GIAC Introduction to Security Fundamentals. Laptop and External Drive Configuration Guide Version 1.2 SEC301
|
|
- Bruno Matthews
- 7 years ago
- Views:
Transcription
1 GIAC Introduction to Security Fundamentals Laptop and External Drive Configuration Guide Version 1.2 SEC301 SEC301 - Hands-on Exercises Addendum Page 1
2 Table of Contents Background... 3 Ensure that the computer can connect to a network that can access the Internet... 3 Create a local account with Administrator privilege... 3 Establish the laptop directory structure...10 Make a folder named SEC 301 Programs under the user folder...10 External drive preparation...13 USB Thumb Drive...13 SEC301 - Hands-on Exercises Addendum Page 2
3 SEC301 Computer and External Drive Configuration Guide Background This document identifies the steps you need to take to make sure that your computer is ready for the lab exercises for SEC301. Prior to coming to class you need to ensure that you have access to an account that is a member of the local administrators group and that you can login to that account. While the laptop requirements for the class strongly recommend that attendees NOT bring a production computer to class, it may not be practical for organizations to provide a separate computer for the attendee. In that case, we recommend that the organization create a local account that is a member of the administrators group. Ensure that the computer can connect to a network that can access the Internet Some of the exercises associated with SEC301 require that the computer be able to access the Internet (e.g., check for software updates, access a database located on the Internet). Networks available at SANS conferences are typically wireless (e.g., WiFi) and it s critical that the computer be able to connect to a public WiFi network and that the network parameters (e.g., address, DNS servers, etc.) be configured by the WiFi network infrastructure. Create a local account with Administrator privilege When an organization has a centralized IT element of the organization, it's typical for the user workstations and laptops to be configured with Standard User account for the individual user accounts. This is a good thing to do as it is a prime implementation of the principle of least privilege (and it minimizes risk). To be able to install and configure the programs that are on the CD associated with SEC301, the attendee will need an account (named SEC301-adm) with Administrator privilege. Participants will need to work with the administrators in their organization to ensure that the account is created and that they can login to it from the computer that they will be using for the class. When an individual buys a computer and logs in for the first time, the account that is created is a member of the Administrators group. Browsing the Internet and reading while using an account that has elevated privilege can be risky. Use a Standard User account instead. Even if the account you use for day to day operation of the computer is a member of the Administrators group, we recommend that you complete this section (create the SEC301-adm account) before proceeding to the next configuration task (Establish the laptop directory structure). Having all attendees using the same account will simplify the process of providing assistance to attendees when they need it. Steps to create the account on a computer (running Windows 7 Home Premium) that is NOT joined to a domain are shown below. SEC301 - Hands-on Exercises Addendum Page 3
4 1. Go to the User Accounts screen as shown below. (Click on Start, Control Panel, User Accounts) 2. Click on Manage another account and provide the password to an account that is a member of the administrators group to get to the screen below: SEC301 - Hands-on Exercises Addendum Page 4
5 3. Click on Create a new account to get to the screen below: SEC301 - Hands-on Exercises Addendum Page 5
6 4. Fill in the account name (SEC301-adm), select Administrator and click on Create Account : 5. A screen similar to that shown below appears: SEC301 - Hands-on Exercises Addendum Page 6
7 6. Click on the account you just created (SEC301-adm) and see the following: 7. In the screen shot shown above, click on Create a password to get to this screen: 8. Because this is the initial account setup, you can ignore the warning in bold text shown on the screen. Note that it DOES serve as a reminder that users in ALL groups need to remember their passwords. Resetting a password will cause the loss of data that was encrypted using EFS. Select a password that you can remember but is difficult for others to guess. Enter the password into both locations and click on Create password. SEC301 - Hands-on Exercises Addendum Page 7
8 9. Note that the new account is now password protected. Close the screen above (click on the red X in the upper right corner). SEC301 - Hands-on Exercises Addendum Page 8
9 10. Switch to the account you just created and login to confirm that it is working as expected. To do so, click on the 'Start' button and then click on the arrow to the right of the 'Shut down' selection to bring up the 'Switch user' option and select it to switch to the account you just created.(sec301-adm) (note that your Start menu may well be different): 11. When presented with the screen displaying the available accounts, select the SEC301-adm account and provide the password to the account. After several seconds, the desktop setup will complete and the computer will be ready for use. If you are not the person who will be using the computer for the SEC301 class, we recommend that you log out from the SEC301-adm account and have the person who will be attending SEC301 perform the next step: Establish the laptop directory structure. SEC301 - Hands-on Exercises Addendum Page 9
10 Establish the laptop directory structure It will be helpful to have all of the files you need for the workbook in one location. Given that most of the exercises are designed around installing, configuring and using programs, here are the steps to create a folder in the SEC301-adm user space named SEC301 Programs to contain the requisite files. The individual who will be attending the SEC301 course should login to the SEC301-adm account created earlier and perform the steps described below. Make a folder named SEC 301 Programs under the user folder Unless it has been relocated, the folder for SEC301-adm will be on the C: drive under the top level folder (C:\Users). 1. To see the existing folder structure, view it in a Windows Explorer window. If you don t already have a preferred way to open Windows Explorer, the following will work. Click on Start, mouse over the SEC301- adm login name and click on it. That will open a Windows Explorer window as shown below: 2. To create a folder in the SEC301-adm user directory, position the cursor in the white space in the right side of the window and right click to bring up a menu from which to select a New Folder: SEC301 - Hands-on Exercises Addendum Page 10
11 3. Name the new folder SEC301 Programs : The SEC301 Programs folder (e.g., C:\Users\SEC301-adm\SEC301 Programs) is the location to which you will copy files from the CD that comes with the course materials you will receive for class. The laptop is now ready for use with the SEC301 labs. The final preparation step (starting on the following page) involves preparing the external drive for use with the computer. SEC301 - Hands-on Exercises Addendum Page 11
12 External drive preparation Several of the exercises in the workbook will direct you to copy files from your computer to an external drive. You can use either an external hard drive (with an appropriate interface such as USB) or a thumb drive that connects via an interface such as USB. While the process is similar for both, the directions below are for a thumb drive. Note that in the last portion of the final lab, you will completely erase the contents of the external drive. Our recommendation is that students use a small capacity (preferably no larger than2 GB) drive because a larger drive will take more time to overwrite. If the external drive you selected contains any files you need to keep, use a blank external drive instead USB Thumb Drive 1. Insert the thumb drive into your laptop and view the contents in a Windows Explorer window: 2. Format the drive as necessary. Right click on the Removable Disk and select Format to see the dialog box. Label the drive SEC301 Labs: SEC301 - Hands-on Exercises Addendum Page 12
13 3. Click on Start and confirm that you wish to erase all data: 4. Click on OK. After a few seconds, you will see a dialog box indicating that the drive is ready for use: 5. Click on the close button of the Format dialog box. 6. Return to the Windows Explorer window, view the contents of the drive (it should appear to be empty): SEC301 - Hands-on Exercises Addendum Page 13
14 7. Create a folder with your name by right clicking on the white space in the right pane and select New; Folder, and type in your name as shown below: The drive is now ready for use. 8. Remove/disconnect the external drive. This completes the computer and external drive setup for the SEC301 labs. SEC301 - Hands-on Exercises Addendum Page 14
Information to configure your Windows 7 office computer is described below.
The Remote Desktop feature in Windows allows you to control your computer from another office or from home. Remote Desktop allows you to use the applications on your office computer, and access your data
More informationInstalling LearningBay Enterprise Part 2
Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay
More informationUsing Remote Web Workplace Version 1.01
Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote
More informationTM Online Storage: StorageSync
TM Online Storage: StorageSync 1 Part A: Backup Your Profile 1: How to download and install StorageSync? Where to download StorageSync? You may download StorageSync from your e-storage account. Please
More informationAT&T Global Network Client v6.8.0 and Passport IP Setup Instructions for Broadband VPN Access
AT&T Global Network Client v6.8.0 and Passport IP Setup Instructions for Broadband VPN Access October 19, 2006 1 Installing AT&T GNC 6.8.0 for Broadband VPN Access... 3 Getting Started... 3 License Agreement...
More informationHosting Users Guide 2011
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
More informationCruzNet Secure Set-Up Instructions for Windows Vista
CruzNet Secure Set-Up Instructions for Windows Vista 1. In order to start using CruzNet Secure, you'll first need to create a password at https://vpn.soe.ucsc.edu/. Click on the reset your password link.
More informationFormat the USB Thumb Drive for Ghost
First, download the 3 files found on this FTP site: ftp://ftp.meta.moleculardevices.com/outgoing/kudoh/ Also, download the files found here: ftp://ftp.meta.moleculardevices.com/support/wavetracer/ You
More informationBackup & Restore Instructions
Backup & Restore Instructions Helper Backup & Restore Overview Helper Software contains a utility to help you backup and restore your data in case your data becomes corrupted or your hardware fails. The
More informationFile Management and File Storage
File Management and File Storage http://training.usask.ca Information Technology Services Division Table of Contents File Management at the University of Saskatchewan...3 Introduction...3 Creating Files
More informationConfiguring WPA2 for Windows XP
Configuring WPA2 for Windows XP Requirements for wireless using WPA2 on Windows XP with Service Pack 2 Your wireless card must support 802.1x, AES, and WPA2. Windows XP with service pack 2, it is recommended
More informationBASF D6Direct. User s Manual
BASF D6Direct User s Manual Version 1.0 May 20, 2009 Document Control Document Name: IPEC User Manual.doc Version Rev # Nature of Change Effective Date 1 0 Initial release 06/17/2009 Included the Version
More informationUsing SSH Secure Shell Client for FTP
Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking
More informationHow To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
More informationGeneral Computing Network (GCN) Guide for Mac OS X
General Computing Network (GCN) Guide for Mac OS X In the new GCN Environment for Mac and Linux machines, you will have to login with your UNCG user name and password. Machines will not be set to automatically
More informationAccessing vlabs using the VMware Horizon View Client for OSX
Accessing vlabs using the VMware Horizon View Client for OSX This document will demonstrate how to download, install, and connect to a virtual lab desktop from a personal Mac OSX computer using the VMware
More information16.4.3 Lab: Data Backup and Recovery in Windows XP
16.4.3 Lab: Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment The
More informationWindows XP Pro: Basics 1
NORTHWEST MISSOURI STATE UNIVERSITY ONLINE USER S GUIDE 2004 Windows XP Pro: Basics 1 Getting on the Northwest Network Getting on the Northwest network is easy with a university-provided PC, which has
More informationOutlook Web Access (OWA) User Guide
Outlook Web Access (OWA) User Guide September 2010 TABLE OF CONTENTS TABLE OF CONTENTS... 2 1.0 INTRODUCTION... 4 1.1 OUTLOOK WEB ACCESS SECURITY CONSIDERATIONS... 4 2.0 GETTING STARTED... 5 2.1 LOGGING
More informationCox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0
Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE
More informationHow to install Radiance on your computer via a virtual machine
How to install Radiance on your computer via a virtual machine This instruction will help to install the lighting simulation tool Radiance on a Windows operated computer. As Radiance runs under Unix/Linux,
More informationInstalling Novell Client Software (Windows 95/98)
Installing Novell Client Software (Windows 95/98) Platform: Windows 95/98 Level of Difficulty: Intermediate The following procedure describes how to install the Novell Client software. This software allows
More informationIT Quick Reference Guides Using Windows 7
IT Quick Reference Guides Using Windows 7 Windows Guides This sheet covers many of the basic commands for using the Windows 7 operating system. WELCOME TO WINDOWS 7 After you log into your machine, the
More information1. Installing The Monitoring Software
SD7000 Digital Microphone Monitor Software manual Table of Contents 1. Installing The Monitor Software 1.1 Setting Up Receivers For Monitoring 1.2 Running The Application 1.3 Shutdown 2. The Detail Monitoring
More informationIntroduction to MS WINDOWS XP
Introduction to MS WINDOWS XP Mouse Desktop Windows Applications File handling Introduction to MS Windows XP 2 Table of Contents What is Windows XP?... 3 Windows within Windows... 3 The Desktop... 3 The
More informationWireless Remote Control of the TT24
of the TT24 Updated: 7/20/04 by Benjamin Olswang The TT24 includes a powerful piece of software called TT Control. With this software, you can monitor and control the TT24 console from a PC attached via
More informationRoyal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology
getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on 5415 2555 (01246 282555) March 2010 Contents 1 Introduction to Symantec
More informationWindows 7 Hula POS Server Installation Guide
Windows 7 Hula POS Server Installation Guide Step-by-step instructions for installing the Hula POS Server on a PC running Microsoft Windows 7 1 Table of Contents Introduction... 3 Getting Started... 3
More informationLotus Notes Client Version 8.5 Reference Guide
Lotus Notes Client Version 8.5 Reference Guide rev. 11/19/2009 1 Lotus Notes Client Version 8.5 Reference Guide Accessing the Lotus Notes Client From your desktop, double click the Lotus Notes icon. Logging
More informationTo use your Brother machine in an ad hoc network, complete the steps listed below:
Description of Problem 100000028554 How do I join the Brother machine to an Adhoc Wireless Network? Description of Solution 200000036605 An Ad-hoc network allows each wireless device to communicate directly
More informationMac OS X Secure Wireless Setup Guide
Mac OS X Secure Wireless Setup Guide Requirements: Apple computer with built-in AirPort card capable of WPA2-Enterprise encryption Mac OS X Snow Leopard version 10.6.0 or greater or Mac OS X Lion version
More informationTIPS FOR USING OS X 10.8 MOUNTAIN LION
Mac OS X Tutorial 10.8 Mountain Lion 1 TIPS FOR USING OS X 10.8 MOUNTAIN LION LAUNCHPAD Launchpad is an application launcher first introduced in OS X 10.7 Lion and improved upon in Mountain Lion. Launchpad
More informationFile and Printer Sharing with Microsoft Windows
Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of
More informationSteps for using MagicConnect
Getting Started Getting Started MagicConnect is a remote access service that allows you safe remote access to a target device from your remote device. What is a remote device? It is a Windows device, iphone/ipad,
More informationOption nv, Gaston Geenslaan 14, B-3001 Leuven Tel +32 16 317 411 Fax +32 16 207 164 http://www.option.com Page 1 of 14
Page 1 of 14 ! " #!"#$ % &&' Page 2 of 14 1 INTRODUCTION One of the highly desirable features of the GlobeSurfer III device is the ability to network together Printers and External Hard Disk drives (aka
More informationRP Pocket PC Scanner Reference Manual For PPT8800
RP Pocket PC Scanner Reference Manual For PPT8800 Table of Contents Overview...2 Installation...2 Setting up your Pocket PC...3 Terminal Services Client...6 Scanning Barcodes...8 Loading Scanner Sessions
More informationMigrating Groupwise Data
Migrating Groupwise Data Requirements: Windows Computer on CCSF admin network Outlook 2010 Groupwise 8 windows client Network access Office 365 login and password Groupwise login and password USB Flash
More informationStep-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.
More information10.3.1.6 Lab - Data Backup and Recovery in Windows XP
5.0 10.3.1.6 Lab - Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment
More informationTransitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1
Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1 A Turning Account is a unique identifier that is used to tie together all software accounts and response devices. A Turning Account is required
More information2. PMP New Computer Installation. & Networking Instructions
ONTARIO CHIROPRACTIC ASSOCIATION PATIENT MANAGEMENT PROGRAM PUTTING EXPERIENCE INTO PRACTICE PMP New Computer Installation & Networking Instructions This document provides installation instructions for
More informationMicrosoft Exchange 2007
Microsoft Exchange 2007 On September 14, 2009 the College will convert its employee email system to Exchange 2007. This affects the email that you send and receive via your bucks.edu account. This conversion
More informationFirst Time On-Campus VLab Setup Windows XP Edition
First Time On-Campus VLab Setup Windows XP Edition General: This guide is a step-by-step walkthrough of downloading, installing and configuring VMware View Client for the University of Cincinnati s VLab
More informationSSL VPN Setup for Windows
SSL VPN Setup for Windows SSL VPN allows you to connect from off campus to access campus resources such as Outlook email client, file sharing and remote desktop. These instructions will guide you through
More informationRed Hat Linux 7.2 Installation Guide
Red Hat Linux 7.2 Installation Guide Ryan Spangler spanglerrp22@uww.edu http://ceut.uww.edu April 2002 Department of Business Education/ Computer and Network Administration Copyright Ryan Spangler 2002
More informationObjectives. At the end of this chapter students should be able to:
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
More informationVerizon Remote Access User Guide
Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks
More informationKaspersky Password Manager USER GUIDE
Kaspersky Password Manager USER GUIDE Dear User! Thank you for choosing our product. We hope that this documentation helps you in your work and provides answers you may need. Any type of reproduction or
More informationVirtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
More informationDial-up Installation for CWOPA Users (Windows Operating System)
Dial-up Installation for CWOPA Users (Windows Operating System) 1 Table of Contents Download and Install Digital Certificates... 3 Internet Explorer 8/9 Certificate Installation.3 Windows XP Instructions
More informationBounceBack User Guide
Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:
More informationConnecting to the FILTER Virtual Private Network (VPN)
Create FILTER VPN Connection Filter s VPN allows computers at remote locations (e.g. home, hotels, Starbucks?) to connect directly and securely to FILTER s corporate network. Computers connected by VPNs
More informationPendragon Forms Industrial
Pendragon Forms Industrial Version 7 Installation & Reference Guide for Android Devices Contents What Is Pendragon Forms Industrial?... 2 Installing Pendragon Forms Industrial... 2 Installing Pendragon
More informationHow to Access Coast Wi-Fi
How to Access Coast Wi-Fi Below is a summary of the information required to configure your device to connect to the coast-wifi network. For further assistance in configuring your specific device, continue
More informationSQL Server 2008 R2 Express Edition Installation Guide
Hardware, Software & System Requirements for SQL Server 2008 R2 Express Edition To get the overview of SQL Server 2008 R2 Express Edition, click here. Please refer links given below for all the details
More informationApple OS / ios Installation Guide Includes MAC OSx and ios based devices
Apple OS / ios Installation Guide Includes MAC OSx and ios based devices Updated 8/10/2012 This page intentionally left blank Using SPOT on a Apple OS Device... 4 Summary... 4 Requirements... 4 Usage and
More informationBaylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
More informationCreating client-server setup with multiple clients
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
More informationUser Guide for Windows 10
User Guide for Windows 10 System requirements E10684 First Edition July 2015 To facilitate a smoother transition from your previous operating system, read the system requirements below before upgrading
More informationHOW TO USE OIT EMAIL VIA THE WEB
HOW TO USE OIT EMAIL VIA THE WEB A) Logging into your MyOIT account which includes your email account 1) Open a browser such as Firefox, Chrome or Safari. Please do not use Internet Explorer. 2) In the
More informationSTATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
More informationExport the address book from the Blackberry handheld to MS Outlook 2003, using the synchronize utility in Blackberry Desktop Manager.
Export the address book from the Blackberry handheld to MS Outlook 2003, using the synchronize utility in Blackberry Desktop Manager. Revised 2/25/07 Creating a New Contacts Folder in Outlook Open Outlook
More informationRecommended Network Setup
Recommended Network Setup Greater Giving Event Software uses Windows File Sharing to allow multiple computers to connect to the same database within your network. This document uses Windows XP as the default
More informationRemote Access for Cisco Unity 8.x
CHAPTER 9 Remote Access for Cisco Unity 8.x Accessing Cisco Unity 8.x Remotely There are several methods that allow remote access to the Cisco Unity server so that you can do tasks such as loading updates
More informationUser s Manual. Management Software for ATS
ATS Monitor User s Manual Management Software for ATS Table of Contents 1. ATS Monitor Overview... 2 2. ATS Monitor Install and Uninstall... 2 2.1. System Requirement... 2 2.2. Software Install... 2 2.3.
More informationVess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved.
Vess A2000 Series NVR Storage Appliance Windows Recovery Instructions Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Different ways to backup the system disk 2 Before
More informationWIRELESS TRAINING SOLUTIONS. by vlogic, Inc. L a b 0.3 Remote Access Labs
WIRELESS TRAINING SOLUTIONS by vlogic, Inc L a b 0.3 Remote Access Labs WIRELESS TRAINING SOLUTIONS Hands-on Workshop and Lab Guide Table of Contents Connecting to the Wireless Training Solutions Network
More informationONBASE OUTLOOK CLIENT GUIDE for 2010 and 2013
To install Outlook 2010/2013 client Note: NOT currently compatible with Windows 10. Make sure your version of outlook is 32bit if not reinstall your version of Microsoft Office to the 32bit version. Must
More informationProjectWise Explorer V8i User Manual for Subconsultants & Team Members
ProjectWise Explorer V8i User Manual for Subconsultants & Team Members submitted to Michael Baker International Subconsultants & Team Members submitted by Michael Baker International ProjectWise Support
More informationInstallation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
More informationConfiguring Windows 7 to Use Encrypted (WPA-E) Wireless Services a...
1 di 9 31/05/2011 14.48 Search This Site All UCSD Sites Blink Home > Technology > Network Services > Connections > Wireless > Windows 7 Configuring Windows 7 to Use Encrypted (WPA-E) Wireless Services
More informationWIRELESS TRAINING SOLUTIONS. by vlogic, Inc. L a b 0.2 Access to Content Management System
WIRELESS TRAINING SOLUTIONS by vlogic, Inc L a b 0.2 Access to Content Management System WIRELESS TRAINING SOLUTIONS Hands-on Workshop and Lab Guide Table of Contents Accessing the Wireless Training Solutions
More informationCONTENTS. Introduction... 3. Outlook at a glance... 3. Configure Outlook 2010 on-campus... 3. Creating Folders... 4. Sorting Emails...
OFFICE OF INFORMATION TECHNOLOGY Academic Technology Unit Microsoft Outlook 2010 Basics Workbook CONTENTS Introduction... 3 Outlook at a glance... 3 Configure Outlook 2010 on-campus... 3 Creating Folders...
More informationSymantec Endpoint Encryption (SEE Client) Installation Instructions. Version 8.2
Symantec Endpoint Encryption (SEE Client) Installation Instructions Version 8.2 Warning: This software is labor intensive, therefore it is important to validate that the hard drive is healthy by first
More informationNAS 103 Wake-on-LAN (WOL) Set up and use WOL with your ASUSTOR NAS
NAS 103 Wake-on-LAN (WOL) Set up and use WOL with your ASUSTOR NAS A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Enable the Wake-on-LAN (WOL) function
More informationUser Guide. emoney for Outlook
User Guide emoney for Outlook Table of Contents INTRODUCTION... 2 SYSTEM REQUIREMENTS... 2 Required Installations... 2 INSTALLATION PROCESS... 2 FIRST TIME SETUP... 8 EMONEY CLIENT PANE... 17 Client Contact
More informationO UTLOOK 2003 HELP SHEET MAIL. Opening the program. Mail
O UTLOOK 2003 HELP SHEET MAIL Opening the program At Work Double-click the icon on your desktop. Or click the Start button. If this icon is displayed, click on it. If it is not displayed, click Start,
More informationVIRTUAL SOFTWARE LIBRARY REFERENCE GUIDE
VIRTUAL SOFTWARE LIBRARY REFERENCE GUIDE INTRODUCTION The Virtual Software Library (VSL) provides remote and on-campus access to lab/course software. This approach is intended to simplify access for all
More informationUser s Manual. Transcend JetFlash SecureDrive. Contents
User s Manual Transcend JetFlash SecureDrive Thank you for purchasing Transcend s USB Flash drive with built-in 256-bit AES encryption security. JetFlash SecureDrive helps you safeguard data by creating
More informationLivezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning
Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux
More informationSJRWMD Cloud-Based Email Quick-Start Guide
SJRWMD Cloud-Based Email Quick-Start Guide Your email account is now in the Microsoft cloud, also known as Office 365. This change from onpremise email provisioning to the cloud allows the agency to provide
More informationUsing Outlook Web Access
Using Outlook Web Access Log on JTSA Outlook Web Access 1. Enter the following URL into the address bar on your web browser (Internet Explorer recommended) and press enter http://exweb.jtsa.edu 2. The
More informationBioWin Network Installation
BioWin Network Installation Introduction This document outlines the procedures for installing the network version of BioWin. There are three parts to the network version installation: 1. The installation
More informationConverting InfoPlus.21 Data to a Microsoft SQL Server 2000 Database
Technical Bulletin Issue Date August 14, 2003 Converting InfoPlus.21 Data to a Microsoft SQL Server 2000 Database Converting InfoPlus.21 Data to a Microsoft SQL Server 2000 Database...2 Introduction...
More informationHow To Connect To A Wireless Network On Windows 7 (Windows 7) On A Pc Or Mac Or Ipad (Windows) On Pc Or Ipa (Windows 8) On Your Computer Or Mac (Windows). (Windows.7) On An
Wireless Configuration for Windows 7 Frostburg State University offers wireless service to all employees and students which can be accessed almost anywhere on campus. Network and Sharing Windows 7 includes
More informationOcster Backup - Rescue System
Overview Ocster Backup - Rescue System The software allows you to create a rescue CD, DVD or USB-Stick. This rescue system is intended for two kinds of situations: 1. To restore a backup to your main hard
More informationNTI Backup Now EZ v2 User s Guide
NTI Backup Now EZ v2 User s Guide GMAA00423010 11/12 2 Copyright statement This guide is copyrighted by Toshiba Corporation with all rights reserved. Under the copyright laws, this guide cannot be reproduced
More informationInstalling Proview on an Windows XP machine
Installing Proview on an Windows XP machine This is a guide for the installation of Proview on an WindowsXP machine using VirtualBox. VirtualBox makes it possible to create virtual computers and allows
More informationUsing ELM Reports in WhatsUp Gold. This guide provides information about configuring ELM reports in WhatsUp Gold v15.0
Using ELM Reports in WhatsUp Gold This guide provides information about configuring ELM reports in WhatsUp Gold v15.0 Using Event Log Management (ELM) Reports in WhatsUp Gold In This Chapter Event Log
More informationSetting Up Windows Perfmon to Collect Performance Data
Setting Up Windows Perfmon to Collect Performance Data In order to provide a comprehensive view of your environment, pick the busiest week of a typical month to collect your disk performance data. To set
More informationLoad Bulletin ADP, Inc. Dealer Services 1950 Hassell Road Hoffman Estates, IL 60169-6308
Load Bulletin ADP, Inc. Dealer Services 1950 Hassell Road Hoffman Estates, IL 60169-6308 Make sure the media label contains this number: NP-ASP-AE1.0 ADP Network Phone ASP Assistant Enterprise Loading
More informationPocket ESA Network Server Installation
Pocket ESA Network Server Installation This document details the installation and configuration of the networked version of Pocket ESA on a computer with Microsoft Windows XP/2000. Installation After agreeing
More informationQbox User Manual. Version 7.0
Qbox User Manual Version 7.0 Index Page 3 Page 6 Page 8 Page 9 Page 10 Page 12 Page 14 Page 16 Introduction Setup instructions: users creating their own account Setup instructions: invited users and team
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationIMPORTANT Please Read Me First
IMPORTANT Please Read Me First 3/02/2006 Table of Contents Table of Contents Part 1 Mac Single User Installation 1 Part 2 Windows Single User Installation 2 Part 3 Mac Server Installation 3 Part 4 Windows
More informationGRS Advantage Website User Reference Guide
GRS Advantage Website User Reference Guide This document describes how to use the GRS Advantage Website. Table of Contents GRS Advantage Website... 2 Accessing the Website... 2 Requesting Access to the
More informationInstalling the Microsoft Network Driver Interface
Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's
More informationOutlook Web App. in Office 365. The Outlook Window. Signing In. (Outlook Exchange Faculty & Staff) Getting Started
Outlook Web App in Office 365 (Outlook Exchange Faculty & Staff) Getting Started The Outlook Window Navigation Bar Settings Navigation Pane View Pane Reading Pane Navigation Bar switch between Outlook,
More informationTo successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to be verified.
TO: UAN CLIENTS FROM: UAN STAFF DATE: OCTOBER 8, 2008 SUBJECT: Steps for Initial Setup of Microsoft Outlook To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to
More information1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4
1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create
More information