W16 W32 Linux IPX X x x Netbios X x TCP/IP x x x When the protected application accesses the Hardlock module, it is entered in a login table on the server which offers space for the same number of entries as you have assigned for your software licenses. When the maximum number of simultaneous users has been reached, no more applications can be started until an entry is freed up by a logout. The entry can be released automatically if the application does not access the Hardlock module for a certain length of time. The timeout time is defined during implementation On the Server directly accesses the network protocol layer. Consequently, to use HL- Server, the system must be wired as a network and a network protocol (e.g. TCP/IP, IPX, or NetBios) must be installed. can only be loaded once on each computer. Possible server protocols Protocol DOS W16 W32 NLM Linux IPX X x x x Netbios X x
11 : Hardlock in a Network 1-3 Protocol DOS W16 W32 NLM Linux TCP/IP x x x x modules are available as an external plug, both USB and parallel, and as an internal plug-in card (ISA, MCA and PCI). For further see the Hardlock Technical Manual. A can support up to ten (DOS: up to three) modules on one computer at the same time. A separate login table is created for each of these modules. The maximum number of login entries is limited to 250 licenses per module. However, you can limit the total number of login entries permitted to between one and the maximum number of 250 in practical operation Supported LANs There is an almost infinite number of possible combinations between LAN type, protocol and network topology. Consequently, we have deliberately decided not to list all LAN environments which are compatible with. If your LAN does not meet these criteria, please contact our support team for special tips on using your particular network or for information on whether your supports your network. 1.4 Types can be run under various operating systems. Refer to the following table to see which type of you need for which operating system and in which chapter this type of server is described. Operating system Protocols Description DOS HLSERVER.EXE IPX, NetBios Chapter 5 OS/2 HLSERVER.EXE IPX, NetBios Chapter 5 Netware 3.1x, 4.x, 5.x HLSERVER.NLM IPX, TCP/IP Chapter 6 Windows 3.1x HLSERVER.EXE IPX, NetBios Chapter 5 Windows 95/98/ME HLS32.EXE IPX, TCP/IP, NetBios Chapter 3 Windows NT 3.51, 4.0/2000/XP HLS32SVC.EXE IPX, TCP/IP, NetBios Chapter 4 HLS32.EXE Linux Hlserver TPC/IP Chapter 5
12 1-4 : Hardlock in a Network 1.5 Installation Under Windows 9.x/ME and NT/2000/XP For the installation of the application and service we provide the file HLSW32.EXE. With this file, your customer can install the following: for Win32 (HLS32.EXE) as a NT service (HLSVC.EXE) Drivers for Hardlock In addition to the file HLSW32.EXE you should also provide your customer with Aladdin Monitor for the central adinistration of all in the network. As an alternative, you can also integrate routines for installing and the required Hardlock drivers into your programs. To do this, use the driver installation API and the Hardlock Server installation API. For a more detailed description, please refer to the HINSTALL.HLP file (driver installation API) and the HSIAPI.PDF file (server installation API). See also the HL-API Manual. Under Linux The installation of for Linux is described in chapter 5. Under Novell The installation of for Novell is described in chapter 6. Under DOS and OS/2 The installation of for Novell is described in chapter Testing the Installation After installation is loaded. The registered module can now be used by all computers in the network (in the examples, this module is the demo module with module address 29809). All stations can now test accessing of the Hardlock being served. To do so, start the HLOGIN.EXE program and enter the module address: HLOGIN 29809
13 : Hardlock in a Network 1-5 The following message should be displayed indicating that the command has been carried out correctly: Login to Hardlock successful. A station is given authorized access until the following command is entered, at which point the station is no longer registered in the login table: HLOGOUT The following message appears indicating that this has been performed correctly: Logout from Hardlock successful. Please refer to chapter 9 for a detailed description of the two utility programs. 1.7 Aladdin Monitor The new Aladdin Monitor (AKSMON) replaces the HLSAdmin program. The program enables end-users to check all s in the network, access a local service under NT, perform license updates (HL-LiMaS). Language setting The Aladdin Monitor is available in German and English by linking language DLLs. The end-user can change the language setting. The default setting depends on the corresponding system setting. New Functions for Hardlock LiMaS The program makes it easier for end-users to administer Hardlock modules which have been encoded for Hardlock LiMaS: The occupation of the individual slots is displayed. Data for updates of the Hardlock modules can be exported and imported directly via the Aladdin Monitor.
14 1-6 : Hardlock in a Network 1.8 Aladdin DiagnostiX The new Aladdin DiagnostiX tool replaces the HLDiag program. It makes it easier to solve problems encountered by your customers. Aladdin DiagnostiX enables end-users to check Hardlock modules, generate reports containing relevant information (driver version, network information, etc.) configure Hardlock Environment settings. The generated reports which you receive from your customers assist you to provide solutions to problems affecting your customers use of deployed Hardlock modules. Aladdin DiagnostiX is shipped with an online Help system. There is also a special section on the tool in the Hardlock End User Manual. See below for more information. 1.9 Hardlock End-Users Manual We provide you with an end-users manual which helps to avoid problems during utilization of the Hardlock protection system. The manual contains information about the Aladdin DiagnostiX utility, the update mechanisms and programs when using HL-LiMaS, the System including the new Aladdin Monitor, possible ways of avoiding and rectifying problems, in particular when using Hardlock in a network. The end-users manual can be downloaded from our website.
15 Implementation and Licensing Implementation and Licensing 2.1 Licensing with and HL-LiMaS If you are using HL-LiMaS when encoding Hardlock-Server modules, you can set up licenses for different components by means of slots (see also the HL-LiMaS Addendum). You can use up to slots and assign up to licenses per slot. Licensing involving users per slot replaces licensing involving users per module and therefore makes it possible to achieve a greater granularity in assigning licenses. With HL-LiMaS, you define the conditions required for each program file to start when you are protecting the program files. You can use a counter, slots and expiration dates individually and in combination when doing this. The first matching condition is used for each program start. The license information is stored both in the memory of the Hardlock module and in a license file with the file name extension ALF (Aladdin License File), see chapter The following steps are required for licensing: When protecting your programs, define under which conditions the program starts. When doing this, you can make the program start dependent on the license for a slot, on valid expiration dates and on a global counter (with Espresso, HL-Crypt or with manual implementation using HL-API). When you are encoding the module for your customer, define how many licenses there are for each slot, which expiration dates apply globally or for the individual slots and what is the top limit of the counter (e.g. using Cappuccino). The higher granularity means the licensing procedure is slightly more complicated when HL-LiMaS is used. As a result, take particular care when assigning the conditions and run through the various possibilities afforded by your licensing system in a precise fashion. Example for using slots Conditions for the program to start: TEXT program runs if there is a license free for slot 1 or slot 2. TABLE program runs if there is a license free for slot 2.
16 2-2 Implementation and Licensing Hardlock encoding for the customer: Slot 1 has one license Slot 2 has three licenses Application: 1. A user starts TEXT and TABLE. One license for slot 1 (first condition) and one license for slot 2 are used. 2. A second user starts TABLE. A license for slot 2 is used. 3. A third user starts TEXT. Since there is no longer a license free for slot 1, the second condition is used: A license for slot 2 is used. 2.2 Licensing without HL-LiMaS Without HL-LiMaS, you can define the number of licenses for accessing the Hardlock module when using. Up to 250 licenses are possible. You can limit the number of licenses by storing a signature in the RAM area or in the ROM area of the Hardlock memory. The format of the signature is Logins:nnnn. The four-digit number is entered in decimal notation. A signature in the RAM area is fundamentally non-secure because it can be altered using software. The only advantage is that you can alter the licensing without having to re-encode the module. If you want to keep this option open, then we recommend that you use HL-LiMaS, because this provides just such an update option in a more convenient and secure way. A signature in the ROM area is defined when the Hardlock module is encoded. This licensing cannot be bypassed by altering it using software. You can define the memory content during encoding with Cappuccino (see the HL-Bistro Manual) or using the EDITEEP utility program (see chapter 9.3). Note: If you are working with the standard loader (HL-Crypt for DOS programs, option -n), you cannot assign licenses. The standard loader is only logged on to while the application is being loaded. Afterwards, it automatically logs back out and is completely deleted from memory. While the program is running, no login permanently remains in. This permits any number of applications to be run as long as an with the correct module address was found when the system was started.
17 Implementation and Licensing 2-3 This feature is useful if you want to license your application without any limit on the number of users per network. 2.3 Automatic Implementation with Espresso/HL-Crypt You have to enable network access to the Hardlock module during automatic implementation with HL-Crypt (see the HL-Crypt Manual) or Espresso (see the HL- Bistro Manual). You can also enable both types of access (local and via a network). In that case, the program first searches for an appropriate Hardlock module locally and then on the network. Espresso: Call up Hardlock Settings and select the Search for via the Network option. You can also specify the timeout here. This value defines the period of time after which an entry in the login table is deleted if the client no longer accesses the Hardlock module. HL-Crypt: Use acc:lr (local or via the network) or acc:r (exclusively via the network), e.g.: [HL-Crypt] myprogram.exe m acc:lr If you are using HL-LiMaS, you must also define during automatic implementation what are the conditions which have to be met in order for the protected program file to start (see chapter 2.1). 2.4 Manual Implementation with Hardlock API Enabling network access When logging in using HL_LOGIN or HLM_LOGIN, enter I_CARE (local or via the network) or NET_DEVICE (only network access) as the access mode, e.g.: hlresult = HL_LOGIN(29809,NET_DEVICE,RefKey,VerKey); Checking licenses (without HL-LiMaS) In addition to the login, you can also check how many entries are possible in the table and how many entries there currently are. You can do this while the program is running. To do this, use the HL_MAXUSER (possible entries) and HL_USERINF (current entries) functions. This only makes sense if you are not using HL-LiMaS, because with LiMaS, licenses are only assigned per slot and not per Hardlock module.
18 2-4 Implementation and Licensing Assigning slots and checking licenses (with HL-LiMaS) If you are using HL-LiMaS, you can make the ability of program sections to run dependent on certain conditions. Use the HLM_OCCUPYSLOT, HLM_FREESLOT; HLM_CHECKALLSLOTS, HLM_CHECKSLOT, HLM_CHECKCOUNTER, HLM_CHECKEXPDATE functions, etc. to occupy, release and check slots. Defined behavior You should program the manual implementation so that your application behaves in a defined manner if is not available (e.g. network interruption). This can be done, for example, by sending a message to the user or by terminating the program in a normal manner. For more information on this subject, refer to the HL-API Manual.
19 as Win32 Application (HLS32) as Win32 Application (HLS32) 3.1 General for 32-bit Windows comprises three parts: a service that runs under Windows NT/2000/XP (see chapter 4), an application for Windows 9x/ME, and the Aladdin Monitor (AKSMON) for central administration of several in the network that can be used both under Windows 9x/ME and under Windows NT/2000/XP. Please note that none of the programs mentioned runs under Win32s, the 32-bit upgrade for Windows 3.x. can only be loaded once on each computer. Up to ten Hardlock modules are supported on each. At the protocol level, the Win32 supports IPX, Netbios, and TCP/IP. The IPX page can be addressed by all IPX clients. The clients provide IP support for Win16 and Win32. TCP/IP must be accessible through Windows sockets (WINSOCK.DLL or WSOCK32.DLL). This is the case, for example in Windows NT/2000/XP, Windows 9x/ME and WfW 3.11 with MS-TCP/IP. Other WINSOCK implementations should also run. We have successfully tested, e.g. the CompuServe Internet Dialer and Trumpet WinSock. can be controlled directly from the command line layer. This makes it possible to implement functions in batch programs. The various functions are input in the form of switches when the program is activated. Please refer to chapter 3.2 for an overview of the possible switches. 32 can be operated both with a menu interface and using the command line. The functions are more or less identical. The Win32 interface offers a range of additional functions, e.g. for displaying system data and testing the security modules. 3.2 Command Line Switches By default, can be called as a Win32 application as follows: HLS32 It is not essential to specify a module address. The system searches for the module addresses of located Hardlock modules when there are checks and adds them (autoadd).
20 3-2 as Win32 Application (HLS32) The table below contains further switches which can either be used written out in full or in their abbreviated form. Please refer to chapter 8 for a detailed description of the individual switches. Switch Meaning Remark Abbreviated form -? Displays switches that can be used with -?. -install Installs. You must always specify Can be omitted -i a module address (-module:n[,m]). -module:n[,m] Module address of the Hardlock to be Can be omitted, -m:n[,m] served (you can enter up to three addresses with one call). n refers to a decimal module address. m is an optional switch for limiting the number of login entries to the number specified (other limitations, such as the number of licenses purchased cannot be exceeded). the HLS automatically searches for Hardlocks when there are checks -comm:s[,s] Used for specifying one or more network -c:s,[,s] protocols. If you do not set this switch, HL- Server supports all protocols available on the computer simultaneously. s refers to the IPX or NetBios protocols. -timeout:n Used for specifying the amount of time -t:n (minutes) after which a login entry of a station that has crashed should be deleted from the login table. The default timeout value is 15. Values between 0 (= timeout deactivated) and 9999 may be entered. -password:s Defines a password for deleting a remote login entry. The system will prompt you to enter this password if you try to delete a login entry using the user interface. -p:s -forcent Forces HLS32 to start even under Windows NT/2000/XP. If not specified, a reference to the service is displayed under NT/ The Interface (HLS32.EXE) The interface offers a list of all active modules and their properties: Module: Module address of the Hardlock Logins: Current number of users logged on Peak: Peak value of logged on users (since the server started) -f
21 as Win32 Application (HLS32) 3-3 Limit: Number of released licenses Req.: Number of server requests (checks) Errors: Number of failed server requests Double-click the corresponding Hardlock address to open a window displaying all available login locations with their current assignment (node or IP address of the client and Task ID), timeout counter reading, as well as login date. To retrieve more information about the current status of your, double-click the Hardlock icon in the upper left corner of the interface. This opens another window, containing more detailed information about events presently occurring on HL- Server. It is here you will find information about every single API function called, the sender (node or IP address), current execution status, as well as the transfer protocol used.
23 as NT Service (HLS32SVC) as NT Service (HLS32SVC) 4.1 General for 32-bit Windows comprises three parts: a service that runs under Windows NT/2000/XP, an application for Windows 9x/ME, and the Aladdin Monitor for central administration of several in the network that can be used both under Windows 9x/ME and under Windows NT/2000/XP. Please note that none of the programs mentioned runs under Win32s, the 32-bit upgrade for Windows 3.x. can only be loaded once on each computer. Up to ten Hardlock modules are supported on each. At the protocol level, the 32-bit supports IPX, Netbios, and TCP/IP. The IPX page can be addressed by all IPX clients. The clients provide IP support for Win16 and Win32. TCP/IP must be accessible through Windows sockets (WINSOCK.DLL or WSOCK32.DLL). This is the case, for example in Windows NT/2000/XP, Windows 9x/ME, and WfW 3.11 with MS-TCP/IP. Other WINSOCK implementations should also run. We have successfully tested, e.g. the CompuServe Internet Dialer and Trumpet WinSock. can be controlled directly from the command line layer. This makes it possible to implement functions in batch programs. The various functions are input in the form of switches when the program is activated. Please refer to chapters 4.2 and 4.3 for an overview of the possible switches. 4.2 Command Line Switches for Installation By default, can be installed and started as an NT Service as follows: hls32svc install hls32svc start It is not essential to specify the module address. The system searches for the module addresses of located Hardlock modules when there are checks and adds them. The table below contains further switches. Please refer to chapter 8 for a detailed description of the individual switches. Switch Meaning Abbreviated form -? Displays switches that can be used with HL- Server -?
24 4-2 as NT Service (HLS32SVC) Switch Meaning Abbreviated form -install Installs. You must always specify a module address (-module:n[,m]) (None) -start Starts the Service (None) -stop Stops the Service (None) -remove Removes the Service (None) 4.3 Command Line Switches for Control (HLS32CMD.EXE) You can use HLS32CMD.EXE if you want to control the NT Service via a command line rather than with the Aladdin Monitor. Switch Meaning -add [mouleaddr] -remove [moduleaddr] -timeout [minutes] -enable [protocol] -disable [protocol] Adds a Hardlock module to a running server Removes a Hardlock module from a running server Defines the server timeout Activates the protocol (TCP, IPX, NetBios) Deactivates the protocol (TCP, IPX, NetBios), NetBios is only selected and not deactivated until after a restart. 4.4 Control Using the Aladdin Monitor You can install, remove, start and stop the Service using the Aladdin Monitor. Use the commands in the Service menu in order to do this. Please refer to the online help.
25 for Linux for Linux 5.1 General for Linux provides the same functionality as the for Win32 including LiMaS support. An application using the cannot recognize any difference between a server earmarked for Linux applications and one designed for Win32 or NLM. The Hardlocks used to protect applications are the same, therefore when selecting a, opt for a system that best fits your customers network environment. for Linux supports IP/UDP protocol and uses port 3047 (IANAregistered) for communication. When using a demo Hardlock, specify module address 29809, and therefore you can test the without requiring a specific -Hardlock. 5.2 Installation can be started either as a daemon (-d), or as a console application (-a). The console application mode can be used to track possible problems; as it shows a trace of all client requests, similar to the trace window displayed by HLS32.EXE on Win32, when double clicking the Hardlock Icon. for Linux can be monitored and administered by the AKSMON (Aladdin Monitor) utility running on a Win32 terminal. for Linux fully supports the Hardlock LiMaS license management functions and the Hardlock classic functions, for USB, parallel and internal Hardlocks. Before for Linux can be started, the Hardlock drivers (aksparlnx.o and aksusbd) must be installed. Please refer to the install.txt file of the Hardlock driver for further information. 5.3 Command Line Switches is started from the console with hlserver [options]
26 5-2 for Linux The following command line switches are supported: -h Display help -a Run as application -d Run as daemon -module:n[,m] -timeout:n -zombie Module address [,max logins] of Hardlock (up to 10 times). Optional: modules are auto-added when requested. Timeout value in minutes. Values between 1 and 9999, 0=no timeout. Default value is 15. Enable zombie mode for timed out logins All parameters may be abbreviated according to their first letter. You must specify either the a or d options. Examples: hlserver d starts as a daemon without registering any Hardlock. Whenever a client application requests an unknown Hardlock, searches for the Hardlock and automatically adds it when available. It is recommended that you insert hlserver d into the appropriate startup script of the machine. The daemon writes its start/stop events and adds/removes a hardlock in the syslognormally in /var/log/messages. Hlserver m:29809 d starts as a daemon and tries to register Hardlock If the Hardlock is not found, the daemon immediately stops. 5.4 Stopping the The daemon is stopped by the kill <processid> command. uses Posix threads, so it appears several times in the process list. Therefore when you kill the first thread, the others willl stop automatically. The application can be stopped with ^C.
NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
Remote Access Server - Dial-Out User s Guide 95-2345-05 Copyrights IBM is the registered trademark of International Business Machines Corporation. Microsoft, MS-DOS and Windows are registered trademarks
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
NDA-30141 ISSUE 1 STOCK # 200893 CallCenterWorX-Enterprise IMX MAT Quick Reference Guide MAY, 2000 NEC America, Inc. LIABILITY DISCLAIMER NEC America, Inc. reserves the right to change the specifications,
DATA PROJECTOR XJ-A135/XJ-A145/XJ-A235/ XJ-A245 E Data Projector Wireless Function Guide Be sure to read the precautions in the User s Guide (Basic Operations) that comes with the Data Projector. Be sure
DATA PROJECTOR XJ-A146/XJ-A246/XJ-A256 E Data Projector Wireless Function Guide Be sure to read the precautions in the Setup Guide that comes with the Data Projector. Be sure to keep all user documentation
LESSON 13 Managing Devices OBJECTIVES After completing this lesson, you will be able to: 1. Open System Properties. 2. Use Device Manager. 3. Understand hardware profiles. 4. Set performance options. Estimated
April 2012 QIAsymphony Management Console User Manual For use with software version 4.0 Sample & Assay Technologies Trademarks QIAGEN, QIAsymphony, Rotor-Gene (QIAGEN Group). InstallShield (Informer Technologies,
Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...
Nortel Networks Call Center Reporting Set Up and Operation Guide www.nortelnetworks.com 2001 Nortel Networks P0919439 Issue 07 (24) Table of contents How to use this guide... 5 Introduction...5 How this
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for
Monitoring Network DMN User Manual Table of contents Table of contents... 2 1. Product features and capabilities... 3 2. System requirements... 5 3. Getting started with the software... 5 3-1 Installation...
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces
1 of 38 About the QMS Network for Windows NT System Requirements" Installing the " Using the " Troubleshooting Operations" Introduction The NT Print Spooler (both workstation and server versions) controls
Xerox 700 Digital Color Press with Integrated Fiery Color Server Utilities 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45072726
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of
MAS 90 Installation and System Administrator's Guide 4WIN1010-02/04 Copyright 1998-2004 Best Software, Inc. All rights reserved. Rev 02 Contents Chapter 1 Introduction 1 How to Use This Manual 1 Graphic
Operating Instructions (For Setting Up) Digital Imaging Systems Installation Overview Model No. DP-8060 / 8045 / 8035 Table of Contents Setting Your Machine Installation Overview General Installation Overview...
EPSON Scan Server & EPSON TWAIN Pro Network EPSON Scan Server & EPSON TWAIN Pro Network SCANNER UTILITY PROGRAMS All rights reserved. No part of this publication may be reproduced, stored in a retrieval
Guest PC for Mac OS X Version 1.6 User Guide Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved. Table of Contents About Guest PC... 1 About your Virtual Computer... 1 Creating a Virtual
NetSentinel Reference Installing Software for Network Versions...2 The Rainbow NetSentinel Software... 2 Network Version Requirements... 3 Installing the Rainbow Network Software... 3 Security Server Reference...
PAYMENTVAULT TM LONG TERM DATA STORAGE Version 3.0 by Auric Systems International 1 July 2010 Copyright c 2010 Auric Systems International. All rights reserved. Contents 1 Overview 1 1.1 Platforms............................
GE Healthcare Life Sciences UNICORN 5.31 Administration and Technical Manual Table of Contents Table of Contents 1 Network setup... 1.1 Network terms and concepts... 1.2 Network environment... 1.3 UNICORN
Monitor Wall 4.0 en Installation and Operating Manual Monitor Wall 4.0 Table of Contents en 3 Table of Contents 1 Introduction 4 1.1 About this Manual 4 1.2 Conventions in this Manual 4 1.3 Minimum Installation
Integrated Accounting System for Mac OS X and Windows Program version: 6.2 110111 2011 HansaWorld Ireland Limited, Dublin, Ireland Preface Books by HansaWorld is a powerful accounting system for the Mac
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
Getting Started with Vision 6 Version 6.9 Notice Copyright 1981-2009 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop
PRINT CONFIGURATION Red Flag Server5 has improved the designs of the printer configuration tool to facilitate you to conduct print configuration and print tasks management in a more convenient and familiar
BorderGuard Client Version 4.4 November 2013 Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, Virginia 20151 703-631-0700 WWW.BLUERIDGENETWORKS.COM All Products are provided with RESTRICTED
Parallels Software International, Inc. Parallels Desktop for Mac Quick Start Guide 3.0 (c) 2005-2007 Copyright 2006-2007 by Parallels Software International, Inc. All rights reserved. Parallels and Parallels
Rapid Assessment Key User Manual Table of Contents Getting Started with the Rapid Assessment Key... 1 Welcome to the Print Audit Rapid Assessment Key...1 System Requirements...1 Network Requirements...1
ServerView User s Guide (For Windows Agent) Areas Covered - Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview of ServerView
Network Installation Guide WorkForce 610 Series Artisan 710 Series Contents Before You Begin.......................................... 3 Choose Your Connection Type................................ 4 Wireless.............................................
MODEL: MX-M283N MX-M363N MX-M453N MX-M503N DIGITAL MULTIFUNCTIONAL SYSTEM Software Setup Guide BEFORE INSTALLING THE SOFTWARE SETUP IN A WINDOWS ENVIRONMENT SETUP IN A MACINTOSH ENVIRONMENT TROUBLESHOOTING
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
When upgrading your TAPIT software make sure that all call accounting data has been exported before you begin the installation process. Registration Settings: SERIAL NUMBER: COMPUTER ID: REGISTRATION NUMBER:
CONFIGURATION MANUAL FILE TRANSFER DAEMON Version 3.7 - June 2014 CONFIGURATION MANUAL IP2Archive 1.4 File Transfer Daemon 3.7 Copyright EVS Broadcast Equipment SA Copyright 2003-2014. All rights reserved.
C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing
Author Janice Hong Version 1.0.0 Date Mar. 2014 Page 1/56 How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment? Application Note The 32-bit operating system
Network Installation Guide Artisan 810 Series Before You Begin Make sure you installed ink cartridges and loaded paper as described on the Start Here sheet. Then follow the instructions in this guide to
Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control
Kaspersky Password Manager User Guide Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most questions that may arise.
Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
HP ProLiant Support Pack and Deployment Utilities User Guide June 2003 (Ninth Edition) Part Number 214611-009 2000, 2003 Hewlett-Packard Development Company, L.P. Microsoft, Windows, and Windows NT are
Network Setup Guide This manual contains the setup information required to use the machine over wired LAN. If you use the machine with USB connection, refer to your setup sheet. Introduction To use the
Network Guide PREFACE Every effort has been made to ensure that the information in this document is complete, accurate, and up-to-date. The manufacturer assumes no responsibility for the results of errors
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
The Discovery Series Multi-User License Installation This document provides information needed to install and to operate The Discovery Series multi-user licensing capability. This document is for individuals
SA-9600 Surface Area Software Manual Version 4.0 Introduction The operation and data Presentation of the SA-9600 Surface Area analyzer is performed using a Microsoft Windows based software package. The
Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec
Installation Guide for Workstations Copyright 1998-2005, E-Z Data, Inc. All Rights Reserved. No part of this documentation may be copied, reproduced, or translated in any form without the prior written
Release notes version 7.01 Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version. It s available as a free downloadable upgrade to existing version 7.0 customers
OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.
Features Reference About Unified Communication System Before Using This Machine Starting a Meeting What You Can Do During the Meeting Leaving a Meeting Managing Address Book Changing Network Configuration
3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other
LifeCyclePlus Version 1 Last updated: 2014-04-25 Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious unless otherwise noted.
1 2 3 4 Database Studio is the new tool to administrate SAP MaxDB database instances as of version 7.5. It replaces the previous tools Database Manager GUI and SQL Studio from SAP MaxDB version 7.7 onwards
Backup Server DOC-OEMSPP-S/6-BUS-EN-21062011 The information contained in this guide is not of a contractual nature and may be subject to change without prior notice. The software described in this guide
HP ProLiant ML110 Server Network Operating System Installation Guide January 2004 (First Edition) Part Number 344-535-001 Regulatory Model Number HSTNS-3100 2004 Hewlett-Packard Development Company, L.P.
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
IMAGING LICENSE SERVER USER GUIDE Imaging License Server User Guide PerkinElmer Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
PaperClip32 Installation Guide for Workgroup and Enterprise Editions Document Revision 2.1 1 Copyright Information Copyright 2005, PaperClip Software, Inc. The PaperClip32 product name and PaperClip Logo
MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information
Accounting Manager User Guide A31003-P1030-U114-2-7619 Our Quality and Environmental Management Systems are implemented according to the requirements of the ISO9001 and ISO14001 standards and are certified
TSMobiles Terminal Service client for Mobiles For keyboard and touchscreen BlackBerry devices User manual Introduction... 3 System Requirements... 3 1. Configuring Remote Desktop on computer... 4 2. Installation...
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...