How to Cheat at Windows System Administration Using Command Line Scripts (2006).Pdf

Total Page:16

File Type:pdf, Size:1020Kb

How to Cheat at Windows System Administration Using Command Line Scripts (2006).Pdf 405_Script_FM.qxd 9/5/06 11:37 AM Page i How to Cheat at Windows System Administration Using Command Line Scripts Pawan K. Bhardwaj 405_Script_FM.qxd 9/5/06 11:37 AM Page ii Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc- tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. KEY SERIAL NUMBER 001 HJIRTCV764 002 PO9873D5FG 003 829KM8NJH2 004 94287PLK49 005 CVPLQ6WQ23 006 VBP965T5T5 007 HJJJ863WD3E 008 2987GVTWMK 009 629MP5SDJT 010 IMWQ295T6T PUBLISHED BY Syngress Publishing, Inc. 800 Hingham Street Rockland, MA 02370 How to Cheat at Windows System Administration Using Command Line Scripts Copyright © 2006 by Syngress Publishing, Inc.All rights reserved. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the pub- lisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication. 1 2 3 4 5 6 7 8 9 0 ISBN: 1-59749-105-5 Publisher:Andrew Williams Page Layout and Art: Patricia Lupien Acquisitions Editor: Gary Byrne Copy Editor:Audrey Doyle Technical Editor: Kimon Andreou Indexer: Odessa&Cie Cover Designer: Michael Kavish Distributed by O’Reilly Media, Inc. in the United States and Canada. For information on rights, translations, and bulk sales, contact Matt Pedersen, Director of Sales and Rights, at Syngress Publishing; email [email protected] or fax to 781-681-3585. 405_Script_FM.qxd 9/5/06 11:37 AM Page iii Lead Author Pawan K. Bhardwaj (MCSE, MCT, Security+, Network+, I-Net+ and A+) is an independent technical trainer and author. He has been actively involved in Windows administration ever since Windows NT 3.51 was released. In the past 16 years he has worked at various system and network support levels for small and medium-sized companies. Some of his major projects included working for one of India’s largest newspaper groups and a large e-commerce organiza- tion in the United States where he had an active involvement in design and implementation of large-scale LAN and WAN solutions based on Windows technologies. Pawan was one of the first 100 in India to attain MCSE certifi- cation back in 1997. He teaches Windows administration and net- working classes and also acts as a consultant to training institutions. He has authored or contributed to more than 12 certification books by Syngress/McGraw Hill. He also coauthored MCSE 2003 Electives Exams in a Nutshell (O’Reilly Media, Inc., 2006). This book is dedicated to the loving memory of my father, Sudershan Bhardwaj, and my father-in-law, Ghanshyam Pandit, both of whom passed away during the writing of this book. —Pawan K. Bhardwaj Technical Editor and Reviewer Kimon Andreou is IT Portfolio Manager at Royal Caribbean International in Miami, FL. His expertise is in software develop- ment, software quality assurance, data warehousing, and data security. Kimon’s experience includes positions as CTO for Secure Discovery Solutions, an e-Discovery company; Manager of Support & QA at S-doc, a software security company; and as Chief Solution Architect iii 405_Script_FM.qxd 9/5/06 11:37 AM Page iv for SPSS in the Enabling Technology Division. He also has led pro- jects in Asia, Europe, North America, and South America. Kimon holds a Bachelor of Science in Business Administration from the American College of Greece and a Master of Science in Management Information Systems from Florida International University. Kimon wrote Chapter 12. Contributing Authors Brian Barber (MCSE, MCP+I, MCNE, CNE-5, CNE-4, CNA-3, CNA-GW) is coauthor of Syngress Publishing’s Configuring Exchange 2000 Server (ISBN: 1-928994-25-3), Configuring and Troubleshooting Windows XP Professional (ISBN: 1-928994-80-6), and two study guides for the MSCE on Windows Server 2003 track (exams 70-296 [ISBN: 1-932266-57-7] and 70-297 [ISBN: 1-932266-54-2]). He is a Senior Technology Consultant with Sierra Systems Consultants Inc. in Ottawa, Canada. He specializes in IT service management and tech- nical and infrastructure architecture, focusing on systems management, multiplatform integration, directory services, and messaging. In the past he has held the positions of Senior Technical Analyst at MetLife Canada and Senior Technical Coordinator at the LGS Group Inc. (now a part of IBM Global Services). Brian wrote Chapter 11. Dave Kleiman (CAS, CCE, CIFI, CISM, CISSP,ISSAP,ISSMP, MCSE) has worked in the Information Technology Security sector since 1990. Currently, he is the owner of SecurityBreach Response.com.A former Florida Certified Law Enforcement Officer, he specializes in litigation support, computer forensic inves- iv 405_Script_FM.qxd 9/5/06 11:37 AM Page v tigations, incident response, and intrusion analysis. He has developed a Windows Operating System lockdown tool, S-Lok (www.s- doc.com/products/slok.asp), which surpasses NSA, NIST, and Microsoft Common Criteria Guidelines. Dave was a contributing author for Microsoft Log Parser Toolkit (Syngress Publishing, ISBN: 1-932266-52-6) and Security Log Management: Identifying Patterns in the Chaos (Syngress Publishing, ISBN: 1-59749-042-3). He was also technical editor for Perfect Passwords: Selection, Protection,Authentication (Syngress Publishing, ISBN: 1-59749-041-5) and Winternals Defragmentation, Recovery, and Administration Field Guide (Syngress Publishing, ISBN: 1597490792). He is frequently a speaker at many national security conferences and is a regular contributor to security-related newsletters, Web sites, and Internet forums. Dave is a member of many professional security organizations, including the International Association of Counter Terrorism and Security Professionals (IACSP), International Society of Forensic Computer Examiners® (ISFCE), Information Systems Audit and Control Association® (ISACA), High Technology Crime Investigation Association (HTCIA),Association of Certified Fraud Examiners (ACFE),Anti Terrorism Accreditation Board (ATAB), and ASIS International®. He is also the Sector Chief for Information Technology at the FBI’s InfraGard® and Director of Education at the International Information Systems Forensics Association (IISFA). Dave cowrote Chapter 13. Mahesh Satyanarayana is a final-semester electronics and commu- nications engineering student at the Visveswaraiah Technological University in Shimoga, India. He expects to graduate this summer and has currently accepted an offer to work for Caritor Inc., an SEI-CMM Level 5 global consulting and systems integration com- pany, headquartered in San Ramon, CA. Caritor provides IT infras- tructure and business solutions to clients in several sectors v 405_Script_FM.qxd 9/5/06 11:37 AM Page vi worldwide. Mahesh will be joining the Architecture and Design domain at Caritor’s development center in Bangalore, India, where he will develop software systems for mobile devices. His areas of expertise include Windows security and related Microsoft program- ming technologies. He is also currently working toward adminis- trator-level certification on the Red Hat Linux platform. Mahesh wrote Appendix A. Companion Web Site Some examples of syntax or code for the command utilities discussed in this book are available for download from www. syngress.com/solutions. Look for the Syngress icon in the margins indicating which examples are available from the companion Web site. vi 405_Script_TOC.qxd 9/5/06 1:48 PM Page vii Contents Introduction . xv Part I Getting Started with Command Line. 1 Chapter 1 Basics of the Command Line . 3 Introduction . .4 Basics of the Windows Command Shell . .4 The MS-DOS Command Shell . .5 Starting the Windows Command Shell . .5 Customizing the Command Shell Startup . .6 Customizing the Command Shell Window . .9 Internal Commands for the Command Shell . .13 Getting Help for Commands . .17 Command History . .17 Displaying Previous Commands with Arrow Keys . .18 Viewing the Command History in a Pop-Up Window . .18 Using Function Keys . .18 Accessing the Windows Command Reference . .19 Installing Windows Support Tools . .20 Summary . .23 Chapter 2 Using Batch Files . 25 Introduction . .26 Working Safely with the Command Line . .26 Configuring the Command Path . .28 Using the Path Command . .29 Using the Set and Setx Commands . .30 Changing Environment Variables in System Properties . .31 Using Command Redirection . .33 Command Redirection Operators . .33 Input Redirection . .34 Output Redirection . .34 Redirecting Output to Other Commands . .35 Error Handling with Redirection Operators . .36 Using Groups of Commands . .37 Using & for Sequential Processing . .37 Using && and || for Conditional Processing . .37 Grouping Sets of Commands with Parentheses . .38 Creating Batch Files . .38 Batch File Commands . .39 Batch File Parameters . .53 Summary . .55 vii 405_Script_TOC.qxd 9/5/06 1:48 PM Page viii viii Contents Chapter 3 Managing Scheduled Tasks.
Recommended publications
  • F.A.Q. Series ROM-DOS TM
    21520 30th Drive SE #110 Bothell, WA 98021 USA Tel: (425) 951-8086 Fax: (425) 951-8095 [email protected] [email protected] www.datalight.com TM ROM-DOS F.A.Q. Series Question: Assuming they don't want FAT32, Long Filename support, or Sockets, why should my customer upgrade to the newest ROM-DOS? Answer: Since our first FAT32 and LFN release 4.00.1091, there have been several improvements to the core ROM- DOS kernel. This core code is used primarily for our DOS 6.22 compatible compilations, and then extended in the case of a FAT32 or Long Filename build. The 4.00.1091 release is also a new code base and there will be no further upgrades to the previous DOS 6.22 code. In order to obtain new features, fixes, and support a customer must upgrade to release 4.00.1091 or greater. Along with the performance enhancements for both size and speed, several corrections have been made to the ROM-DOS kernel. These include stack and memory issues, disk access issues, and compatibility with the former market leader in DOS. Most of the ROM-DOS utilities have also been improved for size and speed, along with bug fixes. The major changes happened with the XCOPY, HIMEM, MSCDEX, CHKDSK, FDISK and FORMAT utilities. In the realm of international support, the Euro was added to the keyboard and display driver code. ROM- DOS and PC-DOS 2000 are the only non-GUI operating systems to support the Euro. Finally, new ROM-DOS utilities have been added.
    [Show full text]
  • How to Cheat at Windows System Administration Using Command Line Scripts
    www.dbebooks.com - Free Books & magazines 405_Script_FM.qxd 9/5/06 11:37 AM Page i How to Cheat at Windows System Administration Using Command Line Scripts Pawan K. Bhardwaj 405_Script_FM.qxd 9/5/06 11:37 AM Page ii Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc- tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies.
    [Show full text]
  • Thank You for Purchasing the Elder Scrolls: Arena. Dedicated Rpgers
    The Elder Scrolls ARENA hank you for purchasing The Elder Scrolls: Arena. Dedicated RPGers have invested an incredible amount of effort into creating this detailed simulation. If you enjoy the game, please pass the word! There is no better advertising than a satisfied customer. TYou can also purchase the second chapter of The Elder Scrolls, entitled Daggerfall, in Fall 1996. TES: Daggerfall will feature the same open-endedness and breadth as Arena, but will feature increased NPC (Non-Player-Character) interaction, a faster, more sophisticated 3-D engine, and a more extensive storyline. With all the planned enhancements, Daggerfall will give you even more of an opportunity to role-play your character as you choose. We are very excited about Daggerfall and what it will mean to the role-playing community. On our part, we promise to keep bringing you the best in computer simulation software and welcome any suggestions you may have for how we can serve you better. Journey well, and peace be with you. —The Bethesda Team Installing the Game Place the CD into your computer’s CD-ROM drive. Type the drive letter followed by a colon (Ex: D: for most CD-ROM drives) and hit <ENTER>. Next type INSTALL and hit <ENTER>. If you are installing Arena from floppy disks, select ‘Install Game’ and follow the prompts. Because you are installing from the CDROM, 5 megabytes of data will be copied to your hard drive when you select ‘Exit’. The next step is to configure your game (see below). Configuring Arena to your System To configure any Sound FX and Music drivers once Arena has successfully installed (if you wish to play the game with sound and/or music), choose the ‘Configure Game’ option.
    [Show full text]
  • Port Replicator*
    ® Personal Computer Reference Manual Model No. CF-07 Series Contents LED Indicators ................................................... 2 98 2000 Standby/Hibernation Functions ....................... 3 Security Measures............................................. 8 Computing on the Road................................. 14 Battery Power ................................................. 15 CD-ROM Drive* ............................................... 19 PC Cards ......................................................... 21 Port Replicator* .............................................. 23 Printer* ............................................................ 24 External Display * ........................................... 25 USB Devices ................................................... 26 LAN * ................................................................ 27 Setup Utility* ................................................... 29 Technical Information .................................... 35 DMI Viewer ...................................................... 36 In this manual, the term “external display” indi- cates a “wired” display with an RGB analog 15- List of Error Codes* ....................................... 37 pin interface. Dealing with Problems (Advanced) ...................... 39 * Only when the port replicator is connected Illustrations in this Reference Manual NOTE: NOTE provides a useful fact or helpful information CAUTION: CAUTION indicates a condition that may result in minor or moderate injury. WARNING: WARNING indicates
    [Show full text]
  • [D:]Path[...] Data Files
    Command Syntax Comments APPEND APPEND ; Displays or sets the search path for APPEND [d:]path[;][d:]path[...] data files. DOS will search the specified APPEND [/X:on|off][/path:on|off] [/E] path(s) if the file is not found in the current path. ASSIGN ASSIGN x=y [...] /sta Redirects disk drive requests to a different drive. ATTRIB ATTRIB [d:][path]filename [/S] Sets or displays the read-only, archive, ATTRIB [+R|-R] [+A|-A] [+S|-S] [+H|-H] [d:][path]filename [/S] system, and hidden attributes of a file or directory. BACKUP BACKUP d:[path][filename] d:[/S][/M][/A][/F:(size)] [/P][/D:date] [/T:time] Makes a backup copy of one or more [/L:[path]filename] files. (In DOS Version 6, this program is stored on the DOS supplemental disk.) BREAK BREAK =on|off Used from the DOS prompt or in a batch file or in the CONFIG.SYS file to set (or display) whether or not DOS should check for a Ctrl + Break key combination. BUFFERS BUFFERS=(number),(read-ahead number) Used in the CONFIG.SYS file to set the number of disk buffers (number) that will be available for use during data input. Also used to set a value for the number of sectors to be read in advance (read-ahead) during data input operations. CALL CALL [d:][path]batchfilename [options] Calls another batch file and then returns to current batch file to continue. CHCP CHCP (codepage) Displays the current code page or changes the code page that DOS will use. CHDIR CHDIR (CD) [d:]path Displays working (current) directory CHDIR (CD)[..] and/or changes to a different directory.
    [Show full text]
  • What Is Active Directory
    What is Active Directory Originally created in the year 1996, Active Directory, also referred as an AD, was first used with Windows 2000 Server as a directory service for Windows domain networks. Active Directory is a special purpose database, which serves as a central location for authenticating and authorizing all the users and computers within a network. Active Directory uses the Lightweight Directory Access Protocol (LDAP), an application protocol used for accessing and maintaining directory information services distributed over an IP network. What is Active Directory? The basic internal structure of the Active Directory consists of a hierarchical arrangement of Objects which can be categorized broadly into resources and security principles. Some of the examples of Active Directory objects are users, computers, groups, sites, services, printers, etc. Every Object is considered as a single entity with some specific set of attributes. The attributes of Objects along with the kind of objects that can be stored in the AD are defined by a Schema. The intrinsic framework of Active Directory is divided into a number of levels on the basis of visibility of objects. An AD network can be organized in four types of container structure namely, Forest, Domains, Organizational Units and Sites. y Forests: It is a collection of AD objects, their attributes and set of attribute syntax. y Domain: Domain is a collection of computers objects in the AD which share a common set of policies, a name and a database of their members. y Organizational Units: OUs are containers in which domains are grouped. They are used to create a hierarchy for the domain to resemble the structure of the Active Directory's company in organizational terms.
    [Show full text]
  • Cygwin User's Guide
    Cygwin User’s Guide i Cygwin User’s Guide Cygwin User’s Guide ii Copyright © 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012 Red Hat, Inc. Permission is granted to make and distribute verbatim copies of this documentation provided the copyright notice and this per- mission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this documentation under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this documentation into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the Free Software Foundation. Cygwin User’s Guide iii Contents 1 Cygwin Overview 1 1.1 What is it? . .1 1.2 Quick Start Guide for those more experienced with Windows . .1 1.3 Quick Start Guide for those more experienced with UNIX . .1 1.4 Are the Cygwin tools free software? . .2 1.5 A brief history of the Cygwin project . .2 1.6 Highlights of Cygwin Functionality . .3 1.6.1 Introduction . .3 1.6.2 Permissions and Security . .3 1.6.3 File Access . .3 1.6.4 Text Mode vs. Binary Mode . .4 1.6.5 ANSI C Library . .5 1.6.6 Process Creation . .5 1.6.6.1 Problems with process creation . .5 1.6.7 Signals . .6 1.6.8 Sockets . .6 1.6.9 Select .
    [Show full text]
  • Netiq Securelogin Installation Guide 9 Installing, Configuring, and Deploying Desktop Automation Services 67 9.1 Installing Desktop Automation Services
    Installation Guide SecureLogin 8.0 October, 2013 www.netiq.com/documentation Legal Notice NetIQ Product Name is protected by United States Patent No(s): nnnnnnnn, nnnnnnnn, nnnnnnnn. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation.
    [Show full text]
  • Windows Tool Reference
    AppendixChapter A1 Windows Tool Reference Windows Management Tools This appendix lists sets of Windows management, maintenance, configuration, and monitor- ing tools that you may not be familiar with. Some are not automatically installed by Windows Setup but instead are hidden away in obscure folders on your Windows Setup DVD or CD- ROM. Others must be downloaded or purchased from Microsoft. They can be a great help in using, updating, and managing Windows. We’ll discuss the following tool kits: ■ Standard Tools—Our pick of handy programs installed by Windows Setup that we think are unappreciated and not well-enough known. ■ Support Tools—A set of useful command-line and GUI programs that can be installed from your Windows Setup DVD or CD-ROM. ■ Value-Added Tools—Several more sets of utilities hidden away on the Windows Setup CD-ROM. ■ Windows Ultimate Extras and PowerToys for XP—Accessories that can be downloaded for free from microsoft.com. The PowerToys include TweakUI, a program that lets you make adjustments to more Windows settings than you knew existed. ■ Resource Kits—A set of books published by Microsoft for some versions of Windows that includes a CD-ROM containing hundreds of utility programs. What you may not have known is that in some cases you can download the Resource Kit program toolkits with- out purchasing the books. ■ Subsystem for UNIX-Based Applications (SUA)—A package of network services and command-line tools that provide a nearly complete UNIX environment. It can be installed only on Windows Vista Ultimate and Enterprise, and Windows Server 2003.
    [Show full text]
  • Netwrix Active Directory Change Reporter Version 6 Freeware and Standard Editions Quick Start Guide
    NetWrix Active Directory Change Reporter Version 6 Freeware and Standard Editions Quick Start Guide _______________________ NetWrix Active Directory Change Reporter User Guide Contents 1. INTRODUCTION ........................................................................................................................................................ 3 1.1 KEY FEATURES .................................................................................................................................................................... 3 1.2 LICENSING .......................................................................................................................................................................... 4 1.3 HOW IT WORKS .................................................................................................................................................................. 5 2. GETTING STARTED .................................................................................................................................................... 7 2.1 SYSTEM REQUIREMENTS ....................................................................................................................................................... 7 2.2 CONFIGURING ACTIVE DIRECTORY CHANGES AUDITING USING AUDIT CONFIGURATION WIZARD ........................................................ 9 2.3 INSTALLATION ..................................................................................................................................................................
    [Show full text]
  • Cd-Rom Drive Owner's Manual
    CD-ROM DRIVE OWNER'S MANUAL MODEL : CRD-8320B To enjoy fully all the features and functions of your CD-ROM Drive, Please read this Owner's Manual carefully and completely. CAUTION: The laser used in the CD-ROM drive can damage your eyes. Do not attempt to open the cover. To reduce the risk of electric shock, do not remove cover (or back). No user-serviceable parts inside. Refer servicing to qualified service personnel. This unit uses CD-ROM discs marked with this symbol: Use of controls or performance of procedures other than those specified herein may result in hazardous radiation exposure. PRODUCT COMPLIES WITH DHHS RULES 21 C.F.R. SUB-CHAPTER J, IN EFFECT AT THE DATE OF MANUFACTURE. WARNING: To reduce the risk of fire or electric shock, do not expose this appliance to rain or moisture. CSA Notice This class B digital apparatus meets all requirements of the Canadian Interference-Causing Equipment Regulations. Cet appareil numerique de la classe B respecte toutes les exigences du Reglement sur le materiel brouilleur du Canada. FCC COMPLIANCE STATEMENT Note : This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.
    [Show full text]
  • Rsview SE V4.0 CPR7+ Distributed System Design Considerations (Rev
    RSView SE V4.0 CPR7+ Distributed System Design Considerations (Rev. 4, Sep. 2007) This page left intentionally blank. RSView SE V4.0 (CPR7+) Distributed System Design Considerations Rev. 4, September, 2007, page 2 of 46 Table of Contents Introduction............................................................................................................................................................7 Prerequisite reading before application development........................................................................................7 Revision History ....................................................................................................................................................7 RSView SE Component Terminology...................................................................................................................8 FactoryTalk Directory™....................................................................................................................................8 RSView Studio ..................................................................................................................................................8 RSView SE Server.............................................................................................................................................8 Data Server.........................................................................................................................................................8 RSView SE Client..............................................................................................................................................8
    [Show full text]