Symbols and Numbers

Total Page:16

File Type:pdf, Size:1020Kb

Symbols and Numbers INDEX Symbols and Numbers ABM_GETTASKBARPOS message, 386 - (dashes), 78 ABN_STATECHANGE message, 386 $ (dollar sign) Access is Denied error, 1187–1188 creating shares, 150 ACPI (Advanced Configuration and Power Interface) deleting files beginning with, 741 boot failures, 1175 hiding shares, 321 disabling/enabling, 90–91, 92 $OEM$ directories, 47–48, 89–90 hibernation mode, 1102–1103 % (percent sign) plug-and-play support, 5 batch file parameters, 1085–1087 shutting down vs. restarting PCs, 1112–1113 obtaining batch file’s PID, 1083 standby mode, 1105 operations on all networked computers, ACPI BIOS detection, disabling, 943–944 1078–1079 Acronyms, definitions of, 1027–1030 %% (percent signs), 1078 ACS (Admission Control Server), QoS, 664–665 %logonserver% variable, 1084–1085 Activate icon, Windows XP,290 %SystemRoot%, 186–187 Active Desktop %userdomain% variable, 310 enabling in IE 5.0, 894 %username% variable, 310 Recovery page and, 854 * (asterisk), 92 removing, 853 . (period), 1203–1204 Active Directory / (forward slash), 1091–1092 auditing, 605–607 : (colon), 320 backups, 569–570 :: (double colon), 1075–1076 circular logging, 605 @echo off command, 153 creating new sites, 541–543 \\?\, paths, 1160 defined, 5 ^ (caret), 1083 defragmenting, 572–575 _ (underscores), 78 DNS integration, 691–692 | (pipe character), 1083 garbage-collection period, 550 >> (double right angle brackets), 1064 listing printer, enabling/disabling, 930–931, 934–935 > (right angle bracket), 1063 log files, 604 (Euro symbol), 305, 1034–1035 naming conventions, 531 0x0000001E error, 1202, 1208 nonexistent domain, removing, 592–593 0x00000054 error, 1212 object searches, 597–599 3UPTIMES.ZIP,403 overview of, 529–530 “502 Proxy Error”, 1225 published printers, preventing removal, 935 restoring, 571–572 Abbreviations, acronyms, 1027–1030 searching, 614 ABM_GETSTATE message, 386 shared folders, 616 1229 1230 INDEX Active Directory database file. See NTDS.DIT file ADMIN$ share, 125–126, 194 Active Directory Replication Monitor Administrative tools (REPLMON.EXE), 564–566 configuring on Start menu, 371–372 Active Directory Schema Manager snap-in, deleting volume, 755 1196–1197 Group Policy Editor and, 1192–1193 Active Directory Scripting Interface (ADSI), hiding on Start menu, 180–181 1090–1091 importing volume, 755–756 Active Directory sites locating Disk Administrator, 753–754 creating, 541–543 Administrator accounts intrasite replication, 551–553 network lockout of, 235 moving servers between, 547 renaming, 164 multiple server membership in, 546–547 Administrator passwords renaming, 545–546 changing in Recovery Console, 447–448 Active Directory Sites and Services snap-in, 291 changing remotely, 313 Active Directory Users and Computers snap-in recovering, 437–439 administering domain users, 324–325 setting during RIS installation, 979–980 delegating authority, 330–332 unattended installations and, 92 dial-in options, 338–339 Administrators errors, 291 .NET/XP pack selection, 1025 Everyone group permissions, 335–336 AT commands and, 145 Active Setup, IE 4.0 and, 869–870 configuring Administrative alerts, 231–232 ACTIVEDS.TLB, 291 default admin shares, 458 AD database file. See NTDS.DIT file executing batch file with WINAT,139 Adaptec 2940 SCSI controller, 1147 ownership of files and directories, 739 Add Network Place Wizard, 492–493 Administrators group Add Printer Wizard, 939–940 backup permissions, 452 Add/Remove Programs CD-ROM drive access, 145 DNS configuration for Windows 2000 domains, ownership of files and directories, 739 688–691 unattended installations, 43 entries missing from, 1166 ADMINPAK.MSI, 294–295, 1025 installing applications on Terminal Server, Admission Control Server (ACS), 664–665 819–820 ADSI (Active Directory Scripting Interface), installing DHCP Server service, 706 1090–1091 installing Remote Installation Services, 56 ADSL (Asymmetric Digital Subscriber Line), uninstalling Active Desktop, 853 1003–1004 uninstalling hidden Windows components, 283 Advanced Configuration and Power Interface. See uninstalling ISA Server 2000, 1219 ACPI (Advanced Configuration and Power uninstalling MSN Messenger Service, 893 Interface) uninstalling service packs, 256 Advanced Power Management. See APM uninstalling task switcher, 25 (Advanced Power Management) uninstalling Windows 2000 service pack, Advanced RISC Computing (ARC), 174–175 124–125 Advanced startup menu, 1179 uninstalling Windows XP,110 Alerts Address Resolution Protocol. See ARP (Address Administrative, 231–232 Resolution Protocol) interactive, 912–913 ADDUSERS.EXE, 1204 low disk space on partitions, 163–164 .ADM files, 189 triggers and, 912 INDEX 1231 Alias, 202–203 scheduling, 139, 158–159 Allow Logon to Terminal Server, 850 stalled backup process and, 454 Alt+Tab, disabling/configuring, 316 ATAPI Real Mode CD-ROM driver, 1160 ANSI ATX case, 1112–1113 command line support, 1063 Auditing exporting Registry key, 434 Active Directory, 605–607 ANSI.NT file, 1063 base objects, 961 ANSI.SYS, 138 DHCP,713 APCOMPAT.EXE, 1124–1125 files/directories, 765–766, 956 APIPA (Automatic Private IP Addressing), 662, logon success/failure and, 327 720 printers, 917, 922 APIs, monitoring, 407–408 saving information from, 955 APM (Advanced Power Management) AUTOCHK.EXE, 1144 hibernation mode, 1102–1103 AutoComplete, Internet Explorer standby mode, 1105 backing up, 892 standby option on portables, 1188 turning off, 868–869 Application Compatibility program, 1125 AUTOEXEC.BAT file, 49, 141 Applications AUTOEXEC.NT file, 1121 16-bit errors, 905, 1121, 1153 AutoExNT service, 155–156 configuring for both NT and 95, 1031 AUTOEXNT utility, 155–156 Not Supported by Windows NT error, AUTOLOG.EXE, 182–183 1134–1135 AutoLogons, 182–183, 293 NT,1122 Automatic Private IP Addressing (APIPA), 662, priority, 905 720 starting every time Windows is started, AUTORUN.INF, 947 1128–1129 AUX.BAT files, 1127 stopping when user logs off, 1133–1134 viewing all on system, 399 Background, changing default, 141 APPS.INF file, 53–55 Backup Domain Controller. See BDC (Backup ARC (Advanced RISC Computing), 174–175 Domain Controller) ARIN Web site, 661 Backup Operators group ARP (Address Resolution Protocol) inability to backup Event Viewer files, 456 cache retention time and, 647–648 permissions, 452 disabling, 679 BackupRead( ) function, 747–748 overview of, 645–647 Backups. See also NT Backup routing and, 644–645 Active Directory, 569–570 ASCII text files, 919 DHCP database, 711–712 Assisted dial, RAS, 1001 EFS recovery key, 774 ASSOC.TXT command, 1068 master boot record, 734–736 Asterisk (*), 92 permissions for, 452 .ASX files, 945–946 strategy for, 449–450 Asymmetric Digital Subscriber Line (ADSL), XP Pro v. XP Home Edition, 14 1003–1004 Balloon tips, disabling, 345–346 AT command BASICDC.INF files, 1182 non-administrator use of, 145 .BAT files not working, 1127–1128, 1168 defined, 1073 NT 4.0 vs. NT 3.51, 1068–1069 fixing files that have lost their associations, 1080 1232 INDEX Batch files, 1073–1086 boot delays, 137–138 accessing on other machines, 1084 boot disks for MS-DOS network, 498–499 automating input, 1082–1083 boot disks for RIS, 60–61 calling from within another batch file, 1081 boot disks for XP,110 checking for and running files, 1082 boot partition access, 1136 color of command prompt window and, CD-ROM as boot device, 67–70 1082–1083 CHKDSK, stopping scheduled, 732 commands, 1073–1074 commands, running at boot time, 155–156 comments, 1075–1076 DNS service and, 703 converting Unicode file to text, 1081 duplicate entries on boot menu, 179 editors, 169, 1067–1068 error messages, 191–192 environment settings, 1079 inability to boot NT after uninstalling 98, 1164 /every switch and, 1150 multiple operating systems and, 790, 1119–1120 fonts installed from, 1032–1033 NTOSKRNL.EXE file, missing, 440 operating networked machines with, 1078–1079 overview of, 2–3 output to screen, stopping, 1081 remote booting, 459 parameters, 1085–1087 service stops booting, 1153–1154 PID of, 1083 verbose event messages and, 266–267 program output to NULL device, 1084 Windows 2000 boot drive, modifying, 281–282 Scheduler and, 1075 Windows 2000/Linux from NTLoader, 99–101 scheduling, 139, 158–159 BOOTCFG, 22–23, 138 searching for, 1079–1080 BOOTFIX.BIN files, 70 sending message from, 1084 BOOT.INI file subroutines, 1076–1077 alternate shell boot option, 286 using &logonserver% variable after logon, boot delay, decreasing, 137–138 1084–1085 boot menu, duplicate entries, 179 writing, 1073 boot menu, showing DOS, Windows 95, and BDC (Backup Domain Controller) NT,146 moving, 592 boot menu, timeout values, 151 promoting, 516 boot process and, 2–3 synchronizing, 524–525 Bootcfg and, 22–23 Beep, disabling, 256–257 corrupt memory, deallocating, 1152 Binary numbers, converting, 1039–1040 dual-boot environments, 87–88 BIOS, 949 finding, 1202–1203 Block Inheritance option, 633–634 forcing use of first processor only, 1114 Blue Screen of Death. See BSOD (Blue Screen of Intel address extensions, 1113 Death) kernel debut and, 1137–1139 BlueSave, 1158 long path names, 174–175 Boot menu mouse connection on COM port, disabling, 1098 changing timeout, 151 Msconfig and, 274–275 DOS, Windows 95 and NT,146 NTOSKRNL.EXE file, 440 duplicate entries, 179 switches, 165–169 Windows 98 and NT installation and, 44–45 Windows operating systems and, 39–40, 44–45, Boot process. See also Rebooting 219, 1164 alternate shell, starting with, 286 BOOTPART.ZIP,146 blue screen pauses, 1144 BOOTSECT.DOS file, 2–3 boot defragment in XP,792–793 BOWSER.LOG file, 487–488 INDEX 1233 Bridgehead servers, 557–558 CD AutoPlay, 941 Broadcast
Recommended publications
  • Planning for Internet Explorer and the IEAK
    02_Inst.fm Page 15 Monday, October 16, 2000 9:40 AM TWO 2Chapter 2 Planning for Internet Explorer and the IEAK LChapter Syllabus In this chapter, we will look at material covered in the Planning section of Microsoft’s Implementing MCSE 2.1 Addressing Technical Needs, Rules, and Policies and Supporting Microsoft Internet Explorer 5 by using the Internet Explorer Administration Kit exam MCSE 2.2 Planning for Custom (70-080). After reading this chapter, you should be Installations and Settings able to: MCSE 2.3 Providing Multiple • Identify and evaluate the technical needs of business Language Support units, such as Internet Service Providers (ISPs), con- tent providers, and corporate administrators. MCSE 2.4 Providing Multiple Platform Support • Design solutions based on organizational rules and policies for ISPs, content providers, and corporate MCSE 2.5 Developing Security Strategies administrators. • Evaluate which components to include in a custom- MCSE 2.6 Configuring for Offline ized Internet Explorer installation package for a given Viewing deployment scenario. MCSE 2.7 Replacing Other Browsers • Develop appropriate security strategies for using Internet Explorer at various sites, including public MCSE 2.8 Developing CMAK kiosks, general business sites, single-task-based sites, Strategies and intranet-only sites. 15 02_Inst.fm Page 16 Monday, October 16, 2000 9:40 AM 16 Chapter 2 • Planning for Internet Explorer and the IEAK • Configure offline viewing for various types of users, including gen- eral business users, single-task users, and mobile users. • Develop strategies for replacing other Internet browsers, such as Netscape Navigator and previous versions of Internet Explorer. • Decide which custom settings to configure for Microsoft Outlook Express for a given scenario.
    [Show full text]
  • Guideline Formats and Architectures
    23.09.2021 17:00:47 Guideline Formats and Architectures Format selection Based on sources provided for package creation following procedures are available: • Transformation of existing vendor MSI. • Creation of MSI by repackaging legacy installer or from the scratch. • Usage of legacy setup. • Package Virtualization (App-V/ThinApp/MSIX) General packaging best practices are given below. An original vendor MSI may not be changed. Adjustments must always be made by MST. The original MSI Databases should Vendor MSI not be modified. In exceptional cases if transform creation is not possible or fixing of vendor MSI is not possible in acceptable timeframe, the setup capture may be performed. Vendor If vendor specific customization tool (e.g. Adobe InstallTuner, Microsoft Office Customization Tool) is available for original customization tool package, it should be used. More than one If original application contains more than one vendor MSI from different vendors, the packaging task should be divided for vendor MSI from separate tasks for each vendor MSI. different vendors Advantages and Disadvantages Application Virtualization Virtualizing applications (e.g. in App-V/MSIX) can offer customers advantages, but also disadvantages: Advantages Applications are installed and uninstalled correctly There are no conflicts between applications Multiple versions of the same application can be installed in parallel Advantages when rolling out applications Applications can be assigned per user (e.g. for VDI or Citrix) Disadvantages Virtualized versions of
    [Show full text]
  • [ EVEREST Ultimate Edition ]
    [ EVEREST Ultimate Edition ] ---------------------------------------- Versi EVEREST v4.50.1330/id Modul Pengukuran 2.3.224.0 Home page http://www.lavalys.com/ Tipe Laporan Bimbingan laporan Komputer TANSISCOTBK09K Generator Nain Sistem Operasi Microsoft Windows XP Profe ssional 5.1.2600 (WinXP Retail) Tanggal 20110510 Jam 06:23 [ Ringkasan ] ---------------------------------------- Komputer: Tipe Komputer ACPI Multiprocessor PC Sistem Operasi Microsoft Windows XP Pro fessional Paket Layanan OS Service Pack 3 Internet Explorer 6.0.2900.5512 DirectX 4.09.00.0904 (DirectX 9. 0c) Nama Komputer TANSISCOTBK09K Nama Pengguna Nain Domain Masuk TANSISCOTBK09K Tanggal / Jam 20110510 / 06:23 Motherboard: Tipe CPU Intel Pentium 4, 3000 MH z (15 x 200) Nama Motherboard Dell OptiPlex GX270 Chipset Motherboard Intel SpringdaleG i865G Memori Sistem 512 MB (DDR SDRAM) DIMM2: Infineon HYS64D32000GU7 256 MB PC2100 DDR SDRAM (2.5337 @ 142 MHz) (2.0336 @ 133 MHz) DIMM3: Hynix HYMD216 646D6JD43 128 MB PC3200 DDR SDRAM (3.0338 @ 200 MHz) (2.5337 @ 166 MHz) (2.0226 @ 133 MHz) DIMM4: Hynix HYMD216 646D6JD43 128 MB PC3200 DDR SDRAM (3.0338 @ 200 MHz) (2.5337 @ 166 MHz) (2.0226 @ 133 MHz) Tipe BIOS Phoenix (05/17/04) Port Komunikasi Communications Port (COM 1) Port Komunikasi ECP Printer Port (LPT1) Layar: Adapter Video RADEON 9600 Series Secon dary (256 MB) Adapter Video RADEON 9600 Series (256 MB) Akselerator 3D ATI Radeon 9600 (RV350) Monitor NEC V520 [15" CRT] (2Y 00657TB) Multimedia: Adapter Suara Analog Devices AD1981B(L ) @ Intel 82801EB ICH5 AC'97 Audio Controller [A2/A3] Adapter Suara BrookTree Bt878 Video Ca pture Device Audio Section Penyimpanan: Kontroler IDE Intel(R) 82801EB Ultra A TA Storage Controllers Kontroler IDE Intel(R) 82801EB Ultra A TA Storage Controllers Kontroler Penyimpanan A2222176 IDE Controller Drive Disk JetFlash Transcend 8GB U SB Device (7 GB, USB) Drive Disk Kingston DataTraveler 2.
    [Show full text]
  • Kony Pre-Install Guide (On-Premise Only)
    Kony Management Pre-installation Guide - Linux On-Premises Release V8 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version stated on the Revision History page. Remember to always view and download the latest document version relevant to the software release you are using. © 2017 by Kony, Inc. All rights reserved 1 of 123 Kony Management Linux Pre-install Guide Version 1.0 Copyright © 2017 Kony, Inc. All rights reserved. November, 2017 This document contains information proprietary to Kony, Inc., is bound by the Kony license agreements, and may not be used except in the context of understanding the use and methods of Kony, Inc., software without prior, express, written permission. Kony, Empowering Everywhere, Kony Fabric, Kony Nitro, and Kony Visualizer are trademarks of Kony, Inc. MobileFabric is a registered trademark of Kony, Inc. Microsoft, the Microsoft logo, Internet Explorer, Windows, and Windows Vista are registered trademarks of Microsoft Corporation. Apple, the Apple logo, iTunes, iPhone, iPad, OS X, Objective-C, Safari, Apple Pay, Apple Watch, and Xcode are trademarks or registered trademarks of Apple, Inc. Google, the Google logo, Android, and the Android logo are registered trademarks of Google, Inc. Chrome is a trademark of Google, Inc. BlackBerry, PlayBook, Research in Motion, and RIM are registered trademarks of BlackBerry. SAP® and SAP® Business Suite® are registered trademarks of SAP SE in Germany and in several other countries. All other terms, trademarks, or service marks mentioned in this document have been capitalized and are to be considered the property of their respective owners.
    [Show full text]
  • MICROSOFT WINDOWS Early Versions Main Articles: Windows 1.0
    MICROSOFT WINDOWS Early versions Main articles: Windows 1.0, Windows 2.0, and Windows 2.1x Windows 1.0, the first version, released in 1985 The history of Windows dates back to September 1981, when Chase Bishop, a computer scientist, designed the first model of an electronic device and project "Interface Manager" was started. It was announced in November 1983 (after the Apple Lisa, but before the Macintosh) under the name "Windows", but Windows 1.0 was not released until November 1985.[5] Windows 1.0 achieved little popularity and was to compete with Apple's own operating system. Windows 1.0 is not a complete operating system; rather, it extends MS-DOS. The shell of Windows 1.0 is a program known as the MS- DOS Executive. Components included Calculator, Calendar, Cardfile, Clipboard viewer, Clock, Control Panel, Notepad, Paint, Reversi, Terminal and Write. Windows 1.0 does not allow overlapping windows. Instead all windows are tiled. Only modal dialog boxes may appear over other windows. Windows 2.0 was released in December 1987 and was more popular than its predecessor. It features several improvements to the user interface and memory management.[citation needed] Windows 2.03 changed the OS from tiled windows to overlapping windows. The result of this change led to Apple Computer filing a suit against Microsoft alleging infringement on Apple's copyrights.[6][7] Windows 2.0 also introduced more sophisticated keyboard shortcuts and could make use of expanded memory. Windows 2.1 was released in two different versions: Windows/286 and Windows/386. Windows/386 uses the virtual 8086 mode of Intel 80386 to multitask several DOS programs and the paged memory model to emulate expanded memory using available extended memory.
    [Show full text]
  • Vista General
    SVRRETIRO.ELRETIROCC.LOCAL Remote Computer Audit :: 19/02/2015 10:04:10 Vista General Item Value Computer Name SVRRETIRO Domain Name ELRETIROCC Site Name Default-First-Site-Name Roles Workstation, Server, SQL Server, Primary Domain Controller Description Operating System Microsoft Windows 2008 R2 Server Standard (full installation) 64-bit Manufacturer HP Model ProLiant ML350 G6 Serial Number MXQ2170303 Asset Tag Number Of Processors 1 Processor Description Intel(R) Xeon(R) CPU E5645 @ 2.40GHz Total Memory 6144MB Total Hard Drive 2379GB Display 1600 x 900 pixels, 65536 colours BIOS Version HP - 2 User Account administrador System Uptime 14 Days, 19 Hours, 26 Minutes Local Time 2015-02-19 10:03:48 19/02/2015 10:05:41 1/110 SVRRETIRO.ELRETIROCC.LOCAL Top Software instalado Active Setup Name Version Installed .NET Framework 2,0,50727,0 .NET Framework 2,0,50727,1 .NET Framework 2,0,50727,1 .NET Framework 2,0,50727,1 .NET Framework 2,0,50727,1 .NET Framework 4,0,30319,0 .NET Framework 4,0,30319,0 19/02/2015 10:05:41 2/110 SVRRETIRO.ELRETIROCC.LOCAL Active Directory Service Interface 5,0,00,0 Yes Address Book 7 6,1,7601,17514 Yes Applying Enhanced Security Configuration 8,0,7100,0 Yes Applying Enhanced Security Configuration 8,0,7100,0 Yes Browsing Enhancements 11,0,9600,17501 Yes DirectDrawEx 4,71,1113,0 Yes Dynamic HTML Data Binding 11,0,9600,17501 Yes Google Chrome 24,0,0,0 Yes HTML Help 6,3,9600,17501 Yes Internet Explorer Core Fonts 11,0,9600,0 Yes Internet Explorer Help 11,0,9600,17501 Yes Internet Explorer Setup Tools 11,0,9600,17501
    [Show full text]
  • Characteristics and Detectability of Windows Auto-Start Extensibility Points in Memory Forensics
    Characteristics and Detectability of Windows Auto-Start Extensibility Points in Memory Forensics Daniel Uroz, Ricardo J. Rodríguez∗ Centro Universitario de la Defensa, Academia General Militar, Zaragoza, Spain Abstract Computer forensics is performed during a security incident response process on disk devices or on the memory of the compromised system. The latter case, known as memory forensics, consists in dumping the memory to a file and analyzing it with the appropriate tools. Many security incidents are caused by malware that targets and persists as long as possible in a Windows system within an organization. The persistence is achieved using Auto-Start Extensibility Points (ASEPs), the subset of OS and application extensibility points that allow a program to auto-start without any explicit user invocation. In this paper, we propose a taxonomy of the Windows ASEPs, considering the features that are used or abused by malware to achieve persistence. This taxonomy splits into four categories: system persistence mechanisms, program loader abuse, application abuse, and system behavior abuse. We detail the characteristics of each extensibility point (namely, write permissions, execution privileges, detectability in memory forensics, freshness of system requirements, and execution and configuration scopes). Many of these ASEPs rely on the Windows Registry. We also introduce the tool Winesap, a Volatility plugin that analyzes the registry-based Windows ASEPs in a memory dump. Furthermore, we state the order of execution of some of these registry-based extensibility points and evaluate the effectiveness of our tool in memory dumps taken from a Windows OS where extensibility points were used. Winesap was successful in marking all the registry-based Windows ASEPs as suspicious registry keys.
    [Show full text]
  • The Definitive Guide to Windows Installer Technology for System
    The Definitive Guidetmtm To Windows Installer Technology for System Administrators Darwin Sanoy and Jeremy Moskowitz Introduction Introduction to Realtimepublishers by Sean Daily, Series Editor The book you are about to enjoy represents an entirely new modality of publishing and a major first in the industry. The founding concept behind Realtimepublishers.com is the idea of providing readers with high-quality books about today’s most critical technology topics—at no cost to the reader. Although this feat may sound difficult to achieve, it is made possible through the vision and generosity of a corporate sponsor who agrees to bear the book’s production expenses and host the book on its Web site for the benefit of its Web site visitors. It should be pointed out that the free nature of these publications does not in any way diminish their quality. Without reservation, I can tell you that the book that you’re now reading is the equivalent of any similar printed book you might find at your local bookstore—with the notable exception that it won’t cost you $30 to $80. The Realtimepublishers publishing model also provides other significant benefits. For example, the electronic nature of this book makes activities such as chapter updates and additions or the release of a new edition possible in a far shorter timeframe than is the case with conventional printed books. Because we publish our titles in “real-time”—that is, as chapters are written or revised by the author—you benefit from receiving the information immediately rather than having to wait months or years to receive a complete product.
    [Show full text]
  • Acti Streaming SDK C Library
    Server Application ACTi NVR v2.0 Quick Installation Guide ACTi APP-2000 This document is copyrighted, 2003 - 2007 by ACTi Corporation. All rights are reserved. ACTi Corporation reserves the right to make improvements to the products described in this manual at any time without notice. No part of this manual may be reproduced, copied, translated or transmitted in any form or by any means without the prior written permission of the original manufacturer. Information provided in this manual is intended to be accurate and reliable. However, the original manufacturer assumes no responsibility for its use, or for any infringements upon the rights of third parties that may result from its use. All other product names or trademarks are properties of their respective owners. V2.0 Edition Mar, 2007 i Table of Contents 1. ADMINISTRATOR’S CHECK LIST 5 Administrator’s Check List ............................................................................................5 Operator Check List .....................................................................................................7 System Requirements ..................................................................................................8 Supported Operating System and Browser 8 Recommended PC Specification – 16 channels 9 Recommended PC Specification – 32 channels 9 Recommended PC Specification – 48 channels 9 Recommended PC Specification – 64 channels 9 Database 10 2. INSTALLATING THE SOFTWARE 11 NVR Server vs. NVR Workstation vs. Web Client ......................................................11 Install NVR Server......................................................................................................12 Step 1: Backup Database 13 1. Click on Step 1: Backup Database Link 13 2. Use Backup Database to backup database 14 Step 2. Install NVR Main Program 15 1. Click on Step 2: Install NVR Main Program link 15 2. Install Pre-requisite for ACTi NVR Server 16 3. Install Database Engine 18 4. Install NVR Main Program 18 6.
    [Show full text]
  • Introduction to Vmware Thinapp Vmware Thinapp 4.0 Introduction to Vmware Thinapp
    Introduction to VMware ThinApp VMware ThinApp 4.0 Introduction to VMware ThinApp Introduction to VMware ThinApp Revision: 20080627 Item: EN-000063-00 You can find the most up-to-date technical documentation on our Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product updates. If you have comments about this documentation, submit your feedback to: [email protected] © 2008 VMware, Inc. All rights reserved. Protected by one or more U.S. Patent Nos. 6,397,242, 6,496,847, 6,704,925, 6,711,672, 6,725,289, 6,735,601, 6,785,886, 6,789,156, 6,795,966, 6,880,022, 6,944,699, 6,961,806, 6,961,941, 7,069,413, 7,082,598, 7,089,377, 7,111,086, 7,111,145, 7,117,481, 7,149,843, 7,155,558, 7,222,221, 7,260,815, 7,260,820, 7,269,683, 7,275,136, 7,277,998, 7,277,999, 7,278,030, 7,281,102, 7,290,253, and 7,356,679; patents pending. VMware, the VMware “boxes” logo and design, Virtual SMP and VMotion are registered trademarks or trademarks of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com 2 VMware, Inc. Contents Introduction to VMware ThinApp 5 How ThinApp Works 5 Features of Thinapp 8 User Mode Operation 8 Virtual Side‐By‐Side (SxS) Support 8 Application Isolation 9 Multiple Simultaneous Client Application Versions 9 Instant Portable Deployment of Applications on USB Flash or CD‐ROM) 9 ThinApp Applications Are Loaded as Normal Applications
    [Show full text]
  • Regrun? Regrun Is an Excellent Tool Kit for Protecting Your Computer Against Viruses Or Trojans/Spyware/ Adware Parasites Or Rootkits
    What is RegRun? RegRun is an excellent tool kit for protecting your computer against viruses or Trojans/Spyware/ Adware parasites or Rootkits. The RegRun uses the newest technology in the world. Fight with the bad guys by the most powerful weapon. What you should know about RegRun? RegRun is not an antivirus in a common sense. It does not scan your disk and detect/cure using signature database. There are a lot of antiviral programs that you can choose. RegRun checks all Windows startup holes and it can detect and remove any UNKNOWN virus. The modern viruses spreads to the millions computers in the world for a pair days. First, a virus kills an antivirus and disables a way to update the antiviral databases. RegRun prevents a virus auto start. Later you can clean your computer by antivirus to remove virus according files and registry records. RegRun resolves three main tasks: 1. Makes backups of the registry and important files. Restores a computer even if it does not boot. 2. Detects a virus in your computer. 3. Removes a virus from your computer. Hope you enjoy it! Who needs RegRun? If you are a user who is exposed to sources of viruses and Trojans (e.g. you are an Internet surfer, E-mail recipient, one who buys "safe" software on CD's, or one who receives data on floppy disks), or if you are an experienced user who needs to adjust your startup configuration as a function of testing and debugging new software, you need RegRun. RegRun is the best choice for users who wants to get maximum security, for power users and computer professionals.
    [Show full text]
  • Access Denied: Error Message - Windows Update
    Access Denied: Error Message - Windows Update Network policy settings prevent you from using Windows Update to download and install updates on your computer. If you believe you have received this message in error, please check with your system administrator. For Windows XP Pro: Start/Run/gpedit.msc. User Configuration/Administrative Templates/Windows Components/Windows Update. In the right pane, double click, Remove access to all Windows Update Features and set it to disabled. For Windows XP Home Edition: Start/Run/Regedit HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\WindowsUpda te Locate the value in the right pane called DisableWindowsUpdateAccess. Double click this entry and change the value to 0 (zero) or right click it and select Delete. If editing the Registry manually isn't to your liking click here for a small Visual Basic Script that will make the change for you. More information here: Why can't I download updates? WINUP-Err Msg: "Cannot Display Page" Accessibility Options Restore Accessibility Options to Default Settings (Line 135) http://www.kellys-korner-xp.com/xp_tweaks.htm Acdsee Acdsee.exe May Cause an Error Message Activation - Troubleshooting Blank Activate Windows Page in the WPA Wizard Service Pack 1 Changes to Product Activation Windows XP Prompts You to Re-activate After You Restore Your Computer Activation - Explained: Windows XP will typically remind you to activate the product (most users will have 30 days to activate XP after installation). To activate XP manually, you can use the Start menu shortcut in the System Tools Accessories folder. At the command prompt, type: oobe/msoobe /a or Start/All Programs/Accessories/System Tools/Activate Windows.
    [Show full text]