File Sharing In a Peer-to-Peer Network
|
|
|
- Collin Miller
- 10 years ago
- Views:
Transcription
1 Overview File Sharing In a Peer-to-Peer Network Vs /23/05 Windows XP supports file sharing between computers on a local area network (LAN) which is configured as a peer-to-peer network. A peer-to-peer network is one where there is no server to authenticate users and passwords, and each user logs in directly to his/her own computer. Peer-to-peer networks are suitable for smaller companies who have 10 computers or less. As a company s total number of PCs approaches 10, it is necessary to begin planning for the implementation of a server, because a Windows XP computer cannot share files with more than 10 other computers. In peer-to-peer networks, it is frequent practice to designate one particular machine as the server, even though it is technically just another PC and does not have a server operating system such as Windows 2003 Server or Windows Small Business Server. This central machine can be used to store files for the entire company, and everyone can open and save files to/from this server in order to facilitate backup. Experience has shown that if certain steps are taken on each machine, file sharing will become much more reliable. The purpose of this paper is to outline the steps required to build and maintain reliable file sharing between PCs on an peer-to-peer network. System Requirements and Best Practices 1. Every computer on the network MUST have either Windows 2000 Professional or Windows XP Professional. Older systems like Windows 98 and Windows ME will work, but offer absolutely zero file security and will be a constant source of problems. Also, logins on Windows 98/ME are easy to circumvent, which in turn causes problems with file sharing. It is better to upgrade or eliminate all PCs which are still running Windows 98 or ME. Windows XP Home will not work because XP Home does not offer the type of file and folder security that XP Professional offers. XP Home only offers the ability to share files and folders, without the ability to set protections that allow certain users to access certain folders but not others. XP Home is truly a home operating system and has no place in an office with a file sharing requirement. 2. The central server must have sufficient memory and disk space to serve files for all users. A minimum configuration for the server is 512MB of memory for up to 4 users. For more than 4 users, 1GB of memory is recommended in order for the server to be able to process multiple requests for files simultaneously. 3. The central server must have some kind of unattended backup system, such as a tape drive or an external, removable disk drive. CD-R drives can be used for backup, but they must be manually operated, and experience has shown that the more operator intervention is required, the less likely the backup system is to be effective. Backup to CDs should be consider as an interim solution only. 4. A redundant disk arrangement on a server is highly advisable. It is fairly simple and costeffective to install a mirrored disk configuration on the server using what is called a RAID card. With this expansion card and two identical disk drives, the system writes the exact same Corporate Office: 29 Briarglen Irvine, CA
2 Report: File Sharing in a Peer-to-Peer Network 3/23/05 Page 2 of 5 thing to both disks simultaneously. If one disk fails, the other disk takes over instantly without having to shut down the computer. The failed disk drive can then replaced after hours with no downtime during business hours, and after installation, it re-mirrors and becomes once again identical to the other drive. In most cases a mirrored disk configuration can be added to the main server PC for under $500 including components and installation. System Setup In a peer-to-peer network, there is no server to log users in, check their passwords and grant them access to resources on the network. For this reason, there is a greater effort required to maintain the network, but once these procedures are understood, the effort is very manageable. Proper attention spent up-front in setting up the system will make ongoing maintenance much easier and less time-consuming. 1. Every computer must be made part of the same workgroup. It doesn t matter what the name of the workgroup is, but it absolutely must be the same on every computer. 2. Simple File Sharing in Windows XP must be turned off. On is the default setting, and it forces the user to use a very simplified method of sharing folders that provides no ability to open certain folders to certain individuals only. Windows XP Home provides nothing BUT simple file sharing and that s why it is unsuitable for a business environment. 3. Your software firewall must be configured to allow for file and printer sharing. Usually, when two computers cannot be made to share files, the #1 reason is the presence of a software firewall preventing it. In the Windows XP Firewall, you can check on an Exception that will permit file and printer sharing through the firewall. 4. Between any two computers where file sharing is desired, the logins and passwords must match. For example, let s say that a user logs in as John on PC01 on workgroup WORKGROUP with a password of sunset. In order for John to be able to access files on any other computer on the network, that computer must also have a login of John with a password of sunset. (Note: there are ways to work around this, but they are so troublesome and the results so inconsistent that it is easier to just consider this a requirement and learn to live with it.) If there is a central file server which serves up files to all the PCs on the network, then that file server must have a matching login for every user who logs into any PC on the network, and the passwords must match. It is this single requirement that makes the management of a peer-to-peer network more work than a server network. Every time a user changes his/her password, that password must be changed on every other computer with which that person shares or obtains files. For this reason it is best to set good passwords, instruct employees to keep them secret from one another, and then simply don t change them unless it s absolutely necessary. If an employee leaves the company, it is necessary to remove their login on every machine on the network where their login was set up, and especially on the server. 5. If a particular PC does not need to share its folders with other computers, then that PC does not need to have every login that exists on the network. It needs to have only the login of the person who uses it. However, if it is desired in the future to share one of its folders, then a login should be created on that computer that matches the login of any other user on the network who will access those files.
3 Report: File Sharing in a Peer-to-Peer Network 3/23/05 Page 3 of 5 6. Logins must match exactly. You may know that John on one computer is the same as John Smith on another, but to Windows those are two separate people. Come up with a standard nomenclature and use it consistently for every login. It is also better if the login is all one word: Jsmith or JohnSmith or John are all better than John Smith. A blank space in login names causes problems in other applications. Using only first names is fine until you get a second employee with the same first name then you are forced to change your nomenclature. It is better to avoid first names only. 7. If the logins on two machines are inconsistent, DO NOT merely rename one of the logins, as Windows XP will allow you to. Go to the machine where the login does not meet your nomenclature and create a new login that does meet the standard, along with its matching password. Merely renaming an existing account provides inconsistent results. 8. Logins in Windows are NOT case sensitive, so a login of jsmith is equivalent to a login of JSmith. But it is still better to standardize and then be consistent. 9. Every login must have a password. Windows XP does not like logins that have no password, and they will be a source of constant headaches. Many people don t like passwords, but they are absolutely mandatory for consistent file-sharing. Do what you will with passwords, but there must be a non-blank password on every login. 10. If any individual wishes to have a folder or folders that are confidential, that individual must have a different password than everyone else, and the password must be kept secret. 11. Passwords on Windows XP ARE case-sensitive. The best passwords are those which are at least 8 characters and include capitals, lower case letters, numbers and punctuation characters. The password can have a mnemonic such as a phrase represented by the characters, such as Oicu812! (read it.) The best passwords of all are those with a completely random set of characters, numbers and punctuation, such as R23#@bbk. Set the complexity of your passwords according to your need for security from outsiders. If you have a snoopy employee who has hacker tendencies, you may need complex passwords for internal security as well. The greater the need for confidentiality, the better the passwords must be to protect it. 12. In order for a folder to be accessible to others, that folder must be shared. Sharing a folder is as simple as right-clicking on it, clicking on Sharing, and then giving it a share name. In the most general terms, if a folder is shared on any PC using default settings, that folder can be accessed by any other computer with a matching login and password. So, in our example, if John shares a folder on PC01, then that folder is accessible on any other PC on the network as long as it has a login of John with a password that matches John s password on PC It is possible to limit sharing of a file to only certain individuals. However, experience has shown that limiting sharing access to a folder as a means of providing security causes a lot of problems. It is much better to set sharing wide-open even for a confidential folder, and then control access through security settings on the folder and not through sharing settings. 14. Windows, unfortunately, supports nested shares. In other words, it allows you to share a folder, and then subsequently share one of its sub-folders. However, sharing a folder means that EVERY subfolder is already available automatically. Nested shares are a mess and create a lot of confusion. It is better to just operate as though once a master folder is shared, ALL of its subfolders are available and do not need to be shared separately. 15. If there is a folder on the server which contains confidential information that should not be made available to all employees, then that folder should be moved OUT OF any master
4 Report: File Sharing in a Peer-to-Peer Network 3/23/05 Page 4 of 5 folder which is already shared. Then the confidential folder is shared separately, and folder security is set for the folder and its contents that limit access to certain logins only. As long as the logins match between PCs, though others may be able to map the folder to a drive, only the authorized user(s) can actually open the folder, view its contents and manipulate its files. This approach is suitable for Quickbooks, Quicken or other financial or HR data. It can also be used to keep Outlook files on the server, although running Outlook on a network. PST file has its own set of challenges. (Specifically, if the network is down, the user will get an error message when running Outlook and the program will not start.) 16. The best way to make shared folders available across a network is through mapped drives. A mapped drive is simply a shared folder on another computer, mounted to this computer as a particular drive letter such as H: or J: or Z:. If mapped drives are properly set up, they will remount themselves every time the computer is started or rebooted. 17. The best way to map drives is through a simple login script that is run on each PC when the user logs in. The script is a program in a text file that tells the computer to mount a particular folder on another computer or the central server, as a particular drive letter. The mapping command is net use. The syntax is as follows: net use \\server\datafolder N: This command will cause the shared Data folder on the server to be mounted to this PC as the N: drive. Then, any file in the Data folder can be accessed as N:\filename 18. It is often customary to share folders that contain company information that employees need access to, and then to allow employees to store other files in their own My Documents folder. Storing of personal files into a company shared folder should be discouraged because file security is a problem and because files so added will increase the backup burden. It is easy to set up a separate folder for each employee, which only he/she has access to, on the server, in a place that can be backed up or not, as preferred. 19. It is also possible to set each machine so that the user s My Documents folder actually resides on the server instead of their local C: drive. Then, anything they save that is not part of the shared company data still gets stored on the server, transparent to the user. This also offers the advantage that if employees swap computers for whatever reason, there are never any files to move from one computer to the other because all files are on the server. Conclusion The process of setting up a functional and trouble-free peer-to-peer file sharing configuration sounds like a lot of work, but it really boils down to good habits on the part of the technician in setting it up. These procedures become second nature, and thus experimentation is reduced and the configuration becomes much more likely to work from the start. Once implemented, simple adherence to these rules about login consistency, avoiding nested shares and unnecessary shares, etc. will minimize the amount of maintenance required in order to make file sharing productive and reliable. On the final page are the Ten Commandments of File Sharing. Remember them and observe them always.
5 Report: File Sharing in a Peer-to-Peer Network 3/23/05 Page 5 of 5 The Ten Commandments of File Sharing 1. Thall shalt use Windows Professional exclusively and shall eschew and have no portion or share with Home or 9X operating systems. 2. Thall shalt abolish Simple File Sharing and never give it a foothold or a portion. 3. Thall shalt choose a workgroup name and never stray from it. 4. Thall shalt suffer no login to exist without a password. 5. Thall shalt make passwords difficult to guess, and share them not among users. 6. Thall shalt make the logins match on any two machines which intend to have communion. 7. Thall shalt not create nor suffer to exist, any nested share. 8. Thall shalt not attempt to secure folders by limiting their share, but shall instead secure them through folder security. 9. When an employee departeth, thall shalt strike his name, his login and his password from every computer on which it dwells, and especially from the server. 10. Remember your firewall and keep it secure, save for imparting to it the knowledge of file and printer sharing.
BestSync Tutorial. Synchronize with a FTP Server. This tutorial demonstrates how to setup a task to synchronize with a folder in FTP server.
BestSync Tutorial Synchronize with a FTP Server This tutorial demonstrates how to setup a task to synchronize with a folder in FTP server. 1. On the main windows, press the Add task button ( ) to add a
Backing up Data. You have lots of different options for backing up data, different methods offer different protection.
Backing up Data Why Should I Backup My Data? In these modern days more and more is saved on to your computer. Sometimes its important work you can't afford to lose, it could also be music, photos, videos
Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x
Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...
How To Run Eve 5 On A Pc Or Mac Or Ipad (For Pc Or Ipa) On A Network (For Mac) On Your Computer Or Ipro (For Ipro) On An Ipro Or Ipo (For Windows)
EVE5 Hardware and Software Requirements EVE5 is a Client/Server program. i.e. there are 2 components to the program: 1/ The Server: this controls your database and will be installed on one computer only.
TROUBLESHOOTING INFORMATION
TROUBLESHOOTING INFORMATION VinNOW Support does not support Microsoft products to include SQL Server,.NET Framework, and also cannot assist with Windows User issues, Network or VPN issues. If installing
Wazza s QuickStart 15. Leopard Server - Disaster Backup
Wazza s QuickStart 15. Leopard Server - Disaster Backup About the Document This document is the 15th in a series of documents describing the process of installing and configuring a Mac OS X 10.5 Server
QuickBooks 2010 Installation Guide
QuickBooks 2010 Installation Guide This article provides instructions for installing QuickBooks 2010 on a single computer and in a network environment. QuickBooks Elements Several elements are involved
Installation Guide for Workstations
Installation Guide for Workstations Copyright 1998-2005, E-Z Data, Inc. All Rights Reserved. No part of this documentation may be copied, reproduced, or translated in any form without the prior written
Keystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS
The following instructions are required for installation of Best Access System s Keystone 600N5 (KS600N) network key control software for the server side. Please see the system requirements on the Keystone
Note: Make sure the.pst file is stored in your U: drive, this drive is protected by backups.
Email Management Best Practices I. Introduction: The School Board Network Infrastructure that we use daily is a huge investment involving workstations, servers, storage, software and backup equipment.
Windows Domain Network Configuration Guide
Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication may
Windows Peer-to-Peer Network Configuration Guide
Windows Peer-to-Peer Network Configuration Guide Windows Peer-to-Peer Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication
ScoMIS Encryption Service
Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation
Using Red Hat Enterprise Linux with Georgia Tech's RHN Satellite Server Installing Red Hat Enterprise Linux
Using Red Hat Enterprise Linux with Georgia Tech's RHN Satellite Server Installing Red Hat Enterprise Linux NOTE: If you need more information regarding the installation process for other distributions
Copyright Pro Softnet Corporation. All rights reserved. 2 of 24
Copyright Pro Softnet Corporation. All rights reserved. 2 of 24 Remote Access Helpdesk User Manual TABLE OF CONTENTS Introduction...4 Features...4 Administrator: Manage Technicians...5 Technician: Initiate
Small Business Server Part 1
Small Business Server Part 1 Presented by : Robert Crane BE MBA MCP [email protected] Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS
Creating client-server setup with multiple clients
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
Windows XP Home Network Setup: Step-by-Step
Windows XP Home Network Setup: Step-by-Step Before we begin, please uninstall any and all firewall software. Software firewalls such as Norton Internet Security, Zone Alarm, Black Ice, McAfee Firewall,
4cast Server Specification and Installation
4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system
Setting up an MS SQL Server for IGSS
Setting up an MS SQL Server for IGSS Table of Contents Table of Contents...1 Introduction... 2 The Microsoft SQL Server database...2 Setting up an MS SQL Server...3 Installing the MS SQL Server software...3
Allworx Installation Course
VPN Hello and welcome. In the VPN section we will cover the steps for enabling the VPN feature on the Allworx server and how to set up a VPN connection to the Allworx System from your PC. Page 1 VPN The
Using HP System Software Manager for the mass deployment of software updates to client PCs
Using HP System Software Manager for the mass deployment of software updates to client PCs Introduction... 2 HP manageability solutions... 2 SSM overview... 3 Software updates... 3 Why not SSM-enabled?...
Cobian9 Backup Program - Amanita
The problem with backup software Cobian9 Backup Program - Amanita Due to the quixotic nature of Windows computers, viruses and possibility of hardware failure many programs are available for backing up
aims sql server installation guide
aims sql server installation guide Document Version: 4000 February 2015 CONTENTS AIMS Installation Guide... 3 Installing the AIMS Software... 4 Pre-Requisites... 4 Installation... 4 Shortcuts... 4 Directory
026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide
026-1010 Rev 7 06-OCT-2011 Site Manager Installation Guide Retail Solutions 3240 Town Point Drive NW, Suite 100 Kennesaw, GA 30144, USA Phone: 770-425-2724 Fax: 770-425-9319 Table of Contents 1 SERVER
ADMINISTRATOR S GUIDE
F O R W I N D O W S N T ADMINISTRATOR S GUIDE 1997 Claris Corporation. All Rights Reserved. Claris Corporation 5201 Patrick Henry Drive Santa Clara, California 95052 Claris and FileMaker are trademarks
FTP Service Reference
IceWarp Unified Communications Reference Version 11.3 Published on 1/6/2015 Contents... 3 About... 4 Reference... 5 General Tab... 5 Dialog... 6 FTP Site... 6 Users... 7 Groups... 11 Options... 14 Access...
Getting Started Guide
Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server
Scan to SMB(PC) Set up Guide
Scan to SMB(PC) Set up Guide Regarding Trade Names Windows is a registered trademark of Microsoft Corporation in the U.S.A. and/or other countries. Windows XP and Windows Vista are trademarks of Microsoft
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
1 of 10 1/31/2014 4:08 PM
1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings
VMware Cloud Environment
VMware Cloud Environment Enterprise level virtual datacentre: providing highly redundant, fast and scalable solutions. An eukhost Technical White Paper. Page 1 Introduction... 3 Traditional physical solutions...
Creating and Managing Shared Folders
Creating and Managing Shared Folders Microsoft threw all sorts of new services, features, and functions into Windows 2000 Server, but at the heart of it all was still the requirement to be a good file
Enterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
DAZZLE INTEGRATED DATA BACKUP FEATURE.
DAZZLE INTEGRATED DATA BACKUP FEATURE. To simplify the backup process and to make sure even the busiest (or laziest) shops have no excuse not to make data backups, we have created a simple on-screen backup
How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
Installation & Maintenance Guide
The instruction booklet is also included on the CD in Word and Acrobat formats, which may be easier to print. (If you want to install Acrobat Reader run d:\acroread\setup.exe (where d:\ is the identifier
Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation
User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended
Hosting Users Guide 2011
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
Installation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
DMP V2.0.1 Installation and Upgrade Reference
DMP V2.0.1 Installation and Upgrade Reference Page 1 of 40 Table of Contents Overview... 3 Compatibility Issues with Previous DMP Versions... 3 DMP V2.0.1 Installation... 3 Sybase CD... 3 Installed Components...
Microsoft SQL Server Guide. Best Practices and Backup Procedures
Microsoft SQL Server Guide Best Practices and Backup Procedures Constellation HomeBuilder Systems Inc. This document is copyrighted and all rights are reserved. This document may not, in whole or in part,
Installation Instruction STATISTICA Enterprise Server
Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)
ScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
PROMISE ARRAY MANAGEMENT (PAM) for
PROMISE ARRAY MANAGEMENT (PAM) for FastTrak SX4030, SX4060 and S150 SX4-M User Manual Version 1.1 PAM for FastTrak SX4030, SX4060 and S150 SX4-M User Manual Copyright 2004 Promise Technology, Inc. All
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
Installation Guide. (June 2014)
Installation Guide Medtech Fax Solution (for Windows 7 and later) (June 2014) IMPORTANT NOTE Medtech recommends that all Medtech upgrades and database back-up and restore processes are performed by a Medtech
Resolving H202 Errors (INTERNAL)
Resolving H202 Errors (INTERNAL) Contents Scope and audience.......3 General H202 Error Information...... 3 System Recommendations....4 QuickBooks Multi User Mode - QuickBooks Over a Network......4 QuickBooks
Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools
Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the
DPMS2 McAfee Endpoint Encryption New Installation
DPMS2 McAfee Endpoint Encryption New Installation Contents DPMS2 McAfee Endpoint Encryption New Installation... 1 1. Registering for the Application... 2 2. Downloading the Application... 6 3. Important
educ Office 365 email: Remove & create new Outlook profile
Published: 29/01/2015 If you have previously used Outlook the with the SCC/SWO service then once you have been moved into Office 365 your Outlook will need to contact the SCC/SWO servers one last time
Migrating Groupwise Data
Migrating Groupwise Data Requirements: Windows Computer on CCSF admin network Outlook 2010 Groupwise 8 windows client Network access Office 365 login and password Groupwise login and password USB Flash
FrontDesk Installation And Configuration
Chapter 2 FrontDesk Installation And Configuration FrontDesk v4.1.25 FrontDesk Software Install Online Software Activation Installing State Related Databases Setting up a Workstation Internet Transfer
Deploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS
Your Login ID: GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS CONTENTS 1.0 Introduction... 3 1.1 Welcome to Edinburgh Napier University from Information Services!... 3 1.2 About Information
Introduction to Microsoft Small Business Server
Summary The aim of this article is to present some basic information about Small Business Server 2003 and how it can fit in with your business. Topics What is Small Business Server? (also known as SBS)
BACKUP THOSE IRREPLACEABLE FILES TO ANOTHER MEDIUM FOR SAFE KEEPING
BACKUP THOSE IRREPLACEABLE FILES TO ANOTHER MEDIUM FOR SAFE KEEPING A Seminar Presented by Bill Wilkinson November 2008 Backup: To copy data files to a second drive as a precaution in case the first drive
Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition
Remote Access Technologies: A Comparison of Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition Contents: Executive Summary...1 Remote Access Overview...2 Intended Application... 2 Revolutionary
1. Installation Overview
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
NetLeverage UK ThinPoint Solution Overview Version 2 Copyright 2012 NetLeverage UK
NetLeverage UK ThinPoint Solution Overview Version 2 Copyright 2012 NetLeverage UK 1. ThinPoint solution to Access your Own PC You require your business users to access their own PC in the office remotely
Acronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide
Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
Lexia Network Installation Instructions
Lexia Network Installation Instructions For Lexia Early Reading 3.x, Primary Reading 1.x, Foundation Reading 1.x, Strategies for Older Students 4.x, Cross-Trainer 1.x and Quick Reading Test 2.x (NOT for
How to Use Remote Access Using Internet Explorer
Introduction Welcome to the Mount s Remote Access service. The following documentation is intended to assist first time or active users with connecting, authenticating and properly logging out of Remote
Setup and configuration for Intelicode. SQL Server Express
Setup and configuration for Intelicode SQL Server Express Due to overwhelming demand and the increased load on support, we are providing a complete SQL Server installation walkthrough document. SQL Server
FTP Service Reference
IceWarp Server FTP Service Reference Version 10 Printed on 12 August, 2009 i Contents FTP Service 1 V10 New Features... 2 FTP Access Mode... 2 FTP Synchronization... 2 FTP Service Node... 3 FTP Service
Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations
Projetex 9 Workstation Setup Quick Start Guide 1 Projetex 9 Help Table of Contents Disclaimer 2 System Requirements 2 Registration/Upgrade 3 Projetex Workstation Setup 5 User Login to Projetex Workstation
English. Network Sharing. Ver.3.0. * Firmware
Network Sharing Ver.3.0. * Firmware How to set-up Folder Sharing in Windows 7 This instruction is for Window 7 Ultimate. 1. [Start] [Control Panel] - [View network status and tasks in Network and Internet].
Business On Line CUSTOMER HANDBOOK
Business On Line CUSTOMER HANDBOOK Contents Section 1. Business on Line 1.1 Benefits of Business On Line 1.2 Service Levels Section 2. Customer support 2.1 Help Screens 2.2 Customer Support Unit 2.3 Additional
SARANGSoft WinBackup Business v2.5 Client Installation Guide
SARANGSoft WinBackup Business v2.5 Client Installation Guide (November, 2015) WinBackup Business Client is a part of WinBackup Business application. It runs in the background on every client computer that
Windows XP Virtual Private Network Connection Setup Instructions
Windows XP Virtual Private Network Connection Setup Instructions Find your My Network Places icon on your desktop or in your control panel under Network and Internet Connections By default, this is NOT
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
Database Assistant. Once Database Assistant is installed you must login to gain access to the database. Copyright 2009
TOSHIBA Strata CIX Technical Bulletin March 2008 is a companion package to Voice Assistant. provides an interface between any Open Database Connectivity (ODBC) compliant database and Voice Assistant. This
Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4
Contents Before You Start 2 Configuring Rumpus 3 Testing Accessible Directory Service Access 4 Specifying Home Folders 4 Open Directory Groups 6 Maxum Development Corp. Before You Start Open Directory
Sharing Pictures, Music, and Videos on Windows Media Center Extender
Sharing Pictures, Music, and Videos on Windows Media Center Extender Applies to: Microsoft Windows XP Media Center Edition Microsoft Windows Media Center Extender Microsoft Windows Media Center Extender
How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On
Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
Remote Desktop Services
Remote Desktop Services White Paper November 2014 Maximizing the Value and Performance of QuickBooks Enterprise with Remote Desktop Services Formerly known as Windows Terminal Services, Remote Desktop
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
Exporting emails from Outlook Version 1.00
Exporting emails from Outlook Version 1.00 The rapid growth in volume of emails means that there is a growing need to archive old emails to media such as external hard disks and DVD s. The document will
Deploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions
Xopero Backup Build your private cloud backup environment. Getting started
Xopero Backup Build your private cloud backup environment Getting started 07.05.2015 List of contents Introduction... 2 Get Management Center... 2 Setup Xopero to work... 3 Change the admin password...
Lab 5 Managing Access to Shared Folders
Islamic University of Gaza Computer Network Lab Faculty of engineering ECOM 4121 Computer Department. Prepared by : Eng. Eman R. Al-Kurdi Managing Access to Shared Folders Objective: Manage access to shared
Chapter Thirteen (b): Using Active Directory Integration
Chapter Thirteen (b): Using Active Directory Integration Summary of Chapter: How to add a User to your Net/Cache/SecurePilot that will match your Active Directory Security Group. How to set-up your Net/Cache/SecurePilot
Xactimate v.27 Network Installation
Xactimate v.27 Network Installation Requirements Like all networked software applications, Xactimate Version 27 must be installed on a workstation connected to a network that has been properly set up and
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
Allworx OfficeSafe Operations Guide Release 6.0
Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,
Shared File Room Field Guide
Shared File Room Field Guide September 2013 Copyright: 2013, CCH, a part of Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form or
SETTING UP AN INSTANT MESSAGING SERVER
SETTING UP AN INSTANT MESSAGING SERVER I recently upgraded a Charlotte company from an NT 4 domain to Small Business 2003. While the employees seemed excited about the Exchange server, Outlook Web Access,
E-mail:[email protected] Web site: www.tst-software.com
E-mail:[email protected] Web site: www.tst-software.com Solutions That Make Sense for Windows 7/XP/2008 and 2003 Server/2000 Multi-DNC v8.0 for Windows 7/XP/2008 and 2003 Server/2000 communications
Moving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.
SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. 1. Setting up your network to allow incoming connections on ports used by Eyemax system. Default ports used by Eyemax system are: range of ports 9091~9115
Sentral servers provide a wide range of services to school networks.
Wazza s QuickStart File Sharing for Macs on a Sentral Server Mac OS X, Sentral Background Sentral servers provide a wide range of services to school networks. One of those services is a space for sharing
