Implementation of a Microsoft Windows Embedded Standard System

Total Page:16

File Type:pdf, Size:1020Kb

Implementation of a Microsoft Windows Embedded Standard System University of Louisville ThinkIR: The University of Louisville's Institutional Repository Electronic Theses and Dissertations 12-2010 Implementation of a Microsoft Windows embedded standard system. Kristopher L. Kumler University of Louisville Follow this and additional works at: https://ir.library.louisville.edu/etd Recommended Citation Kumler, Kristopher L., "Implementation of a Microsoft Windows embedded standard system." (2010). Electronic Theses and Dissertations. Paper 783. https://doi.org/10.18297/etd/783 This Master's Thesis is brought to you for free and open access by ThinkIR: The University of Louisville's Institutional Repository. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of ThinkIR: The University of Louisville's Institutional Repository. This title appears here courtesy of the author, who has retained all other copyrights. For more information, please contact [email protected]. IMPLEMENTATION OF A MICROSOFT WINDOWS EMBEDDED STANDARD SYSTEM By Kristopher L. Kumler B.S., University of Louisville, 2002 A Thesis Submitted to the Faculty of the University of Louisville J.B. Speed School of Engineering in Partial Fulfillment of the Requirements for the Professional Degree MASTER OF ENGINEERING Department of Computer Engineering and Computer Science December 2010 IMPLEMENTATION OF A MICROSOFT WINDOWS EMBEDDED STANDARD SYSTEM Submitted by: _______________________________ Kristopher L. Kumler A Thesis Approved On _______________December 8, 2010 _______________ (Date) by the Following Reading and Examination Committee: ___________________________________ Ahmed H. Desoky, Thesis Director ___________________________________ Adel S. Elmaghraby ___________________________________ John F. Naber ii ACKNOWLEDGMENTS I would like to express my appreciation to my advisor, Dr. Ahmed Desoky, for his guidance and patience. I also thank my committee, Dr. Adel Elmaghraby and Dr. John Naber. Special thanks to Mr. David Goffinet and Image Vault, LLC. for the use of equipment and the use of Image Vault’s software product as an example host application. Thanks to Eric Kramer, for his help with advice, proofreading, and editing. I want to express my appreciation to my wife, Mandy Kumler, for pushing me to finish. Her tremendous love and dedication throughout the past twelve years is ineffable. iii ABSTRACT Many dedicated-use computer systems sold as complete products require a turn-key design delivered to the customer. This requires a system which is stable, secure, and serviceable. Adaptability of the system to existing software applications is a key consideration for many vendors. This thesis attempts to establish and gather best practices for designing, configuring, and building a Microsoft Windows Embedded Standard 2009 system. An existing real-world system will be used as a case study and example implementation. The end result will be a relatively compact, secure, and efficient Microsoft Windows Operating System image to support the target software application. iv TABLE OF CONTENTS APPROVAL PAGE....................................................................................................ii ACKNOWLEDGMENTS .........................................................................................iii ABSTRACT .............................................................................................................. iv TABLE OF CONTENTS............................................................................................ v LIST OF TABLES .................................................................................................... vi LIST OF FIGURES ................................................................................................. vii LIST OF FIGURES ................................................................................................. vii I. INTRODUCTION.................................................................................................. 1 II. LITERATURE REVIEW......................................................................................4 A. System Reliability.............................................................................................4 B. System Security ................................................................................................ 7 C. Microsoft Windows Embedded Products ........................................................8 D. Windows Embedded Standard...................................................................... 10 III. INSTRUMENTATION AND EQUIPMENT......................................................15 A. Hardware Platform .........................................................................................15 B. Hosted Application..........................................................................................17 C. Windows Embedded Tools .............................................................................17 IV. DEVELOPMENT OF AN EMBEDDED OPERATING SYSTEM PLATFORM 20 A. Motherboard ...............................................................................................20 B. Device Drivers .............................................................................................23 C. Host Application .........................................................................................26 D. AutoUpdate Application..........................................................................29 E. Image Configuration ...................................................................................30 F. Target Image Preparation...........................................................................36 V. DISCUSSION OF RESULTS..............................................................................39 VI. CONCLUSIONS................................................................................................ 41 VII. RECOMMENDATIONS..................................................................................42 APPENDIX I. TARGET ANALYSIS RESULTS......................................................44 APPENDIX II. RECORDER APPLICATION DEPENDENCY SPECIFICATION .46 APPENDIX III. RECORDER APPLICATION ANALYZED DEPENDENCIES.....48 APPENDIX IV. IVRECORD COMPONENT CREATION...................................... 54 APPENDIX V. AUTOUPDATE COMPONENT CREATION .................................58 APPENDIX VI. WINDOWS SECURITY DIALOG PREFERENCES .....................60 APPENDIX VII. IMAGE CONFIGURATION CREATION....................................64 LIST OF REFERENCES.........................................................................................69 VITA ........................................................................................................................71 v LIST OF TABLES TABLE I. WINDOWS EMBEDDED FAMILY COMPARISON................................9 TABLE II. BOOT AND STORAGE OPTIONS .........................................................11 TABLE III. HARDWARE DEVICES .......................................................................15 TABLE IV. REQUIREMENT RESOLUTIONS ......................................................39 vi LIST OF FIGURES FIGURE 1. SYSTEM RELIABILITY FAILURE FAULT TREE ...............................................6 FIGURE 2. TARGET ANALYZER PROBE EXECUTION ................................................... 21 FIGURE 3. SELECTOR PROTOTYPE USED FOR MACRO COMPONENT ...........................22 FIGURE 4. COMPONENT DATABASE MANAGER IMPORT ............................................23 FIGURE 5. VIDEO CAPTURE DEVICE RESOURCES ......................................................24 FIGURE 6. COMPONENT REPOSITORY SELECTION ..................................................... 25 FIGURE 7. DEPENDENCY WALKER ANALYSIS ............................................................ 27 FIGURE 8. RECORDER SOFTWARE COMPONENT DEPENDENCIES ...............................28 FIGURE 9. CONFIGURATION SETTINGS – RUN -TIME IMAGE LICENSING ..................... 31 FIGURE 10. ACPI MULTIPROCESSOR PC CONFIGURATION .......................................32 FIGURE 11. WINDOWS FIREWALL CONFIGURATION ..................................................33 FIGURE 12. SYSTEM CLONING TOOL CONFIGURATION ..............................................34 FIGURE 13. CONFIGURATION DEPENDENCY CHECK .................................................. 35 FIGURE 14. FIRST BOOT AGENT EXECUTING ............................................................36 FIGURE 15. FIRST BOOT AGENT COMPLETE ............................................................. 37 FIGURE 16. FINAL SYSTEM RUNNING IMAGE VAULT ’S RECORDER APPLICATION ........38 FIGURE 17. DEPENDENCY WALKER PROFILING CONFIGURATION ..............................48 FIGURE 18. IVR ECORD COMPONENT PROPERTIES ................................................... 57 FIGURE 19. AUTO UPDATE COMPONENT PROPERTIES ............................................... 59 FIGURE 20. COMPONENT DESIGNER REGISTRY DATA ..............................................60 FIGURE 21. IMAGE CONFIGURATION EXTRA REGISTRY DATA ....................................68 vii I. INTRODUCTION Modern dedicated computer systems are in use throughout the consumer marketplace. Devices such as ATMs, retail kiosks, gaming or security systems, medical devices, or other application-dedicated systems require a stable and secure platform for their Operating System. The repercussions of failures in either system stability, with crashes or denial of service, or security, with user or external breaches, can result in the
Recommended publications
  • Through the Looking Glass: Webcam Interception and Protection in Kernel
    VIRUS BULLETIN www.virusbulletin.com Covering the global threat landscape THROUGH THE LOOKING GLASS: and WIA (Windows Image Acquisition), which provides a WEBCAM INTERCEPTION AND still image acquisition API. PROTECTION IN KERNEL MODE ATTACK VECTORS Ronen Slavin & Michael Maltsev Reason Software, USA Let’s pretend for a moment that we’re the bad guys. We have gained control of a victim’s computer and we can run any code on it. We would like to use his camera to get a photo or a video to use for our nefarious purposes. What are our INTRODUCTION options? When we talk about digital privacy, the computer’s webcam The simplest option is just to use one of the user-mode APIs is one of the most relevant components. We all have a tiny mentioned previously. By default, Windows allows every fear that someone might be looking through our computer’s app to access the computer’s camera, with the exception of camera, spying on us and watching our every move [1]. And Store apps on Windows 10. The downside for the attackers is while some of us think this scenario is restricted to the realm that camera access will turn on the indicator LED, giving the of movies, the reality is that malware authors and threat victim an indication that somebody is watching him. actors don’t shy away from incorporating such capabilities A sneakier method is to spy on the victim when he turns on into their malware arsenals [2]. the camera himself. Patrick Wardle described a technique Camera manufacturers protect their customers by incorporating like this for Mac [8], but there’s no reason the principle into their devices an indicator LED that illuminates when can’t be applied to Windows, albeit with a slightly different the camera is in use.
    [Show full text]
  • Download Windows Media App How to Download Windows Media Center
    download windows media app How to Download Windows Media Center. wikiHow is a “wiki,” similar to Wikipedia, which means that many of our articles are co-written by multiple authors. To create this article, 16 people, some anonymous, worked to edit and improve it over time. This article has been viewed 208,757 times. Windows Media Center was Microsoft's media PC interface, and allowed you to record live TV, manage and playback your media, and more. Media Center has been discontinued, but you can still get it for Windows 7 or 8.1. If you are using Windows 10, you'll need to use an enthusiast- made hacked version, as Windows Media Center has been completely disabled. How to Download Windows Media Center. wikiHow is a “wiki,” similar to Wikipedia, which means that many of our articles are co-written by multiple authors. To create this article, 16 people, some anonymous, worked to edit and improve it over time. This article has been viewed 208,757 times. Windows Media Center was Microsoft's media PC interface, and allowed you to record live TV, manage and playback your media, and more. Media Center has been discontinued, but you can still get it for Windows 7 or 8.1. If you are using Windows 10, you'll need to use an enthusiast- made hacked version, as Windows Media Center has been completely disabled. Download this free app to get Windows Media Center back in Windows 10. With the release of Windows 10, Microsoft waved farewell to Windows Media Center. There are some excellent free alternatives around, but if you miss the classic video recorder and media player there's a free download that brings its suite of streaming and playback tools to the new operating system.
    [Show full text]
  • SLDXA /T /L1 – SLX Component List
    SLDXA /T /L1 – SLX Component List SLDXA.exe ver 1.0 Copyright (c) 2004-2006 SJJ Embedded Micro Solutions, LLC All Rights Reserved SLXDiffC.exe ver 2.0 / SLXtoTXTC.exe ver 2.0 www.sjjmicro.com Processing... File1 to TXT file. Opening XSL File Reading RTF for final conversion F:\SLXTEST\LOCKDOWN_DEMO2.SLX has the following Components Total Count is: 577 -------------------------------------------------- .NET Framework 1.1 - Security Update KB887998 Accessibility Control Panel Accessibility Core ACPI Fixed Feature Button Active Directory Service Interface (ADSI) Core Active Directory Service Interface (ADSI) LDAP Provider Active Directory Service Interface (ADSI) Windows NT Provider Active Template Library (ATL) Add Hardware Control Panel Add/Remove Programs Control Panel Administration Support Tools Administrator Account Advanced Configuration and Power Interface (ACPI) PC Analog TV Application Compatibility Core Audio Codecs Audio Control Panel Base Component Base Performance Counters Base Support Binaries CD-ROM Drive Certificate Request Client & Certificate Autoenrollment Certificate User Interface Services Class Install Library - Desk Class Install Library - Mdminst Class Install Library - Mmsys Class Install Library - Msports Class Install Library - Netcfgx Class Install Library - Storprop Class Install Library - System Devices Class Installer - Computer Class Installer - Disk drives Class Installer - Display adapters Class Installer - DVD/CD-ROM drives Class Installer - Floppy disk controllers Class Installer - Floppy disk drives
    [Show full text]
  • IBM Thinkpad Notebooks 1992 to 2001 - Withdrawn January 2001 - Version 214 IBM Thinkpad 240 - Withdrawn
    IBM PC Institute IBM Personal Systems Reference IBM ThinkPad Notebooks 1992 to 2001 - withdrawn January 2001 - Version 214 IBM ThinkPad 240 - withdrawn IBM ThinkPad Processor Intel Mobile Celeron 300, 366, or 400MHz1 / 66MHz system bus Processor features No upgrade / processor on Ball Grid Array (H-PBGA) L2 cache 128KB / onboard (full speed) / synchronous pipelined burst / ECC / write-back Diskette drive External 3.5" 1.44MB / connects to left side with FDD port / includes case and cable CD-ROM Option: External CD-ROM / via Portable Drive Bay and 24X-10X5 CD-ROM UltraslimBay Drive DVD-ROM Option: External DVD-ROM / via Portable Drive Bay and DVD-ROM UltraslimBay Drive Type-model ✂ 2609-21U ✂ 2609-31U ✂ 2609-41U Processor Celeron 300MHz Celeron 366MHz Celeron 400MHz Disk - size / ms 6.4GB4 / 13ms read / Ultra DMA/33 or PIO Mode 4 12.0GB / 12ms read / ATA-66 or PIO4 Preload (see side) Windows 987 Windows 987 SE Windows 987 SE Avail / withdrawn date June 1999 / February 2000 November 1999 / February 2000 February 2000 / February 2001 Display - size and type 10.4" TFT color (264.16mm) / Active Matrix Display - technology SVGA / 800x600 / 15ms refresh (typical) / 50 to 110 nits 16.7 million simultaneous colors / 250 to 1 contrast (typical) Graphics - controller NeoMagic MagicMedia128XD (NM2160C) / 128-bit accelerator / DDC2B / 2MB / SGRAM (embedded) / color space conversion Graphics - features Simultaneous LCD and CRT26 / 180 degree tilt / no multiple-monitor support / ext SVGA to 1024x768 with 65,536 colors Memory - std / max 64MB / 192MB33
    [Show full text]
  • 3Dp-V264gt/Pro 3Dp-V264gt2/Tv User's Manual
    R 3DP-V264GT/PRO R 3DP-V264GT2/TV 3D Graphic Cards USER'S MANUAL Hardware & Video Drivers USER'S NOTICE No part of this product, including the product and software may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any lan- guage in any form by any means without the express written permission of ASUSTeK COMPUTER INC. (hereinafter referred to as ASUS) except documentation kept by the purchaser for backup purposes. Specifications are subject to change without notice. ASUS provides this manual “as is” without warranty of any kind, either express or implied, including but not limited to the implied warranties or conditions of merchantability or fitness for a particular purpose. In no event shall ASUS be liable for any loss or profits, loss of business, loss of use or data, interruption of business, or for indirect, special, inci- dental, or consequential damages of any kind, even if ASUS has been advised of the possibility of such damages arising from any defect or error in this manual or product. ASUS may revise this manual from time to time without notice. Products mentioned in this manual are mentioned for identification purposes only. Product names appearing in this manual may or may not be registered trademarks or copyrights of their respective companies. • IBM is a registered trademark of International Business Machines Corp. • Windows and MS-DOS are registered trademarks of Microsoft Corporation. • Sound Blaster AWE32 and SB16 are trademarks of Creative Technology Ltd. • Adobe and Acrobat are registered trademarks of Adobe Systems Incorporated. The product name and revision number are both printed on the board itself.
    [Show full text]
  • Software License and Limited Warranty
    Software License and Limited Warranty LEASE READ CAREFULLY BEFORE INSTALLING THIS SOFTWARE. BY INSTALLING THIS SOFTWARE, PYOU AGREE TO BECOME BOUND BY THE TERMS OF THIS LICENSE. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENSE, RETURN THIS PACKAGE TO THE PLACE WHERE YOU OBTAINED IT WITHIN 15 DAYS FOR A FULL REFUND. 1. Grant of License The enclosed computer program(s) (the “Software”) is licensed, not sold, to you by NewTek for use only under the terms of this License, and NewTek reserves any rights not expressly granted to you. You own the disk(s) on which the Software is recorded or fixed, but the Software is owned by NewTek or its suppliers and is protected by United States copyright laws and international treaty provisions. The copyright restrictions of this license extend to any further updates, software patches, or bug fixes made available to you by Newtek, whether distributed by floppy disc, CD ROM, or in an electronic format via BBS, ftp, email, etc. This License allows you to use one copy of the Software on a single computer at a time. To “use” the Software means that the Software is either loaded in the temporary memory (i.e., RAM) of a computer, or installed on the permanent memory of a computer (i.e., hard disk, CD ROM, etc.). You may use at one time as many copies of the Software as you have licenses for. You may install the Software on a common storage device shared by multiple computers, provided that if you have more computers having access to the common storage device than the number of licensed copies of the Software, you must have some software mechanism which locks out any concurrent user in excess of the number of licensed copies of the Software (an additional license is not needed for the one copy of Software stored on the common storage device accessed by multiple computers).
    [Show full text]
  • 1. Installing Axis C++ Server
    Axis c++ windows installation guide Description This document describes the installation process of Axis C++ on windows OS , using Apache web server, to the point where you have a running Calculator sample (provided with Axis) web service. What does Axis do? Web service is a way to expose services to developers over the web. For example, a Calculator object reside on a web server might expose an Add service , so that a client software can call this function and get a result over the web. The protocol used for this communication is SOAP, which is a XML based protocol. What Axis do is parse this SOAP message, deserialize and invoke the C++ class which perform the actual calculation, and than serialize the result back to SOAP protocol and return it to the callee. Installation The installation can be divided to 2 parts: 1. Installing Axis C++ server. 2. Creating the Web service. 1. Installing Axis C++ server How does it work? Axis is implemented as a module (mod_axis.dll for apache 1.3 or mod_axis2.dll for apache 2.0) which is loaded by the web server. A module is a piece of software which declares its interest in the messages sent to the web server. In order to be loaded as a module, this dll should be placed in the server's modules folder, and be registered in the server's httpd.conf file. The module itself requires several dlls to properly work. Some of them come with Axis and some with the apache server. In order for them to be found, we will add the path to their containing folders to the Path environment variable.
    [Show full text]
  • Javascript Client Reference
    World Wide Web security URLmerchant systemChat community system server navigator TCP/IP HTML Publishing Personal Client-Side JavaScript Reference Inter ww Version 1.3 Proxy SSL Mozilla IStore Publishing Internet secure sockets layer mail encryption HTMLhttp://www comp.syselectronic commerce JavaScript directory server news certificate Proxy Netscape Communications Corporation ("Netscape") and its licensors retain all ownership rights to the software programs offered by Netscape (referred to herein as "Software") and related documentation. Use of the Software and related documentation is governed by the license agreement accompanying the Software and applicable copyright law. Your right to copy this documentation is limited by copyright law. Making unauthorized copies, adaptations, or compilation works is prohibited and constitutes a punishable violation of the law. Netscape may revise this documentation from time to time without notice. THIS DOCUMENTATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN NO EVENT SHALL NETSCAPE BE LIABLE FOR INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY KIND ARISING FROM ANY ERROR IN THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION ANY LOSS OR INTERRUPTION OF BUSINESS, PROFITS, USE, OR DATA. The Software and documentation are copyright ©1994-1999 Netscape Communications Corporation. All rights reserved. Netscape, Netscape Navigator, Netscape Certificate Server, Netscape DevEdge, Netscape FastTrack Server, Netscape ONE, SuiteSpot and the Netscape N and Ship’s Wheel logos are registered trademarks of Netscape Communications Corporation in the United States and other countries. Other Netscape logos, product names, and service names are also trademarks of Netscape Communications Corporation, which may be registered in other countries. JavaScript is a trademark of Sun Microsystems, Inc.
    [Show full text]
  • Windows Embedded Standard 2009 Prepkit
    MCTSi Exam 70-577 Windows Embedded Standard 2009 Preparation Kit Certification Exam Preparation Automation Not for resale. ii Published by Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publica- tion. Information in this document, including URL and other Internet Web site references, is subject to change with- out notice. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmit- ted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any pur- pose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. Copyright © 2009 Microsoft Corporation. All rights reserved. Internet Explorer, Microsoft, MS-DOS, Visual Studio, Win32, Windows and Windows Vista are trademarks of the Microsoft group of companies.
    [Show full text]
  • V3000 Series USER's MANUAL
    R V3000 Series AGP&PCI Graphics Cards USER’S MANUAL Hardware & Video Drivers AGP-V3000 AGP-V3000/TV 3DP-V3000/TV AGP-V3000ZXTV AGP-V3000ZX USER’S NOTICE No part of this manual, including the products and software described in it, may be repro- duced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means, except documentation kept by the purchaser for backup pur- poses, without the express written permission of ASUSTeK COMPUTER INC. (“ASUS”). ASUS PROVIDES THIS MANUAL “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OR CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PAR- TICULAR PURPOSE. IN NO EVENT SHALL ASUS, ITS DIRECTORS, OFFICERS, EM- PLOYEES OR AGENTS BE LIABLE FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES (INCLUDING DAMAGES FOR LOSS OF PROF- ITS, LOSS OF BUSINESS, LOSS OF USE OR DATA, INTERRUPTION OF BUSINESS AND THE LIKE), EVEN IF ASUS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES ARISING FROM ANY DEFECT OR ERROR IN THIS MANUAL OR PRODUCT. Product warranty or service will not be extended if: (1) the product is repaired, modified or altered, unless such repair, modification of alteration is authorized in writing by ASUS; or (2) the serial number of the product is defaced or missing. Products and corporate names appearing in this manual may or may not be registered trade- marks or copyrights of their respective companies, and are used only for identification or explanation and to the owners’ benefit, without intent to infringe.
    [Show full text]
  • The Spyrats of Oceanlotus Malware Analysis White Paper Contents
    The SpyRATs of OceanLotus Malware Analysis White Paper Contents Introduction ............................................................................................4 C2 .............................................................................................................. 32 Protocol ............................................................................................ 32 Components ............................................................................................4 Commands ...................................................................................... 33 Backdoor Error Codes ................................................................. 34 Roland RAT ..............................................................................................4 CobaltStrike Beacon #1 ................................................................... 35 Overview ...................................................................................................4 Overview ................................................................................................ 35 Features ....................................................................................................4 Deployment .......................................................................................... 36 Behavior ....................................................................................................5 C2 .................................................................................................................7 CobaltStrike
    [Show full text]
  • 3Dexplorer® 3000 USER's MANUAL
    R 3DexPlorer® 3000 AGP-V3000 Graphics Card USER’S MANUAL Hardware & Video Drivers USER’S NOTICE No part of this manual, including the products and softwares described in it, may be repro- duced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means, except documentation kept by the purchaser for backup pur- poses, without the express written permission of ASUSTeK COMPUTER INC. (“ASUS”). ASUS PROVIDES THIS MANUAL “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OR CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PAR- TICULAR PURPOSE. IN NO EVENT SHALL ASUS, ITS DIRECTORS, OFFICERS, EMPLOYEES OR AGENTS BE LIABLE FOR ANY INDIRECT, SPECIAL, INCIDEN- TAL, OR CONSEQUENTIAL DAMAGES (INCLUDING DAMAGES FOR LOSS OF PROFITS, LOSS OF BUSINESS, LOSS OF USE OR DATA, INTERRUPTION OF BUSI- NESS AND THE LIKE), EVEN IF ASUS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES ARISING FROM ANY DEFECT OR ERROR IN THIS MANUAL OR PRODUCT. Products and corporate names appearing in this manual may or may not be registered trade- marks or copyrights of their respective companies, and are used only for identification or explanation and to the owners’ benefit, without intent to infringe. • Intel, LANDesk, and Pentium are registered trademarks of Intel Corporation. • IBM and OS/2 are registered trademarks of International Business Machines. • Symbios is a registered trademark of Symbios Logic Corporation. • Windows and MS-DOS are registered trademarks of Microsoft Corporation. • Sound Blaster AWE32 and SB16 are trademarks of Creative Technology Ltd.
    [Show full text]