/helpop <command> you can get the detailed help for one single command.

Size: px
Start display at page:

Download "/helpop <command> you can get the detailed help for one single command."

Transcription

1 These are the Commands you need, to enter or leave a channel or to change your nick. You can use some of these commands every day or maybe more often. They control how you appear in IRC, and allow you to control your channel without using the services. This help document provides basic information about the commands available. Detailed information is available through our HELPOP System. To access the HELPOP System, just use the command: /helpop on the IRC Network. General Commands: HELPOP Syntax: /helpop <parameter> Thats the HELPOP System. You will find a detailed command Help for every available IRC Server command here. Sometimes on this page i will refer to the HELPOP System, because some commands have a complex syntax which is better explained there. With "/helpop usercmds" (without the quotes) you will get a more complete list of all commands listed here, and with /helpop <command> you can get the detailed help for one single command. JOIN Syntax: /join <#channel> <password> Enter a channel. The password is only needed when the Channel is password protected (See 1 / 11

2 Channel Modes for detailes.) Only when you entered / joined a channel you can read Channelmessages. Please note that a Channel Operator can lock a channel with different tools (Channelmodes), so it's possible that you're not able to join the channel. However, you will receive an errormessage where the reason why you can't join is explained. PART Syntax: /part <#channel> Leaves a channel. CYCLE Syntax: /cycle #channel Part and Join the Channel. This command is also known as "rejoin" on other networks. NICK Syntax: /nick <newnickname> 2 / 11

3 Changes your nick to <newnickname>. Please Note that it is possible that the new nick is allready in use. In this case you aren't able to change your nick and you will receive an errormessage. AWAY Syntax: /away <reason> If you used the command with a reason, you will be marked as away with the given reason. To remove this just use the command without a reason and you're back. Note: The Away-Flag is for information purpose only, theres no difference in how the servers reacting on you when you marked as beeing away. KNOCK Syntax: /knock <#channel> If a channel is set to invite only (+i) nobody is able to join till he or she gets an invitation. The knock Command tells the Channeloperator that you want to get in, so he can decide to invite you or not. 3 / 11

4 PRIVMSG Syntax: /privmsg <nickname> /privmsg <#channel> PRIVMSG is the central command to send messages to other users. The Target defines who will receive the message - a single user or a whole channel. Most IRC Clients don't show the Users the Command, they have an Editbox to enter the Text and send it to the channel or person who is assigned to the open window, but you can use this command to send text to a specific target. NOTICE Syntax: /notice <nickname> /notice <#channel> NOTICE works like PRIVMSG. The difference is, that most IRC Clients formating Notices to look different from PRIVMSGs. LIST Syntax: /list <parameters> The LIST Command is used to get a List of all Channels. Without parameters given, the list will show you all channels. Detailed Informations about Parameters for this command are available in the HELPOP System. Note: As a normal User, every channel wich is having Mode +s or Mode +p set, will not be shown on that list. 4 / 11

5 LINKS Syntax: /links This Command is used to see wich servers are in the IRC Network. When you use this command, you will get a List of all IRC Servers. MAP Syntax: /map This command works like the LINKS command, the difference is that the list is drawn as Connection MAP. LUSERS Syntax: /lusers Displays the current User / Channel stats. NAMES Syntax: /names <#channel> 5 / 11

6 Displays the Users who are in the given Channel. Note: Depending on the Channelmodes, you may have to be in the Channel to use that command. WATCH Syntax: /watch +<nickname> /watch -<nickname> The WATCH list is like a Buddy list. You can add nicknames and the IRC Server will notify you when one of the nicks on the list comes online or goes offline. Note: The Watch List is limited to 15 entries. Note2: The Watch list is lost after disconnect. SILENCE Syntax: /silence +<nickname> /silence -<nickname> The SILENCE list is a serverbased ignore list. You can add nicknames and the IRC Server will not deliver any messages or notices from the user to you. Note: The Silence List is limited to 15 entries. Note2: The Silence list is lost after disconnect. 6 / 11

7 WHOIS Syntax: /whois <nickname> The WHOIS Command can be used if you want to get more Informations about a User. You will see the (encrypted) Hostname and some Other Informations like Ident, provided Realname and so on. If you use the Whois Command with the same nick twice (i.e. /whois nickname nickname ) you will get the Info about how long the User has been idle since his last activity. WHOWAS Syntax: /whowas <nickname> With the WHOWAS Command you can get some Info about a user who just disconnected. For example, you get a list of the recent Servers he used, and when he was online. WHO The WHO command is a powerfull tool to find users. But the syntax is very komplex. So if you want to use the WHO command, please take a look into the HELPOP System at the IRC Server to get the full help for that command. MOTD Syntax: /motd 7 / 11

8 This will show you the "Message of the Day" of the Server you're connected to. Note: The MotD is normally displayed while you're connecting. RULES Syntax: /rules This Command will show you the Network rules. We have a copy on our Homepage too. Please Note: Every User who is using our Service have to follow this rules. So please read them. QUIT Syntax: /quit <reason> The QUIT Command will terminate your IRC Session. The Reson parameter is optional. 8 / 11

9 Channel Management: TOPIC Syntax: /topic <#channel> <text> With this Command you can set the Topic of a Channel. Most IRC Clients (i.e. mirc) displaying the Topic in the Window Header of the Channelwindow. KICK Syntax: /kick <#channel> <nickname> Removes a User from the given Channel. Note: A user can simple rejoin your channel unless you banned him (See MODE Command). INVITE Syntax: /invite <#channel> <nickname> Invites a User into a channel. You need to Invite users before they can join when you set Channelmode +i 9 / 11

10 MODE Mode is the central command for Channel Management. You can configure the behavior of your channel (i.e. can anybody talk or colors allowed or not.) and you can give privileges to or take privileges from other users. And at last you can ban users from your channel, wich means that they cannot rejoin after you kicked them. Examples: To make a channel invite only you can use the following command: /mode <#channel> +i Give OP Privileges to a user: /mode <#channel> +o <nickname> Take OP Privileges from a user: /mode <#channel> -o <nickname> Ban a user: /mode <#channel> +b nick!ident@host You can use wildcards in bans. if you want to ban only a nickname then use: /mode <#channel> +b Nickname!*@* Or if you want to ban a hostname: 10 / 11

11 /mode <#channel> +b Note: A complete list of channelmodes is available at the Server Help Section under the topic Channelmodes. 11 / 11

IRC - Internet Relay Chat

IRC - Internet Relay Chat IRC - Internet Relay Chat Protocol, Communication, Applications Jenisch Alexander [email protected] Morocutti Nikolaus [email protected] Introduction Facts. How it works. IRC specifiaction. Communication.

More information

Implementing an IRC Server Using an Object- Oriented Programming Model for Concurrency

Implementing an IRC Server Using an Object- Oriented Programming Model for Concurrency Implementing an IRC Server Using an Object- Oriented Programming Model for Concurrency Bachelor Thesis Fabian Gremper ETH Zürich [email protected] May 17, 2011 September 25, 2011 Supervised by:

More information

The ScoutLink Operators Manual. For IRC Operators

The ScoutLink Operators Manual. For IRC Operators The ScoutLink Operators Manual For IRC Operators 1 Table of Contents 1 Table of Contents... 2 2 Introduction... 3 3 OPER... 4 4 #Services.log... 4 5 HELPSYS... 5 6 SAMODE... 5 6.1 Regular channel modes...

More information

How To Understand Your Server History On Acedo.Com (For Free) On A Pc Or Mac) On An Ipad Or Ipad (For A Premium) On Pc Or Ipa (For Cheap) On Your Pc Or Pc Or

How To Understand Your Server History On Acedo.Com (For Free) On A Pc Or Mac) On An Ipad Or Ipad (For A Premium) On Pc Or Ipa (For Cheap) On Your Pc Or Pc Or Operators guide for the charybdis IRC server William Pitcock Jilles Tjoelker Operators guide for the charybdis IRC server by William Pitcock by Jilles Tjoelker Copyright 2005-2009 William Pitcock and Jilles

More information

How To Protect Your Network From Attack On A Linux Chat (Netty) On A Pcode (Netrocess) On An Ipa 2.5 (Networking) On Your Pcode 2.7 (Netware) On Pcode

How To Protect Your Network From Attack On A Linux Chat (Netty) On A Pcode (Netrocess) On An Ipa 2.5 (Networking) On Your Pcode 2.7 (Netware) On Pcode OfficeIRC v2.1 Technical Manual SUMMARY This manual describes how to configure your chat server, connect to your server and secure your chat server. It also details trouble shooting, Internet Relay Chat

More information

Troubleshooting / FAQ

Troubleshooting / FAQ Troubleshooting / FAQ Routers / Firewalls I can't connect to my server from outside of my internal network. The server's IP is 10.0.1.23, but I can't use that IP from a friend's computer. How do I get

More information

IRC-Client. IRC Group: Arne Bochem, Benjamin Maas, David Weiss

IRC-Client. IRC Group: Arne Bochem, Benjamin Maas, David Weiss IRC-Client IRC Group: Arne Bochem, Benjamin Maas, David Weiss September 1, 2007 Contents 1 Introduction 2 1.1 Description.............................. 2 1.2 Motivation.............................. 2

More information

CHAPTER 26 - SHOPPING CART

CHAPTER 26 - SHOPPING CART CHAPTER 26 - SHOPPING CART ecommerce Hosting With ihoststudio's Shopping Cart Sell your items on the web with the ihoststudio shopping cart. Product catalogs Shopping cart Credit Card Payments Store control

More information

The Konversation Handbook. Gary R. Cramblitt

The Konversation Handbook. Gary R. Cramblitt Gary R. Cramblitt 2 Contents 1 Introduction 6 2 Using Konversation 7 2.1 If you haven t used IRC before................................ 7 2.2 Setting your identity.................................... 9

More information

(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).

(For purposes of this Agreement, You,  users, and account holders are used interchangeably, and where applicable). Key 2 Communications Inc. Acceptable Use Policy Please read carefully before accessing and/or using the Key 2 Communications Inc. Web site and/or before opening an account with Key 2 Communications Inc..

More information

HOW TO CONFIGURE CISCO FIREWALL PART I

HOW TO CONFIGURE CISCO FIREWALL PART I HOW TO CONFIGURE CISCO FIREWALL PART I Cisco Abstract: Please find below a step by step process to configure the PIX Firewall from scratch. A simple scenario is given here where you have a corporate network

More information

USER S GUIDE: Audio Conferencing. Start increasing your efficiency today.

USER S GUIDE: Audio Conferencing. Start increasing your efficiency today. USER S GUIDE: Audio Conferencing Start increasing your efficiency today. Table of Contents Conferencing Basics 3 Conferencing Set Up Options 4 Call Control Features 5 Security Features 6 Call Control Commands

More information

Java and IRC. What Is IRC? Nicks, Channels and Operators. Using IRC. What Is an IRC Bot? IRC Protocol

Java and IRC. What Is IRC? Nicks, Channels and Operators. Using IRC. What Is an IRC Bot? IRC Protocol What Is IRC? Java and IRC Making a Java IRC Bot With The PircBot Framework IRC stands for Internet Relay Chat Created by Jarkko Oikarinen in 1988 and still growing in popularity An IRC server allows people

More information

Lecture 29: Bots and Botnets. Lecture Notes on Computer and Network Security. by Avi Kak ([email protected])

Lecture 29: Bots and Botnets. Lecture Notes on Computer and Network Security. by Avi Kak (kak@purdue.edu) Lecture 29: Bots and Botnets Lecture Notes on Computer and Network Security by Avi Kak ([email protected]) April 22, 2015 1:28pm c 2015 Avinash Kak, Purdue University Goals: Bots and bot masters Command and

More information

CrushFTP User Manager

CrushFTP User Manager CrushFTP User Manager Welcome to the documentation on the CrushFTP User Manager. This document tries to explain all the parts tot he User Manager. If something has been omitted, please feel free to contact

More information

Server Setup. Basic Settings

Server Setup. Basic Settings Server Setup Basic Settings CrushFTP has two locations for its preferences. The basic settings are located under the "Prefs" tab on the main screen while the advanced settings are under the file menu.

More information

BEGINNER S ADMINISTRATION TUTORIAL for MEDAL OF HONOR: ALLIED ASSAULT by Crow King [email protected]

BEGINNER S ADMINISTRATION TUTORIAL for MEDAL OF HONOR: ALLIED ASSAULT by Crow King crowking@autokick.com BEGINNER S ADMINISTRATION TUTORIAL for MEDAL OF HONOR: ALLIED ASSAULT by Crow King [email protected] For more Administrator Support, please visit http://www.autokick.com/ 2003 DTOM, Inc. All Rights

More information

[AthenaIRC v2.3.4] coded by _Stoner ----- -Documentation- -----

[AthenaIRC v2.3.4] coded by _Stoner ----- -Documentation- ----- [AthenaIRC v2.3.4] coded by _Stoner ----- -Documentation- ----- Athena IRC Bot Commands: Miscellaneous Commands!decrypt Decrypts a previously encrypted command(prevents IRC lurkers from seeing/interpreting

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

Hands-on MESH Network Exercise Workbook

Hands-on MESH Network Exercise Workbook Hands-on MESH Network Exercise Workbook Santa Clara County RACES Date: 18 March 2015 Version: 1.0 scco_wifi_intro_exonly_v150318.docx 1 Table of Contents HANDS ON! Exercise #1: Looking at your Network

More information

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. 1. Click the Windows Start button, then Control Panel How-To-WCC-Secure-Windows-7-11/4/2010-4:09

More information

Autodesk Desktop Subscription

Autodesk Desktop Subscription Autodesk Desktop Subscription Customer frequently asked questions and answers Table of contents Frequently asked questions and answers 1 1. About Autodesk Desktop Subscription 2 1.1 What is Autodesk Desktop

More information

How to deploy SurveilStar PC/Internet Monitoring Software

How to deploy SurveilStar PC/Internet Monitoring Software How to deploy SurveilStar PC/Internet Monitoring Software 1/16 How to deploy SurveilStar PC/Internet Monitoring Software (Latest updated: April. 9, 2015) www.surveilstar.com This document provides detailed

More information

Celly FAQ. inbox cells people help. celly help. Common Support Questions. celly company. General. celly @ school. policies. About Cells.

Celly FAQ. inbox cells people help. celly help. Common Support Questions. celly company. General. celly @ school. policies. About Cells. Celly FAQ Common Support Questions inbox cells people help How do I change my username? How do I change the phone number on my Celly account? How do I set my password/reset my password? How can I mass

More information

IDS and Penetration Testing Lab IIIa

IDS and Penetration Testing Lab IIIa IDS and Penetration Testing Lab IIIa Dissecting a Botnet C&C - rbot Triggering Lab Malware operation Upon execution malware connects to botirc.net server and establishes standard IRC session with #test

More information

Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access

Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access Configuring Timeout, Retransmission, and Key Values per RADIUS Server The Configuring Timeout, Retransmission, and Key Values per RADIUS Server feature extends the functionality of the existing radius-server

More information

Polycom Converged Management Application (CMA ) Desktop for Mac OS X. Help Book. Version 5.1.0

Polycom Converged Management Application (CMA ) Desktop for Mac OS X. Help Book. Version 5.1.0 Polycom Converged Management Application (CMA ) Desktop for Mac OS X Help Book Version 5.1.0 Copyright 2010 Polycom, Inc. Polycom and the Polycom logo are registered trademarks and Polycom CMA Desktop

More information

VPN PPTP Application. Installation Guide

VPN PPTP Application. Installation Guide VPN PPTP Application Installation Guide 1 Configuring a Remote Access PPTP VPN Dial-in Connection A remote worker establishes a PPTP VPN connection with the head office using Microsoft's VPN Adapter (included

More information

Creating a User Profile for Outlook 2013

Creating a User Profile for Outlook 2013 Creating a User Profile for Outlook 2013 This document tells you how to create a user profile for Outlook 2013 on your computer (also known as the Outlook client). This is necessary, for example, when

More information

12Planet Chat end-user manual

12Planet Chat end-user manual 12Planet Chat end-user manual Document version 1.0 12Planet 12Planet Page 2 / 13 Table of content 1 General... 4 1.1 How does the chat work?... 4 1.2 Browser Requirements... 4 1.3 Proxy / Firewall Info...

More information

Using Windows Task Scheduler instead of the Backup Express Scheduler

Using Windows Task Scheduler instead of the Backup Express Scheduler Using Windows Task Scheduler instead of the Backup Express Scheduler This document contains a step by step guide to using the Windows Task Scheduler instead of the Backup Express Scheduler. Backup Express

More information

TRBOnet Watch. User Guide. Copyright 2011 Neocom Software, Ltd.

TRBOnet Watch. User Guide. Copyright 2011 Neocom Software, Ltd. TRBOnet Watch User Guide TRBOnet Watch User Guide 2 Contents: Architecture Overview 4 Architecture Overview 4 Installing and Configuring TRBOnet Watch Server 5 Installing Prerequisite software 5 To install

More information

Conferencing Moderator Guide - Proprietary - 2007 Nextera Communications. Conferencing Moderator Guide

Conferencing Moderator Guide - Proprietary - 2007 Nextera Communications. Conferencing Moderator Guide - Proprietary - Conferencing Moderator Guide TABLE OF CONTENTS 1 INTRODUCTION...3 2 ACTIVATING THE CONFERENCE CALL...3 3 QUICK KEY REFERENCE FOR TELEPHONE ADMINISTRATION...3 4 WEB INTERFACE...4 4.1 Accessing

More information

Configuring Timeout, Retransmission, and Key Values Per RADIUS Server

Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Feature Summary The radius-server host command functions have been extended to include timeout, retransmission, and encryption key

More information

OCS Training Workshop LAB14. Email Setup

OCS Training Workshop LAB14. Email Setup OCS Training Workshop LAB14 Email Setup Introduction The objective of this lab is to provide the skills to develop and trouble shoot email messaging. Overview Electronic mail (email) is a method of exchanging

More information

Setup Instructions for Secure Hummingbird FTP

Setup Instructions for Secure Hummingbird FTP Setup Instructions for Secure Hummingbird is the terminal emulation software that allows users to connect their pc to the mainframe in a secure environment. For example, this allows users to connect to

More information

LDAP User Guide PowerSchool Premier 5.1 Student Information System

LDAP User Guide PowerSchool Premier 5.1 Student Information System PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson

More information

IMAP and SMTP Setup in Email Clients

IMAP and SMTP Setup in Email Clients IMAP and SMTP Setup in Email Clients Configuring an Email Client for IMAP Configuring an Email Client for the SMTP Server Overview Internet Message Access Protocol (IMAP), or a remote connection through

More information

Using the ECM VPN with Windows 7

Using the ECM VPN with Windows 7 Using the ECM VPN with Windows 7 ECM IT has set up a VPN server to provide an enhanced service to ECM staff and students. This document shows you how to set up a connection on a Windows computer once your

More information

Citrix Application Streaming. Universal Application Packaging and Delivery Breaking Away from Traditional IT

Citrix Application Streaming. Universal Application Packaging and Delivery Breaking Away from Traditional IT Citrix Application Streaming Universal Application Packaging and Delivery Breaking Away from Traditional IT Application Packaging Application Delivery to Endpoint Devices Application Isolation Mode Automatic

More information

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud Contents File Transfer Protocol...3 Setting Up and Using FTP Accounts Hosted by Adobe...3 SAINT...3 Data Sources...4 Data Connectors...5

More information

RDM+ Desktop for Windows Getting Started Guide

RDM+ Desktop for Windows Getting Started Guide RDM+ Remote Desktop for Mobiles RDM+ Desktop for Windows Getting Started Guide Introduction... 3 1. Installing RDM+ Desktop on a computer... 3 2. Preparing for remote connection... 4 3. RDM+ Desktop window...

More information

Domain Registration/Domain Transfer/Domain Renewal Contract TERMS OF SERVICE

Domain Registration/Domain Transfer/Domain Renewal Contract TERMS OF SERVICE Domain Registration/Domain Transfer/Domain Renewal Contract TERMS OF SERVICE This contract is between Enter.Net, Inc., located at 815 N 12th Street, Allentown PA 18102, ("Enter.Net") and you, Enter.Net

More information

Creating an e mail list in YahooGroups

Creating an e mail list in YahooGroups Creating an e mail list in YahooGroups Creating an e mail list in Yahoo Groups is easy to do. Just follow the steps below and your group will be created in a matter of minutes. Why use Yahoo Groups? First,

More information

Enterprise Remote Control 5.6 Manual

Enterprise Remote Control 5.6 Manual Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote

More information

#Celine_Dion - EFnet - IRC Tutorial

#Celine_Dion - EFnet - IRC Tutorial #Celine_Dion - EFnet - IRC Tutorial I. Configure And Use mirc 1. Get The Program First you will need to download and install a program called mirc to connect to the IRC (Internet Relay Chat) Network. You

More information

Connecting to the Firewall Services Module and Managing the Configuration

Connecting to the Firewall Services Module and Managing the Configuration CHAPTER 3 Connecting to the Firewall Services Module and This chapter describes how to access the command-line interface and work with the configuration. This chapter includes the following sections: Connecting

More information

Back, start, and search key... 3. Lock the keys and screen... 6. Unlock the keys and screen... 7. Set the keys and screen to lock automatically...

Back, start, and search key... 3. Lock the keys and screen... 6. Unlock the keys and screen... 7. Set the keys and screen to lock automatically... Userguide Nokia Lumia 620 Table of Contents Keys and parts... 3 Back, start, and search key... 3 How to Insert a SIM card... 4 First start-up... 6 Switching Phone ON and OFF... 6 Switch the phone on...

More information

Resco CRM Guide. Get to know Resco CRM

Resco CRM Guide. Get to know Resco CRM Resco CRM Guide Get to know Resco CRM Table of Contents Introducing Resco CRM... 3 1.1. What is Resco CRM...3 1.2. Capabilities of Resco CRM... 4 1.3. Who should use Resco CRM...5 1.4. What are the main

More information

AnzioWin FTP Dialog. AnzioWin version 15.0 and later

AnzioWin FTP Dialog. AnzioWin version 15.0 and later AnzioWin FTP Dialog AnzioWin version 15.0 and later With AnzioWin version 15.0, we have included an enhanced interactive FTP dialog that operates similar to Windows Explorer. The FTP dialog, shown below,

More information

Quick Reference Guide. Vendor FAQ

Quick Reference Guide. Vendor FAQ This Frequently Asked Questions guide is meant to assist vendor users of the new emaryland Marketplace. If you require additional support, the emaryland Marketplace Support Team can be reached at [email protected].

More information

Web. Security Options Comparison

Web. Security Options Comparison Web 3 Security Options Comparison Windows Server 2003 provides a number of Security Options that can be applied within the scope of managing a GPO. Most are the same as those available in Windows 2000.

More information

MS Live Communication Server managed by TELUS. Getting Started Guide. v. 1.0

MS Live Communication Server managed by TELUS. Getting Started Guide. v. 1.0 MS Live Communication Server managed by TELUS Getting Started Guide v. 1.0 Table of Contents Getting Connected...1 Managing Contacts...2 Searching for a Contact...2 Adding a Contact to Your Contacts List...2

More information

VoIP H.323 Series. VoIP Gatways: VoIP 422/404/440/800 VoIP Routers: VoIP 404R/440R/200R/110R. Quick Setup Guide

VoIP H.323 Series. VoIP Gatways: VoIP 422/404/440/800 VoIP Routers: VoIP 404R/440R/200R/110R. Quick Setup Guide VoIP H.323 Series VoIP Gatways: VoIP 422/404/440/800 VoIP Routers: VoIP 404R/440R/200R/110R Quick Setup Guide Important Information In this guide, you will learn how to setup our VoIP gateway and Routers

More information

Canopy Wireless Broadband Platform

Canopy Wireless Broadband Platform 1 Canopy Wireless Broadband Platform Frequently Asked Questions Software Ordering and License Fulfillment Process May 2007 CONTENTS GENERAL SOFTWARE ORDERING PROCESS...2 USING THE LICENSING PORTAL...5

More information

Windows 95/98 Palace Server Guide. Version 4.4

Windows 95/98 Palace Server Guide. Version 4.4 Windows 95/98 Palace Server Guide Version 4.4 Copyright 1999 Communities.com, All rights reserved. Windows 95/98 Palace Server Guide, version 4.4 July, 1999 This document and the software described in

More information

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07 Using MioNet Copyright 2006 by Senvid, Inc. All rights reserved. 2445 Faber Place, Suite 200, Palo Alto, CA 94303 Voice: (650) 354-3613 Fax: (650) 354-8890 1 COPYRIGHT NOTICE No part of this publication

More information

SANS: The 2010 European Digital Forensics and Incident Response Summit. Retrieving Information... Then what? 8 September 2010. Righard J.

SANS: The 2010 European Digital Forensics and Incident Response Summit. Retrieving Information... Then what? 8 September 2010. Righard J. SANS: The 2010 European Digital Forensics and Incident Response Summit Page 1 Retrieving Information... Then what? Righard J. Zwienenberg Abstract Page 2 While combating cybercrime, you may gather lots

More information

Configuring SQL Server Lock (Block) Monitoring With Sentry-go Quick & Plus! monitors

Configuring SQL Server Lock (Block) Monitoring With Sentry-go Quick & Plus! monitors Configuring SQL Server Lock (Block) Monitoring With Sentry-go Quick & Plus! monitors 3Ds (UK) Limited, November, 2013 http://www.sentry-go.com Be Proactive, Not Reactive! To allow for secure concurrent

More information

Chatzy Information. General. Invitations and access control

Chatzy Information. General. Invitations and access control Chatzy Information General What is Chatzy? Chatzy is a private chat service which EDA uses to enable online communication between people who visit our website Chatroom. Registration is required to allow

More information

Understanding offline files

Understanding offline files Understanding offline files Introduction If you've ever needed to access important files stored in a shared folder on your network but couldn't because the network connection was unavailable, then you

More information

MOBILITY FOR iphone USER GUIDE

MOBILITY FOR iphone USER GUIDE MOBILITY FOR iphone USER GUIDE VERSION 20.0.2 401 Market Street, First Floor Philadelphia, PA 19106 877.258.3722 www.alteva.com Table of Contentsl 1. About Alteva Mobility for iphone... 3 2. Installation...

More information

Using Dedicated Servers from the game

Using Dedicated Servers from the game Quick and short instructions for running and using Project CARS dedicated servers on PC. Last updated 27.2.2015. Using Dedicated Servers from the game Creating multiplayer session hosted on a DS Joining

More information

Pine Exchange mini HOWTO

Pine Exchange mini HOWTO Pine Exchange mini HOWTO Alexandru Roman v1.0, 2002 03 28 Revision History Revision 1.0 2002 03 28 Revised by: ar Submitted to the LDP for publication. Revision 0.3 2002 03 25 Revised

More information

Instructions For Opening UHA Encrypted Email

Instructions For Opening UHA Encrypted Email Receiving Encrypted Email You have received a secure, encrypted message from UHA. The message will contain the following notice and an attachment named SecureMessageAtt.hml. The attachment is shown circled

More information

Contact Center CC-165 INSTALLATION & USER'S GUIDE

Contact Center CC-165 INSTALLATION & USER'S GUIDE Contact Center CC-165 INSTALLATION & USER'S GUIDE Table of Contents Introduction... 2 Specifications... 2 J4 Host Communications... 2 J5 and J12 (upper board)... 3 J6, J13, and 14 Input Connections...

More information

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide for Use With Your FreeAgent Drive 1

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide for Use With Your FreeAgent Drive 1 Seagate Manager User Guide For Use With Your FreeAgent TM Drive Seagate Manager User Guide for Use With Your FreeAgent Drive 1 Seagate Manager User Guide for Use With Your FreeAgent Drive Revision 1 2008

More information

Netscape E-Mail Setup Instructions

Netscape E-Mail Setup Instructions Netscape E-Mail Setup Instructions The following instructions will assist you in setting up Netscape Communicator for reading and sending e-mail over the WHOI Network. Before proceeding you will need to

More information

Using the VCDS Application Monitoring Tool

Using the VCDS Application Monitoring Tool CHAPTER 5 This chapter describes how to use Cisco VQE Client Configuration Delivery Server (VCDS) Application Monitoring Tool (AMT). VCDS is a software component installed on each VQE Tools server, the

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

Obtaining a Memory Dump on Windows Servers

Obtaining a Memory Dump on Windows Servers Obtaining a Memory Dump on Windows Servers A White Paper From Goldstar Software Inc. For more information, see our web site at Page 1 of 6 Obtaining a Memory Dump on Windows Servers Last Updated: 12/21/2006

More information

Mission 1: The Bot Hunter

Mission 1: The Bot Hunter Mission 1: The Bot Hunter Mission: Interpol have asked the BSidesLondon Unhackable Mission Force to penetrate and shut down a notorious botnet. Our only clue is a recovered bot executable which we hope

More information

mirc Scripting Primer Version 1.00

mirc Scripting Primer Version 1.00 http://www.flurnet.org mirc Scripting Primer mirc Scripting Primer Version 1.00 Introduction 02 Fine Tuning mirc 03 Aliases 04 Control Structure 06 - If Statements - Goto Statements - While Statements

More information

WebSphere Application Server security auditing

WebSphere Application Server security auditing Copyright IBM Corporation 2008 All rights reserved IBM WebSphere Application Server V7 LAB EXERCISE WebSphere Application Server security auditing What this exercise is about... 1 Lab requirements... 1

More information

How to Configure Dynamic DNS on a Virtual Access Router

How to Configure Dynamic DNS on a Virtual Access Router How to Configure Dynamic DNS on a Virtual Access Router Issue 1.0 Date 03 April 2012 Table of contents 1 About this document... 3 1.1 Scope... 3 1.2 Readership... 3 1.3 Terminology... 3 2 Introduction...

More information

Configure and enable remote access for windows operating system

Configure and enable remote access for windows operating system Configure and enable remote access for windows operating system There can be several reasons on why you cannot access a remote computer in your network. In this guide we will focus on troubleshooting the

More information

The Value of Physical Memory for Incident Response

The Value of Physical Memory for Incident Response The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical

More information

Automating Administration with SQL Agent

Automating Administration with SQL Agent Automating Administration with SQL Agent Automating Administration with SQL Agent Objectives Configure SQL Server Agent. Set SQL Server Agent properties. Configure a fail-safe operator. Create operators.

More information

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router 1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains

More information

What is FTH 2.0? replacement for

What is FTH 2.0? replacement for Free Toast Host 2.0 What is FTH 2.0? FreeToastHost 2.0 is the replacement for FreeToastHost 1.0. It is not a competitor of FTH, or a alternative for FTH. It is a complete rebuild using the latest web

More information

1. Configuring the Dispatcher / Load Balancer

1. Configuring the Dispatcher / Load Balancer 1. To configure the Dispatcher / Load Balancer you must adapt is configuration file, usually named dispatcher.any. The name and location you had to define in the web servers configuration file during installation.

More information

Seminar Computer Security

Seminar Computer Security Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example

More information

EF MetaTrader 5 for Android OS

EF MetaTrader 5 for Android OS User Guide for the online trading platform EF MetaTrader 5 for Android OS Euro-Finance 43 Christopher Columbus blvd., 1592 Sofia, Bulgaria tel.: +359 (0) 700 156 56; fax: +359 (0) 2 981 14 96 [email protected]

More information

Configuration Manual English version

Configuration Manual English version Configuration Manual English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the

More information

CIFS Permissions Best Practices Nasuni Corporation Natick, MA

CIFS Permissions Best Practices Nasuni Corporation Natick, MA Nasuni Corporation Natick, MA Overview You use permissions to control user access to data. There are two basic considerations when using permissions to control user access to data: Which users have access

More information

Data Warehouse Troubleshooting Tips

Data Warehouse Troubleshooting Tips Table of Contents "Can't find the Admin layer "... 1 "Can't locate connection document "... 3 Column Headings are Missing after Copy/Paste... 5 Connection Error: ORA-01017: invalid username/password; logon

More information

How To Behind A Dynamically-Assigned Public IP Address

How To Behind A Dynamically-Assigned Public IP Address How To Use Dynamic DNS To Allow You To Host Servers Behind A Dynamically-Assigned Public IP Address Allied Telesis routers feature a dynamic DNS client, which allows you to host web domains, FTP servers,

More information

1.2 Teams All teams will be directly invited and selected by Valve to compete in the tournament.

1.2 Teams All teams will be directly invited and selected by Valve to compete in the tournament. General 1.1 Tournament The International 2013 West Qualifier is a 8 team tournament lasting 7 days. It is divided into three tournament stages: initial group stage, secondary group stage, and the finals.

More information

AT&T Voice DNA User Guide

AT&T Voice DNA User Guide AT&T Voice DNA User Guide Page 1 Table of Contents GET STARTED... 4 Log In... 5 About the User Dashboard... 9 Manage Personal Profile... 15 Manage Messages... 17 View and Use Call Logs... 22 Search the

More information

Domain Name System (DNS) Services

Domain Name System (DNS) Services 12 Domain Name System (DNS) Services Contents Overview..................................................... 12-3 Host and Domain Names.................................... 12-3 Host Tables...............................................

More information

The DirectOne E-Commerce System

The DirectOne E-Commerce System The DirectOne E-Commerce System SecurePay Pty. Ltd. Level 4, 20 Queen St Melbourne 3000 Australia November 05 Contents INTRODUCTION 3 WELCOME TO THE DIRECTONE E-COMMERCE SYSTEM 3 AN OVERVIEW OF E-COMMERCE

More information