Introduction Installing the download utility Installing Java(TM) 2 Runtime Environment, Standard Edition
|
|
|
- Emory Knight
- 10 years ago
- Views:
Transcription
1 Installing Java Runtime Environment Table of contents Introduction Installing the download utility Installing Java(TM) 2 Runtime Environment, Standard Edition Configuring the ami.ini file Configuring the products.ini file Running the download utility Log Files Scheduling the download utility to run automatically Troubleshooting Using a Proxy Server Troubleshooting using a Proxy Server Page 1 of 12
2 Introduction ASX has developed a Java application which is made available to customers of ASX Online Market Information without charge. This application is designed to automatically downloads all product files into a specified directory on your infrastructure. It downloads all current and historical product files listed in your products.ini file, into the directory you have specified for that product. The number of historical files is limited to those that are visible in your browser at any point in time. The download utility firsts checks whether you have already downloaded that file, if not, it downloads the new file. The download utility will create a 'date' directory underneath the directory you have specified for each product. For example, files for the 20th March 2003 will be created in a directory underneath the directory you have specified for that product. While ASX has used reasonable care and skill in developing this java application, this utility is made available in good faith, and without charge, to assist customers. It is provided on the basis that all customers will satisfy themselves as to the suitability of the product for use in their environment. In these circumstances, ASX is not able to offer support for this application and does not in any way guarantee the functionality or suitability of the product, nor does ASX accept any liability concerning the use of or failure of the java application. 1. Installing the download utility Windows platform 1. Using WinZip, extract the client.zip file onto the Windows machine where you shall be performing the file download. 2. These are the files and directories that shall be extracted: Page 2 of 12
3 Page 3 of 12
4 Unix platform 1. Extract and untar the client.tar.gz file onto the Unix machine where you shall be performing the file download. 2. These are the files and directories that shall be extracted: -rwxrwxr-x 356 Mar 5 16:15 ami.ini drwxrwxr-x 512 May 14 10:55 install drwxrwxr-x 512 May 14 10:43 lib -r-xr-xr-x 1102 Feb 11 17:18 logging.properties drwxrwxr-x 512 May 14 10:39 logs -rwxrwxr-x 499 Feb 7 14:54 products.ini -r-xr--r May 13 10:51 rundownload.sh This will extract all the configuration files into the base directory, along with a batch file for executing the download utility. You will also notice a lib and logs directories. The lib directory contains all the necessary jars used by the download utility, including the download utility itself. All log files created by the download utility will be found in the logs directory. 2. Installing Java(TM) 2 Runtime Environment, Standard Edition The Java client is built for Java(TM) 2 Runtime Environment, Standard Edition or higher. If you do not have a JVM on your machine, go to the Java download site at: This must be installed for the client to run. 3. Configuring the ami.ini file The ami.ini file contains 'name=value' pairs. These are explained below. Name=Value pair Description baseurl= The URL for the Market Information web service (this should not be modified). userid=<enter User ID> Your username for the Market Information site. password=<enter password> Your password for the Market Information site. Page 4 of 12
5 The following properties are only applicable if you connect to the Internet via a proxy server. Leave these properties empty if you have a direct connection to the Internet. Name=Value pair proxyhost=proxyserver.com.au proxyport=8083 proxyusername=proxyuser proxypassword=proxypassword Description The name of the proxy server you use. The port to use when connecting via the proxy server. The user name for HTTP proxy basic authentication if applicable. The password for HTTP proxy basic authentication if applicable. 4. Configuring the products.ini file The products.ini file should contain a list of the products that you are subscribed to and you want downloaded regularly. The format for an entry in this file is: product_code = local_directory where product_code is the product code for a subscribed product. To obtain the product code for a product, follow the procedure Obtaining product codes given below. local_directory is the directory where you want the files for that product to be downloaded to. This can be specified as a fully qualified directory path, or a path relative to where the ini files reside. e.g. If you wanted to save the Signal D01 product to your local directory C:\My Documents you would enter the following line into your products.ini file: DO1_INT=C:\\My Documents Alternatively, if your files download utility is in c:\filedownload, the following line in your products.ini file will save the files in c:\filedownload\files\do1_int: DO1_INT=files\\D01_INT Note: On Unix replace the \\ with / OBTAINING PRODUCT CODES 1. Log in to the Market Information website. Page 5 of 12
6 2. Click on the User Profile icon. 3. Click on the Subscription Details link on the left of the screen. Page 6 of 12
7 4. The product code for each subscription can be found in the last column of the table. The following is an example of the table you will see: Product Subscriptions Product Qty / Users Total Sub. Price Product Type Billing Code Signal D12 1 $3, Web Annual D12_INT Total (including GST) $3, Note: the product code is case sensitive. Here is a list of all product codes for the signal type products PRODUCT_CODE PRODUCT_NAME D12_INT Signal D 12 Licence Fee DDISS_INT Signal D Dissemination Fee DIARYD_INT Daily Diary E19_INT Signal E Open Interest ECORP_INT Signal E Corporate Actions ESEC_INT Signal E Securities Info ETRADE_INT Signal E Trades Quotes Information TOP150_INT Top Running the download utility Once you have determined that you have a Java interpreter, and you have set up your ami.ini and products.ini files, you are able to run the download utility. To do this: 1. Go to the directory where the download utility resides. 2. On the command prompt, run the batch file provided rundownload.bat. If you are using Unix, execute rundownload.sh. 3. The application should now start running and display output giving you information about how the download process is going. The same information is saved in a log file in the logs directory. 6. Log Files Every time the java client runs it will log details to a log file. One log file will be created for each day the utility is run. When the download utility runs more than once in a day the log file is appended to. Page 7 of 12
8 /logs 20-MAR-2003.log 21-MAR-2003.log The same information will be displayed in the console. The download utility will contain a logging.properties file, this is a configuration file used by the logging library. Do not change the content of this file. 7. Scheduling the download utility to run automatically Scheduling an application to run automatically can be done on most operating systems. On the Microsoft Windows 95/NT platforms a utility called Task Scheduler is able to run applications automatically. On UNIX, a command called 'cron' is able to do a similar function. You can ask your Systems Administrator to set this up on the machine that is running the java client. Page 8 of 12
9 8. Troubleshooting Unable to authenticate user ID '<enter logon ID>' - Invalid User ID specified. Please check the ami.ini file and ensure that you have entered your correct username/password for the Market Information site. Please note that user ID should always be in lower case whilst the password is case sensitive. Malformed URL specified for server ' - unknown protocol: https This means that you have either not installed the Java 2 Runtime Environment 1.4.1, or that it is not set up correctly in your system path. Error encountered while writing to local file system In the product.ini file, ensure that the directory that you have specified in the file is correct and that no trailing spaces appear. General Error Message Possible Cause Solution Malformed URL specified for server ' - unknown protocol: https using JDK version < 1.4 install JDK version Exception in thread "main" java.lang.noclassdeffounderror: webservice/proxy/webserviceclient Error opening socket: java.net.unknownhostexception: qqwww.asxonline.com; root ex - ; target ex - incorrect classpath incorrect baseurl in ami.ini (also see table below) make sure the rundownload.bat/.sh is executed from the current directory enter correct baseurl, o/webservices Page 9 of 12
10 9. Using a Proxy Server This current release of the Java Client v8.8 can run behind a proxy server. The following combinations have been successfully tested. Proxies Server / Windows Client - Microsoft ISA Server OS: Windows 2000 server Authentication: NTLM Using MS Proxy Client - Squid Proxy OS: Unix Authentication: none Java Client Operating System NT Workstation, XP, Win 2000 Workstation NT Workstation, XP, Win 2000 Workstation, Linux Please ensure you have entered the following into ami.ini file Name=Value pair proxyhost=proxyserver.com.au proxyport=8083 proxyusername=proxyuser proxypassword=proxypassword Description The name of the proxy server you use. The port to use when connecting via the proxy server. The user name for HTTP proxy basic authentication if applicable. The password for HTTP proxy basic authentication if applicable. Troubleshooting using a Proxy Server Proxy Server Related Error Message Possible Cause Solution Error opening socket: null; root ex - ; target ex - not using firewall client AND not specifying proxy settings, but required to go through proxy server - OR - specifying proxy settings with soap.jar v2.2 - OR - using Squid proxy server requiring NTLM authentication, specifying proxy specify proxy settings ---- use soap.jar v see Note 1 below Page 10 of 12
11 settings with NO authentication details Error opening socket: java.net.connectexception not using firewall client AND not specifying proxy settings, but required to go through proxy server (also see Connection refused message below for more specific cause) specify proxy settings Error opening socket: java.io.ioexception: Unable to tunnel through :8083. Proxy returns "HTTP/ Proxy Authentication Required"; root ex - ; target ex - Error opening socket: java.io.ioexception: Unable to tunnel through proxy.asx.com.au:8083. Proxy returns "HTTP/ Proxy Authentication Required ( The ISA Server requires authorization to fulfill the request. Access to the Web Proxy service is denied. )"; root ex - ; target ex - Error opening socket: java.net.unknownhostexception: asx281abc; root ex - ; target ex - - OR - Error opening socket: java.net.socketexception: Network is unreachable: connect; root ex - ; target ex - Error opening socket: java.io.ioexception: Unable to tunnel through asx281:80. Proxy returns "HTTP/ Not Supported"; root ex - ; target ex - Error opening socket: java.net.connectexception: Connection refused: connect; root ex - ; target ex - using Squid proxy server requiring NTLM authentication, specifying proxy settings with authentication details using Microsoft proxy server requiring authentication, specifying proxy settings with NO authentication details - OR - using Microsoft proxy server requiring authentication, specifying proxy settings with authentication details specifying proxy settings with wrong proxy server value specifying proxy settings with missing proxy server port value specifying proxy settings with incorrect proxy server port value see Note 1 below see Note 1 below ---- see Note 1 below enter correct proxy server value enter correct proxy server port value enter correct proxy server port value Note 1: Page 11 of 12
12 The SOAP client can only be used as is when no authentication OR basic authentication is required on the proxy server. If the proxy server at your location requires NTLM authentication, you may like to pursue the following workarounds: If the user s desktop is Windows, install the Firewall Client and do not specify proxy settings in ami.ini. If the user s desktop is non-windows, use an authorization proxy server (see Note 2) OR put in a rule in the proxy server to bypass authentication for the user s machine. If using an authorization proxy server, put this as the proxy settings in ami.ini. Proxy server using basic authentication was not explicitly tested, but according to Apache SOAP documentation, basic authenticiation should be supported. Note 2: An authorization proxy server is a proxy software that allows you to authenticate via an MS Proxy Server using the proprietary NTLM protocol. One such software is APS - NTLM Authorization proxy server ( this is an open-source project written in Python ( This can be configured to refer to the actual proxy server as the parent proxy. Page 12 of 12
How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
Troubleshooting AVAYA Meeting Exchange
Troubleshooting AVAYA Meeting Exchange Is my browser supported? Avaya Web Conferencing supports the following browser clients for joining conferences (with the described limitations). The supported browsers
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
Elluminate Live! Access Guide. Page 1 of 7
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
XIA Configuration Server
XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
Elluminate Live! Access Guide. Page 1 of 7
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
SECURE FTP CONFIGURATION SETUP GUIDE
SECURE FTP CONFIGURATION SETUP GUIDE CONTENTS Overview... 3 Secure FTP (FTP over SSL/TLS)... 3 Connectivity... 3 Settings... 4 FTP file cleanup information... 5 Troubleshooting... 5 Tested FTP clients
This presentation will discuss how to troubleshoot different types of project creation issues with Information Server DataStage version 8.
This presentation will discuss how to troubleshoot different types of project creation issues with Information Server DataStage version 8. Page 1 of 29 The objectives of this module are to list the causes
OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.
OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does
New Features... 1 Installation... 3 Upgrade Changes... 3 Fixed Limitations... 4 Known Limitations... 5 Informatica Global Customer Support...
Informatica Corporation B2B Data Exchange Version 9.5.0 Release Notes June 2012 Copyright (c) 2006-2012 Informatica Corporation. All rights reserved. Contents New Features... 1 Installation... 3 Upgrade
Eclipse installation, configuration and operation
Eclipse installation, configuration and operation This document aims to walk through the procedures to setup eclipse on different platforms for java programming and to load in the course libraries for
Massey University Wireless Network Client Configuration Mac OS X 10.6 10.9
Massey University Wireless Network Client Configuration Mac OS X 10.6 10.9 MAC wireless network Requirements Information Technology Services You must have an active Massey username and password (i.e. you
MIGS Payment Client Installation Guide. EGate User Manual
MIGS Payment Client Installation Guide EGate User Manual April 2004 Copyright The information contained in this manual is proprietary and confidential to MasterCard International Incorporated (MasterCard)
Security Correlation Server Quick Installation Guide
orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS
HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS Overview of Oracle JInitiator Oracle JInitiator enables users to run Oracle Forms applications using Netscape Navigator or Internet Explorer. It
24x7 Scheduler Multi-platform Edition 5.2
24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table
Contents CHAPTER 1 IMail Utilities
Contents CHAPTER 1 IMail Utilities CHAPTER 2 Collaboration Duplicate Entry Remover... 2 CHAPTER 3 Disk Space Usage Reporter... 3 CHAPTER 4 Forward Finder... 4 CHAPTER 5 IMAP Copy Utility... 5 About IMAP
Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0
Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0 Third edition (May 2012). Copyright International Business Machines Corporation 2012. US Government Users Restricted
How To Use A Pmsft On A Pc Or Mac Or Mac (For Mac) With A Pmf (For Pc) Or Mac Mac (Or Mac) On A Mac Or Pc (For Pmsf) On An Ipad
Capario Secure File Transfer User Guide Notices This user guide (the Guide ) is provided by Capario in order to facilitate your use of the Capario Secure File Transfer Software. This Guide is subject to
Informatica Corporation Proactive Monitoring for PowerCenter Operations Version 3.0 Release Notes May 2014
Contents Informatica Corporation Proactive Monitoring for PowerCenter Operations Version 3.0 Release Notes May 2014 Copyright (c) 2012-2014 Informatica Corporation. All rights reserved. Installation...
UFTP AUTHENTICATION SERVICE
UFTP Authentication Service UFTP AUTHENTICATION SERVICE UNICORE Team Document Version: 1.1.0 Component Version: 1.1.1 Date: 17 11 2014 UFTP Authentication Service Contents 1 Installation 1 1.1 Prerequisites....................................
BACKITUP Online. Error Codes & Fixes
BACKITUP Online Error Codes & Fixes General backup errors 1. "Quota Exceeded" This means that the backup account has run out of its allocated quota. Please contact your administrator (or backup services
iconnect ebxml Client System User Manual
iconnect ebxml Client System User Manual 1 TABLE OF CONTENTS I. INSTALLATION SETUP GUIDE I.A System Requirements 3 I.B Installing and Running the iconnect Client System 3 I.C Setting Up Your Company s
SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client.
Contents Introduction... 2 Prepare Work PC for Remote Desktop... 4 Add VPN url as a Trusted Site in Internet Explorer... 5 VPN Client Installation... 5 Starting the VPN Application... 6 Connect to Work
Clientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
Central Administration User Guide
User Guide Contents 1. Introduction... 2 Licensing... 2 Overview... 2 2. Configuring... 3 3. Using... 4 Computers screen all computers view... 4 Computers screen single computer view... 5 All Jobs screen...
Jive Connects for Microsoft SharePoint: Troubleshooting Tips
Jive Connects for Microsoft SharePoint: Troubleshooting Tips Contents Troubleshooting Tips... 3 Generic Troubleshooting... 3 SharePoint logs...3 IIS Logs...3 Advanced Network Monitoring... 4 List Widget
CRSP MOVEit Cloud Getting Started Guide
CRSP MOVEit Cloud Getting Started Guide General Information and Support https://crsp.moveitcloud.com This information is available at the Sign On screen, and on other screens on the left side under Need
HP AppPulse Active. Software Version: 2.2. Real Device Monitoring For AppPulse Active
HP AppPulse Active Software Version: 2.2 For AppPulse Active Document Release Date: February 2015 Software Release Date: November 2014 Legal Notices Warranty The only warranties for HP products and services
IBM WebSphere Application Server V8.5 lab Basic Liberty profile administration using the job manager
IBM WebSphere Application Server V8.5 lab Basic Liberty profile administration using the job manager Scenario You are a system administrator responsible for managing web application server installations.
RemotelyAnywhere Getting Started Guide
April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...
Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008
Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
USER GUIDE WWPass Security for Windows Logon
USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey
Citrix Access on SonicWALL SSL VPN
Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.
Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway
Enterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
Java Web Services SDK
Java Web Services SDK Version 1.5.1 September 2005 This manual and accompanying electronic media are proprietary products of Optimal Payments Inc. They are to be used only by licensed users of the product.
2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
Witango Application Server 6. Installation Guide for OS X
Witango Application Server 6 Installation Guide for OS X January 2011 Tronics Software LLC 503 Mountain Ave. Gillette, NJ 07933 USA Telephone: (570) 647 4370 Email: [email protected] Web: www.witango.com
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
Integrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0
Integrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0 This document supports the version of each product listed and supports all subsequent versions until the document
Central Administration QuickStart Guide
Central Administration QuickStart Guide Contents 1. Overview... 2 Licensing... 2 Documentation... 2 2. Configuring Central Administration... 3 3. Using the Central Administration web console... 4 Managing
SafeNet KMIP and Google Cloud Storage Integration Guide
SafeNet KMIP and Google Cloud Storage Integration Guide Documentation Version: 20130719 Table of Contents CHAPTER 1 GOOGLE CLOUD STORAGE................................. 2 Introduction...............................................................
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
Windows XP Exchange Client Installation Instructions
WINDOWS XP with Outlook 2003 or Outlook 2007 1. Click the Start button and select Control Panel: 2. If your control panel looks like this: Click Switch to Classic View. 3. Double click Mail. 4. Click show
Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If
Dell SonicWALL SRA 7.5 Citrix Access
Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
DameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
WHITE PAPER Citrix Secure Gateway Startup Guide
WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server
Crawl Proxy Installation and Configuration Guide
Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main
Oracle Fusion Middleware 11gR2: Forms, and Reports (11.1.2.0.0) Certification with SUSE Linux Enterprise Server 11 SP2 (GM) x86_64
Oracle Fusion Middleware 11gR2: Forms, and Reports (11.1.2.0.0) Certification with SUSE Linux Enterprise Server 11 SP2 (GM) x86_64 http://www.suse.com 1 Table of Contents Introduction...3 Hardware and
Cyber-Ark Software. Version 4.5
Cyber-Ark Software One-Click Transfer User Guide The Cyber-Ark Vault Version 4.5 All rights reserved. This document contains information and ideas, which are proprietary to Cyber-Ark Software. No part
Configuring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
HP Operations Orchestration Software
HP Operations Orchestration Software Software Version: 9.00 HP Operations Manager Incent Web Service Integration Gue Document Release Date: June 2010 Software Release Date: June 2010 Legal Notices Warranty
Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11
Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes
DC Agent Troubleshooting
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
idatafax Troubleshooting
idatafax Troubleshooting About idatafax idatafax is a client application that connects back to a server at the PHRI based in Hamilton, Ontario, Canada. It is not known to interfere with any software and
SDK Code Examples Version 2.4.2
Version 2.4.2 This edition of SDK Code Examples refers to version 2.4.2 of. This document created or updated on February 27, 2014. Please send your comments and suggestions to: Black Duck Software, Incorporated
Pre-Installation Instructions
Agile Product Lifecycle Management PLM Mobile Release Notes Release 2.0 E49504-02 October 2014 These Release Notes provide technical information about Oracle Product Lifecycle Management (PLM) Mobile 2.0.
Tableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
WEB CONFIGURATION. Configuring and monitoring your VIP-101T from web browser. PLANET VIP-101T Web Configuration Guide
WEB CONFIGURATION Configuring and monitoring your VIP-101T from web browser The VIP-101T integrates a web-based graphical user interface that can cover most configurations and machine status monitoring.
SOA Software: Troubleshooting Guide for Agents
SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,
EMC Clinical Archiving
EMC Clinical Archiving Version 1.7 Installation Guide EMC Corporation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Legal Notice Copyright 2014-2015 EMC Corporation. All Rights
Remote Console Installation & Setup Guide. November 2009
Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission
TECHNICAL TRACKSNETWORKING ESSENTIALS OPPORTUNISTIC LOCKING
OPPORTUNISTIC LOCKING Opportunistic Locking is a feature within Windows NT-based computers such as Windows NT 4, Windows 2000, and Windows XP Professional. Windows XP home edition, which is based on the
Access to Webmail services via a Non Trust Computer
Access to Webmail services via a Non Trust Computer Aintree Outlook Web Access has been provided via the AppGate SSL Portal, this service can be accessed from any computer on the Internet. Two factor SMS
Configuring IBM HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on IBM WebSphere Application Server
Configuration Guide Configuring IBM HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on IBM WebSphere Application Server This document is revised for SAS 9.3. In previous versions
Go2Group JaM Plugin. Atlassian JIRA add-on for HP Quality Center. Quick Install Guide
Go2Group JaM Plugin Atlassian JIRA add-on for HP Quality Center Quick Install Guide Version 5.5 April 2009 Table of Contents Go2Group JaM Plugin Requirements... 3 What s Needed... 3 Go2Group JaM Plugin
13.1 Backup virtual machines running on VMware ESXi / ESX Server
13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
How to setup and use XViewer & XImpcert
How to setup and use XViewer & XImpcert Written by Michael Lackner aka Grand Admiral Thrawn http://wp.xin.at/the-xviewer-project irc://www.xin.at:6666 #guests irc+ssl:/www.xin.at:6697 #guests How to setup
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
HP Business Availability Center
HP Business Availability Center for the Windows and Solaris operating systems Software Version: 8.05 Business Process Monitor Administration Document Release Date:September 2010 Software Release Date:
PingFederate. IWA Integration Kit. User Guide. Version 2.6
PingFederate IWA Integration Kit Version 2.6 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate IWA Integration Kit User Guide Version 2.6 March, 2012 Ping Identity Corporation
Network Connect Installation and Usage Guide
Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing
Yale Software Library http://www.yale.edu/software/
e/ Yale Software Library http://www.yale.edu/software/ For assistance contact the ITS Help Desk 785-3200, 432-9000, [email protected] Remote Desktop General overview With Remote Desktop, you get full access
Installation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
CafePilot has 3 components: the Client, Server and Service Request Monitor (or SRM for short).
Table of Contents Introduction...2 Downloads... 2 Zip Setups... 2 Configuration... 3 Server...3 Client... 5 Service Request Monitor...6 Licensing...7 Frequently Asked Questions... 10 Introduction CafePilot
Tableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
Citrix Receiver for Mobile Devices Troubleshooting Guide
Citrix Receiver for Mobile Devices Troubleshooting Guide www.citrix.com Contents REQUIREMENTS...3 KNOWN LIMITATIONS...3 TROUBLESHOOTING QUESTIONS TO ASK...3 TROUBLESHOOTING TOOLS...4 BASIC TROUBLESHOOTING
Rebasoft Auditor Quick Start Guide
Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered
IUCLID 5 Guidance and Support
IUCLID 5 Guidance and Support Web Service Installation Guide July 2012 v 2.4 July 2012 1/11 Table of Contents 1. Introduction 3 1.1. Important notes 3 1.2. Prerequisites 3 1.3. Installation files 4 2.
ZeroTurnaround License Server User Manual 1.4.0
ZeroTurnaround License Server User Manual 1.4.0 Overview The ZeroTurnaround License Server is a solution for the clients to host their JRebel licenses. Once the user has received the license he purchased,
DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection
DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS Introduction I m InTouch is a personal remote access application that allows a user to access the data on his or her PC from a remote location,
TROUBLESHOOTING INFORMATION
TROUBLESHOOTING INFORMATION VinNOW Support does not support Microsoft products to include SQL Server,.NET Framework, and also cannot assist with Windows User issues, Network or VPN issues. If installing
Access Your Cisco Smart Storage Remotely Via WebDAV
Application Note Access Your Cisco Smart Storage Remotely Via WebDAV WebDAV (Web-based Distributed Authoring and Versioning), is a set of extensions to the HTTP(S) protocol that allows a web server to
Accessing TP SSL VPN
Accessing TP SSL VPN This guide describes the steps to install, connect and disconnect the SSL VPN for remote access to TP intranet systems using personal notebooks. A. Installing the SSL VPN client Junos
