RS-2500 Dual WAN Security VPN Gateway

Total Page:16

File Type:pdf, Size:1020Kb

RS-2500 Dual WAN Security VPN Gateway RS-2500 Dual WAN Security VPN Gateway Web VPN / SSL VPN Server IPSec / PPTP VPN Server Application Blocking for IM, P2P, Webmail, Video/Audio, Game, Tunnel and Remote Control applications Content Blocking for URL, Scripts, Download and Upload Bandwidth Management for user or application Authentication for Internet access Policy-based firewall Web VPN/ IPSec VPN PPTP VPN Application Content SSL VPN Server Server Blocking Filtering Dual WAN Policy Bandwidth User Multiple Load Based Management Authentication Subnet Balance Firewall Fully VPN Solution The AirLive RS-2500 is the new generation of all-in-one Dual WAN Security VPN Gateway. You can choose to create the high security IPSec VPN tunnel between offices, or the fast and easy configured PPTP VPN between office and home user. Now AirLive RS-2500 features with Web VPN (SSL VPN), user can easily create the high security IPSec VPN via web browser between office and anywhere. SSL VPN Server IPSec VPN Server SOHO Router VPN Internet VPN VPN Internet VPN LAN LAN LAN LAN PPTP VPN Server IPSec VPN Trunk 5F, No.96, Min-ChuanRd, Hsin-tien City, Taipei, Taiwan RS-2500 Internet Internet Primary VPN Backup VPN PC1 PC2 RS-2500 SSL VPN Server IPSec VPN Server SOHO Router VPN Internet VPN VPN Internet VPN LAN LAN LAN LAN PPTP VPN Server IPSec VPN Trunk RS-2500 Internet Internet Primary VPN Backup VPN PC1 PC2 RS-2500 Web VPN (SSL VPN) The AirLive RS-2500 features Windows based Web VPN (SSL VPN) function, and the remote user only needs to open browser then he can establish the high security of IPSec VPN tunnel between AirLive RS-2500 and the client PC or laptop. The browser’s type of Web VPN client can be IE, Firefox, Safari, or Chrome. Application Blocking The new function of Application Blocking not just support to block IM and P2P connection, it can also block several application connections such as Webmail, Video/Audio, Game, Tunnel and Remote Control applications. 5F, No.96, Min-ChuanRd, Hsin-tien City, Taipei, Taiwan Application Blocking List Application Type Software Instant Messaging Login MSN, Yahoo, ICQ/AIM, QQ/TM2008, Skype Google Talk, Gadu-Gadu, Rediff, WebIM, AliSoft, Fetion Instant Messaging File MSN, Yahoo, ICQ/AIM, QQ, Google Talk, Gadu-Gadu Transfer Peer-to-Peer Application eDonkey, Bit Torrent, WinMX, Foxy, KuGoo, AppleJuice AudioGalaxy, DirectConnect, iMesh, MUTE, Thunder5 GoGoBox, QQDownload, Ares, Shareaza, BearShare Morpheus, Limewire, Kazaa, Clubbox Video / Audio Application PPLive, PPStream, UUSee, QQLive exPeer, qvodplayer, Funchion, PPMate Webmail Gmail, Hotmail, Yahoo, Hinet, PChome, URL, YAM Seednet, 163/126/Yeah, Tom, Sina, Sohu, QQ/Foxmail Game Application GLWorld, QQGame Tunnel Application VNN Client, Ultra-Surf, Tor, Hamachi, Hotspot Shield Remote Control Application TeamViewer, VNC, RemoteDesktop Other 10jqka, Dzh, Qianlong, Pobo * New updated list will be announced in AirLive website without further notification QoS (Quality of Service) The useful bandwidth can be defined the guarantee and maximum value based on IP or Service, even the VPN tunnel. So, user can surf Internet resource within a certain bandwidth, and RS-2500 system can also allocate the extra bandwidth depended on QoS rule’s priority level. Bandwidth Manager The AirLive RS-2500 also supports to restrict the bandwidth per source IP, the Max. Concurrent Sessions per Source IP, and the Max. Concurrent Sessions per Internet policy rule. You can just configure those functions in Policy rule without creating any QoS setting. RS-2500 Dual WAN Security VPN Gateway DMZ LAN WAN2 WAN1 Status Power Link/Act 2M 1M 5F, No.96, Min-ChuanRd, Hsin-tien City, Taipei, Taiwan User Authentication The internal users must pass the authentication before to access Internet resource. The AirLive RS-2500 users’ database can be stored at local device, RADIUS server or POP3 server. Better hardware specification The RS-2500 is powered by a powerful IXP425 533 MHz RISC processor and increased of memory capacity. So, the AirLive RS-2500 can feature the better performance than ever before. Standard Accessories Power Adapter RJ-45 Ethernet Cable x 2 CD QIG Specifications Hardware: - IPSec VPN - Processor: Intel IXP 425, 533MHz - Max. 50 entries Tunnels - Memory: 16MB Flash, 128MB DRAM - Encryption: DES, 3DES, AES-128, AES-192, - LAN: 1 x 10/100 Base-T Ethernet RJ45 port AES-256 - WAN: 2 x 10/100 Base-T Ethernet RJ45 port - Authentication : MD5, SHA-1 - DMZ: 1 x 10/100 Base-T Ethernet RJ45 port - VPN Trunk - Reset button - Packets controlled (such as QoS, Service, - Power: 100 ~ 240 VAC, DC5V, 2.4A Source/Destination address, and else) by Policy - Dimension: 220 x 150 x 40 mm rule - PPTP VPN Performance: - Max. 32 entries Tunnels for PPTP Server - NAT Throughput : 100Mbps - Max. 16 entries Tunnels for PPTP Client - IPSec VPN Throughput (3DES) : 35Mbps - Packets controlled (such as QoS, Service, - SSL VPN Throughput: 10Mbps Source/Destination address, and else) by Policy - Max. Concueent Sessions: 110,000 rule - Max. New Session per second : 10,000 - Corporation Size: SMB (Clients: 90 ~ 100) Security: - Application Blocking VPN: - Automatically or manually updates Application - Web VPN / SSL VPN Signature - Max. 50 entries Tunnels - IM Login - Support up to 10 internal subnet - IM File Transfer - Hardware Authentication - Peer-to-Peer Applications - Browser type (Windows Only): IE, Firefox, - Video/Audio Applications Safari, Chrome - Webmail - Tunnel Applications: - Remote Control Applications: 5F, No.96, Min-ChuanRd, Hsin-tien City, Taipei, Taiwan - Content Blocking - DDNS - URL Blocking - IPSec, PPTP, L2TP, SIP pass through - Scripts Blocking: - Environment: Java Scripts, ActiveX, Popup, and Cookie - Operating Temperature: 0 ~ 60 ℃ - Download - Operating Humidity: 5% ~ 95% - Upload - Certification: - Authentication - CE - User Database: Local, POP3, and RADIUS - FCC - Max. 200 entries for local database - Anomaly Flow IP - Email, NetBIOS notification - DoS (Denial of Service) System: - QoS - Upstream and Downstream Bandwidth Control - Define Guaranteed and Maximum Bandwidth - Limit bandwidth by IP and/or by Application Service - 3 tiers level of priority - Max. Bandwidth Per Source IP - Max. Concurrent Sessions Per Source IP or Policy rule - Virtual Server - Mapped IP - Multi Virtual Server - Server Load Balance - Schedule - WAN Support - PPPoE - Dynamic IP - Fixed IP - Load Balance and Fail-over - DMZ Support - NAT mode or Transparent mode - Multiple Subnet - Static Route, RIPv2 - Wake On Lan Ordering Information: AirLive RS-2500 Dual WAN Security VPN Gateway 5F, No.96, Min-ChuanRd, Hsin-tien City, Taipei, Taiwan Comparison Table RS-2500 RS-1200 RS-2000 RS-3000 Hardware Specifications IXP 425, IXP 425, IXP 425, IXP 425, CPU 533MHz 266MHz 400MHz 533MHz RAM 128MB 64MB 64MB 128MB WAN x 2 WAN x 2 WAN x 2 WAN x 1 Interface LAN x 1 LAN x 1 LAN x 1 LAN x 1 DMZ x 1 DMZ x 1 DMZ x 1 Reset Button Yes Yes Yes No Console port No No No Yes Power DC 5V, 2.4A DC 5V, 2.4A DC 5V, 2.4A 100 ~ 250 VAC Security Specifications Anti-Spam No No No Yes Anti-Virus No No No Yes Anomaly Flow Yes Yes Yes Yes IDP No No No Yes Web, IPSec, VPN IPSec, PPTP IPSec, PPTP IPSec, PPTP PPTP Max. VPN 50 50 50 50 Tunnels VPN Trunk Yes No No Yes Application IM/P2P IM/P2P Yes Yes Blocking Blocking only Blocking only Content Blocking Yes Yes Yes Yes Authentication Yes Yes Yes Yes System Specifications QoS Yes Yes Yes Yes WAN Load Yes Yes No Yes Balance Multiple Subnet Yes Yes Yes Yes DMZ Transparent Yes Yes No Yes Performance Specifications NAT Throughput 100 Mbps 70 Mbps 100 Mbps 100 Mbps IPSec 3DES 35 Mbps 10 Mbps 15 Mbps 16 Mbps Throughput Web VPN 5F, No.96, Min-ChuanRd, Hsin-tien10 City,Mbps Taipei, TaiwanN/A N/A N/A Throughput Max. Concurrent 110,000 45,000 45,000 110,000 Sessions New Sessions 10,000 6,500 8,000 10,000 per second Email Capacity N/A N/A N/A 120,000 per Day Max. Users 90 ~ 100 30 ~ 50 50 ~ 70 50 ~ 70 Comparison Table RS-2500 RS-1200 RS-2000 RS-3000 Hardware Specifications IXP 425, IXP 425, IXP 425, IXP 425, CPU 533MHz 266MHz 400MHz 533MHz RAM 128MB 64MB 64MB 128MB WAN x 2 WAN x 2 WAN x 2 WAN x 1 Interface LAN x 1 LAN x 1 LAN x 1 LAN x 1 DMZ x 1 DMZ x 1 DMZ x 1 Reset Button Yes Yes Yes No Console port No No No Yes Power DC 5V, 2.4A DC 5V, 2.4A DC 5V, 2.4A 100 ~ 250 VAC Security Specifications Anti-Spam No No No Yes Anti-Virus No No No Yes Anomaly Flow Yes Yes Yes Yes IDP No No No Yes Web, IPSec, VPN IPSec, PPTP IPSec, PPTP IPSec, PPTP PPTP Max. VPN 50 50 50 50 Tunnels VPN Trunk Yes No No Yes Application IM/P2P IM/P2P Yes Yes Blocking Blocking only Blocking only Content Blocking Yes Yes Yes Yes Authentication Yes Yes Yes Yes System Specifications QoS Yes Yes Yes Yes WAN Load Yes Yes No Yes Balance Multiple Subnet Yes Yes Yes Yes DMZ Transparent Yes Yes No Yes Performance Specifications NAT Throughput 100 Mbps 70 Mbps 100 Mbps 100 Mbps IPSec 3DES 35 Mbps 10 Mbps 15 Mbps 16 Mbps Throughput Web VPN 10 Mbps N/A N/A N/A Throughput Max. Concurrent 110,000 45,000 45,000 110,000 Sessions New Sessions 10,000 6,500 8,000 10,000 per second Email Capacity N/A N/A N/A 120,000 per Day Max. Users 90 ~ 100 30 ~ 50 50 ~ 70 50 ~ 70 5F, No.96, Min-ChuanRd, Hsin-tien City, Taipei, Taiwan.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Download Fact Sheet
    Intella Process l Search l Filter l Produce. Simple. Fact Sheet Intella®: Smarter eDiscovery and Forensic Investigations Innovative, powerful, and simple – exactly the tools you need to conquer today’s data challenges and deliver world class results. Process. Search. Filter. Produce. Simple. Exponential Market Leading Industry’s Best Productivity Power Value & Pricing Key Features Customer Use Examples • Highly user-friendly interface and market-leading Intella has helped some of the world’s best known indexing speeds organizations to dramatically reduce the time, expense and • Insight Analysis feature lists the most notable user, personnel needed for their case loads. system and Internet artifacts, simplifying finding • A Fortune 500 retailer was able to bring e-discovery important data and improving examination time and functions in-house and save millions odue to Intella’s thoroughness of any investigation easy-to-use functionality. • Batch documents and assign to reviewers for subjective • The compliance department of a global financial coding for legal review institution conducts internal reviews of employee emails • Built-in instant messaging so co-workers can discuss and and files with surprising ease because of Intella’s low share documents within the tool during investigations resource/highly efficient architecture. • Automatic extraction of notable registry artifacts. This • A major international accounting and consulting firm can save the examiner many hours of manual artifact increased customer satisfaction by providing their
    [Show full text]
  • Free Email Software Download Best Free Email Client 2021
    free email software download Best Free Email Client 2021. This article is all about best free email clients and how they can help you be more productive. We also talk about Clean Email, an easy-to-use email cleaner compatible with virtually all major email services. But before we go over the best email clients for 2021, we believe that we should first explain what advantages email clients have over web-based interfaces of various email services. Clean Email. Take control of your mailbox. What Is an Email Client and Why Should I Use One? If you’re like most people, you probably check your email at least once every day. And if you’re someone whose work involves communication with customers, clients, and coworkers, the chances are that you deal with emails all the time. Even though we spend so much time writing, forwarding, and managing emails, we hardly ever pause for a moment and think about how we could improve our emailing experience. We use clunky web interfaces that are not meant for professional use, we accept outdated applications as if alternatives didn’t exist, and we settle for the default email apps on our mobile devices even though app stores are full of excellent third-party email apps. Broadly speaking, an email client is a computer program used to access and manage a user’s email. But when we use the term email client in this article, we only mean those email clients that can be installed on a desktop computer or a mobile device—not web-based email clients that are hosted remotely and are accessible only from a web browser.
    [Show full text]
  • List of Brands
    Global Consumer 2019 List of Brands Table of Contents 1. Digital music 2 2. Video-on-Demand 4 3. Video game stores 7 4. Digital video games shops 11 5. Video game streaming services 13 6. Book stores 15 7. eBook shops 19 8. Daily newspapers 22 9. Online newspapers 26 10. Magazines & weekly newspapers 30 11. Online magazines 34 12. Smartphones 38 13. Mobile carriers 39 14. Internet providers 42 15. Cable & satellite TV provider 46 16. Refrigerators 49 17. Washing machines 51 18. TVs 53 19. Speakers 55 20. Headphones 57 21. Laptops 59 22. Tablets 61 23. Desktop PC 63 24. Smart home 65 25. Smart speaker 67 26. Wearables 68 27. Fitness and health apps 70 28. Messenger services 73 29. Social networks 75 30. eCommerce 77 31. Search Engines 81 32. Online hotels & accommodation 82 33. Online flight portals 85 34. Airlines 88 35. Online package holiday portals 91 36. Online car rental provider 94 37. Online car sharing 96 38. Online ride sharing 98 39. Grocery stores 100 40. Banks 104 41. Online payment 108 42. Mobile payment 111 43. Liability insurance 114 44. Online dating services 117 45. Online event ticket provider 119 46. Food & restaurant delivery 122 47. Grocery delivery 125 48. Car Makes 129 Statista GmbH Johannes-Brahms-Platz 1 20355 Hamburg Tel. +49 40 2848 41 0 Fax +49 40 2848 41 999 [email protected] www.statista.com Steuernummer: 48/760/00518 Amtsgericht Köln: HRB 87129 Geschäftsführung: Dr. Friedrich Schwandt, Tim Kröger Commerzbank AG IBAN: DE60 2004 0000 0631 5915 00 BIC: COBADEFFXXX Umsatzsteuer-ID: DE 258551386 1.
    [Show full text]
  • Spear Phishing Targeting Ics Supply Chain – Analysis
    SPEAR PHISHING TARGETING ICS SUPPLY CHAIN – ANALYSIS January 20, 2021 MARKEL PICADO 1 Table of Contents Introduction ................................................................................................................................................... 3 Threat Analysis ............................................................................................................................................... 3 Distribution Strategy .................................................................................................................................. 4 Spear Phishing............................................................................................................................................ 5 Identity Theft ......................................................................................................................................... 5 Toolkit .................................................................................................................................................... 8 AgentTesla v3 Analysis ........................................................................................................................... 9 Attack Surface .......................................................................................................................................... 16 MITRE ATT&CK Mapping ..................................................................................................................... 17 Threat Actor Infrastructure ................................................................................................................
    [Show full text]
  • Downloadable Email Program for My Pc 32 Best Free Email Clients
    downloadable email program for my pc 32 Best Free Email Clients. Here are 32 best free email client software . These let you manage and access all of your email accounts in one single place easily. All these email client software are completely free and can be downloaded to Windows PC. These free software offer various features, like: can be used with IMAP, SMTP, POP3 and Gmail, keeps your emails safe and secure, lets you open various emails simultaneously, provide protection from spam, lets you view your emails offline, manage and access all of your email accounts in one single place, supports PH, LDAP, IMAP4, POP3 and SMPT mail protocols etc. So, go through this list of free email client software and see which ones you like the most. Thunderbird. Thunderbird is a free and handy email client software for your computer. It can be used with IMAP, SMTP, POP3 and Gmail. It will also work with email accounts provided by MS Exchange Server. The user interface of Thunderbird is tabbed. It lets you open various emails simultaneously. Thunderbird keeps your emails safe and secure. It also has special filters for filtering the mail. Windows Live Mail. Windows Live Mail is a free email client for your computer. It works with various email accounts. It lets you access Yahoo, Gmail, Hotmail and emails from different servers which supports POP3 and SMTP. Its security features are excellent it will also provide protection from spam. You can also view your emails offline in this freeware. Zimbra Desktop. Zimbra Desktop is a free email client.
    [Show full text]
  • Tencent and China Mobile's Dilemma
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by AIS Electronic Library (AISeL) Association for Information Systems AIS Electronic Library (AISeL) Pacific Asia Conference on Information Systems PACIS 2014 Proceedings (PACIS) 2014 FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA Jun Wu School of Economics and Management, Beijing University of Posts and Telecommunications, [email protected] Qingqing Wan School of Economics and Management, Beijing University of Posts and Telecommunications, [email protected] Follow this and additional works at: http://aisel.aisnet.org/pacis2014 Recommended Citation Wu, Jun and Wan, Qingqing, "FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA" (2014). PACIS 2014 Proceedings. 265. http://aisel.aisnet.org/pacis2014/265 This material is brought to you by the Pacific Asia Conference on Information Systems (PACIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in PACIS 2014 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA Jun Wu, School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, [email protected] Qingqing Wan, School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, [email protected] Abstract With the coming of mobile internet era, Giants in the different industry begin to compete face by face. This teaching case presents the event of charging for WeChat in China context to delineate the new challenges that Online Service Provider and Mobile Network Operator will face.
    [Show full text]
  • Variability Modeling for Software Product Line
    [Type text] ISSN : [Type0974 -text] 7435 Volume 10[Type Issue text] 14 2014 BioTechnology An Indian Journal FULL PAPER BTAIJ, 10(14), 2014 [8118-8125] Variability modeling for software product line Luo Daizhong1, Diao Shanhui2 1School of Software Engineer, Chongqing University of Arts and Sciences, Chongqing, (CHINA) 2Department of Education Administrator, Chongqing University of Arts and Sciences, Chongqing, (CHINA) [email protected] ABSTRACT The variability model which captures the commonality and variability of the software product families is very important in domain requirements modeling. In the software product families, it will be difficult to establishing the variability model in the domain analysis. An novel variability modeling method with the extended UML is presented for variability modeling, it not only supports variability type of use cases such as optional, alternative and or, but also supports variability constraint such as variant to variant, variant to variation point and variation to variation point. We present the formal definition of variability type and variability constraint, it helps us to validate the variability model correctness. Finally, we illustrate the variability modeling approach with a mobile phone SPL and then discuss about the formalization of variability type and constraint. KEYWORDS Software product line; Variability modeling; Variability type; Constraint, UML. © Trade Science Inc. BTAIJ, 10(14) 2014 Luo Daizhong and Diao Shanhui 8119 INTRODUCTION Software Product Line (SPL) technology has become research spot and has been widely applied in domain engineer. Product line engineering is a development paradigm that explicitly addresses reuses for software development, can effectively promise large gains in productivity, quality and time to market reduction[1].
    [Show full text]
  • Forcepoint DLP Supported File Formats and Size Limits
    Forcepoint DLP Supported File Formats and Size Limits Supported File Formats and Size Limits | Forcepoint DLP | v8.8.1 This article provides a list of the file formats that can be analyzed by Forcepoint DLP, file formats from which content and meta data can be extracted, and the file size limits for network, endpoint, and discovery functions. See: ● Supported File Formats ● File Size Limits © 2021 Forcepoint LLC Supported File Formats Supported File Formats and Size Limits | Forcepoint DLP | v8.8.1 The following tables lists the file formats supported by Forcepoint DLP. File formats are in alphabetical order by format group. ● Archive For mats, page 3 ● Backup Formats, page 7 ● Business Intelligence (BI) and Analysis Formats, page 8 ● Computer-Aided Design Formats, page 9 ● Cryptography Formats, page 12 ● Database Formats, page 14 ● Desktop publishing formats, page 16 ● eBook/Audio book formats, page 17 ● Executable formats, page 18 ● Font formats, page 20 ● Graphics formats - general, page 21 ● Graphics formats - vector graphics, page 26 ● Library formats, page 29 ● Log formats, page 30 ● Mail formats, page 31 ● Multimedia formats, page 32 ● Object formats, page 37 ● Presentation formats, page 38 ● Project management formats, page 40 ● Spreadsheet formats, page 41 ● Text and markup formats, page 43 ● Word processing formats, page 45 ● Miscellaneous formats, page 53 Supported file formats are added and updated frequently. Key to support tables Symbol Description Y The format is supported N The format is not supported P Partial metadata
    [Show full text]
  • Intella User Manual Version 2.0.0
    Intella User Manual Version 2.0.0 Contact To learn more about Intella™, please contact us using the contact information below, or contact an Intella Channel Partner. Vound Office Phone +1 888-291-7201 Email [email protected] Postal Address PO Box 308 Evergreen, Colorado 80437 U.S.A. Sales Contacts http://www.vound-software.com/partners We will be pleased to provide additional information concerning Intella and schedule a demonstration at your convenience. To become an Intella reseller, please contact us! For user and technical support please visit our website: http://www.vound-software.com Page 2 | Intella™ User Manual | © 2016 Vound Vound Colorado (“Vound”). Mention of third-party products is for © 2016 Vound. All rights reserved. informational purposes only and constitutes neither an endorsement nor a The information in this User Manual is recommendation. Vound assumes no subject to change without notice. Every responsibility regarding the performance or effort has been made to ensure that the use of these products. Under the copyright information in this manual is accurate. laws, this manual may not be copied, in Vound is not responsible for printing or whole or in part, without the written clerical errors. consent of Vound. VOUND PROVIDES THIS DOCUMENT “AS IS” Your rights to the software are governed by WITHOUT WARRANTY OF ANY KIND, the accompanying software license EITHER EXPRESS OR IMPLIED AND SHALL agreement. The Vound logo is a trademark NOT BE LIABLE FOR TECHNICAL OR of Vound. Use of the Vound logo for EDITORIAL ERRORS OR OMISSIONS commercial purposes without the prior CONTAINED HEREIN; NOR FOR INCIDENTAL written consent of Vound may constitute OR CONSEQUENTIAL DAMAGES RESULTING trademark infringement and unfair FROM THE FURNISHING, PERFORMANCE, competition in violation of federal and OR USE OF THIS MATERIAL.
    [Show full text]
  • Intella™ User Manual
    Intella™ User Manual Intella™ evidence made visible Vound, LLC email investigation and eDiscovery software Version 1.5 Contact To learn more about Intella™ please contact your nearest Vound representative listed below or an Intella Channel Partner. USA, Canada, Latin America Natasha Lockhart [email protected] nlockhart09 (Skype) +1 801-704-9140 +1 801-367-2169 (mobile) Europe, the Middle East, Africa Tom Balance [email protected] tballance (Skype) +1 720-746-0408 +1 303-919-0709 (mobile) Asia-Pacific Region Peter Mercer [email protected] We will be pleased to provide additional information concerning Intella and schedule a demonstration at your convenience. To become an Intella reseller, please contact us! For user and technical support please visit our website: www.vound-software.com. Vound Mention of third-party products is © 2011 Vound, LLC. All rights for informational purposes only and reserved. constitutes neither an endorsement nor a recommendation. Vound The information in this User Manual assumes no responsibility with is subject to change without notice. regard to the performance or use of Every effort has been made to these products. Under the ensure that the information in this copyright laws, this manual may not manual is accurate. Vound, LLC is be copied, in whole or in part, not responsible for printing or without the written consent of clerical errors. Vound, LLC. VOUND, LLC PROVIDES THIS Your rights to the software are DOCUMENT “AS IS” WITHOUT governed by the accompanying WARRANTY OF ANY KIND, software license agreement. The EITHER EXPRESS OR IMPLIED Vound logo is a trademark of AND SHALL NOT BE LIABLE FOR Vound, LLC.
    [Show full text]
  • Review, Email Clients with Source Code Editing
    Review, Email Clients with Source Code Editing By Micheline Johnson Updated 2013-12-05 Why is source code editing desirable? It enables the addition of variable indenting and hanging indents, tables, images, charts, videos etc. the replacement of <p> tags with <div> tags, if para spacing is not required. Wikipedia lists most email clients. Of these, the free Windows or cross-platform GUI email clients are included in the Appendix. Of these, the current mainstream desktop GUI email clients include: 1. Outlook, overkill for most purposes, and is not free. 2. Outlook Express, not available for Windows 7 3. Windows Live Mail 4. Mozilla Thunderbird, does not natively support HTML editing or tables. 5. Eudora v7.1, runs on Microsoft Windows XP/2000 (http://www.eudora.com/download/). It has problems with Windows 7, see http://mcaf.ee/cxsw8 . It runs on Windows XP, and does not appear to support editing HTML source code, or tables. 6. Eureka Email. It is very difficult to uninstall, see http://mcaf.ee/1q0ka , so I did not test it. 7. Pegasus Mail. Pegasus v4.63 allows the insertion of a table and the editing of the number of rows or columns of that table; but it does not support editing of HTML source code. It supports hanging indents to increments of one tab spacing, which is very crude. 8. DreamMail 9. FoxMail 10. SeaMonkey. http://www.seamonkey-project.org/. Allows inserting of tables. Appears to allow insertion of HTML code, but does not allow viewing of the entire HTML source code. 11. Netscape Messenger used to have an HTML editor.
    [Show full text]