Metadefender Core V4.10.1

Total Page:16

File Type:pdf, Size:1020Kb

Metadefender Core V4.10.1 MetaDefender Core v4.10.1 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Installing Metadefender Core on Ubuntu or Debian computers 15 Installing Metadefender Core on Red Hat Enterprise Linux or CentOS computers 15 Installing Metadefender Core on Windows computers 16 1.2. License Activation 16 1.3. Scan Files with Metadefender Core 17 2. Installing or Upgrading Metadefender Core 18 2.1. Recommended System Requirements 18 System Requirements For Server 18 Browser Requirements for the Metadefender Core Management Console 20 2.2. Installing Metadefender Core 20 Installation 20 Installation notes 21 2.2.1. Installing Metadefender Core using command line 21 2.2.2. Installing Metadefender Core using the Install Wizard 23 2.3. Upgrading MetaDefender Core 23 Upgrading from MetaDefender Core 3.x 23 Upgrading from MetaDefender Core 4.x 23 2.4. Metadefender Core Licensing 24 2.4.1. Activating Metadefender Core Licenses 24 2.4.2. Checking Your Metadefender Core License 30 2.5. Performance and Load Estimation 31 What to know before reading the results: Some factors that affect performance 31 How test results are calculated 32 Test Reports 32 Performance Report - Multi-Scanning On Linux 32 Performance Report - Multi-Scanning On Windows 36 2.6. Special installation options 41 Use RAMDISK for the tempdirectory 41 3. Configuring Metadefender Core 45 3.1. Management Console 45 3.2. Metadefender Configuration 46 3.2.1. Startup Core Configuration 46 3.2.2. Startup Node Configuration 50 3.3. User management 53 3.3.1. Users and groups 53 3.3.2. Roles 57 3.3.3. User directories 60 3.3.4. Active Directory attributes 67 3.3.5. Change user password 70 3.4. Update settings 71 Internet 72 Folder 73 Manual 73 3.5. Clean up scan database 74 Technology Note: 74 3.6. Policies configuration 74 3.6.1. How MetaDefender Core policies work 75 3.6.2. Workflow template configuration 75 3.6.3. Security zone configuration 88 3.6.4. Workflow rule configuration 88 3.7. Logging 92 3.7.1. Configuration 93 3.7.2. Debug logging 93 3.8. Enabling HTTPS 93 Enabling HTTPS via Management Console 94 Enabling HTTPS via configuration files 96 3.9. Configuring proxy settings 98 How can I set proxy server for the product 98 3.10. External Scanners And Post Actions 98 External Scanners 99 Post Actions 102 4. Scan files with Metadefender Core 105 Scan Files via REST API 105 Scan Files via Web Interface 106 Choose what to scan and how 106 Start scanning 106 Progress of scanning 106 5. Data Sanitization 108 6. Operating Metadefender Core 109 6.1. Dashboard 109 Overview page 109 Scan history 110 Quarantine 110 Update history 110 6.2. Inventory Management 111 Certificates 111 Engines 114 Nodes 121 Whitelist (by hash) 123 6.3. Regular Maintenance 124 Checking for Upgrades 124 Checking Engines / Databases Health 124 6.4 Import/Export configuration 125 Export 125 Import 125 Note 125 7. Metadefender Core Developer Guide 126 How to Interact with Metadefender Core using REST 126 File scan process 126 Activate License Online 126 Successful response 127 Error response 127 Cancel Batch 128 Cancel Scan Batch 128 Close Batch 129 Close Scan Batch 129 Download Batch Signed Result 131 Download Batch Signed Result 131 Download Sanitized Files 133 Download Sanitized Files Using Data Id 133 Error response 134 Fetching Available Scan Rules 135 Successful response 135 Error response 136 Fetching Engine/Database Versions 136 Successful response 137 Error response 138 Fetch Scan Result 138 Retrieving Scan Reports Using Data ID 138 Successful response 138 Successful response with archive detection 143 Response (not existing data_id) 145 Error response 145 Fetch Scan Result by File Hash 146 Retrieve Scan Results Using Hash 146 Request http header parameters 146 The retrieved result is always the most recent for the processed item, if rule is set then it will be the most recent - if exists - under the given rule. 146 Successful response 146 Successful response with archive detection 150 Response (not existing hash) 152 Error response 152 Get Current License Information 153 Successful response 153 Error response 154 Get Product Version 154 Successful response 155 Error response 155 Initiate Batch 156 Initiate Scan Batch 156 Login / Create a Session 157 Successful response 157 Error response 158 Logout / Destroy a Session 158 Successful response 159 Error response 159 Scan A File 159 Successful response 160 Error response 160 Scan file in batch 161 Scan file in batch 161 Status of Batch 162 Status of Scan Batch 162 Uploading License Key File 163 Successful response 164 Error response 164 Vulnerability Info In Scan Result 165 Example 165 8. Advanced Metadefender Core Deployment 169 8.1. Scripted license management 169 Requirements 169 Activation steps 169 Deactivation steps 170 Important notes 172 8.2. Multi-node deployment 172 Setting up several Metadefender Core nodes 172 8.3. Using external load-balancer 175 8.3.1. HTTP(S) - Layer 7 load balancing 175 8.3.2. DNS load balancing 178 9. Troubleshooting Metadefender Core 182 Installation issues 182 Issues with nodes 182 Where are the Metadefender Core logs located? 182 How can I create a support package? 182 Issues under high load 182 How to Create Support Package? 183 Creating the package on Linux 183 Creating the package on Windows 183 Content of the created package 184 How to Read the Metadefender Core Log? 184 Files 184 Format 184 Severity levels of log entries 185 Inaccessible Management Console 185 How to detect 185 Solution 185 Possible Issues on Nodes 186 Q. Node detected 3rd party product on system 186 Q. There is no scan node connected 186 Too Many Sockets or Files Open 187 How to detect 187 Solution 187 Too Many TIME_WAIT Socket 188 How to detect 188 Solution 188 Technical Insights 189 10. Release notes 190 Version v4.10.1 190 Version v4.10.0 190 Version 4.9.1 191 Version 4.9.0 191 Version 4.8.2 192 Version 4.8.1 192 Version 4.7.2 193 Version 4.7.1 194 Version 4.6.3 195 Version 4.6.2 195 Version 4.6.1 195 Version 4.6.0 196 Version 4.5.1 197 Version 4.5.0 197 Version 4.4.1 197 Version 4.3.0 198 Version 4.2.0 199 Version 4.1.0 200 Version 4.0.1 200 Version 4.0.0 201 11. Metadefender / Client 202 About This Guide 202 Key Features of MetaDefender Client 202 Supported Operating Systems 202 1. MetaDefender Client Packages 203 MetaDefender Free Client 203 MetaDefender Premium Client 203 2. MetaDefender Premium Client 204 2.1 Install using the Install Wizard 204 2.2 Install using the Command Line 206 2.3 Using the MetaDefender Premium Client 207 2.4 Configuring through the config file 222 2.5 Configuring through Central Management 229 3. MetaDefender Free Client 234 4. Command Line Interface 234 Example: 234 Command Line Options 234 4.1 Generating and using the Administrator Password 238 5. MetaDefender Client Release Notes 240 Tips and Known Issues 240 4.1.4 Release 240 4.1.3 Release 241 4.1.2 Release 241 4.1.1 Release 241 4.1.0 Release 242 4.0.18 Release 242 4.0.17 Release 243 4.0.16 Release 243 4.0.15 Release 243 4.0.14 Release 244 4.0.13 Release 244 4.0.12 Release 245 4.0.11 Release 245 4.0.10 Release 246 4.0.9 Release 246 4.0.8 Release 247 4.0.7 Release 247 4.0.6 Release 247 4.0.5 Release 248 4.0.4 Release (Internal Only) 248 4.0.3 Release 248 4.0.2 Release 249 4.0.1 Release 249 4.0.0 Release 249 Changes in 3.12.5 250 12. Legal 251 Copyright 251 DISCLAIMER OF WARRANTY 251 COPYRIGHT NOTICE 251 Export Classification EAR99 251 13. Knowledge Base Articles 252 Are MetaDefender Core v4 upgrades free? 253 Are there any dependencies that need to be fulfilled for MetaDefender Core v4 engines ? 253 Does Metadefender Core v4 offer real-time antivirus protection on the system where it is installed? 254 Does MetaDefender Core v4 Detect the NotPetya Ransomware? 254 Does the fixing updates for Meltdown and Spectre vulnerabilities affects any engines in MetaDefender Core v4? 257 External scanners in MetaDefender core v4.8.0 and above 257 How can I configure the maximum queue size in MetaDefender Core v4 ? 259 How can I find a sanitized file scanned with MetaDefender Core v4? 261 How can I increase the scaling up performance? 261 How can I upgrade from Core v4.7.0/v4.7.1 to a newer Core v4.7 release 263 How can the TEMP folder be changed? 264 How do I collect verbose debug packages on MetaDefender Core v4 for Linux? 265 How do I deploy MetaDefender Core v4 to an offline Linux environment? 267 Installing MetaDefender Core 267 Activate your license 267 Installing the MetaDefender Update Downloader utility 269 Applying offline updates 270 Contacting OPSWAT Support 271 How do I deploy MetaDefender Core v4 to an offline Windows environment? 271 Installing MetaDefender Core 272 Activate your license 272 Installing the MetaDefender Update Downloader utility 273 Applying offline updates 275 Contacting OPSWAT Support 276 How do I disable real-time protection of my anti-malware software if it is not allowed by corporate policy for use with MetaDefender Core v4? 276 How do I remove an engine from my MetaDefender v4 instance? 278 How do I use MetaDefender Core v4 Workflows ? 278 Defining and administering Workflow Templates in MetaDefender Core v4 279 Is there a virus test I could use to test MetaDefender Core v4? 280 MetaDefender Core v4 shows a large number of files that failed to scan.
Recommended publications
  • Amigan Software
    tali ► an Amiga Februar y 97 Issue No 3 Gaz te rip $3 Who said that there are no Amiga dealers left? Hardware Amiga A1200 HD, Amiga A4000 Cobra 33 68030 33, Mhz Cobra 33+ with 68882, Cobra 40 68EC030 40 Mhz, Cobra40+ with 68882, Ferret SCSI card for Cobra 1202 32 bit rami- clock, 1202+ with 16 or 33 Mhz 68882, Squirrel SCSI, Surf Squirrel SCSI plus RS@232, 2 Mb PCMCIA Ram A1200/A600, Spitfire SCSI A2000/3000/4000, Rapidfire SCSI + RAM A2000, Wildfire A2000 68060+ram+SCSI F/W+network, Megachip, 2Mb chip ram A500/A2000, Securekey Security card for A2000/3000/4000, Picasso Graphics cards, SCSI and IDE Hard drives. Accessories Green Mouse -320 DPI with pad, Hypermouse I1 400 DPI with pad, Pen mouse - super small, Joysticks, from Quickshot and Rocfire, GI 105 hand- scanner with touchup 4 and OCR Jr, Colourburst colour hand scanner with ADPRO loader & OCR Jr, Master 3A 880 K External Floppy drives, Rocgen Plus genlock, Electronic Design Genlocks and TBC, Neriki Genlocks Syquest EzDrives, External SCSI Cases with A500/A600/A1200 power lead included & CD, or hard drive option, A1200 3.5 IDE Kits, Monitor adaptors, ROM Switches, Air Freight Magazines with CD. Plus Much more Available. Software Over 70 titles in stock including games, productivity, CD rom titles, and Utilities, all at competative prices. Servicing We have a fully equiped workshop, and our techs have a total of over 50 Man years of experience as technicians in the computer industry. We do repairs and upgrades including specialist work. The Complete Amiga specialist.
    [Show full text]
  • Compress/Decompress Encrypt/Decrypt
    Windows Compress/Decompress WinZip Standard WinZip Pro Compressed Folders Zip and unzip files instantly with 64-bit, best-in-class software ENHANCED! Compress MP3 files by 15 - 20 % on average Open and extract Zipx, RAR, 7Z, LHA, BZ2, IMG, ISO and all other major compression file formats Open more files types as a Zip, including DOCX, XLSX, PPTX, XPS, ODT, ODS, ODP, ODG,WMZ, WSZ, YFS, XPI, XAP, CRX, EPUB, and C4Z Use the super picker to unzip locally or to the cloud Open CAB, Zip and Zip 2.0 Methods Convert other major compressed file formats to Zip format Apply 'Best Compression' method to maximize efficiency automatically based on file type Reduce JPEG image files by 20 - 25% with no loss of photo quality or data integrity Compress using BZip2, LZMA, PPMD and Enhanced Deflate methods Compress using Zip 2.0 compatible methods 'Auto Open' a zipped Microsoft Office file by simply double-clicking the Zip file icon Employ advanced 'Unzip and Try' functionality to review interrelated components contained within a Zip file (such as an HTML page and its associated graphics). Windows Encrypt/Decrypt WinZip Standard WinZip Pro Compressed Folders Apply encryption and conversion options, including PDF conversion, watermarking and photo resizing, before, during or after creating your zip Apply separate conversion options to individual files in your zip Take advantage of hardware support in certain Intel-based computers for even faster AES encryption Administrative lockdown of encryption methods and password policies Check 'Encrypt' to password protect your files using banking-level encryption and keep them completely secure Secure sensitive data with strong, FIPS-197 certified AES encryption (128- and 256- bit) Auto-wipe ('shred') temporarily extracted copies of encrypted files using the U.S.
    [Show full text]
  • Muuglines the Manitoba UNIX User Group Newsletter
    MUUGLines The Manitoba UNIX User Group Newsletter Volume 28 No. 10, June 2016 Editor: Bradford C. Vokey Next Meeting: June 14th, 2016, )here to Find the Meeting 7:30 pm University of Winnipeg Room 1M28 Manitoba Hall Main Topic: Gentoo Eric Raine will be presenting on the Gentoo Linux Dist. Differ- ences in installation from Ubuntu will be covered. Also covered is how to configure installation of packages and update. entoo is a free operating s!stem based on either Linux or Free#$D that can be automaticall! optimi%ed and customized for just about any applic- ation or need. RTFM: Termina Control Commands Due to a recent influx of new and novice members 'revor Cordes will be doing an R'") instead of a daemon dash this month. The topic is something ever! *+,- user should master. terminal control commands (i.e.0 ^2 and ^L3 and rudimentar! job control. These little dual ke! presses will streamline !our terminal sessions and make you more efficient. 4ou5ll wonder how you ever got b! without them6 Door %rize'#( )eetings are held in the University of Winnipeg's 'his month we will be giving )anitoba Hall (marked “M” on the map30 along awa! the O8Reill! book #almoral Street south of Ellice Avenue. We can be "Using csh & tcsh"0 found in room 1)@A0 but may occasionall! get b! Paul Du#ois. relocated to nearb! rooms. If there is a change0 it should be conve!ed via a sign on the door to 1)@A. Type Less, Accomplish More. Doors are usuall! open b! 7.CC pm with the meeting starting at 7.DC pm.
    [Show full text]
  • ACS – the Archival Cytometry Standard
    http://flowcyt.sf.net/acs/latest.pdf ACS – the Archival Cytometry Standard Archival Cytometry Standard ACS International Society for Advancement of Cytometry Candidate Recommendation DRAFT Document Status The Archival Cytometry Standard (ACS) has undergone several revisions since its initial development in June 2007. The current proposal is an ISAC Candidate Recommendation Draft. It is assumed, however not guaranteed, that significant features and design aspects will remain unchanged for the final version of the Recommendation. This specification has been formally tested to comply with the W3C XML schema version 1.0 specification but no position is taken with respect to whether a particular software implementing this specification performs according to medical or other valid regulations. The work may be used under the terms of the Creative Commons Attribution-ShareAlike 3.0 Unported license. You are free to share (copy, distribute and transmit), and adapt the work under the conditions specified at http://creativecommons.org/licenses/by-sa/3.0/legalcode. Disclaimer of Liability The International Society for Advancement of Cytometry (ISAC) disclaims liability for any injury, harm, or other damage of any nature whatsoever, to persons or property, whether direct, indirect, consequential or compensatory, directly or indirectly resulting from publication, use of, or reliance on this Specification, and users of this Specification, as a condition of use, forever release ISAC from such liability and waive all claims against ISAC that may in any manner arise out of such liability. ISAC further disclaims all warranties, whether express, implied or statutory, and makes no assurances as to the accuracy or completeness of any information published in the Specification.
    [Show full text]
  • Amigaos 3.2 FAQ 47.1 (09.04.2021) English
    $VER: AmigaOS 3.2 FAQ 47.1 (09.04.2021) English Please note: This file contains a list of frequently asked questions along with answers, sorted by topics. Before trying to contact support, please read through this FAQ to determine whether or not it answers your question(s). Whilst this FAQ is focused on AmigaOS 3.2, it contains information regarding previous AmigaOS versions. Index of topics covered in this FAQ: 1. Installation 1.1 * What are the minimum hardware requirements for AmigaOS 3.2? 1.2 * Why won't AmigaOS 3.2 boot with 512 KB of RAM? 1.3 * Ok, I get it; 512 KB is not enough anymore, but can I get my way with less than 2 MB of RAM? 1.4 * How can I verify whether I correctly installed AmigaOS 3.2? 1.5 * Do you have any tips that can help me with 3.2 using my current hardware and software combination? 1.6 * The Help subsystem fails, it seems it is not available anymore. What happened? 1.7 * What are GlowIcons? Should I choose to install them? 1.8 * How can I verify the integrity of my AmigaOS 3.2 CD-ROM? 1.9 * My Greek/Russian/Polish/Turkish fonts are not being properly displayed. How can I fix this? 1.10 * When I boot from my AmigaOS 3.2 CD-ROM, I am being welcomed to the "AmigaOS Preinstallation Environment". What does this mean? 1.11 * What is the optimal ADF images/floppy disk ordering for a full AmigaOS 3.2 installation? 1.12 * LoadModule fails for some unknown reason when trying to update my ROM modules.
    [Show full text]
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • SGML As a Framework for Digital Preservation and Access. INSTITUTION Commission on Preservation and Access, Washington, DC
    DOCUMENT RESUME ED 417 748 IR 056 976 AUTHOR Coleman, James; Willis, Don TITLE SGML as a Framework for Digital Preservation and Access. INSTITUTION Commission on Preservation and Access, Washington, DC. ISBN ISBN-1-887334-54-8 PUB DATE 1997-07-00 NOTE 55p. AVAILABLE FROM Commission on Preservation and Access, A Program of the Council on Library and Information Resources, 1400 16th Street, NW, Suite 740, Washington, DC 20036-2217 ($20). PUB TYPE Reports Evaluative (142) EDRS PRICE MF01/PC03 Plus Postage. DESCRIPTORS *Access to Information; Computer Oriented Programs; *Electronic Libraries; *Information Retrieval; Library Automation; Online Catalogs; *Preservation; Standards IDENTIFIERS Digital Technology; *SGML ABSTRACT This report explores the suitability of Standard Generalized Markup Language (SGML) as a framework for building, managing, and providing access to digital libraries, with special emphasis on preservation and access issues. SGML is an international standard (ISO 8879) designed to promote text interchange. It is used to define markup languages, which can then encode the logical structure and content of any so-defined document. The connection between SGML and the traditional concerns of preservation and access may not be immediately apparent, but the use of descriptive markup tools such as SGML is crucial to the quality and long-term accessibility of digitized materials. Beginning with a general exploration of digital formats for preservation and access, the report provides a staged technical tutorial on the features and uses of SGML. The tutorial covers SGML and related standards, SGML Document Type Definitions in current use, and related projects now under development. A tiered metadata model is described that could incorporate SGML along with other standards to facilitate discovery and retrieval of digital documents.
    [Show full text]
  • Winzip 12 Reviewer's Guide
    Introducing WinZip® 12 WinZip® is the most trusted way to work with compressed files. No other compression utility is as easy to use or offers the comprehensive and productivity-enhancing approach that has made WinZip the gold standard for file-compression tools. With the new WinZip 12, you can quickly and securely zip and unzip files to conserve storage space, speed up e-mail transmission, and reduce download times. State-of-the-art file compression, strong AES encryption, compatibility with more compression formats, and new intuitive photo compression, make WinZip 12 the complete compression and archiving solution. Building on the favorite features of a worldwide base of several million users, WinZip 12 adds new features for image compression and management, support for new compression methods, improved compression performance, support for additional archive formats, and more. Users can work smarter, faster, and safer with WinZip 12. Who will benefit from WinZip® 12? The simple answer is anyone who uses a PC. Any PC user can benefit from the compression and encryption features in WinZip to protect data, save space, and reduce the time to transfer files on the Internet. There are, however, some PC users to whom WinZip is an even more valuable and essential tool. Digital photo enthusiasts: As the average file size of their digital photos increases, people are looking for ways to preserve storage space on their PCs. They have lots of photos, so they are always seeking better ways to manage them. Sharing their photos is also important, so they strive to simplify the process and reduce the time of e-mailing large numbers of images.
    [Show full text]
  • Electronic Data Deliverables Reference Guide EPA Region 4
    Electronic Data Deliverables Reference Guide Version 1.0 EPA Region 4 Prepared By: for Region 4 Superfund Division Environmental Protection Agency March 2010 DISCLAIMER OF ENDORSEMENT Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government, and shall not be used for advertising or product endorsement purposes. STATUS OF DOCUMENT As of March 2010, this document and all contents contained herein are considered DRAFT and are subject to revision and subsequent republication. Ecological EDD specifications do not appear in this guidance as they are currently under development, and will appear in future addenda. CONTACTS For questions and comments, contact: Your RPM or, DART Coordinator Superfund Division, 11th Floor East United States Environmental Protection Agency, Region 4 Sam Nunn Atlanta Federal Center 61 Forsyth Street, SW Atlanta, GA 30303-8960 (404) 562-8558 [email protected] Acronyms CAS RN – Chemical Abstracts Service Registry Number DART – Data Archival and ReTrieval EDD – Electronic Data Deliverable EDP – EQuIS Data Processor EPA – Environmental Protection Agency O&M – Operation and Maintenance SESD – Science and Ecosystem Support Division SRS – Substance Registry System CLP – Contract Laboratory Program PRP – Potentially Responsible Party Definitions Darter - Darter is a set of software utilities written by EPA that assist in moving data from other platforms such as FORMS, Niton, YSI and Scribe to the Region 4 EDD format. Data Provider – It is important to distinguish between “Data Provider” and “Sample Provider” with regard to EDD submittals.
    [Show full text]
  • Hp Jornada 560 시리즈 개인용 정보 단말기
    hp jornada 560 시리즈 개인용 정보 단말기 FAQ 차례 동기화 및 액티브 싱크 ...................................................................................................................................................................................6 1. 액티브 싱크를 설치하였지만 파트너십이 생성되지 않습니다.........................................................................................................6 2. 데스크탑PC에 액티브 싱크가 있어야만 동기화가 가능한가요?......................................................................................................6 3. 직장과 집, 그 외 고정되지 않은 곳의 데스크탑PC와 조나다를 동기화하고 싶습니다..................................................................6 4. 시리즈가 다른 조나다를 보유하고 있습니다. 여러대의 PDA를 데스크탑PC와 동기화하려면 어떻게 해야합니까?.....................6 5. 데스크탑PC가 MAC입니다. MAC에서도 조나다를 사용할 수 있습니까?........................................................................................6 6. 데스크탑과 조나다가 연결되지 않습니다.........................................................................................................................................6 7. 파트너십을 삭제하는 방법................................................................................................................................................................7 8. 백업 프로그램 사용법.......................................................................................................................................................................7 9. 옮긴 데이터를 조나다에서 실행했지만 읽을 수가 없어요..............................................................................................................9 10. 데스크탑PC의 데이터를 조나다로 옮기는 방법?.............................................................................................................................9
    [Show full text]
  • Cumulus User Guide
    Cumulus 8.6 Client User Guide Copyright 2012, Canto GmbH. All rights reserved. Canto, the Canto logo, the Cumulus logo, and Cumulus are registered trade- marks of Canto, registered in the U.S. and other countries. Apple, Mac, Macintosh and QuickTime are registered trademarks of Apple Com- puter, Inc. , registered in the U.S. and other countries. Microsoft, Windows, Windows Vista, and Windows NT are either trademarks or registered trademarks of the Microsoft Corporation in the U.S. and other coun- tries. Other third-party product and company names mentioned in this document are trademarks or registered trademarks of their respective holders. Feedback? Tell us what you think about this manual. We welcome all of your comments and suggestions. Please e-mail comments to [email protected] or via fax at +49-30-390 48 555. CU-WC-861-MN-Z-1 3 Table of Contents Renaming Records . 27 Intro 7 Editing a Record’s Category Assignments . 28 Things You Can Do with Records . 28 Cumulus . 8 Things You Can Do with Assets . 29 This User Guide . 8 Categories . 29 Category Types. 30 Organization. 8 Creating Categories . 31 Cross-Platform Issues . 9 Custom Ordering of Categories. 32 User Interface Item Conventions. 9 Category Fields. 33 Cumulus Step by Step. 9 Category Information Window. 33 Your Experience . 9 Editing Category Information . 33 Categories and Auto-cataloging . 34 Understanding Cumulus . 10 Individual Category Tabs (optional) . 35 Assets . 10 Things You Can Do with Categories. 35 Catalogs . 10 Collections . 10 Information Window. 36 Categories . 10 • THE INFORMATION WINDOW....................................................................... 36 Records . 11 Sets and Templates .
    [Show full text]
  • Valami Commander Felhasználói És Fejlesztői Dokumentáció
    Tuska Balázs Valami Commander Felhasználói és Fejlesztői Dokumentáció Témavezető: Porkoláb Zoltán ELTE IK 2004 1 Tartalomjegyzék 1. Bevezető...............................................................................................................................4 1.1. A programról.................................................................................................................4 1.1.1. Motiváció és történet.............................................................................................5 1.1.2. Mire használható?.................................................................................................7 1.1.3. Mire nem használható?.........................................................................................7 1.2. Telepítés........................................................................................................................7 1.2.1. Követelmények és Ajánlások................................................................................7 1.2.2. A telepítés menete.................................................................................................8 2. Funkciók részletesen a felhasználók számára.......................................................................9 2.1. A fő ablak......................................................................................................................9 2.1.1. Panelek................................................................................................................10 2.1.2. A parancssor........................................................................................................11
    [Show full text]