Disabling Netbios Over TCP

Total Page:16

File Type:pdf, Size:1020Kb

Disabling Netbios Over TCP Disabling NetBIOS over TCP/IP - cannot browse network : netbios, over,... http://www.experts-exchange.com/Networking/Misc/Q_21306199.html Hello QuickQuote_IT My Account Open Questions (0) Logout Enter Your Search Terms Home Networking Misc Networking Disabling NetBIOS over TCP/IP - cannot browse network My Profile: Edit | View ZONE Misc Networking Networking Knowledgebase Skin: Premium | Expert Open Questions (0) 02/08/05 06:19 AM, ID: 21306199 Question History (2) Save Monitor Print Email Share Status: VIP All Access Title: Disabling NetBIOS over TCP/IP - cannot browse network 7.6 Question: What's the deal with this? We have a TCP/IP network. DNS Servers. We used to have WINS servers, but I removed them. My client is Windows XP Professional. If I Disable NetBIOS over TCP/IP on the WINS tab, I can no longer browse the network. I thought this would work through DNS. Can someone explain please? Quickly Reference Your Favorite Zones Tags: netbios, over, browse, network, cannot Zones: Miscellaneous Networking, Dynamic Host Configuration Protocol (DHCP), Domain Name Service (DNS) Week Month Year Overall Author: robrandon, Limited Member 1. giltjr 106,746 Posted: 02/08/05 06:19 AM Member Profile 0 Expert Points Yesterday 2. Rick_O_… 86,997 3. The--Ca… 54,675 4. RobWill 52,532 5. johnb6767 44,980 02/08/05 06:24 AM, ID: 13254202 6. bbao 39,706 7. SteveJ 38,832 7. dariusg 38,832 stevenlewis: Was this comment helpful? 9. donjohnston 32,554 If you disable NetBIOS over TCP/IP, you cannot use broadcast-based NetBIOS name resolution to 10. ikalmar 29,947 resolve computer names to IP addresses for computers on a network segment, also known as a subnet. 11. aleghart 29,732 Common home network configurations place all of the computers on the same subnet. If NetBIOS over 12. thinkpads… 27,472 TCP/IP is disabled, you must install a DNS server and either have your computers register with DNS (or 13. that1guy15 27,111 manually configure DNS records) or configure entries in the local Hosts file for each computer. 14. Chris-Dent 26,882 http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/sag_tcpip_pro_use Rank: Sage 15. nappy_d 25,500 winsconfig.mspx 16. dpk_wal 25,475 17. Qlemo 23,064 18. naykam 22,392 02/08/05 06:25 AM, ID: 13254212 19. Vito_Corl… 21,300 20. digitap 21,116 21. GuruChiu 19,864 ssammons: Was this comment helpful? 22. MikeKane 19,600 23. leew 19,506 Check your DNS server. See if it has entries for the computers on your network. If you are in a domain 24. uetian1707 19,400 setting then each system will need to join the domain. Also check the server for referrence to the WINS 25. jakob_di 19,380 servers. If they still exist the netwokr might still be looking for them, but now they are gone. Check the event logs for errors on the servers. You are likely to find out that your systems are still looking for WINS. If not, try disbaling and enabling the network connection to restore settings. 02/08/05 06:25 AM, ID: 13254217 stevenlewis: Was this comment helpful? http://windows.about.com/gi/dynamic/offsite.htm?site=http://support.microsoft.com/support/kb/art icles/Q299/9/77.ASP 1 of 4 6/9/2010 4:02 PM Disabling NetBIOS over TCP/IP - cannot browse network : netbios, over,... http://www.experts-exchange.com/Networking/Misc/Q_21306199.html Rank: Sage 02/08/05 06:34 AM, ID: 13254315 robrandon: Was this comment helpful? This is a Windows 2000 domain network. We have AD integrated DNS, on 2 servers. All clients computers register with them. The zone is setup to not look at Wins. There are no errors in my event log, or the DNS event logs on both of the DNS servers. I can resolve names fine. What I can't do is browse, meaning, if I open My Network Places, Entire Network, Microsoft Windows Network, DomainName, nothing shows up. If I enable the NetBIOS, the window populates. Now shouldn't I be able to do that with NetBIOS disabled? 02/08/05 06:42 AM, ID: 13254414 ssammons: Was this comment helpful? Yes, it should work...try removing and re-adding tcp/ip service. If that doesn't do it try this: http://support.microsoft.com/kb/811259 or a pre-made tool: http://www.spychecker.com/program/winsockxpfix.html If that does not work...then I am stumped. 02/08/05 06:46 AM, ID: 13254462 stevenlewis: Was this comment helpful? How To Configure TCP/IP Networking While NetBIOS Is Disabled in Windows 2000 Server Article ID : 299977 Last Review : July 1, 2004 Revision : 2.1 This article was previously published under Q299977 IN THIS TASK Rank: Sage • SUMMARY• Installation • Troubleshooting• Computers Running Windows 2000 • Computers Operating as WINS Clients • Down-Level Clients, Services and Programs SUMMARY This step-by-step article describes how to configure a Windows 2000 server with TCP/IP networking while NetBIOS is disabled. Windows 2000 provides for the ability to disable NetBIOS over TCP/IP (NetBT) for selected clients on an "as needed" basis. If you would prefer to only use DNS to provide name registration and resolution on a specified computer that is used in a specialized or secured role for your network, you can select to disable NetBT services for one or all of the network adapters that are installed on that computer. back to the top Installation To disable WINS/NetBT name resolution: 1. Click Start, point to Settings, and then click Network and Dial-up Connections. 2. Click the local area connection that you want to be statically configured, and then click Properties on the File menu. 3. Click Internet Protocol(TCP/IP), click Properties, click Advanced, and then click the WINS tab. 4. Click Disable NetBIOS over TCP/IP. 5. Click OK, click OK, and then click OK. NOTE: Optionally, you can select the Use NetBIOS setting from the DHCP server if you are using a DHCP server that can selectively enable and disable NetBIOS configurations through DHCP option types. NetBIOS over TCP/IP can also be disabled for computers that are running Windows 2000 by using DHCP option types that are supported by the Windows 2000 DHCP Server service. back to the top Troubleshooting Computers Running Windows 2000 • The computer no longer listens for traffic to the NetBIOS datagram service at User Datagram Protocol (UDP) port 138, the NetBIOS name service at UDP port 137, or the NetBIOS session service at Transmission Control Protocol (TCP) port 139. • If the computer needs to participate in WINS as a client, it must be physically multihomed (that is, it must have other physical network connections active and available for its use) for it to continue communicating with and using a WINS server. back to the top Computers Operating as WINS Clients • The computer can no longer function as a WINS server to service WINS clients over the connection unless NetBT is re-enabled. • For those adapters to use WINS, you must either manually configure a list of WINS servers on the NetBT-enabled connections or provide such a list to these connections from a DHCP server. NOTE: WINS servers that are configured in TCP/IP properties for the disabled network adapter do not 2 of 4 6/9/2010 4:02 PM Disabling NetBIOS over TCP/IP - cannot browse network : netbios, over,... http://www.experts-exchange.com/Networking/Misc/Q_21306199.html apply for other installed network adapters. back to the top Down-Level Clients, Services and Programs • NetBIOS defines a software interface and a naming convention, not a protocol. NetBIOS over TCP/IP provides the NetBIOS programming interface over the TCP/IP protocol, extending the reach of NetBIOS client and server programs to the WAN, and providing interoperability with various other operating systems. • The Workstation service, Server service, Browser, Messenger, and Net Logon services are all direct NetBT clients. They use TDI (Transport Driver Interface) to communicate with NetBT. Microsoft Windows NT and Windows 2000 also include a NetBIOS emulator. The emulator takes standard NetBIOS requests from NetBIOS programs and translates them to equivalent TDI primitives. • Windows 2000 uses NetBIOS over TCP/IP to communicate with prior versions of Windows NT and other clients, such as Microsoft Windows 95. Careful testing should be done before disabling NetBIOS over TCP/IP in any production environment. Programs and services that depend on NetBIOS no longer function after you disable NetBT services, so it is important that you verify that your clients and programs no longer need NetBIOS support before you disable it. NOTE: Computers that are running an operating system prior to Windows 2000 will be unable to browse, locate, or create file and print share connections to a Windows 2000 computer with NetBIOS disabled. back to the top -------------------------------------------------------------------------------- APPLIES TO • Microsoft Windows 2000 Server • Microsoft Windows 2000 Advanced Server Top of Page Keywords: kbhowtomaster kbnetwork KB299977 Top of Page 02/08/05 06:48 AM, ID: 13254490 lrmoore: Was this solution helpful? Browsing network neighborhood is still a NetBIOS function. Always has been, probably always will be. WINS dependency has been replaced by Dynamic DNS. Windows XP only chages the order of name resolution to prefer DNS over WINS. You don't need WINS, but you do still need NetBios as long as you want to use Network Neighborhood functions. Everything else will work without NetBIOS enabled. http://support.microsoft.com/default.aspx?scid=kb%3ben-us%3b134304 Rank: Genius http://support.microsoft.com/default.aspx?scid=kb;en-us;188305 Thank you for your feedback.
Recommended publications
  • Mac Keyboard Shortcuts Cut, Copy, Paste, and Other Common Shortcuts
    Mac keyboard shortcuts By pressing a combination of keys, you can do things that normally need a mouse, trackpad, or other input device. To use a keyboard shortcut, hold down one or more modifier keys while pressing the last key of the shortcut. For example, to use the shortcut Command-C (copy), hold down Command, press C, then release both keys. Mac menus and keyboards often use symbols for certain keys, including the modifier keys: Command ⌘ Option ⌥ Caps Lock ⇪ Shift ⇧ Control ⌃ Fn If you're using a keyboard made for Windows PCs, use the Alt key instead of Option, and the Windows logo key instead of Command. Some Mac keyboards and shortcuts use special keys in the top row, which include icons for volume, display brightness, and other functions. Press the icon key to perform that function, or combine it with the Fn key to use it as an F1, F2, F3, or other standard function key. To learn more shortcuts, check the menus of the app you're using. Every app can have its own shortcuts, and shortcuts that work in one app may not work in another. Cut, copy, paste, and other common shortcuts Shortcut Description Command-X Cut: Remove the selected item and copy it to the Clipboard. Command-C Copy the selected item to the Clipboard. This also works for files in the Finder. Command-V Paste the contents of the Clipboard into the current document or app. This also works for files in the Finder. Command-Z Undo the previous command. You can then press Command-Shift-Z to Redo, reversing the undo command.
    [Show full text]
  • This Document Explains How to Copy Ondemand5 Data to Your Hard Drive
    Copying Your Repair DVD Data To Your Hard Drive Introduction This document explains how to copy OnDemand5 Repair data to your hard drive, and how to configure your OnDemand software appropriately. The document is intended for your network professional as a practical guide for implementing Mitchell1’s quarterly updates. The document provides two methods; one using the Xcopy command in a DOS window, and the other using standard Windows Copy and Paste functionality. Preparing your System You will need 8 Gigabytes of free space per DVD to be copied onto a hard drive. Be sure you have the necessary space before beginning this procedure. Turn off screen savers, power down options or any other program that may interfere with this process. IMPORTANT NOTICE – USE AT YOUR OWN RISK: This information is provided as a courtesy to assist those who desire to copy their DVD disks to their hard drive. Minimal technical assistance is available for this procedure. It is not recommended due to the high probability of failure due to DVD drive/disk read problems, over heating, hard drive write errors and memory overrun issues. This procedure is very detailed and should only be performed by users who are very familiar with Windows and/or DOS commands. Novice computers users should not attempt this procedure. Copying Repair data from a DVD is a time-consuming process. Depending on the speed of your processor and/or network, could easily require two or more hours per disk. For this reason, we recommend that you perform the actual copying of data during non-business evening or weekend hours.
    [Show full text]
  • OSI Model and Network Protocols
    CHAPTER4 FOUR OSI Model and Network Protocols Objectives 1.1 Explain the function of common networking protocols . TCP . FTP . UDP . TCP/IP suite . DHCP . TFTP . DNS . HTTP(S) . ARP . SIP (VoIP) . RTP (VoIP) . SSH . POP3 . NTP . IMAP4 . Telnet . SMTP . SNMP2/3 . ICMP . IGMP . TLS 134 Chapter 4: OSI Model and Network Protocols 4.1 Explain the function of each layer of the OSI model . Layer 1 – physical . Layer 2 – data link . Layer 3 – network . Layer 4 – transport . Layer 5 – session . Layer 6 – presentation . Layer 7 – application What You Need To Know . Identify the seven layers of the OSI model. Identify the function of each layer of the OSI model. Identify the layer at which networking devices function. Identify the function of various networking protocols. Introduction One of the most important networking concepts to understand is the Open Systems Interconnect (OSI) reference model. This conceptual model, created by the International Organization for Standardization (ISO) in 1978 and revised in 1984, describes a network architecture that allows data to be passed between computer systems. This chapter looks at the OSI model and describes how it relates to real-world networking. It also examines how common network devices relate to the OSI model. Even though the OSI model is conceptual, an appreciation of its purpose and function can help you better understand how protocol suites and network architectures work in practical applications. The OSI Seven-Layer Model As shown in Figure 4.1, the OSI reference model is built, bottom to top, in the following order: physical, data link, network, transport, session, presentation, and application.
    [Show full text]
  • (PI-Net): Facial Image Obfuscation with Manipulable Semantics
    Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics Jia-Wei Chen1,3 Li-Ju Chen3 Chia-Mu Yu2 Chun-Shien Lu1,3 1Institute of Information Science, Academia Sinica 2National Yang Ming Chiao Tung University 3Research Center for Information Technology Innovation, Academia Sinica Abstract Deepfakes [45], if used to replace sensitive semantics, can also mitigate privacy risks for identity disclosure [3, 15]. With the growing use of camera devices, the industry However, all of the above methods share a common has many image datasets that provide more opportunities weakness of syntactic anonymity, or say, lack of formal for collaboration between the machine learning commu- privacy guarantee. Recent studies report that obfuscated nity and industry. However, the sensitive information in faces can be re-identified through machine learning tech- the datasets discourages data owners from releasing these niques [33, 19, 35]. Even worse, the above methods are datasets. Despite recent research devoted to removing sen- not guaranteed to reach the analytical conclusions consis- sitive information from images, they provide neither mean- tent with the one derived from original images, after manip- ingful privacy-utility trade-off nor provable privacy guar- ulating semantics. To overcome the above two weaknesses, antees. In this study, with the consideration of the percep- one might resort to differential privacy (DP) [9], a rigorous tual similarity, we propose perceptual indistinguishability privacy notion with utility preservation. In particular, DP- (PI) as a formal privacy notion particularly for images. We GANs [1, 6, 23, 46] shows a promising solution for both also propose PI-Net, a privacy-preserving mechanism that the provable privacy and perceptual similarity of synthetic achieves image obfuscation with PI guarantee.
    [Show full text]
  • Powerview Command Reference
    PowerView Command Reference TRACE32 Online Help TRACE32 Directory TRACE32 Index TRACE32 Documents ...................................................................................................................... PowerView User Interface ............................................................................................................ PowerView Command Reference .............................................................................................1 History ...................................................................................................................................... 12 ABORT ...................................................................................................................................... 13 ABORT Abort driver program 13 AREA ........................................................................................................................................ 14 AREA Message windows 14 AREA.CLEAR Clear area 15 AREA.CLOSE Close output file 15 AREA.Create Create or modify message area 16 AREA.Delete Delete message area 17 AREA.List Display a detailed list off all message areas 18 AREA.OPEN Open output file 20 AREA.PIPE Redirect area to stdout 21 AREA.RESet Reset areas 21 AREA.SAVE Save AREA window contents to file 21 AREA.Select Select area 22 AREA.STDERR Redirect area to stderr 23 AREA.STDOUT Redirect area to stdout 23 AREA.view Display message area in AREA window 24 AutoSTOre ..............................................................................................................................
    [Show full text]
  • January 2019 Edition
    Tunkhannock Area High School Tunkhannock, Pennsylvania The Prowler January 2019 Volume XIV, Issue XLVII Local Subst itute Teacher in Trouble Former TAHS substitute teacher, Zachary Migliori, faces multiple charges. By MADISON NESTOR Former substitute teacher Wyoming County Chief out, that she did not report it originally set for December at Tunkhannock Area High Detective David Ide, started to anyone. 18 was moved to March 18. School, Zachary Migliori, on October 11 when the When Detective Ide asked If he is convicted, he will was charged with three felony parents of a 15-year old Migliori if he knew that one face community service, and counts of distributing obscene student found pornographic of the girls he sent explicit mandatory counseling. material, three misdemeanor images and sexual texts messages to was a 15-year- Tunkhannock Area High counts of open lewdness, and on their daughter’s phone. old, he explained that he School took action right away three misdemeanor counts of The parent then contacted thought she was 18-years-old to ensure students’ safety, unlawful contact with minors. Detective Ide, who found because she hung out with and offers counseling to any This comes after the results after investigating that the many seniors. After being students who need it. of an investigation suspecting substitute teacher was using informed of one victim being Sources:WNEP, lewd contact with students a Snapchat account with the 15-years-old, Migliori said he WCExaminer, CitizensVoice proved to be true. According name ‘Zach Miggs.’ was disgusted with himself. to court documents, Migliori Two 17-year old females Judge Plummer set used Facebook Messenger also came forward, one of Migliori’s bail at $50,000.
    [Show full text]
  • S.Ha.R.K. Installation Howto Tools Knoppix Live CD Linux Fdisk HD
    S.Ha.R.K. Installation Tools HowTo • Linux fdisk utility • A copy of Linux installation CD • A copy of Windows® installation CD Tullio Facchinetti University of Pavia - Italy • Some FreeDOS utilities • A copy of S.Ha.R.K. S.Ha.R.K. Workshop S.Ha.R.K. Workshop Knoppix live CD Linux fdisk Command action a toggle a bootable flag Download ISO from b edit bsd disklabel c toggle the dos compatibility flag d delete a partition http://www.knoppix.org l list known partition types m print this menu n add a new partition o create a new empty DOS partition table p print the partition table q quit without saving changes • boot from CD s create a new empty Sun disklabel t change a partition's system id • open a command shell u change display/entry units v verify the partition table • type “su” (become root ), password is empty w write table to disk and exit x extra functionality (experts only) • start fdisk (ex. fdisk /dev/hda ) Command (m for help): S.Ha.R.K. Workshop S.Ha.R.K. Workshop HD partitioning HD partitioning 1st FreeDOS FAT32 FreeDOS must be installed Primary 2nd Windows® FAT32 into the first partition of your HD or it may not boot 3rd Linux / extX Data 1 FAT32 format data partitions as ... Extended FAT32, so that you can share Data n FAT32 your data between Linux, last Linux swap swap Windows® and FreeDOS S.Ha.R.K. Workshop S.Ha.R.K. Workshop 1 HD partitioning Windows ® installation FAT32 Windows® partition type Install Windows®..
    [Show full text]
  • Importance of DNS Suffixes and Netbios
    Importance of DNS Suffixes and NetBIOS Priasoft DNS Suffixes? What are DNS Suffixes, and why are they important? DNS Suffixes are text that are appended to a host name in order to query DNS for an IP address. DNS works by use of “Domains”, equitable to namespaces and usually are a textual value that may or may not be “dotted” with other domains. “Support.microsoft.com” could be considers a domain or namespace for which there are likely many web servers that can respond to requests to that domain. There could be a server named SUPREDWA.support.microsoft.com, for example. The DNS suffix in this case is the domain “support.microsoft.com”. When an IP address is needed for a host name, DNS can only respond based on hosts that it knows about based on domains. DNS does not currently employ a “null” domain that can contain just server names. As such, if the IP address of a server named “Server1” is needed, more detail must be added to that name before querying DNS. A suffix can be appended to that name so that the DNS sever can look at the records of the domain, looking for “Server1”. A client host can be configured with multiple DNS suffixes so that there is a “best chance” of discovery for a host name. NetBIOS? NetBIOS is an older Microsoft technology from a time before popularity of DNS. WINS, for those who remember, was the Microsoft service that kept a table of names (NetBIOS names) for which IP address info could be returned.
    [Show full text]
  • NETSTAT Command
    NETSTAT Command | NETSTAT Command | Use the NETSTAT command to display network status of the local host. | | ┌┐────────────── | 55──NETSTAT─────6─┤ Option ├─┴──┬────────────────────────────────── ┬ ─ ─ ─ ────────────────────────────────────────5% | │┌┐───────────────────── │ | └─(──SELect───6─┤ Select_String ├─┴ ─ ┘ | Option: | ┌┐─COnn────── (1, 2) ──────────────── | ├──┼─────────────────────────── ┼ ─ ──────────────────────────────────────────────────────────────────────────────┤ | ├─ALL───(2)──────────────────── ┤ | ├─ALLConn─────(1, 2) ────────────── ┤ | ├─ARp ipaddress───────────── ┤ | ├─CLients─────────────────── ┤ | ├─DEvlinks────────────────── ┤ | ├─Gate───(3)─────────────────── ┤ | ├─┬─Help─ ┬─ ───────────────── ┤ | │└┘─?──── │ | ├─HOme────────────────────── ┤ | │┌┐─2ð────── │ | ├─Interval─────(1, 2) ─┼───────── ┼─ ┤ | │└┘─seconds─ │ | ├─LEVel───────────────────── ┤ | ├─POOLsize────────────────── ┤ | ├─SOCKets─────────────────── ┤ | ├─TCp serverid───(1) ─────────── ┤ | ├─TELnet───(4)───────────────── ┤ | ├─Up──────────────────────── ┤ | └┘─┤ Command ├───(5)──────────── | Command: | ├──┬─CP cp_command───(6) ─ ┬ ────────────────────────────────────────────────────────────────────────────────────────┤ | ├─DELarp ipaddress─ ┤ | ├─DRop conn_num──── ┤ | └─RESETPool──────── ┘ | Select_String: | ├─ ─┬─ipaddress────(3) ┬ ─ ───────────────────────────────────────────────────────────────────────────────────────────┤ | ├─ldev_num─────(4) ┤ | └─userid────(2) ─── ┘ | Notes: | 1 Only ALLCON, CONN and TCP are valid with INTERVAL. | 2 The userid
    [Show full text]
  • Operator's Guide
    MILITARY POWER SUPPLY Operator’s Guide Ethernet & SNMP MPS-4000-1U MPPS-4000-1U Made in USA 1.888.567.9596 (USA only) | SynQor Headquarters 155 Swanson Road, Boxborough, MA 01719-1316 USA | www.synqor.com QMS: 006-0006748 Rev. E 01\19\2021 MPS with Ethernet Interface Contents 1 Overview ............................................................................................................................................... 2 2 Initial Configuration .............................................................................................................................. 2 2.1 DHCP Server .................................................................................................................................. 2 2.2 NetBIOS Hostname ....................................................................................................................... 2 2.3 Local Connection ........................................................................................................................... 2 3 Web Interface ....................................................................................................................................... 3 3.1 MONITOR Page ............................................................................................................................. 4 3.2 CONTROL Page .............................................................................................................................. 5 3.3 NETWORK Page ............................................................................................................................
    [Show full text]
  • Creating and Formatting Partitions
    Creating and formatting partitions Home Download Docs FAQ Forum Creating and formatting partitions SUNDAY, 14 NOVEMBER 2010 12:27 JAY Creating & formatting partitions in Porteus There are two ways to do things in Porteus. Using a GUI (graphical User Interface) or from a console prompt. If you prefer using a GUI then you can download a module called 'gparted' which takes care of creating and modifying partitions. Double click the module from within Porteus to activate it or place the module in the modules folder if you want it to be available automatically when you boot Porteus. Click here to get gparted. Once activated it should appear in your menu system and you can start it and create your partitions. If it does not exist in the menu then open a console and type: gparted Creating partitions from a console: There is a built in application to modify your partition table in Porteus. It is called cfdisk and gives you a CUI (console user interface) to manage your partition through. Simply open your console and type: cfdisk Another built in function for modifying partitions is called fdisk which also uses a CUI. The benefit of fdisk is that it can be called from a script. You should know the path of your USB device before using this option which you can get from typing: fdisk -l at console. Once you know the path of your USB device you would start fdisk by typing: fdisk /dev/sdb where sdb is the path of your usb. Don't include the number on the end (for example /dev/sdb1) as you will need to modify the entire devices partition table.
    [Show full text]
  • JES3 Commands
    z/OS Version 2 Release 3 JES3 Commands IBM SA32-1008-30 Note Before using this information and the product it supports, read the information in “Notices” on page 431. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-16 © Copyright International Business Machines Corporation 1997, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures....................................................................................................... ix List of Tables........................................................................................................ xi About this document...........................................................................................xiii Who should use this document.................................................................................................................xiii Where to find more information................................................................................................................ xiii How to send your comments to IBM......................................................................xv If you have a technical problem.................................................................................................................xv Summary of changes...........................................................................................xvi
    [Show full text]