SLDXA /T /L1 – SLX Component List

Total Page:16

File Type:pdf, Size:1020Kb

SLDXA /T /L1 – SLX Component List SLDXA /T /L1 – SLX Component List SLDXA.exe ver 1.0 Copyright (c) 2004-2006 SJJ Embedded Micro Solutions, LLC All Rights Reserved SLXDiffC.exe ver 2.0 / SLXtoTXTC.exe ver 2.0 www.sjjmicro.com Processing... File1 to TXT file. Opening XSL File Reading RTF for final conversion F:\SLXTEST\LOCKDOWN_DEMO2.SLX has the following Components Total Count is: 577 -------------------------------------------------- .NET Framework 1.1 - Security Update KB887998 Accessibility Control Panel Accessibility Core ACPI Fixed Feature Button Active Directory Service Interface (ADSI) Core Active Directory Service Interface (ADSI) LDAP Provider Active Directory Service Interface (ADSI) Windows NT Provider Active Template Library (ATL) Add Hardware Control Panel Add/Remove Programs Control Panel Administration Support Tools Administrator Account Advanced Configuration and Power Interface (ACPI) PC Analog TV Application Compatibility Core Audio Codecs Audio Control Panel Base Component Base Performance Counters Base Support Binaries CD-ROM Drive Certificate Request Client & Certificate Autoenrollment Certificate User Interface Services Class Install Library - Desk Class Install Library - Mdminst Class Install Library - Mmsys Class Install Library - Msports Class Install Library - Netcfgx Class Install Library - Storprop Class Install Library - System Devices Class Installer - Computer Class Installer - Disk drives Class Installer - Display adapters Class Installer - DVD/CD-ROM drives Class Installer - Floppy disk controllers Class Installer - Floppy disk drives Class Installer - IDE ATA/ATAPI controllers Class Installer - Keyboards Class Installer - Mice and other pointing devices Class Installer - Monitors Class Installer - Network adapters Class Installer - Other devices Class Installer - Ports (COM & LPT) Class Installer - Processors Class Installer - Sound, video and game controllers Class Installer - Storage volumes Class Installer - Stream Class Installer - System devices Client / Server Runtime (Console) - Security Update KB900725 Client for Microsoft Networks CMD - Windows Command Processor CodePage: 10000 (MAC - Roman) CodePage: 1252 (ANSI - Latin I) CodePage: 28591 (ISO 8859-1 Latin I) CodePage: 437 (OEM - United States) CodePage: 850 (OEM - Multilingual Latin I) CoDevice Installer - Disk drives CoDevice Installer - DVD/CD-ROM drives CoDevice Installer - Floppy disk drives CoDevice Installer - IDE ATA/ATAPI controllers CoDevice Installer - Keyboards CoDevice Installer - Mice and other pointing devices CoDevice Installer - System devices COM Base COM Server Registration COM+ Services - Security Update KB902400 Common Control Libraries Policy XPSP2 Common Control Libraries Version 5 Common Control Libraries Version 6 [1.0.0.0] Common Control Libraries Version 6 [6.0.0.0] Common Control Libraries Version XPSP2 Common File Dialogs Communications Port Compression and Expansion Tools Computer Browser Service Control Panel Applet for "Wireless Setup Wizard" and "Home Networking Wizard" Control Panel Applets Control Panel Command Line Support Copy and Compare Tools Core Certificate Services Core Networking Credential Management User Interface Cryptographic Network Services Cryptographic Service Providers Date/Time Control Panel Default Monitor Desktop Wallpaper Device Manager DHCP Client Service Dial-up Client for Windows Dial-Up Networking Common Libraries Dial-up Server for Windows Direct memory access controller Direct Parallel Direct3D DirectDraw DirectDrawEx Directory Service Common User Interface DirectShow ASF/DMO - Update KB907507 DirectShow Capture DirectShow Core - Security Update KB904706 DirectSound DirectX Registry Info Disk Defragmenter Core Disk Defragmenter for FAT Disk Defragmenter for NTFS Disk drive Disk Dump Drivers Disk Management Basic Volume Runtime Disk Management Command Line Utility Disk Management Dynamic Volume Runtime Disk Management MMC Snap-In Disk Management Services Disk Performance Counters Display Control Panel Distributed Transaction Coordinator (MSDTC) - Security Update KB902400 DNS Cache Support Down-level Shell Compat DXMRTP Policy XPSP2 DXMRTP XPSP2 Embedded Trust English Language Support English MUI Resource Enhanced Write Filter Enhanced Write Filter API (EWF API) Event Log EWF NTLDR EWFNET Test Explorer Application Explorer shell FAT FAT Format FBA: Crypto FBA: Net Common FBA: Optional Components FBA: PnP FBA: SCE File Server For Macintosh Management Interface File Sharing - Security Update KB896422 File system recognizer Filter Mime Messages for the Indexing Service First Boot Agent (FBA) Floppy disk drive Font: Marlett Fonts: EGA Fonts: Fonts Arial Fonts: Fonts Microsoft_San_Serif Fonts: Fonts Tahoma Fonts: Fonts tahoma_bold Fonts: Fonts verdana Fonts: Fonts webdings Fonts: Fonts wingdings Fonts: Western Europe font substitute Fonts:vgaoem_fon Format Common User Interface Friendly Logon User Interface FrontMotion (SJJ Embedded Micro Solutions) GDI+ Policy XPSP2 GDI+ Side By Side Manifest 1.0.0.0 GDI+ XP GDI+ XPSP2 Generic Packet Classifier Group Policy Core - Support Files Group Policy Core Administration MMC Snap-In GUI Based Format Common Libraries H323 Telephony Service Provider Headless VGA Driver HID Phone Telephony Service Provider HTML Help (Shared files) HTML Help Engine - Security Update KB896358 HTML Rendering Engine - Security Update KB905915 I/O Error Log Messages Indexing Service Intel 21140-Based PCI Fast Ethernet Adapter (Generic) Intel 82371AB/EB PCI to ISA bridge (ISA mode) Intel 82443BX Pentium(r) II Processor to PCI Bridge Intel Microcode Update Driver Intel Processor Intel(R) 82371AB/EB PCI Bus Master IDE Controller International Control Panel Internet Authentication Service (IAS) and Remote Access Common Files Internet Authentication Service (IAS) Server Data Objects (SDO) and RAP Engine Internet Explorer - Security Update KB905915 Internet Protocol Network Address Translation IP Conference Telephony Service Provider IP Security Services ISAPNP Read Data Port Jet Database Engine Jet Database OLEDB Support Kernel Mode Crypto Driver for RSA Kernel Streaming User Mode Support Key Manager Keyboard & Mouse Control Panel Keyboard Class Driver Keyboard: United States - Dvorak Keyboard: United States - International Keyboard: United States English Language: English (Australian) - 0c09 Language: English (Belize) - 2809 Language: English (Canadian) - 1009 Language: English (Caribbean) - 2409 Language: English (Irish) - 1809 Language: English (Jamaica) - 2009 Language: English (New Zealand) - 1409 Language: English (Philippines) - 3409 Language: English (South Africa) - 1c09 Language: English (Trinidad) - 2c09 Language: English (United Kingdom) - 0809 Language: English (United States) - 0409 Language: English (Zimbabwe) - 3009 Legacy Audio Drivers Legacy Video Capture Devices Lightweight Directory Access Protocol (LDAP) client Local Security Authority Subsystem (LSASS) - Security Update KB899587 Logical Disk Manager Macromedia Flash v8 Map Network Drives/Network Places Wizard Mapi32 Libraries MCI Support Media Control Devices Message Queuing (MSMQ) Core Microcode Update Device Microsoft ACPI-Compliant System Microsoft Audio Compression Manager (MME Core) Microsoft Data Access Components (MDAC) Microsoft Foundation Class Library (Legacy) Microsoft Foundation Class Library (MFC) Microsoft Kernel Acoustic Echo Canceller Microsoft Kernel Audio Splitter Microsoft Kernel DLS Synthesizer Microsoft Kernel DRM Audio Descrambler Microsoft Kernel GS Wavetable Synthesizer Microsoft Kernel System Audio Device Microsoft Kernel Wave Audio Mixer Microsoft Line Services Microsoft Management Console (MMC) Microsoft PS/2 Mouse Microsoft Streaming Clock Proxy Microsoft Streaming Quality Manager Proxy Microsoft Streaming Service Proxy Microsoft Visual C++ Run Time Microsoft Visual C++ Run Time (Legacy) Microsoft WINMM WDM Audio Compatibility Driver Motherboard resources Mount Manager Mouse Class Driver MSFS Msxml 3.1 Msxml Libraries Multiple UNC Provider Multi-Protocol Router Service Messages Library Ndis NDIS Tunnel Miniport Driver NDIS User-Mode I/O Driver Ndisuio Inf Netbios Driver Netbios over TCP/IP NetDav Inf Netgpc Inf NetIP6 Inf Netlogon/NetJoin Netmscli Inf Netnb Inf Netpschd Inf Netrasa Inf Netrass Inf Netrast Inf Netserv Inf Netshell Nettcpip Inf Network Command Shell Network Configuration Network Performance Counters Network Setup Wizard Netwzc Inf NLS: Core Files NLS: Locale Map IDs NLS: Time Zones NPFS NT Hardware Detect NTFS NTFS Format Numeric data processor Ole Automation OLE Dialog Interfaces Packet Scheduler Miniport Partition Manager PCI bus Performance Counter Configuration Phone and Modem Control Panel Plug and Play Software Device Enumerator PnP (Kernel-mode) PnP (User-mode) Power Management Application Power Meter Control Panel Pragmatic General Multicast (Reliable Multicast protocol) Primary IDE Channel Primitive: Aclui Primitive: Advpack Primitive: Afd Primitive: AuthZ- HotFix Q890859 Primitive: Browselc Primitive: Browseui - Security Update KB905915 Primitive: Cabinet Primitive: Cdfview - Security Update KB905915 Primitive: Cdrom.sys Primitive: CertCli Primitive: Cfgmgr32 Primitive: Clbcatq - Security Update KB902400 Primitive: Clusapi Primitive: Comcat Primitive: Comres Primitive: Crypt32 Primitive: Cryptdll Primitive: CryptUI Primitive: Dbgeng Primitive: Dbghelp Primitive: Devmgr Primitive: Digest Primitive: Dnsapi Primitive: Dpcdll Primitive: Drmk.sys Primitive: Dssec Primitive: Duser Primitive: Dxapi.sys Primitive: Dxg Primitive: Dxgthk Primitive: Els Primitive: Esent
Recommended publications
  • System Requirements and Installation
    SCAD Office System Requirements and I nstallation SCAD Soft Contents System Requirements ...................................................................................................................... 3 Recommendations on Optimization of an Operational Environment ............................................. 4 Turn on (or off) the Indexing Service .......................................................................................... 4 Defragment Regularly ................................................................................................................. 4 Start Word and Excel once before Starting SCAD Office .......................................................... 4 Memory Fragmentation by the Service Programs ....................................................................... 4 Settings of the PDF-printing ........................................................................................................ 4 SCAD Office Installation ................................................................................................................ 5 Program Installation .................................................................................................................... 5 English Versions of Windows ..................................................................................................... 5 Privileges ..................................................................................................................................... 5 Network Licensing .....................................................................................................................
    [Show full text]
  • Through the Looking Glass: Webcam Interception and Protection in Kernel
    VIRUS BULLETIN www.virusbulletin.com Covering the global threat landscape THROUGH THE LOOKING GLASS: and WIA (Windows Image Acquisition), which provides a WEBCAM INTERCEPTION AND still image acquisition API. PROTECTION IN KERNEL MODE ATTACK VECTORS Ronen Slavin & Michael Maltsev Reason Software, USA Let’s pretend for a moment that we’re the bad guys. We have gained control of a victim’s computer and we can run any code on it. We would like to use his camera to get a photo or a video to use for our nefarious purposes. What are our INTRODUCTION options? When we talk about digital privacy, the computer’s webcam The simplest option is just to use one of the user-mode APIs is one of the most relevant components. We all have a tiny mentioned previously. By default, Windows allows every fear that someone might be looking through our computer’s app to access the computer’s camera, with the exception of camera, spying on us and watching our every move [1]. And Store apps on Windows 10. The downside for the attackers is while some of us think this scenario is restricted to the realm that camera access will turn on the indicator LED, giving the of movies, the reality is that malware authors and threat victim an indication that somebody is watching him. actors don’t shy away from incorporating such capabilities A sneakier method is to spy on the victim when he turns on into their malware arsenals [2]. the camera himself. Patrick Wardle described a technique Camera manufacturers protect their customers by incorporating like this for Mac [8], but there’s no reason the principle into their devices an indicator LED that illuminates when can’t be applied to Windows, albeit with a slightly different the camera is in use.
    [Show full text]
  • Download Windows Media App How to Download Windows Media Center
    download windows media app How to Download Windows Media Center. wikiHow is a “wiki,” similar to Wikipedia, which means that many of our articles are co-written by multiple authors. To create this article, 16 people, some anonymous, worked to edit and improve it over time. This article has been viewed 208,757 times. Windows Media Center was Microsoft's media PC interface, and allowed you to record live TV, manage and playback your media, and more. Media Center has been discontinued, but you can still get it for Windows 7 or 8.1. If you are using Windows 10, you'll need to use an enthusiast- made hacked version, as Windows Media Center has been completely disabled. How to Download Windows Media Center. wikiHow is a “wiki,” similar to Wikipedia, which means that many of our articles are co-written by multiple authors. To create this article, 16 people, some anonymous, worked to edit and improve it over time. This article has been viewed 208,757 times. Windows Media Center was Microsoft's media PC interface, and allowed you to record live TV, manage and playback your media, and more. Media Center has been discontinued, but you can still get it for Windows 7 or 8.1. If you are using Windows 10, you'll need to use an enthusiast- made hacked version, as Windows Media Center has been completely disabled. Download this free app to get Windows Media Center back in Windows 10. With the release of Windows 10, Microsoft waved farewell to Windows Media Center. There are some excellent free alternatives around, but if you miss the classic video recorder and media player there's a free download that brings its suite of streaming and playback tools to the new operating system.
    [Show full text]
  • Active@ UNDELETE Documentation
    Active @ UNDELETE Users Guide | Contents | 2 Contents Legal Statement.........................................................................................................5 Active@ UNDELETE Overview............................................................................. 6 Getting Started with Active@ UNDELETE.......................................................... 7 Active@ UNDELETE Views And Windows...................................................................................................... 7 Recovery Explorer View.......................................................................................................................... 8 Logical Drive Scan Result View..............................................................................................................9 Physical Device Scan View......................................................................................................................9 Search Results View...............................................................................................................................11 File Organizer view................................................................................................................................ 12 Application Log...................................................................................................................................... 13 Welcome View........................................................................................................................................14 Using
    [Show full text]
  • RAID, LVM, WSS, Verschlüsselung)
    Hochschule Wismar University of Applied Sciences Technology, Business and Design Fakultät für Ingenieurwissenschaften, Bereich EuI Projektarbeit Aufbereitung besonderer Speicherkonfigurationen als analysefähiges Material (RAID, LVM, WSS, Verschlüsselung) Eingereicht am: 6. Juli 2019 von: Melanie Wetzig Sven Lötgering Tom Gertenbach Stefan Depping Inhaltsverzeichnis Inhaltsverzeichnis 1 Vorüberlegungen4 1.1 Motivation und Zielstellung.......................4 1.2 Anforderung an den Ermittlungsprozess.................4 1.3 Einordnung in Ermittlungsprozess....................6 1.4 Write-Blocker...............................6 1.5 Software..................................7 1.5.1 Rohdatenformat (RAW).....................7 1.5.2 Expert Witness Format (EWF).................8 1.5.3 Advanced Forensic Format (AFF)................8 1.5.4 Xmount..............................8 2 Rechtliche Betrachtung9 2.1 Einleitung.................................9 2.2 Private Ermittlungen........................... 10 2.3 Behördliche Ermittlungen........................ 11 2.4 Zusammenfassung............................. 11 3 Speichermedien 13 3.1 Einleitung................................. 13 3.2 Magnetspeicher.............................. 13 3.2.1 Speicherung auf einer HDD................... 14 3.2.2 Löschen von Daten auf einer HDD............... 15 3.2.3 Forensische Relevanz....................... 15 3.3 Flash-Speicher............................... 15 3.3.1 Speicherung auf einer Solid-State-Drive (SSD)......... 16 3.3.2 Löschen von Daten auf einer SSD...............
    [Show full text]
  • IBM Thinkpad Notebooks 1992 to 2001 - Withdrawn January 2001 - Version 214 IBM Thinkpad 240 - Withdrawn
    IBM PC Institute IBM Personal Systems Reference IBM ThinkPad Notebooks 1992 to 2001 - withdrawn January 2001 - Version 214 IBM ThinkPad 240 - withdrawn IBM ThinkPad Processor Intel Mobile Celeron 300, 366, or 400MHz1 / 66MHz system bus Processor features No upgrade / processor on Ball Grid Array (H-PBGA) L2 cache 128KB / onboard (full speed) / synchronous pipelined burst / ECC / write-back Diskette drive External 3.5" 1.44MB / connects to left side with FDD port / includes case and cable CD-ROM Option: External CD-ROM / via Portable Drive Bay and 24X-10X5 CD-ROM UltraslimBay Drive DVD-ROM Option: External DVD-ROM / via Portable Drive Bay and DVD-ROM UltraslimBay Drive Type-model ✂ 2609-21U ✂ 2609-31U ✂ 2609-41U Processor Celeron 300MHz Celeron 366MHz Celeron 400MHz Disk - size / ms 6.4GB4 / 13ms read / Ultra DMA/33 or PIO Mode 4 12.0GB / 12ms read / ATA-66 or PIO4 Preload (see side) Windows 987 Windows 987 SE Windows 987 SE Avail / withdrawn date June 1999 / February 2000 November 1999 / February 2000 February 2000 / February 2001 Display - size and type 10.4" TFT color (264.16mm) / Active Matrix Display - technology SVGA / 800x600 / 15ms refresh (typical) / 50 to 110 nits 16.7 million simultaneous colors / 250 to 1 contrast (typical) Graphics - controller NeoMagic MagicMedia128XD (NM2160C) / 128-bit accelerator / DDC2B / 2MB / SGRAM (embedded) / color space conversion Graphics - features Simultaneous LCD and CRT26 / 180 degree tilt / no multiple-monitor support / ext SVGA to 1024x768 with 65,536 colors Memory - std / max 64MB / 192MB33
    [Show full text]
  • Active @ UNDELETE Users Guide | TOC | 2
    Active @ UNDELETE Users Guide | TOC | 2 Contents Legal Statement..................................................................................................4 Active@ UNDELETE Overview............................................................................. 5 Getting Started with Active@ UNDELETE........................................................... 6 Active@ UNDELETE Views And Windows......................................................................................6 Recovery Explorer View.................................................................................................... 7 Logical Drive Scan Result View.......................................................................................... 7 Physical Device Scan View................................................................................................ 8 Search Results View........................................................................................................10 Application Log...............................................................................................................11 Welcome View................................................................................................................11 Using Active@ UNDELETE Overview................................................................. 13 Recover deleted Files and Folders.............................................................................................. 14 Scan a Volume (Logical Drive) for deleted files..................................................................15
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 8,074,184 B2 Garside Et Al
    USOO8074184B2 (12) United States Patent (10) Patent No.: US 8,074,184 B2 Garside et al. (45) Date of Patent: Dec. 6, 2011 (54) MODIFYING ELECTRONIC DOCUMENTS 6,065,026 A * 5/2000 Cornelia et al. .............. 715,531 WITH RECOGNIZED CONTENT OR OTHER 6,081,814 A * 6/2000 Mangatet al. ... 715,205 6,108,272 A * 8/2000 Fox .................... ... 367,131 ASSOCATED DATA 6,111,985 A * 8/2000 Hullender et al. ... 382,229 6,340,967 B1 * 1/2002 Maxted .......... ... 345,179 (75) Inventors: Adrian James Garside, Sammamish, 6,411,733 B1* 6/2002 Saund ............ ... 382,190 WA (US); David Vaughn Winkler, 6,493.464 B1* 12/2002 Hawkins et al. ... ... 382,189 6,766,494 B1* 7/2004 Price et al. ......... T15,203 Seattle, WA (US); Joshua Clow, 6,836,759 B1* 12/2004 Williamson et al. TO4/235 Bellevue, WA (US) 6,903,751 B2 * 6/2005 Saund et al. ....... ... 345,619 7,283,670 B2 * 10/2007 Wakeam et al. ... ... 382, 186 (73) Assignee: Mocrosoft Corporation, Redmond, WA 7.468,801 B2 * 12/2008 Wakeam et al. ... ... 358,114 (US) 7,502,805 B2 * 3/2009 Wakeam et al. ...................... 1.1 (*) Notice: Subject to any disclaimer, the term of this (Continued) patent is extended or adjusted under 35 OTHER PUBLICATIONS U.S.C. 154(b) by 933 days. ask-search-q linked+Support+document&search=&qsrc=0—Aug. (21) Appl. No.: 10/703,081 14, 2011.* (22) Filed: Nov. 7, 2003 (Continued) (65) Prior Publication Data Primary Examiner — Boris Pesin US 2005/OO99398 A1 May 12, 2005 Assistant Examiner — John Heffington (74) Attorney, Agent, or Firm — Shook, Hardy & Bacon (51) Int.
    [Show full text]
  • A Chinese Mobile Phone Input Method Based on the Dynamic and Self-Study Language Model
    A Chinese Mobile Phone Input Method Based on the Dynamic and Self-study Language Model Qiaoming Zhu, Peifeng Li, Gu Ping, and Qian Peide School of Computer Science & Technology of Soochow University, Suzhou, 215006 {qmzhu, pfli, pgu, pdqian}@suda.edu.cn Abstract. This paper birefly introduces a Chinese digital input method named as CKCDIM (CKC Digital Input Method) and then applies it to the Symbian OS as an example, and it also proposes a framework of input method which adopted the Client/Server architecture for the handheld computers. To improve the performance of CKCDIM, this paper puts forward a dynamic and self-study language model which based on a general language model and user language model, and proposes two indexes which are the average number of pressed-keys (ANPK) and the hit rate of first characters (HRFC) to measure the performance of the input method. Meanwhile, this paper brings forward a modified Church-Gale smoothing method to reduce the size of general language model to meet the need of mobile phone. At last, the experiments prove that the dynamic and self-study language model is a steady model and can improve the performance of CKCDIM. Keywords: Chinese Digital Input Method, Architecture of Input Method, Dynamic and Self-study Language Model, HRFC, ANPK. 1 Introduction With the developing of communication technology and the popularization of the mobile phone in China, the use of text message in mobile phone is growing rapidly. According to CCTV financial news report, the total number of Short Message Service use will grow from 300 billions in 2005 to 450 billions in 2006 in China.
    [Show full text]
  • Microsoft Patches Were Evaluated up to and Including CVE-2020-1587
    Honeywell Commercial Security 2700 Blankenbaker Pkwy, Suite 150 Louisville, KY 40299 Phone: 1-502-297-5700 Phone: 1-800-323-4576 Fax: 1-502-666-7021 https://www.security.honeywell.com The purpose of this document is to identify the patches that have been delivered by Microsoft® which have been tested against Pro-Watch. All the below listed patches have been tested against the current shipping version of Pro-Watch with no adverse effects being observed. Microsoft Patches were evaluated up to and including CVE-2020-1587. Patches not listed below are not applicable to a Pro-Watch system. 2020 – Microsoft® Patches Tested with Pro-Watch CVE-2020-1587 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2020-1584 Windows dnsrslvr.dll Elevation of Privilege Vulnerability CVE-2020-1579 Windows Function Discovery SSDP Provider Elevation of Privilege Vulnerability CVE-2020-1578 Windows Kernel Information Disclosure Vulnerability CVE-2020-1577 DirectWrite Information Disclosure Vulnerability CVE-2020-1570 Scripting Engine Memory Corruption Vulnerability CVE-2020-1569 Microsoft Edge Memory Corruption Vulnerability CVE-2020-1568 Microsoft Edge PDF Remote Code Execution Vulnerability CVE-2020-1567 MSHTML Engine Remote Code Execution Vulnerability CVE-2020-1566 Windows Kernel Elevation of Privilege Vulnerability CVE-2020-1565 Windows Elevation of Privilege Vulnerability CVE-2020-1564 Jet Database Engine Remote Code Execution Vulnerability CVE-2020-1562 Microsoft Graphics Components Remote Code Execution Vulnerability
    [Show full text]
  • User's Guide O&O Defrag
    Last changes: 19.09.2018 Table of contents About O&O Defrag 22 4 Features at a glance 5 Differences between the various Editions 7 System requirements 8 Installation 10 Screen Saver 12 Online registration 14 Getting started 16 Analyze your drives 17 Defragmenting your Drives 19 Selecting a defragmentation method 22 Standard defragmentation methods 25 User Interface (GUI) 32 Drive List 33 Cluster View 34 Defragmentation summary 36 Job View and Reports 37 Status Views 38 Tray icon (Notification area icon) 40 O&O DiskCleaner 41 O&O DiskStat 44 Schedule defragmentation at regular intervals 45 Create job - General 46 Plan a schedule 48 Screen Saver Mode 50 Select drives 51 Exclude and include files 52 O&O ActivityMonitor for Jobs 54 Further job settings 56 Edit/Duplicate/Delete jobs 59 Status reports 60 Extras 62 TRIM Compatibility 68 Work within the network 79 Zone filing 82 Rules for individual drives 84 Notation for rules 86 Settings 87 General Settings 88 Boot time defragmentation 91 Automatic optimization 93 Select files for defragmentation 95 O&O ActivityMonitor 97 Technical information 99 Using the command line version 101 Status notices and program output 103 Data Security and Integrity 105 Supported hardware 106 Supported File Systems 107 Free space needed for defragmentation 108 Recommendations and FAQs 109 O&O DiskStat 3 113 System requirements 114 Installation 115 Getting started 116 End user license agreement 118 User's guide O&O Defrag About O&O Defrag 22 About O&O Defrag 22 Thank you for choosing O&O Defrag! O&O Defrag activates the hidden performance of your computer and packs file fragments efficiently and securely together.
    [Show full text]
  • Installing and Configuring Whatsup Gold V16.3
    WhatsUp Gold v16.4 Installation and Conguration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview ........................................................................................................................................................... 1 Overview ...................................................................................................................................................................... 1 Security considerations ......................................................................................................................................... 2 Standard WhatsUp Gold Installation ............................................................................................................................ 2 Distributed Installation ....................................................................................................................................................... 4 Installing WhatsUp Gold - Distributed (Central Site) ............................................................................... 4 Installing WhatsUp Gold - Distributed (Remote Site) .............................................................................. 6 Failover Installation .............................................................................................................................................................. 7 Installing WhatsUp Gold - Failover (Secondary Site) ..............................................................................
    [Show full text]