Understanding The Windows 95 Registry

Size: px
Start display at page:

Download "Understanding The Windows 95 Registry"

Transcription

1 Understanding The Windows 95 Registry Julian Moss examines the function of the Windows 95 Registry and highlights some areas where problems can develop. Windows 95 stores all information about system configuration in a database called the Registry. This replaces the use of text-based configuration files like WIN.INI and SYSTEM.INI, though these files are still present in truncated form for compatibility with 16-bit applications, which expect to find them. Unlike the INI files, the Registry stores information in an indexed, treelike structure. It cannot be viewed or modified directly using a text editor, only by the special tools Microsoft provides. Microsoft requires 32-bit applications to use the Registry instead of creating their own INI files. As you migrate to Windows 95 you will therefore need to become familiar with the Registry and the tools used to maintain it. One of the prime reasons for the change from the simple INI file to the more complex Registry is to cater for the fact that many users are networked and mobile, and may want to access their network from different places using different machines. Keys are used to access the information held in the registry, and these keys can point to different sets of data depending on the hardware configuration chosen or the name of the user of the machine. Settings related to the local hardware and settings that relate to user preferences are stored separately in the Registry. In fact, they are stored in separate files. User information is stored in the file USER.DAT, in the \WINDOWS directory. By default the user settings apply to all users of the PC, but by selecting customised user profiles from the Control Panel Passwords applet, you can have separate settings for each user. If you do this there will be a separate USER.DAT for each username, stored in directories named \WINDOWS\PROFILES\- username. You can also choose to store USER.DAT in the user s network login directory so that wherever they access the network from, their own preferences for desktop colours, shortcuts and so on will be used. [A detailed article on Windows 95 User Profiles is currently in preparation for publication in PCSA shortly - Ed.] System-specific information is kept in SYSTEM.DAT. Since this contains configuration details relating to the hardware and software installed in the machine there is a single copy per machine, which is located in the \WINDOWS directory. "One of the prime reasons for the change from the simple INI file to the more complex Registry is to cater for the fact that many users are networked and mobile." Backing Up INI files had their shortcomings, but they also had the advantage of simplicity. Being text-based, you could easily view them and edit them. If you wanted to see what changes had been made by a program you could simply compare two versions of the file side by side. The Registry doesn t lend itself to quick hacking with a text editor, so it s even more important to take backups of it and know how to recover from them in case Windows 95 gets into a state where it won t load. Windows 95 itself creates backup copies of the two registry data files called SYSTEM.DA0 and USER.DA0 each time it successfully loads. To undo changes made to the Registry during the last session, boot to a command prompt (press F8 when the "Starting Windows 95" message is displayed and choose the Command Prompt option) and copy SYS- TEM.DA0 and USER.DA0 to SYSTEM.DAT and USER.DAT before running Windows. Both the.dat files and their backup copies have the system, read-only and hidden attributes so you will need to use the ATTRIB command on them before you can copy them. Although the Windows backup mechanism is useful, it is better to take backups of the registry that relate to known stable configurations. It might not be until after you have rebooted a couple of times that you realise you would be better off reverting to the original state, by which time the Registry copies you want will have been overwritten. During a Windows session, information is being read from and written to the Registry all the time. Software installation programs update it, Update 86 Page 3 File: O0138.1

2 "Although the Registry is two files, it is treated as a single logical entity by Windows. Information within it is organised as a tree-like structure with two main branches." If the key is not found, it then looks in HKEY_LOCAL_MACHINE/Software to obtain the default value. Because HKEY_CURRENT_USER always points to settings that are specific to a user, different users can use one machine and the software will always use their own personal settings. Similarly, a user can access a network using different machines and the software will adopt their personal preferences. changes that you make using the Control Panel and other utilities to customise the environment are stored in it, and applications can also use it to store their own settings. Unsurprisingly, the files are quite large: SYSTEM.DAT is typically around 500 KB while USER.DAT is about 100 KB. Although the Registry is two files, it is treated as a single logical entity by Windows. Information within it is organised as a tree-like structure with two main branches. HKEY_USERS is the name (or key) to one branch, which represents the information stored in USER.DAT. HKEY_LOCAL_MA- CHINE is the other branch, which represents the information stored in SYSTEM.DAT. Each branch is broken down into sub-branches, much as a directory is broken into subdirectories. At the end of each node is a uniquely addressed item of information, which may be a string, a binary value or a 32-bit number. User Settings HKEY_USERS may have several branches, each of which contains a set of information relating to a particular user of the machine. When a user logs on, a key HKEY_CURRENT_USER is set to point directly to the branch - in effect the USER.DAT file - corresponding to that user. During a session, HKEY_CURRENT_USER is the root key used to access all the user-specific information. Several distinct areas of information are held in branches under HKEY_CURRENT_USER. For example, the subtree AppEvents holds details of the user s preferences for the sounds that are played when various system events occur. Subtree Control Panel holds the various Control Panel settings such as the colour preferences, keyboard delay and repeat rate and mouse speed settings. Network holds details of persistent and recent network connections. The Software subtree holds information about the user s personal software settings. It is broken down by software company name - Microsoft, Lotus and so on - and then by application name, version number and application-specific categories. This information is equivalent to that which would have been stored in the applications own INI files by 16-bit Windows applications. The Software subtree is interesting because it is related to a similar subtree in the HKEY_LOCAL_MACHINE branch. When software is installed on a machine, its default settings are written under the HKEY_LOCAL_- MACHINE/Software branch of the Registry. This is logical: software is an attribute of the machine, not personal to the user. When a user changes any of the default settings through using the software, however, the defaults are not overwritten. Instead, the changes are recorded in the HKEY_CUR- RENT_USER/Software branch. When Windows obtains the value of a particular key, it looks first in HKEY_CURRENT_USER/Software. System Settings Like HKEY_CURRENT_USER, the HKEY_LOCAL_MACHINE branch of the Registry also holds several distinct categories of information under a number of subtrees. The Config subtree holds details of different hardware configurations, called hardware profiles, which specify which hardware devices are available and which default settings are to be adopted at start-up. All systems start off with a configuration New hardware profiles can be created using the Control Panel System applet. An example of where this would be useful is in the case of a notebook PC, which might need a different display resolution when attached to a docking station, or different printer drivers when used at home or in the office. The root key HKEY_CUR- RENT_CONFIG provides a direct route to the currently selected configuration. The Enum subtree is used by a type of device driver called a bus enumerator, which finds out what equipment is installed in the system. It is unlikely that you would ever want to modify, or even look at, the information kept here. The same is true of the Hardware subtree, which holds very little information. The Network subtree holds information about the network connection, XXX (default) "XXX_auto_file" XXX_auto_file (default) "Example File" XXX_auto_file\shell (default) (not set) XXX_auto_file\shell\open (default) "" XXX_auto_file\shell\open\command (default) "<path>\runxxx.exe %1" Figure 1 - Registry information to specify how a file is opened. File: O Update 86 Page 4

3 Windows 95 Registry "The Network subtree holds information about the network connection, such as the primary network type, the default username, and data relating to system policies." such as the primary network type, the default username, and data relating to system policies. Policies are another new Windows 95 concept. Essentially they define what a user or group of users is allowed access to. Changes to this section are made using the network icon in Control Panel, or using the System Policy Editor, POLEDIT. There is also a separate Security subtree which is used if you have security options in force. The Software subtree contains information about the software installed on the machine. One of the most important sections is the subtree HKEY_LOCAL_MACHINE\Software\Classes. This has entries for all the types of file which are recognised by the system, including the associations between file types and applications. We will look at this section in more detail later on. Much of the data held here is the same as that which was held in the old Windows 3.1 Registration Database. For compatibility with this the class data can be accessed directly using the key HKEY_CLASSES_ROOT. Other subtrees of the HKEY_LOCAL_MACHINE\Software branch are used to hold information relating to specific applications: the equivalent of the old INI files. As already mentioned, the HKEY_LOC- AL_MACHINE\Software is where the default settings are recorded when an application is installed. User modifications are recorded in a similar hierarchy under HKEY_CUR- RENT_USER/Software. Microsoft has specified that applications should store information in subtrees of HKEY_LOCAL_MACHINE\Softwa- re\companyname\productname- \Version. As an example, Lotus s new word processor WordPro stores its configuration data under HKEY_- LOCAL_MACHINE\- Software\- Lotus\WordPro\7.0. In this example, Lotus has actually named subtrees of this branch after the.ini files that would be used by the 16-bit version of the software. Some other application vendors have chosen to use CurrentVersion in place of a version number. The key HKEY_LOCAL_MACH- INE\Software\Microsoft\Windows- \CurrentVersion contains data which is broadly equivalent to what would have been stored in WIN.INI by Windows 3.x. Some of it is exactly the same. The Extensions subkey, for example, contains the contents of the Extensions section of WIN.INI at the time Windows 95 was installed. However, the file associations listed there appear to be neither updated nor used. One useful subkey here is App- Paths. Adding keys here will allow applications to run without the need either for them to be on the DOS path or for the full path to be given. You create a subkey with the application s name, for example,..\app- Paths\APP.EXE, and enter its full path as the default string value. Now you can run the application simply by choosing Run from the taskbar menu and typing APP. You can also eliminate the need for related executable files like DLLs to be either in the application s own directory or the Windows search path by specifying a path for them as a string value with the name Path. So the subkey for APP.EXE might look something like:..\apppaths\app.exe (default)- "c:\myapp\app.exe"path"c:\myapp- \dlls;" This doesn t work with 16-bit applications, though, as they don t know about this search method. Another useful subkey to know about is SharedDLLs. Applications which install DLLs in the Windows SYSTEM directory are supposed to add a binary value to this subkey with the name of the DLL and a count of 1. If the value already exists, applications are supposed to increment the count. The purpose of this is to allow uninstall programs to check whether any other program uses a shared DLL before removing it. Hopefully once Windows 95 is established, programs will comply with this behaviour more consistently than many beta programs I have seen. System The final major subkey under HKEY_LOCAL_MACHINE is System, which has a subkey called CurrentControlSet. This is further divided into two levels, Control and Services. These subkeys are where a lot of hardware setup data resides. This data is used by Windows at startup....\shell\print...\shell\print\ddeexec...\shell\print\ddeexec\ifexec...\shell\print\ddeexec\application...\shell\print\ddeexec\topic (default) (not set) (default) "<DDE macro to load, print & close file>" (default) "<DDE macro to load, print & close app>" (default) "<application name for DDE communication>" (default) "<topic name for DDE communication>" Figure 2 - Entries for printing via DDE. Update 86 Page 5 File: O0138.3

4 One key of interest is..\control\vmm32files, which holds a list of all the virtual device drivers (VxDs) which are to be loaded at startup. Microsoft cautions against changing any of the data in the System section using Registry Editor (REGEDIT.EXE). One occasion when you might need to is if you install software which installs VxDs and later remove it. If references to the VxDs remain in the Registry then you will see messages warning that the VxD could not be loaded when Windows starts. The only solution in this case is to delete the offending entries. The best way to find the keys to delete is to use REGEDIT s Find facility to search for a string such as the name of the VxD concerned, since it is difficult to be sure that you have found all the references by searching manually. Data In RAM HKEY_DYN_DATA is a root key to information which is held in RAM because it is rapidly changing. There are two subkeys by default. HKEY_DYN_DATA\Config Manager is used by the Plug n Play Configuration Manager and holds information about the devices that are currently installed and running. HKEY_DYN_DATA\PerfStats contains various network statistical information. Virtual device drivers can create their own keys and provide dynamic data which can then be easily accessed by applications via the Registry. File Associations Figure 3 - REGEDIT in Action. "Microsoft cautions against changing any of the data in the System section using Registry Editor (REGEDIT.EXE). One occasion when you might need to is if you install software which installs VxDs and later remove it." The key HKEY_LOCAL_MA- CHINE\Software\Classes, which as already mentioned can be accessed directly as HKEY_CLASSES_ROOT, holds the data that tells Windows what to call files of a particular type, which icon to use for them, and what to do if a user opens or prints the file. This is an extension of the concept of file associations which simply told Windows what program to run if you double-clicked on a file icon. When Windows 95 is installed over an existing Windows installation, any file associations in the Extensions section of WIN.INI and in the Windows 3.1 Registration Database are automatically added to the Registry Classes data. However, if you install Windows 95 into a new directory, or if you subsequently install a 16-bit application that only creates a WIN.INI association record, no file associations other than the Windows defaults will be set up. The most simple way for a user to set up an association for a file, other than by running an application s Setup utility, is to try opening it. Windows 95 displays the "Open With" dialog, from which the program needed to open the file can be selected. The dialog also allows a descriptive name to be entered for the file type. Windows creates all the Registry keys needed from the information entered in this dialog. For a file with the extension XXX, which is to be opened using RUNXXX.EXE and given the description Example File, Windows would create subkeys of the Classes section as listed in Figure 1. From this you can see that the entry for the file extension holds an internal description of the file type, "XXX_auto_file". This is the name Windows makes up when the "Open With" dialog method of creating an extension is used. If a different icon from that of the associated application has been specified for the file, its source is held in the DefaultIcon subkey. The internal file description is itself a key at the same level in the Registry hierarchy. These keys are used like a chain which leads eventually to the data Windows wants about the file. When the internal name XXX_auto_file is looked up in the Registry it yields the description "Example File". This is the description that would appear next to the file s entry in a Details view of a folder or in its Properties sheet. File: O Update 86 Page 6

5 Windows 95 Registry "The Shell subkey points to a whole set of branches that tell Windows how to open a file in various circumstances." Shell The Shell subkey points to a whole set of branches that tell Windows how to open a file in various circumstances. The command in the subkey...\shell\open\command is the command that launches the application associated with the file. The filename is passed as a parameter, which is substituted for %1. This is treated by most programs as a file to be loaded, so the opened file is displayed in the application s window. If you examine the HKEY_CLASSES_ROOT tree for some other file types such as "wrifile", the internal name for.wri files, you will see that other subkeys can appear under the Shell subtree, such as print and printto. The value of shell\print\command is the command which is used if you print a file by dragging its icon to the printer shortcut. This facility was supported in the Windows 3.1 Registration Database so many 16-bit applications already have a print association set up for them. Some programs are not capable of being instructed to print a file from the command line, however. An alternative method for opening or printing a file - also supported by the Windows 3.1 Registration Database - is to use DDE commands. If DDE is to be used, the subtree shown in Figure 2 is created. The application and topic names ensure that the commands are sent to the right part of the right application. The macro specified in ddeexec is run if the application is already loaded. If it is not loaded, the one in ifexec is used instead. The main difference is that the ifexec DDE commands close the application on completion. If you know the DDE macro commands to use you can enter them in the "Open With" dialog after checking the "Use DDE" checkbox. Usually, though, they are set up by the Setup utility of the application. The shell print mechanism has one major limitation which is that it can only print to the default printer, while many users have at least two: a printer and a fax card. If a user drags a file to the icon of a printing device that is not the current default, Windows 95 offers to change the default printer to the one selected, but it will not change it back afterwards. Though this achieves the desired result it is undesirable as it could lead to files printed from within an application being sent to the wrong device later on. Windows 95 supports a new shell command, printto, which supporrts printing to multiple printer devices. If present, the printto shell command is used in preference to the print command when a file is printed using drag-and-drop. The following parameters are passed to the command line of the program named in shell\printto\- command: %1<document path> %2<printer name> %3<printer driver> %4<device name> The last three items of information are what is needed to change the output device under program control. For example, when the document TEST.DOC is dragged to a printer and a fax icon respectively, the parameters passed might be: C:\DOCS\TEST.DOC Olivetti JP 250- JP350.DRV LPT1: C:\DOCS\TEST.DOC Microsoft Fax- WPSUNI.DRV FAX: Windows 95-aware applications should be written to recognise these extra parameters and provide a means of switching to the specified device if they are present. Likely as not, other applications that you have may not support them. However it may prove possible to use an application s macro language or DDE commands to get the command line parameters and change the printer selection to the requested device. Creating New Documents Another new facility of Windows 95 is the ability to create new documents directly in a folder or on the desktop. If you right-click on a folder and select New from the popup menu, you will see a list of file types like Text Document or Bitmap Image. If you choose one of these, Windows will create an empty file called "New Text Document" or "New Bitmap Image" in the folder. You can then simply change the name and open the new file. This feature, combined with the long filename support, goes a long way towards making PCs easier to use for non-technical users by allowing them to think in terms of documents and folders instead of files and directories. Unfortunately few applications, and none that isn t a Windows 95 application, make use of the facility. However, it is quite easy, with the aid of REGEDIT, to set up some new document types. The key which tells Windows what to do to create a new file of a particular type is the ShellNew subkey to the file extension key in the Classes section. If this has a value named NullFile, with a null string value, Windows creates an empty file called "New <file description>" in the target folder. For an example, look at the entry for a text file (.TXT), which contains the following keys: HKEY_CLASSES_ROOT\.txt (default) "txtfile" HKEY_CLASSES_ROOT\.txt\Shell- New (default) (not set) NullFile"" If you use REGEDIT to delete the NullFile value you will find that the Text Document option has disap- Update 86 Page 7 File: O0138.5

6 peared from the popup menu. You can remove any other of the default file types that you would rather not have on the menu in the same way. Unfortunately it is no good creating a null file for the majority of applications which have their own specific file format. If you try to open an empty file with most word processors or spreadsheets the applications will probably try to import it as a plain text file, and then display an error message when it fails. For applications like this you must set up an empty document template. Document Templates New document templates are stored in a hidden subdirectory to the Windows directory called ShellNew. You can create one simply by saving an empty document using your application. Then create a ShellNew subkey to the Registry entry for the application s file extension, and add a value named FileName, which should hold a string giving the name of the template you have created. An example for the fictitious "SuperWord" document type might look like: HKEY_CLASSES_ROOT\.doc (default) "swfile" HKEY_CLASSES_ROOT\.doc\Shell- New (default) (not set) FileName - "superwrd.doc" If you used REGEDIT to add the ShellNew key and the FileName value you would find that SuperWord Document (or whatever the text description of a.doc file, found by looking up the swfile key, has been defined to be) would appear on the menu of new document types. If you select this menu item, Windows 95 looks up the key for.doc in the Registry and then looks to see if there is a ShellNew subkey with a File- Name value. As there is, it copies the template document named there from the \WINDOWS\SHELLNEW directory and renames it "New SuperWord Document". The new file can then be renamed and opened in the usual way. This is all well and good, but you will probably find it more useful to have a choice of pre-formatted document templates rather than a single option of a blank document, available from the menu. The problem is that there is a one-to-one association between file extension and document type. A file type can only have one description and one ShellNew File- Name entry. One solution that suggests itself is to define new file extensions for each document type. This is a little cumbersome as you have got to create a complete set of Registry entries, including Shell Open commands, for each new type. Another problem is that the new document types will not automatically be associated with the application that created them on other systems that have that application, unless the special associations have been set up. The ShellNew subkey can have a third value option, Command. If this value is present, the program specified is run when the user chooses a new document of this type from the menu. This is the solution adopted by Microsoft in Office 95. A dummy file type with the extension.ofn is created in the Registry, with the internal name Office.FileNew, and the description Other Office Documents. When "Other Office Documents" is selected from the menu, the program MSOW.EXE is run, which presents a tabbed dialog showing all the document templates available. However, choosing one opens it in the Office application: the user must still use File Save As.. to save the new document to the correct location. Windows passes the path of the new document, eg, "C:\WIN- DOWS\DESKTOP\New SuperWord Document.doc" to the program if the parameter %1 is added to the command line, as in this example: HKEY_CLASSES_ROOT\.doc (default) "swfile" HKEY_CLASSES_ROOT\.doc\Shell New (default) (not set) Command "c:\utils\winscr.exe template %1" Here, a Windows batch language has been used to offer a choice of document templates, one of which will be copied to the path passed in the parameter %1. With a little effort, even your non Windows 95-aware applications can be more closely integrated with the new desktop, making life easier for your users. Conclusion Editing the Windows 95 Registry with REGEDIT isn t something you should have to do every day. Wherever possible, it is easier and safer to use the configuration tools that Microsoft provides. However, direct editing can provide a way to recover from problems caused by defective setup or uninstall programs. It can also enable you to take advantage of Windows 95 features that your applications may ignore. It s certainly worthwhile to know how the Registry is organised and what data is stored there. But before you get too carried away with tinkering, take a backup. The Author PCSA Julian Moss is a freelance writer specialising in PC technology, and developer of the Windows batch language WinScript which is on this month s PCSA Utility Disk. You can contact him on [email protected]. File: O Update 86 Page 8

WINDOWS PROCESSES AND SERVICES

WINDOWS PROCESSES AND SERVICES OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.

More information

Introduction to MS WINDOWS XP

Introduction to MS WINDOWS XP Introduction to MS WINDOWS XP Mouse Desktop Windows Applications File handling Introduction to MS Windows XP 2 Table of Contents What is Windows XP?... 3 Windows within Windows... 3 The Desktop... 3 The

More information

Chapter 11 Compound Documents in Windows 3.1

Chapter 11 Compound Documents in Windows 3.1 Chapter 11 Compound Documents in Windows 3.1 This chapter presents an overview of how Object Linking and Embedding (OLE) works when a Windows application is designed to take advantage of the OLE features

More information

Windows Administration Terminal Services, AD and the Windows Registry. INLS 576 Spring 2011 Tuesday, February 24, 2011

Windows Administration Terminal Services, AD and the Windows Registry. INLS 576 Spring 2011 Tuesday, February 24, 2011 Windows Administration Terminal Services, AD and the Windows Registry INLS 576 Spring 2011 Tuesday, February 24, 2011 Terminal Services Uses RDP (Remote Desktop Protocol), relies on TCP/IP, and falls under

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

Optimizing Windows CHAPTER

Optimizing Windows CHAPTER CHAPTER 14 Optimizing Windows In this chapter, you will learn: About Windows utilities and tools you can use to solve problems with Windows How to optimize Windows to improve performance I n the last chapter,

More information

Microsoft Access Database

Microsoft Access Database 1 of 6 08-Jun-2010 12:38 Microsoft Access Database Introduction A Microsoft Access database is primarily a Windows file. It must have a location, also called a path, which indicates how the file can be

More information

1! Registry. Windows System Artifacts. Understanding the Windows Registry. Organization of the Windows Registry. Windows Registry Viewer

1! Registry. Windows System Artifacts. Understanding the Windows Registry. Organization of the Windows Registry. Windows Registry Viewer 1! Registry Understanding the Windows Registry! A database that stores hardware and software configuration information, network connections, user preferences, and setup information Windows System Artifacts

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and

More information

Server & Workstation Installation of Client Profiles for Windows

Server & Workstation Installation of Client Profiles for Windows C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 5 Optimizing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 5 Optimizing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 5 Optimizing Windows Objectives Learn about Windows utilities and tools you can use to solve problems with Windows Learn how to optimize Windows

More information

Hosting Users Guide 2011

Hosting Users Guide 2011 Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure

More information

CashFlow Programming Module CPM

CashFlow Programming Module CPM CashFlow Programming Module CPM Installation & User Guide GB REV G4 08/08/2006 Table of Content Table of Content... 2 CashFlow Programming Module (CPM)... 4 What is a CPM?... 4 CPM Identification... 4

More information

Guest PC. for Mac OS X. User Guide. Version 1.6. Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved.

Guest PC. for Mac OS X. User Guide. Version 1.6. Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved. Guest PC for Mac OS X Version 1.6 User Guide Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved. Table of Contents About Guest PC... 1 About your Virtual Computer... 1 Creating a Virtual

More information

Introduction to Windows XP

Introduction to Windows XP Introduction to Windows XP Academic Computing Support Information Technology Services Tennessee Technological University January 2003 1. What s new in XP New colorful interface. More stable than 9x/Me

More information

Known Issues and Work Around

Known Issues and Work Around Known s and Work Around During Compass 2.0 installation, sometimes you may get a popup message.net framework/sqlexpress could not be installed. Install.Net framework/sqlexpress manually. Sometimes, migration

More information

Registry Tuner. Software Manual

Registry Tuner. Software Manual Registry Tuner Software Manual Table of Contents Introduction 1 System Requirements 2 Frequently Asked Questions 3 Using the Lavasoft Registry Tuner 5 Scan and Fix Registry Errors 7 Optimize Registry

More information

Errors That Can Occur When You re Running a Report From Tigerpaw s SQL-based System (Version 9 and Above) Modified 10/2/2008

Errors That Can Occur When You re Running a Report From Tigerpaw s SQL-based System (Version 9 and Above) Modified 10/2/2008 Errors That Can Occur When You re Running a Report From Tigerpaw s SQL-based System (Version 9 and Above) Modified 10/2/2008 1 Introduction The following is an explanation of some errors you might encounter

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Chapter 5: Fundamental Operating Systems

Chapter 5: Fundamental Operating Systems Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose

More information

Most of your tasks in Windows XP will involve working with information

Most of your tasks in Windows XP will involve working with information OFFICE 1 File Management Files and Folders Most of your tasks in Windows XP will involve working with information stored on your computer. This material briefly explains how information is stored in Windows

More information

Changing Your Cameleon Server IP

Changing Your Cameleon Server IP 1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may

More information

Diamond II v2.3 Service Pack 4 Installation Manual

Diamond II v2.3 Service Pack 4 Installation Manual Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance

More information

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES LESSON 13 Managing Devices OBJECTIVES After completing this lesson, you will be able to: 1. Open System Properties. 2. Use Device Manager. 3. Understand hardware profiles. 4. Set performance options. Estimated

More information

EasySuite. User Guide V1.0

EasySuite. User Guide V1.0 EasySuite User Guide V1.0 1 Launch EasySuite...3 Stop the EasySuite:...4 System Requirements...5 EasyCopy...6 Function Description...7 File Transfer...9 EasyMover...12 Function Descriptions of EasyMover...12

More information

LDCDP 11999.GdW. L force Controls. Ä.GdWä. Software Manual. Industrial PC. WindowsR CE Thin Client. Operating system

LDCDP 11999.GdW. L force Controls. Ä.GdWä. Software Manual. Industrial PC. WindowsR CE Thin Client. Operating system L force Controls Ä.GdWä LDCDP 11999.GdW Software Manual Industrial PC WindowsR CE Thin Client Operating system l Please read these instructions before you start working! Follow the enclosed safety instructions.

More information

How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment?

How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment? Author Janice Hong Version 1.0.0 Date Mar. 2014 Page 1/56 How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment? Application Note The 32-bit operating system

More information

How to install the RTL8029 PCI Adapter Boot Rom for Windows95

How to install the RTL8029 PCI Adapter Boot Rom for Windows95 How to install the RTL8029 PCI Adapter Boot Rom for Windows95 0.0 Preview 1.0 Installing the Remoteboot Service on the Server 1.1 Installing Windows 95 for Windows 95 Clients Add DLC and NetBEUI Protocol,

More information

ReportByEmail ODBC Connection setup

ReportByEmail ODBC Connection setup ReportByEmail ODBC Connection setup Page 2 of 28 Content Introduction... 3 ReportByEmail Server and changing ODBC settings... 3 Microsoft AD Windows setup... 3 Important notice regarding 32-bit / 64-bit

More information

Iridium Extreme TM Satellite Phone. Data Services Manual

Iridium Extreme TM Satellite Phone. Data Services Manual Iridium Extreme TM Satellite Phone Data Services Manual Table of Contents 1 OVERVIEW... 1 2 HOW IT WORKS... 1 3 BEFORE INSTALLING... 2 4 USB DRIVER INSTALLATION... 3 5 MODEM INSTALLATION AND CONFIGURATION...

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

Release Notes OPC-Server V3 Alarm Event for High Availability

Release Notes OPC-Server V3 Alarm Event for High Availability Manual-No. 2CDC 125 027 K0201 Release Notes OPC-Server V3 Alarm Event for High Availability ABB STOTZ-KONTAKT GmbH, Eppelheimer Straße 82, 69123 Heidelberg, http://www.abb.de/stotz-kontakt Please read

More information

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without

More information

GeneMapper Software v.4.1 Uninstall Procedure

GeneMapper Software v.4.1 Uninstall Procedure GeneMapper Software v.4.1 Uninstall Procedure Manual uninstall procedure for Full Install configurations on a stand-alone computer Note: This protocol is intended for cases where GeneMapper Software v.4.1

More information

Allworx OfficeSafe Operations Guide Release 6.0

Allworx OfficeSafe Operations Guide Release 6.0 Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,

More information

Online Backup Client User Manual

Online Backup Client User Manual For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.

More information

SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013

SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Software User's Guide

Software User's Guide BROTHER QL-500/550/650TD/1050/1050N Software User's Guide QL-500 QL-650TD QL-550 QL-1050/1050N 1 Contents Contents....................................................................................2................................................................................4

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide

Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide Page 1 of 243 Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide (This is an alpha version of Benjamin Day Consulting, Inc. s installation

More information

You can find the installer for the +Cloud Application on your SanDisk flash drive.

You can find the installer for the +Cloud Application on your SanDisk flash drive. Installation You can find the installer for the +Cloud Application on your SanDisk flash drive. Make sure that your computer is connected to the internet. Next plug in the flash drive and double click

More information

Server Edition Administrator s Guide

Server Edition Administrator s Guide Server Edition Administrator s Guide July 13, 2010 Introduction This document covers FinePrint, pdffactory, and pdffactory Pro Server Editions (SE). Installing SE on a Windows server provides easy deployment

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu

Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu Menu INTRODUCTION...2 HOW DO I DEPLOY MYUSBONLY ON ALL OF MY COMPUTERS...3 ADMIN KIT...4 HOW TO SETUP A LOGON SCRIPTS...5 Why would I choose one method over another?...5 Can I use both methods to assign

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4

Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4 Digital Signatures User Guide Revision 1.2 build 1, Document Revision 1.12 Published 31. Octover 2011 ii Contents Copyright Disclaimer iii iii Introduction 1 System Requirements... 3 Installing the software

More information

MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing Resources

MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing Resources MCSE TestPrep: Windows NT Server 4, Second Edition - CH 3 - Managing Resources Page 1 of 36 [Figures are not included in this sample chapter] MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing

More information

SA-9600 Surface Area Software Manual

SA-9600 Surface Area Software Manual SA-9600 Surface Area Software Manual Version 4.0 Introduction The operation and data Presentation of the SA-9600 Surface Area analyzer is performed using a Microsoft Windows based software package. The

More information

Contents. Overview...2. License manager Installation...2. Configure License Manager...3. Client Installation...8. FastLook Features...

Contents. Overview...2. License manager Installation...2. Configure License Manager...3. Client Installation...8. FastLook Features... Technical Support All technical support must be done through the Report-a-Problem feature located under the Help menu. Please use this feature to access your Priority Maintenance subscription to update

More information

Installing Oracle 12c Enterprise on Windows 7 64-Bit

Installing Oracle 12c Enterprise on Windows 7 64-Bit JTHOMAS ENTERPRISES LLC Installing Oracle 12c Enterprise on Windows 7 64-Bit DOLOR SET AMET Overview This guide will step you through the process on installing a desktop-class Oracle Database Enterprises

More information

Creating and Managing Shared Folders

Creating and Managing Shared Folders Creating and Managing Shared Folders Microsoft threw all sorts of new services, features, and functions into Windows 2000 Server, but at the heart of it all was still the requirement to be a good file

More information

Managing and Supporting Windows XP Chapter #16

Managing and Supporting Windows XP Chapter #16 Managing and Supporting Windows XP Chapter #16 Amy Hissom Key Terms Backup Operator A Windows 2000/XP user account that can back up and restore any files on the system regardless of its having access to

More information

Point of Sale 2015 Enterprise. Installation Guide

Point of Sale 2015 Enterprise. Installation Guide Point of Sale 2015 Enterprise Installation Guide Contents About this guide 3 System Requirements - Microsoft SQL Server 2008 R2 Express 3 System Requirements - POS Enterprise 2015 (Administrator) 3 System

More information

NetWrix Server Configuration Monitor

NetWrix Server Configuration Monitor NetWrix Server Configuration Monitor Version 2.2 Quick Start Guide Contents NetWrix Server Configuration Monitor Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

VirtualXP Users Guide

VirtualXP Users Guide VirtualXP Users Guide Contents Chapter 1: Introduction... 2 Chapter 2: Install and Uninstall VirtualXP... 3 2.1 System Requirement... 3 2.2 Installing VirtualXP... 3 2.3 Uninstalling VirtualXP... 3 Chapter

More information

Redirect Printer Port to LPT3 for Printing to Local Printer in Remote Desktop Session

Redirect Printer Port to LPT3 for Printing to Local Printer in Remote Desktop Session Redirect Printer Port to LPT3 for Printing to Local Printer in Remote Desktop Session Remote Desktop client CAN redirect printing to the local printer while controlling a host. http://support.microsoft.com/kb/312135

More information

User s Manual. Version 4.0. Levit & James, Inc.

User s Manual. Version 4.0. Levit & James, Inc. User s Manual Version 4.0 April 2008 [This page is intentionally left blank] CrossWords Installation & Operation Guide 3 LEGAL NOTES The information contained in this document represents the current view

More information

Topaz Installation Sheet

Topaz Installation Sheet Topaz Installation Sheet P/N 460924001E ISS 08FEB12 Content Introduction... 3 Recommended minimum requirements... 3 Setup for Internet Explorer:... 4 Topaz installation... 10 Technical support... 14 Copyright

More information

Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72. User Guide

Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72. User Guide Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72 User Guide Contents 1 Introduction... 4 2 Requirements... 5 3 Important Note for Customers Upgrading... 5 4 Installing the Web Reports

More information

Setting up the Oracle Warehouse Builder Project. Topics. Overview. Purpose

Setting up the Oracle Warehouse Builder Project. Topics. Overview. Purpose Setting up the Oracle Warehouse Builder Project Purpose In this tutorial, you setup and configure the project environment for Oracle Warehouse Builder 10g Release 2. You create a Warehouse Builder repository

More information

Introduction. Installation of SE S AM E BARCODE virtual machine distribution. (Windows / Mac / Linux)

Introduction. Installation of SE S AM E BARCODE virtual machine distribution. (Windows / Mac / Linux) Installation of SE S AM E BARCODE virtual machine distribution (Windows / Mac / Linux) Introduction A "virtual machine" is a fake computer within a true one. An underlying software (here VirtualBox) is

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

Handling Hyper-V. In this series of articles, learn how to manage Hyper-V, from ensuring high availability to upgrading to Windows Server 2012 R2

Handling Hyper-V. In this series of articles, learn how to manage Hyper-V, from ensuring high availability to upgrading to Windows Server 2012 R2 White Paper Handling Hyper-V In this series of articles, learn how to manage Hyper-V, from ensuring high availability to upgrading to Windows Server 2012 R2 White Paper How to Make Hyper-V Virtual Machines

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Forms Printer User Guide

Forms Printer User Guide Forms Printer User Guide Version 10.51 for Dynamics GP 10 Forms Printer Build Version: 10.51.102 System Requirements Microsoft Dynamics GP 10 SP2 or greater Microsoft SQL Server 2005 or Higher Reporting

More information

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)

More information

The instructions were written for Windows 7. They have run without problems for Windows 8.

The instructions were written for Windows 7. They have run without problems for Windows 8. 1 Download and Install CCS for Windows This procedure describes how to install CCS5 on a single Windows PC (client and server running on the same physical machine), and a single user. If you are setting

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy

More information

TAMUS Terminal Server Setup BPP SQL/Alva

TAMUS Terminal Server Setup BPP SQL/Alva We have a new method of connecting to the databases that does not involve using the Texas A&M campus VPN. The new way of gaining access is via Remote Desktop software to a terminal server running here

More information

webkpi SaaS ETL Connector Installation & Configuration Guide

webkpi SaaS ETL Connector Installation & Configuration Guide webkpi SaaS ETL Connector Installation & Configuration Guide SaaS ETL Version 2.5.0.12 Version 1.6 September 2013 webkpi SaaS ETL Connector Version 2.5.0.12 V 1.6 Page 1 Table of Contents Table of Contents

More information

Nortel Networks Call Center Reporting Set Up and Operation Guide

Nortel Networks Call Center Reporting Set Up and Operation Guide Nortel Networks Call Center Reporting Set Up and Operation Guide www.nortelnetworks.com 2001 Nortel Networks P0919439 Issue 07 (24) Table of contents How to use this guide... 5 Introduction...5 How this

More information

Search help. More on Office.com: images templates

Search help. More on Office.com: images templates Page 1 of 14 Access 2010 Home > Access 2010 Help and How-to > Getting started Search help More on Office.com: images templates Access 2010: database tasks Here are some basic database tasks that you can

More information

5.4.8 Optional Lab: Managing System Files with Built-in Utilities in Windows 7

5.4.8 Optional Lab: Managing System Files with Built-in Utilities in Windows 7 5.4.8 Optional Lab: Managing System Files with Built-in Utilities in Windows 7 Introduction Print and complete this lab. In this lab, you will use Windows built-in utilities to gather information about

More information

Introduction to Operating Systems

Introduction to Operating Systems Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these

More information

SEER-HD Database Administrator s Guide

SEER-HD Database Administrator s Guide SEER-HD Database Administrator s Guide Rev. April 30, 2010-1 - Contents Introduction... 3 How SEER-HD Works... 4 Interaction of SEER-HD with Other SEER Programs... 5 Database Platforms... 6 Getting Started...

More information

Clickfree Software User Guide

Clickfree Software User Guide Clickfree Software User Guide Last Revised: Nov 2, 2011 Clickfree_backup_software_user_guide_v1.0 Clickfree and the Clickfree logo are trademarks or registered trademarks of Storage Appliance Corporation.

More information

Topic 2: Computer Management File Management Folders A folder is a named storage location where related files can be stored. A folder also known as

Topic 2: Computer Management File Management Folders A folder is a named storage location where related files can be stored. A folder also known as Topic 2: Computer Management File Management Folders A folder is a named storage location where related files can be stored. A folder also known as directory in some operating systems, all folders or directories

More information

CEFNS Web Hosting a Guide for CS212

CEFNS Web Hosting a Guide for CS212 CEFNS Web Hosting a Guide for CS212 INTRODUCTION: TOOLS: In CS212, you will be learning the basics of web development. Therefore, you want to keep your tools to a minimum so that you understand how things

More information

Active Directory Integration for Greentree

Active Directory Integration for Greentree App Number: 010044 Active Directory Integration for Greentree Last Updated 14 th February 2013 Powered by: AppsForGreentree.com 2013 1 Table of Contents Features... 3 Options... 3 Important Notes... 3

More information

Online Backup Linux Client User Manual

Online Backup Linux Client User Manual Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might

More information

Windows XP File Management

Windows XP File Management Windows XP File Management As you work with a computer creating more and more documents, you need to find a way to keep this information organized. Without a good organizational method, all your files

More information

Online Backup Client User Manual

Online Backup Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Non-ThinManager Components

Non-ThinManager Components Non-ThinManager Components Microsoft Terminal Servers play an important role in the ThinManager system. It is recommended that you become familiar with the documentation provided by Microsoft about their

More information

ADMINISTRATOR S GUIDE

ADMINISTRATOR S GUIDE F O R W I N D O W S N T ADMINISTRATOR S GUIDE 1997 Claris Corporation. All Rights Reserved. Claris Corporation 5201 Patrick Henry Drive Santa Clara, California 95052 Claris and FileMaker are trademarks

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

How To Backup A Database In Navision

How To Backup A Database In Navision Making Database Backups in Microsoft Business Solutions Navision MAKING DATABASE BACKUPS IN MICROSOFT BUSINESS SOLUTIONS NAVISION DISCLAIMER This material is for informational purposes only. Microsoft

More information

Networking Lab - Vista Public Network Sharing

Networking Lab - Vista Public Network Sharing Networking Lab - Vista Public Network Sharing After completing the lab activity, you will be able to: Explain the differences between Windows XP and Windows Vista network sharing. Explain the purpose of

More information

Finding and Opening Documents

Finding and Opening Documents In this chapter Learn how to get around in the Open File dialog box. See how to navigate through drives and folders and display the files in other folders. Learn how to search for a file when you can t

More information

The Reprographics Online E-Copy Process is used to submit print jobs to the RUSD Reprographics department.

The Reprographics Online E-Copy Process is used to submit print jobs to the RUSD Reprographics department. The Reprographics E-Copy Process The Reprographics Online E-Copy Process is used to submit print jobs to the RUSD Reprographics department. FTP Site Submission For Print Job Files FTP Print Job Submissions

More information

MOBILE LIFECYCLE MANAGEMENT SUITE: BEST PRACTICES BY: CHAD J. SANDERS

MOBILE LIFECYCLE MANAGEMENT SUITE: BEST PRACTICES BY: CHAD J. SANDERS MOBILE LIFECYCLE MANAGEMENT SUITE: BEST PRACTICES BY: CHAD J. SANDERS PURPOSE OF THIS DOCUMENT The purpose of the Mobile Lifecycle Management Suite Best Practices document is to address some of the most

More information