Michael Murgolo

Total Page:16

File Type:pdf, Size:1020Kb

Michael Murgolo Scripting Trouble-Free Downloads with BITS Michael Murgolo Many of us in Microsoft Consulting Services spend lots of time downloading Figure 1 BITS Features large ISO files and virtual machine images Version Description of Features from our primary file servers in Redmond, Version 2.5 Added support for certificate-based client authentication for secure HTTP and it’s so frustrating to have those down- transports and custom HTTP headers. loads fail when a wireless or remote access Included in the Windows Vista and Windows Server “Longhorn” operat- connection is dropped. And though tools ing system. A redistributable will be available for the Windows Server like Robocopy and Xcopy can be used in 2003, Windows XP, and Windows 2000 SP3 operating systems from the restartable mode, they require manual re- Microsoft Download Center. start after a machine restart. Fortunately, The version of %windir%\System32\QMgr.dll is 6.7.xxxx.xxxx. the Background Intelligent Transfer Service Version 2.0 Added support for performing concurrent foreground downloads, us- ing server message block (SMB) paths for remote names, download- (BITS), which is built into Windows XP, ing ranges of a file, changing the prefix or complete name of a remote Windows Server 2003, and Windows Vista name, and limiting client bandwidth usage. can help you easily manage file downloads. Included in Windows XP SP2 and Windows Server 2003 SP1. You can Software and update distribution products also download BITS 2.0 for Windows Server 2003, Windows XP SP1, like Systems Management Server (SMS) Windows XP, Windows 2000 SP4, and Windows 2000 SP3. To download BITS 2.0, go to the Microsoft Download Center and install KB 842773. 2003, Windows Server Update Services, and The version of %windir%\System32\QMgr.dll is 6.6.xxxx.xxxx. Windows Automatic Updates use BITS to Version 1.5 Added upload and upload-reply capability, command-line execution for transfer updates and software to computers events, explicit credentials, and support for Windows 2000. with limited end-user disruption. Included in Windows Server 2003. A redistributable is available for BITS is designed to have minimal im- Windows XP and Windows 2000 SP3 from the Microsoft Download Center. pact on resources; it transfers files using The version of %windir%\System32\QMgr.dll is 6.5.xxxx.xxxx. leftover network bandwidth. So if you’re Version 1.2 Same functionality as version 1.0. Contains internal upgrades and im- using 60 percent of your bandwidth for provements. Included in Windows XP SP1 and Windows 2000 SP3. other tasks, BITS will only use up to the The version of %windir%\System32\QMgr.dll is 6.2.xxxx.xxxx. remaining 40 percent and no more. Even Version 1.0 Initial release. Provides prioritised, throttled, and asynchronous down- better, if you get disconnected or need to loads in the background or foreground. The downloads automatically restart your machine, the file transfer does resume after computer restarts and network disconnects. not have to be restarted; when the network Included in Windows XP. connection is re-established, BITS contin- The version of %windir%\System32\QMgr.dll is 6.0.xxxx.xxxx. ues where it left off. You can download files with BITS us- ing a command-line tool called the BITS BITS and Bitsadmin Administration Utility (Bitsadmin), which is Versions Michael Murgolo is a Senior Infrastructure Consultant for found in the Windows Support Tools. With How you use Bitsadmin depends on which Microsoft Consulting Services. He is focused in the areas of Bitsadmin you can achieve “set-and-forget” version of BITS you have installed on your operating systems, deployment, network services, active directo- downloading. In this column I’ll describe operating system. Figure 1 lists BITS ver- ry, systems management, automation, and patch management. He is a subject-matter expert in the area of desktop deployment how you can use Bitsadmin with a sample sions and features as well as the location of and migration. VBScript to automate BITS jobs. the downloads. TechNet Magazine October 2006 11 fwlink/?linkid=68006. (The Windows XP SP2 Figure 2 Bitsadmin Versions Support Tools version has a known issue Version Bitsadmin Source that does not allow it to be used correctly with the Windows Script Host WshShell.Exec Version 2.0 Windows Server 2003 Service Pack 1 32-bit Support Tools go.microsoft. method to capture StdOut.) Windows com/fwlink/?linkid=68006 Vista already has bitsadmin.exe in the OS. Windows XP Service Pack 2 Support Tools go.microsoft.com/fwlink/?LinkId=68007 Due to the quirky syntax of the Bitsadmin Version 1.5 Windows Server 2003 Support Tools SetNotifyCmdLine command syntax, the Windows Server 2003 CD, Support\Tools folder location of bitsadmin.exe must not have Version 1.2 Windows XP Service Pack 1 Support Tools Windows XP Service Pack 1 CD, Support\Tools folder any spaces in its path. So for this version of the script, the bitsadmin.exe location is Version 1.0 Windows XP RTM Support Tools Windows XP RTM CD, Support\Tools folder hardcoded to %SystemRoot%\system32. You must copy it there on Windows XP or Windows Server 2003. (It’s already in this Bitsadmin is versioned based on the BITS The Create command creates the BITS location on Windows Vista.) version. Figure 2 shows the version of BITS job in a suspended state. You add files to BITSJob.vbs works in two stages. You use and the source for the corresponding ver- the job with the AddFile command. The it first to create a CMD file, then the CMD sion of Bitsadmin. SetNotifyCmdLine switch lets you define file is used to actually execute the bitsadmin If you’re going to use BITS and scripting a command to launch when the transfer is commands. The remote file or folder needs for your downloading tasks, it’s a good idea to finished. In this case it runs the Bitsadmin to be available when you run the script or have at least BITS 2.0 installed. BITS 1.5 and command to Complete the BITS jobs. (A CMD file. The advantage of this is that you later allow an action to be executed after the job must be completed after the transfer can look at the total file count in a remote transfer is complete. BITS 2.0 allows trans- is finished.) The Resume command starts fers from SMB server shares as well as HTTP the download. BITS is designed transfers, so the source file(s) for a BITS job For complete Bitsadmin command syn- to have minimal can be on a file server. BITS 2.0 also includes tax, at a command prompt you should type: a new BITS policy setting called Maximum bitsadmin /? impact on resources; Network Bandwidth, which you access in the it transfers files Computer Configuration\Administrative Sample VBScript Templates\Network\Background Intelligent I created a sample VBScript—BITS- using leftover Transfer Service node of the Group Policy Job.vbs—to avoid having to create com- network bandwidth. Object Editor. If you have Windows XP mand shell scripts manually with Bitsadmin Service Pack 2 (SP2), Windows Server 2003 commands. You can use the script with folder (shown in the CMD file) to see if SP1, or later, you have at least BITS 2.0. It Bitsadmin.exe to create BITS jobs that there are too many files for BITS to handle is also available as a download for older will download a URL file, a single UNC in one job. Due to limitations of BITS, it is service packs. shared file, or an entire Universal Naming not recommended for jobs with more than Convention (UNC) shared folder. (There 100 files. You can comment out any files you Bitsadmin Commands is no scriptable COM interface to BITS decide not to add to the job. (An optional Now let’s look at a series of Bitsadmin for use in VBScript or other languages, so switch for BITSJobs.vbs lets you execute the commands used to create a BITS job, as Bitsadmin is currently the only tool for CMD file immediately after it is created.) Use shown in Figure 3. The example assumes that scripting BITS.) bitsadmin’s /list or /info switches to check the client computer is running Windows XP To use BITSJob.vbs, first make sure your on the status of your BITS jobs. or Windows Server 2003 with BITS 1.5 or computer has BITS 2.0 or higher. Next, BITSJobs.vbs is available at microsoft.com/ higher, and that bitsadmin.exe is located in you need bitsadmin.exe. If you are using technet/technetmag/code06.aspx. I’ve included a the %SystemRoot%\system32 folder (gen- Windows XP or Windows Server 2003, small CMD file along with the download that erally C:\Windows\system32 by default on use the version from the Windows Server shows examples of the BITSJobs.vbs switch- a new Windows XP installation). 2003 SP1 Support Tools: go.microsoft.com/ es. You can also get help by executing cscript BITSJobs.vbs /? at a command prompt. Figure 3 Bitsadmin Commands For more on BITS, see Background bitsadmin /create myDownloadJob Intelligent Transfer Service in Windows bitsadmin /addfile myDownloadJob http://www.contoso.com/downloads/test.exe C:\Downloads\Test.exe bitsadmin /SetNotifyCmdLine myDownloadJob “%SystemRoot%\system32\bitsadmin.exe” “%SystemRoot%\ Server 2003 at microsoft.com/windowsserver2003/ system32\bitsadmin.exe /complete myDownloadJob “ techinfo/overview/bits.mspx. Also check out technet. bitsadmin /resume myDownloadJob microsoft.com and msdn.microsoft.com. l 12 To get your FREE copy of TechNet Magazine subscribe at: www.microsoft.com/uk/technetmagazine.
Recommended publications
  • How to Cheat at Windows System Administration Using Command Line Scripts
    www.dbebooks.com - Free Books & magazines 405_Script_FM.qxd 9/5/06 11:37 AM Page i How to Cheat at Windows System Administration Using Command Line Scripts Pawan K. Bhardwaj 405_Script_FM.qxd 9/5/06 11:37 AM Page ii Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc- tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies.
    [Show full text]
  • What Is Active Directory
    What is Active Directory Originally created in the year 1996, Active Directory, also referred as an AD, was first used with Windows 2000 Server as a directory service for Windows domain networks. Active Directory is a special purpose database, which serves as a central location for authenticating and authorizing all the users and computers within a network. Active Directory uses the Lightweight Directory Access Protocol (LDAP), an application protocol used for accessing and maintaining directory information services distributed over an IP network. What is Active Directory? The basic internal structure of the Active Directory consists of a hierarchical arrangement of Objects which can be categorized broadly into resources and security principles. Some of the examples of Active Directory objects are users, computers, groups, sites, services, printers, etc. Every Object is considered as a single entity with some specific set of attributes. The attributes of Objects along with the kind of objects that can be stored in the AD are defined by a Schema. The intrinsic framework of Active Directory is divided into a number of levels on the basis of visibility of objects. An AD network can be organized in four types of container structure namely, Forest, Domains, Organizational Units and Sites. y Forests: It is a collection of AD objects, their attributes and set of attribute syntax. y Domain: Domain is a collection of computers objects in the AD which share a common set of policies, a name and a database of their members. y Organizational Units: OUs are containers in which domains are grouped. They are used to create a hierarchy for the domain to resemble the structure of the Active Directory's company in organizational terms.
    [Show full text]
  • Cygwin User's Guide
    Cygwin User’s Guide i Cygwin User’s Guide Cygwin User’s Guide ii Copyright © 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012 Red Hat, Inc. Permission is granted to make and distribute verbatim copies of this documentation provided the copyright notice and this per- mission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this documentation under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this documentation into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the Free Software Foundation. Cygwin User’s Guide iii Contents 1 Cygwin Overview 1 1.1 What is it? . .1 1.2 Quick Start Guide for those more experienced with Windows . .1 1.3 Quick Start Guide for those more experienced with UNIX . .1 1.4 Are the Cygwin tools free software? . .2 1.5 A brief history of the Cygwin project . .2 1.6 Highlights of Cygwin Functionality . .3 1.6.1 Introduction . .3 1.6.2 Permissions and Security . .3 1.6.3 File Access . .3 1.6.4 Text Mode vs. Binary Mode . .4 1.6.5 ANSI C Library . .5 1.6.6 Process Creation . .5 1.6.6.1 Problems with process creation . .5 1.6.7 Signals . .6 1.6.8 Sockets . .6 1.6.9 Select .
    [Show full text]
  • Netiq Securelogin Installation Guide 9 Installing, Configuring, and Deploying Desktop Automation Services 67 9.1 Installing Desktop Automation Services
    Installation Guide SecureLogin 8.0 October, 2013 www.netiq.com/documentation Legal Notice NetIQ Product Name is protected by United States Patent No(s): nnnnnnnn, nnnnnnnn, nnnnnnnn. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation.
    [Show full text]
  • Windows Tool Reference
    AppendixChapter A1 Windows Tool Reference Windows Management Tools This appendix lists sets of Windows management, maintenance, configuration, and monitor- ing tools that you may not be familiar with. Some are not automatically installed by Windows Setup but instead are hidden away in obscure folders on your Windows Setup DVD or CD- ROM. Others must be downloaded or purchased from Microsoft. They can be a great help in using, updating, and managing Windows. We’ll discuss the following tool kits: ■ Standard Tools—Our pick of handy programs installed by Windows Setup that we think are unappreciated and not well-enough known. ■ Support Tools—A set of useful command-line and GUI programs that can be installed from your Windows Setup DVD or CD-ROM. ■ Value-Added Tools—Several more sets of utilities hidden away on the Windows Setup CD-ROM. ■ Windows Ultimate Extras and PowerToys for XP—Accessories that can be downloaded for free from microsoft.com. The PowerToys include TweakUI, a program that lets you make adjustments to more Windows settings than you knew existed. ■ Resource Kits—A set of books published by Microsoft for some versions of Windows that includes a CD-ROM containing hundreds of utility programs. What you may not have known is that in some cases you can download the Resource Kit program toolkits with- out purchasing the books. ■ Subsystem for UNIX-Based Applications (SUA)—A package of network services and command-line tools that provide a nearly complete UNIX environment. It can be installed only on Windows Vista Ultimate and Enterprise, and Windows Server 2003.
    [Show full text]
  • Netwrix Active Directory Change Reporter Version 6 Freeware and Standard Editions Quick Start Guide
    NetWrix Active Directory Change Reporter Version 6 Freeware and Standard Editions Quick Start Guide _______________________ NetWrix Active Directory Change Reporter User Guide Contents 1. INTRODUCTION ........................................................................................................................................................ 3 1.1 KEY FEATURES .................................................................................................................................................................... 3 1.2 LICENSING .......................................................................................................................................................................... 4 1.3 HOW IT WORKS .................................................................................................................................................................. 5 2. GETTING STARTED .................................................................................................................................................... 7 2.1 SYSTEM REQUIREMENTS ....................................................................................................................................................... 7 2.2 CONFIGURING ACTIVE DIRECTORY CHANGES AUDITING USING AUDIT CONFIGURATION WIZARD ........................................................ 9 2.3 INSTALLATION ..................................................................................................................................................................
    [Show full text]
  • Rsview SE V4.0 CPR7+ Distributed System Design Considerations (Rev
    RSView SE V4.0 CPR7+ Distributed System Design Considerations (Rev. 4, Sep. 2007) This page left intentionally blank. RSView SE V4.0 (CPR7+) Distributed System Design Considerations Rev. 4, September, 2007, page 2 of 46 Table of Contents Introduction............................................................................................................................................................7 Prerequisite reading before application development........................................................................................7 Revision History ....................................................................................................................................................7 RSView SE Component Terminology...................................................................................................................8 FactoryTalk Directory™....................................................................................................................................8 RSView Studio ..................................................................................................................................................8 RSView SE Server.............................................................................................................................................8 Data Server.........................................................................................................................................................8 RSView SE Client..............................................................................................................................................8
    [Show full text]
  • Carbonite Availability for Windows User's Guide Version 8.2.1, Wednesday, October 17, 2018 If You Need Technical Assistance, You Can Contact Customercare
    Notices Carbonite Availability for Windows User's Guide Version 8.2.1, Wednesday, October 17, 2018 If you need technical assistance, you can contact CustomerCare. All basic configurations outlined in the online documentation will be supported through CustomerCare. Assistance and support for advanced configurations may be referred to a Pre-Sales Systems Engineer or to Professional Services. Man pages are installed and available on Carbonite Availability and Carbonite Migrate Linux servers. These documents are bound by the same Carbonite license agreement as the software installation. This documentation is subject to the following: (1) Change without notice; (2) Furnished pursuant to a license agreement; (3) Proprietary to the respective owner; (4) Not to be copied or reproduced unless authorized pursuant to the license agreement; (5) Provided without any expressed or implied warranties, (6) Does not entitle Licensee, End User or any other party to the source code or source code documentation of anything within the documentation or otherwise provided that is proprietary to Carbonite, Inc.; and (7) All Open Source and Third-Party Components (“OSTPC”) are provided “AS IS” pursuant to that OSTPC’s license agreement and disclaimers of warranties and liability. Carbonite, Inc. and/or its affiliates and subsidiaries in the United States and/or other countries own/hold rights to certain trademarks, registered trademarks, and logos. Hyper-V and Windows are registered trademarks of Microsoft Corporation in the United States and/or other countries. Linux is a registered trademark of Linus Torvalds. vSphere is a registered trademark of VMware. All other trademarks are the property of their respective companies.
    [Show full text]
  • Windows Server 2008 Network Infrastructure, Configuring
    Microsoft TS 70-642 Network Infrastructure 2008 2013-01-02 Number : 70-642 Passing Score : 700 Time Limit : 180 min File Version : 1.1 http://www.gratisexam.com/ EXAM:70-642 TS: Windows Server 2008 Network Infrastructure, Configuring CHANGE LOG: Removed all duplicated question (even if is very similar) Added a few new questions Added many technet links and explanations PS: plz comment at ==> www.examcollection.com/70-642.html It's important to learn the question! Don’t just memorize the answers!! ;) GOOD LUCK Sections 1. Exam A 2. Exam B 3. Exam C 4. Exam D 5. Exam E 6. Exam F 7. Exam G 8. Exam H 9. Exam I 10.Exam J 11.Exam K 12.Exam L 13.Exam M 14.Exam N Exam A QUESTION 1 Your network contains 100 servers that run Windows Server 2008 R2. A server named Server1 is deployed on the network. Server1 will be used to collect events from the Security event logs of the other servers on the network. You need to define the Custom Event Delivery Optimization settings on Server1. Which tool should you use? A. Event Viewer B. Task Scheduler C. Wecutil D. Wevtutil Correct Answer: C Section: Exam A Explanation Explanation/Reference: Explanation: Wecutil.exe is a Windows Event Collector utility that enables an administrator to create and manage subscriptions to events forwarded from remote event sources that support the WS-Management protocol. QUESTION 2 Your network contains a server that runs Windows Server 2008 R2. You plan to create a custom script. You need to ensure that each time the script runs, an entry is added to the Application event log.
    [Show full text]
  • How to Run Nesstar with IIS Socket Pooling
    Unlocking | data | creating | knowledge How to run Nesstar with IIS Socket Pooling November 2006 Nesstar Socket Pooling Contents 1 Introduction ......................................................................................................... 1 1.1 What is Socket Pooling? ............................................................................. 1 1.1.1 How to confirm this is the problem ...................................................... 1 2 Solving the Problem ............................................................................................ 1 1.1 Solving the Problem for IIS 5.0.................................................................... 1 2.2 Solving the Problem for IIS 6.0.................................................................... 2 Nesstar Socket Pooling 1 Introduction The Nesstar Service will not start under Win 2K or Win 2K3 Server when IIS 5/6 (Internet Information Server) is running. This is because of IIS Socket Pooling. The instructions below explain how to change IIS setting to enable the Nesstar Service to run. 1.1 What is Socket Pooling? Socket pooling is non-blocking socket usage, introduced in IIS 5.0 where more than one application can use any given socket. When IIS 5.0 and 6.0 start on 2000 or 2003 server, IIS binds to all IP addresses on the server and not just the IP addresses that are assigned to web sites. The HTTP service, for example, listens to port 80 on all unassigned IP addresses even if you specify a particular IP address for the default virtual server. The same is true for the FTP and SMTP services on port 21 and 25 respectively. 1.1.1 How to confirm this is the problem To check if IIS socket pooling is the cause of the problem: 1. Open a ‘Command Prompt’ by clicking Start > Run, and typing ‘cmd’. 2. Type “netstat –na” in the command prompt window.
    [Show full text]
  • Lab Setup Guide
    CS490 Windows Internals Software Setup for Labs & Exercises CS490 Windows Internals Lab Setup Guide The tools referenced in the labs are from the following sources: Windows Support Tools Windows Resource Kit Tools Windows Debugging Tools Kernrate (only needed for Unit 3) Freeware tools from www.sysinternals.com For a general description of these tool sources and their use for exploring Windows OS internals, see Windows Internals, 5th edition pp. 24-31. HARDWARE REQUIREMENTS: Any supported Windows 2000, Windows XP, or Windows Server 2003 system Disk space: at least 1GB free after installation ACCOUNT REQUIREMENTS: Some of the labs require local administrator rights: specifically, any lab using Windbg for performing local kernel debugging as well as labs using Filemon and Regmon from Sysinternals.com. INSTALLATION STEPS: 1. Install Windows Support Tools To install: run \support\tools\setup.exe from the Windows CD (make sure to install the Support Tools that matches the OS you are running on, e.g. XP Support Tools for XP, etc) 2. Install Windows Server 2003 Resource Kit Tools http://www.microsoft.com/downloads/details.aspx?FamilyID=9d467a69-57ff-4ae7-96ee- b18c4790cffd&DisplayLang=en © 2005-2010 David A. Solomon, Mark Russinovich and Kenny Zhu 1 CS490 Windows Internals Software Setup for Labs & Exercises 3. Install Debugging Tools for Windows http://www.microsoft.com/whdc/ddk/debugging You may need to install Microsoft .NET framework version 4.0 from http://www.microsoft.com/downloads/en/details.aspx?FamilyID=9cfb2d51-5ff4-4491-b0e5- b386f32c0992&displaylang=en before installing the debugging tools. Configure symbols (required for kernel debugging) as explained on the “Getting Started” page, available from the above web page.
    [Show full text]
  • Implementation Guide of R7.1.X
    This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the “Documentation”), is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation is proprietary information of CA and may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. If you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE.
    [Show full text]