Assureon Administration Guide

Total Page:16

File Type:pdf, Size:1020Kb

Assureon Administration Guide ® Assureon Administration Guide Version 8.3 NEXSAN | 325 E. Hillcrest Drive, Suite #150 | Thousand Oaks, CA 91360 USA Printed Monday, January 27, 2020 | www.nexsan.com Copyright © 2000-2020 Nexsan Technologies, Inc.. All Rights Reserved Worldwide. www.nexsan.com Trademarks Assureon® is a registered trademark of Nexsan Technologies, Inc.. SATABlade, SATABoy, SATABeast, Nexsan E60™, Nexsan E60X™, Nexsan E18™, and the Nexsan logo are trademarks or registered trademarks of Nexsan. Microsoft, Microsoft Windows, Microsoft Internet Explorer, Microsoft SQL Server, and Microsoft Visual Studio .NET are registered trademarks of Microsoft Corporation. All other trademarks and registered trademarks are the property of their respective owners. Patents This product is protected by one or more of the following patents, and other pending patent applications worldwide: United States patents US7,801,871, US8,086,578 United Kingdom patents GB2296798B, GB2297636B About This Document Unauthorized use, duplication, or modification of this document in whole or in part without the written consent of Nexsan Technologies, Inc. is strictly prohibited. Nexsan reserves the right to make changes to this manual, as well as the equipment and software described in this manual, at any time without notice. This manual may contain links to Web sites that were current at the time of publication, but have since been moved or become inactive. It may also contain links to sites owned and operated by third parties. Nexsan is not responsible for the content of any such third-party site. Contents Contents Contents iii Chapter 1: Getting started 11 Launching the System Administration Web interface 12 Chapter 2: Assureon system administration 15 Overview of Assureon system administration 16 File Systems, Organizations, and Watches 16 Main menu 18 Configuring the System 19 System Administrator Web access 20 Security options 22 High-speed Assureon with RoCE 23 Setting thresholds 24 Setting thresholds for statistics gathering 25 Setting disk capacity thresholds 26 Setting thresholds for message queues 27 Monitoring network connectivity 28 Setting Assureon client thresholds 29 Setting SQL jobs thresholds 29 Setting CPU and memory thresholds 31 Monitoring the folders for Organizations 32 Setting the update interval for service monitoring 33 Setting the Ingestion update interval 33 Setting hardware monitoring thresholds 33 Viewing the Assureon Server status 35 Statistics panel 36 Disks panel 36 Queues panel 36 Connectivity panel 37 SQL Jobs panel 37 CPU & Memory panel 37 Folders panel 37 Services panel 37 Ingestion panel 37 Nexsan Assureon www.nexsan.com iii Contents Hardware panel 37 Viewing overall system health 38 Clients 38 External storage 39 Monitoring the System State 40 About thresholds 41 Monitoring tasks 42 Monitoring Assureon Queues 42 Searching for and restoring files 44 Generating reports 47 Viewing space consumption, disposition details, and predictive analytics 48 Viewing client trends 49 Viewing summary and date-specific reports 49 Using the Access Control pages 52 Classifying archived files - Access Classification page 52 Configuring read access 53 Reviewing file access logs 56 Working with retention rules 58 Adding a retention rule 59 Using archive folders 61 Setting archive folder rules 61 Using archive folder templates 62 Using the Clients page 64 Running a client synchronization 66 Displaying client Information 66 Using the Assureon Services page 68 Managing services 68 Using the Archive Folders Editor 70 Tasks 71 Archive Folders 71 Archive Folders for 75 The Search Engine 76 The Indexing wizard 77 Using Watch variables 77 Unity Active Archive 81 Using the Events page 82 Working with event logs 82 Managing email alerts 83 Using the System Audit Trail 85 Managing disposition of files 87 Setting disposition overrides 87 Selecting files for disposition 89 Working with scheduled disposition jobs 91 Viewing disposition logs 92 Changing the disposition schedule 93 Scheduling disposition of excess file versions 94 Disposing of excess file versions manually 95 Using the Auditing page 96 Managing integrity audits 96 Using the Scheduled Audit Configuration wizard 98 Using the Manual Audit Configuration wizard 99 Viewing integrity audit logs 101 Nexsan Assureon Administration Guide Version 8.3 iv Contents Viewing incomplete transaction logs 102 Configuring File Systems and Organizations 104 About Organizations and File Systems 107 Active-Active Plus configurations 107 Non-ASP model 107 ASP fully-hosted model 107 ASP DR model 108 Using the File System wizard 108 Applying Rollover settings 111 Advanced system administration tasks 114 Using the IIS Administration page 114 Certificate mapping 115 Virtual directory configuration 115 IIS administration 115 DNS records update 115 Using the Job Management page 115 Using the Storage Devices page 117 Using the Authorization Management page 117 Using the Organization Security page 118 Using the Options page 119 Using the Support page 121 Using Remote Desktop 121 Using CallHome 121 Logs 122 Upgrades 122 Contact Us 122 Chapter 3: The Client Service 123 Installing the Client Service 124 Client Service taskbar icon 126 Assureon client options 126 Secure File Transfers 128 Client Service For Laptops 128 Assureon property sheet 128 Low disk space warning 129 Archive folder icons 129 Safe Shortcuts 129 About Sparse Files 129 About Virtual Shortcuts 130 About the Filter Driver 130 About empty files 131 Chapter 4: Assureon Explorer 133 About Assureon Explorer 134 Restore options 135 Assureon Explorer command line 136 Chapter 5: The File Synchronization utility 137 File Synchronization dialog box 138 Starting a new file sync 139 Nexsan Assureon www.nexsan.com v Contents Archiving Sync 140 Shortcutting - Safe Shortcuts 142 Reporting - View Sync Reports 143 Directory Security - Sync 145 Disposition - Delete disposed shortcuts 146 File Synchronization command line 148 Scheduling a synchronization process using the Windows Task Scheduler 148 Change Journal 149 File Sync Request Watcher 150 Appendix A: Environment-specific configurations 153 Using certificates for authentication 154 Installing a certificate 154 Exporting and mapping a new certificate 158 Configuring the client to use a certificate 161 Integration with Symantec EV 162 Creating an Assureon Archive partition 162 Installing Assureon Client Services 163 Creating an Archive folder 163 Scheduling a Sync 164 Security Certificate 164 ADAM security model 164 Mac OS character support 166 Opened firewall ports 166 Windows updates 167 Read files from site 2 167 NFS access 168 Creating a UNIX mount point 170 Appendix B: Advanced options 173 Backing up with a replicated configuration 174 Assureon server outage 174 Shutting down or restarting Assureon 174 Store data protection 174 Time synchronization 175 Clustered NAS 175 Virtual Shortcuts with Clustered NAS 175 Database Transaction Log Shipping 175 NTFS security integration 176 Data Migration wizard 176 Appendix C: System messages 177 Disposition messages 178 Key Manager messages 179 Key Server proxy messages 180 Manifest Server messages 181 Object Request Broker messages 181 Storage Server messages 185 Storage Web Services messages 186 Restore Server messages 186 Nexsan Assureon Administration Guide Version 8.3 vi Contents Glossary 187 Index 191 Nexsan Assureon www.nexsan.com vii About this document This guide contains detailed information about the Assureon System Administration console, a Web-based portal used to manage and monitor the system and files stored within the system. This guide assumes that Assureon is installed and that you have a user name and password to access the system administration console. Access to the system administration pages is controlled by security groups. The AssureonAdmin user has access to all the pages. Depending on your user, you may not have access to all the pages described in this guide. For more information, see System Administrator Web access on page 20. Audience This guide has been prepared for the following audience: l IT system administrators l Engineers l Technicians Conventions Here is a list of text conventions used in this document: Convention Description underlined Cross-references, hyperlinks, URLs, and email addresses. blue boldface Text that refers to labels on the physical unit or interactive items in the graphical user inter- face (GUI). monospace Text that is displayed in the command-line interface (CLI) or text that refers to file or dir- ectory names. monospace Text strings that must be entered by the user in the command-line interface or in text fields bold in the graphical user interface (GUI). italics System messages and non-interactive items in the graphical user interface (GUI) References to Software User Guides Notes, Tips, Cautions, and Warnings Note Notes contain important information, present alternative procedures, or call attention to certain items. Nexsan Assureon www.nexsan.com ix About this document Tip Tips contain handy information for end-users, such as other ways to perform an action. CAUTION: In hardware manuals, cautions alert the user to items or situations which may cause damage to the unit or result in mild injury to the user, or both. In software manuals, cautions alert the user to situations which may cause data corruption or data loss. WARNING: Warnings alert the user to items or situations which may result in severe injury or death to the user. Contacting Nexsan For questions about Nexsan products, please visit the Nexsan support Web page, and the
Recommended publications
  • Windows® Scripting Secrets®
    4684-8 FM.f.qc 3/3/00 1:06 PM Page i ® WindowsSecrets® Scripting 4684-8 FM.f.qc 3/3/00 1:06 PM Page ii 4684-8 FM.f.qc 3/3/00 1:06 PM Page iii ® WindowsSecrets® Scripting Tobias Weltner Windows® Scripting Secrets® IDG Books Worldwide, Inc. An International Data Group Company Foster City, CA ♦ Chicago, IL ♦ Indianapolis, IN ♦ New York, NY 4684-8 FM.f.qc 3/3/00 1:06 PM Page iv Published by department at 800-762-2974. For reseller information, IDG Books Worldwide, Inc. including discounts and premium sales, please call our An International Data Group Company Reseller Customer Service department at 800-434-3422. 919 E. Hillsdale Blvd., Suite 400 For information on where to purchase IDG Books Foster City, CA 94404 Worldwide’s books outside the U.S., please contact our www.idgbooks.com (IDG Books Worldwide Web site) International Sales department at 317-596-5530 or fax Copyright © 2000 IDG Books Worldwide, Inc. All rights 317-572-4002. reserved. No part of this book, including interior design, For consumer information on foreign language cover design, and icons, may be reproduced or transmitted translations, please contact our Customer Service in any form, by any means (electronic, photocopying, department at 800-434-3422, fax 317-572-4002, or e-mail recording, or otherwise) without the prior written [email protected]. permission of the publisher. For information on licensing foreign or domestic rights, ISBN: 0-7645-4684-8 please phone +1-650-653-7098. Printed in the United States of America For sales inquiries and special prices for bulk quantities, 10 9 8 7 6 5 4 3 2 1 please contact our Order Services department at 1B/RT/QU/QQ/FC 800-434-3422 or write to the address above.
    [Show full text]
  • CA Arcserve Backup for Windows Command Line Reference Guide
    CA ARCserve® Backup for Windows Command Line Reference Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only and are subject to change or withdrawal by CA at any time. This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. This Documentation is confidential and proprietary information of CA and may not be used or disclosed by you except as may be permitted in a separate confidentiality agreement between you and CA. Notwithstanding the foregoing, if you are a licensed user of the software product(s) addressed in the Documentation, you may print a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO THE END USER OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE.
    [Show full text]
  • Sys-Manage Copyright2 User Manual
    Sys-Manage User Manual CopyRight2 CopyRight2 User Manual (C) 2001-2021 by Sys-Manage Copyright © 2012 by Sys-Manage. All rights reserved. This publication is protected by Copyright and written permission should be obtained from the publisher prior any prohibited reproduction, storage in retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. Sys-Manage Informatica SL Phone: +1 (408) 345-5199 Phone: +1 (360) 227-5673 Phone: +44 (0) 8455273028 Phone: +49-(0)69-99999-3099 Phone : +34-810 10 15 34 Mail: [email protected] Web: http://www.Sys-Manage.com YouTube: www.YouTube.com/SysManage Twitter: www.twitter.com/SysManage Facebook: www.facebook.com/pages/Sys-Manage/153504204665791 Use of trademarks: Microsoft, Windows, Windows NT, XP, Windows Vista, Windows7, Windows8 and the Windows logo are ® trademarks of Microsoft Corporation in the United States, other countries, or both. All other company, product, or service names may be trademarks of others and are the property of their respective owners. Page 2 / 212 Document Version 1.52 02-15-2021 CopyRight2 User Manual (C) 2001-2021 by Sys-Manage ABSTRACT ............................................................................................................................................................ 8 REQUIREMENTS ................................................................................................................................................. 9 USAGE SCENARIOS .........................................................................................................................................
    [Show full text]
  • CA Arcserve Backup for Windows Release Summary
    CA ARCserve® Backup for Windows Release Summary r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the “Documentation”) is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. This Documentation is confidential and proprietary information of CA and may not be disclosed by you or used for any purpose other than as may be permitted in (i) a separate agreement between you and CA governing your use of the CA software to which the Documentation relates; or (ii) a separate confidentiality agreement between you and CA. Notwithstanding the foregoing, if you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT.
    [Show full text]
  • The Extended FAT File System
    Linux Conference October 26- 28, 2011 Prague , Czech Republic Linux Development Center The Extended FAT file system Differentiating with FAT32 file system Keshava Munegowda , Venkatraman S Texas Instruments (India) Pvt Ltd Bangalore. Dr. G T Raju Professor and Head, Computer Science and Engineering Department, 1 R N S Institute of Technology, Bangalore, India. ExFAT Linux Development Center Agenda Ø FAT file system Ø Need for ExFAT file system Ø ExFAT file system organization Ø Boot Sector of FAT and ExFAT Ø Snapshot of Boot Sector of ExFAT Ø Directory Entries of FAT Ø Directory Entries of ExFAT Ø Clusters Heap Ø Up-Case Table Ø Snapshot of Root directory Ø Performance Benchmarking in Linux Ø Performance Benchmarking in Windows 2 Ø References ExFAT Linux Development Center FAT File system Minimum 1 BPB sector BPB - BIOS Parameter Block – BIOS : Basic Input-Output System FAT1 – Also Called as “Boot Sector” or “Volume Boot Record” – Specifies FAT2 • Number of sectors in the storage partition/disk/device Cluster 2 • Number of FATs ( File Allocation Table) Cluster 3 • Sectors per cluster Cluster 4 …………. Data FAT1 – File Allocation Table …………. clusters - Linear linking (chain) of data clusters of the …………. file/directory FAT2 – Backup of FAT1 FILE.TXT cluster3 cluster7 EOF Data clusters - Group of physical/logical sectors/blocks Clusters chain / Linked list of 3 clusters - Contains directories or Files data ExFAT Linux Development Center Need For ExFAT file system l FAT File system limited to support only 32GB. – FAT does not support Higher size SDXC cards. l NTFS – Security features – Optional for Removable storage devices – Meta data overhead for file/directory – Write caching mechanism for performance optimizations causes the data corruption in when 4 removable storage device is unplugged.
    [Show full text]
  • PKZIP® 2.50 Command Line User's Manual Copyright © 1997 PKWARE, Inc
    PKZIP® 2.50 Command Line User's Manual Copyright © 1997 PKWARE, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any other language in whole or in part, in any form or by any means, whether it be electronic, mechanical, magnetic, optical, manual or otherwise, without prior written consent of PKWARE, Inc. PKWARE, INC. DISCLAIMS ALL WARRANTIES AS TO THIS SOFTWARE, WHETHER EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, FUNCTIONALITY, DATA INTEGRITY OR PROTECTION. PKWARE, the PKWARE logo, and PKZIP are registered trademarks of PKWARE, Inc. Trademarks of other companies mentioned in this documentation appear for identification purposes only and are the property of their respective companies. Table of Contents Chapter 1 Welcome to PKZIP 1 Introduction 2 About This Manual 2 Your Work Environment: The Command Line 3 Using Help 3 Getting License Information 4 Getting Version Information 5 Using PKWARE Technical Support 6 Using Internet/Usenet 6 Using CompuServe 7 Using the PKWARE BBS 7 Before You Call 7 Calling a PKWARE Technical Support Representative 8 Using the PKWARE Customer Support Form 8 Chapter 2 The Basics 11 Introduction 12 Using the Tutorials 12 Conventions Used in the Tutorials 13 Using Sample Files and Directories 13 Preparing Your Workspace 13 .ZIP File Naming Conventions 14 Compressing Files: Learning the Basics 14 Compressing a Single File in the Current
    [Show full text]
  • Veritas Backup Exec.Pdf
    VERITAS Backup Exec™ for Windows NT/2000 White Paper Table of Contents Introduction: .................................................................................................................................................................1 The VERITAS/Microsoft Partnership..............................................................................................................................2 The Microsoft Standard .............................................................................................................................................2 More Than Backup ....................................................................................................................................................2 The MTF Tape Format Standard ................................................................................................................................2 Microsoft Windows 2000 Rapid Deployment Program...............................................................................................2 Field Proven Solutions ..............................................................................................................................................3 Product and Scalability.................................................................................................................................................3 Microsoft Windows 2000...........................................................................................................................................3 Protecting Windows
    [Show full text]
  • Technical Reference Guide
    PDT 3200 Technical Reference Guide PDT 3200 Technical Reference Guide 70-31468-01 Revision A — July, 1997 ii Symbol Technologies, Inc. One Symbol Plaza, Holtsville N.Y. 11742 PDT 3200 Technical Reference Guide 70-31468-01 Revision A July, 1997 1997 by Symbol Technologies, Inc. All rights reserved. No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means, without permission in writing from Symbol. This includes electronic or mechanical means, such as photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to change without notice. The software is provided strictly on an Òas isÓ basis. All software, including Þrmware, furnished to the user is on a licensed basis. Symbol grants to the user a non-transferable and non-exclusive license to use each software or Þrmware program delivered hereunder (licensed program). Except as noted below, such license may not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of Symbol. No right to copy a licensed program in whole or in part is granted, except as permitted under copyright law. The user shall not modify, merge, or incorporate any form or portion of a licensed program with other program material, create a derivative work from a licensed program, or use a licensed program in a network without written permission from Symbol. The user agrees to maintain SymbolÕs copyright notice on the licensed programs delivered hereunder, and to include the same on any authorized copies it makes, in whole or in part.
    [Show full text]
  • PKZIP 6.0 Command Line User's Manual
    PKZIP® 6.0 Command Line User’s Manual Copyright © 1997-2002 PKWARE, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any other language in whole or in part, in any form or by any means, whether it be electronic, mechanical, magnetic, optical, manual or otherwise, without prior written consent of PKWARE, Inc. PKWARE, INC., DISCLAIMS ALL WARRANTIES AS TO THIS SOFTWARE, WHETHER EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, FUNCTIONALITY, DATA INTEGRITY, OR PROTECTION. PKWARE IS NOT LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES. Portions of this software include RSA BSAFE ® cryptographic or security protocol software from RSA Security Inc. PKWARE, the PKWARE logo, the zipper logo, PKZIP, PKUNZIP, and PKSFX are registered trademarks of PKWARE, Inc. Trademarks of other companies mentioned in this documentation appear for identification purposes only and are the property of their respective companies. RSA and BSAFE are registered trademarks of RSA Security Inc. ii Disclaimer Table of Contents WELCOME TO PKZIP...........................................................................................1 Overview: ..........................................................................................................................1 Sections in This Chapter:.................................................................................................1 Introduction
    [Show full text]
  • Acronis Backup & Recovery 11
    Acronis Backup & Recovery 11 Server for Linux Update 0 User Guide Copyright © Acronis, Inc., 2000-2011. All rights reserved. “Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis, Inc. "Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc. in the United States and/or other jurisdictions. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of this work or derivative work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. Third party code may be provided with the Software and/or Service. The license terms for such third-parties are detailed in the license.txt file located in the root installation directory. You can always find the latest up-to-date list of the third party code and the associated license terms used with the Software and/or Service at http://kb.acronis.com/content/7696 2 Copyright © Acronis, Inc., 2000-2011 Table of contents 1 Introducing Acronis Backup & Recovery 11 ...............................................................................
    [Show full text]
  • Command Line Users Manual
    Command Line Users Manual PKZIP® Command Line SecureZIP® Command Line Copyright © 1997-2011 PKWARE, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any other language in whole or in part, in any form or by any means, whether it be electronic, mechanical, magnetic, optical, manual or otherwise, without prior written consent of PKWARE, Inc. PKWARE, INC., DISCLAIMS ALL WARRANTIES AS TO THIS SOFTWARE, WHETHER EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, FUNCTIONALITY, DATA INTEGRITY, OR PROTECTION. PKWARE IS NOT LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES. PKWARE, the PKWARE logo, the zipper logo, PKZIP, PKUNZIP, SecureZIP, and PKSFX are registered trademarks of PKWARE, Inc. Deflate64 is a trademark of PKWARE, Inc. Trademarks of other companies mentioned in this documentation appear for identification purposes only and are the property of their respective companies. 2011-10-25 iii Table of Contents 1 THE BASICS ................................................................................................. 1 About This Manual ..................................................................................................... 1 Conventions in This Guide ........................................................................................ 2 An Overview of What PKZIP Does ............................................................................ 2 Supported
    [Show full text]
  • 1 Learning Objectives After Completing This Chapter, You Will Be
    Learning Objectives After completing this chapter, you will be able to: 1. Define operating system. 2. Define enhancements. 3. Explain the function and purpose of OS 3. Use the DIR command to display the files on version numbers. the screen. 4. List some of the types of system configura- 4. Use the VER command to determine which tions. version of Windows is being used. 5. Explain the need and procedure for booting 5. Use the CLS command to clear the screen. the system. 6. Use the DATE and TIME commands to set or 6. Explain the function of disk files. change the date and time on the computer. 7. Explain the function of and rules for file 7. Make a copy of a disk. specifications. 8. End a computer work session. 8. List and explain the importance of the two Chapter Overview types of computer files. Most people who use computers are really 9. Describe the function and purpose of com- interested in application software. They want mands. programs that are easy to use and that help them 10. Compare and contrast internal and external solve specific problems. However, before you can commands. use application software, you must know at least 11. Explain the function and purpose of the DIR, the basics of using the operating system. No VER, and CLS commands. computer can work without an operating system 12. Explain the purpose of and the procedure for in RAM. The Windows operating system takes using the DATE and TIME commands. care of mandatory functions for computer 13. Explain the legal and ethical ramifications of operations such as handling the input and output copying disks that were not purchased.
    [Show full text]