Access 2003 Macro Security Levels, Sandbox Mode, and Digitally Signed Files

Total Page:16

File Type:pdf, Size:1020Kb

Access 2003 Macro Security Levels, Sandbox Mode, and Digitally Signed Files Access 2003 Macro Security Levels, Sandbox Mode, and Digitally Signed Files Tim Gordon [email protected] Programming Plus (816) 333-7357 About dangerous code Dangerous code can consist of powerful commands that may exist in an Access file you open — in its objects (such as queries, forms, reports, and macros), and also in its Microsoft Visual Basic for Applications (VBA) modules. You can prevent some potentially dangerous code from running by running Access in sandbox mode, which is strongly recommended. How the macro security level works Access features three different macro security levels that control what happens when you first try to open a database file, and what can then happen while you have that database open. These levels are High, Medium, and Low: · At the High macro security level, Access prevents you from opening any file unless it is digitally signed. · At the Medium macro security level, Access prompts you with a message when you first open a file. This message warns you that the file could contain code that might damage your computer or data, and gives you the choice of either opening the file or not. The file may or may not have a digital signature. If you decide not to open the file, you can choose to scan it for viruses, check with the originator of the file (that is, the person or company that created or changed it) to verify that it is safe, and then open it later. · At the Low macro security level, Access allows you to open any database file without being prompted. It is strongly recommended that you never use the Low macro security level. The macro security level for each Microsoft Office program is independent of all other Office programs. So, for example, if you set the macro security level to Medium in Access and the macro security level is already set to High in Microsoft Word, the security level for Word won't change. Depending on your work environment, you will choose one of the three macro security levels for yourself. In Access, it is recommended that you choose High. If you need to work with unsigned files from other sources, you can use the Medium macro security level to do that; however, you should always examine such files and sources carefully before choosing to enable any macros, and change back to High when you no longer need to use the Medium level. If you use only your own files in Access, you should self sign your own files and use the High macro security level. What to do if you don't see the Security command To change your macro security level in Access, you'll need to use the Security command (Tools menu, Macro submenu). However, this and other commands may have been made unavailable by your organization's Office administrator. Note You may want to check with your Office administrator before attempting this procedure. Certain commands, such as the ability to change macro security levels, may have been made unavailable as part of your organization's security policy. To make the Security command available 1. On the Tools menu, click Customize, and then click the Commands tab. 2. Click Rearrange Commands, click Menu Bar, and then in the Menu Bar box, click Tools | Macro. 3. Under Controls, click the Add button. The Add Command dialog box appears. 4. In the Categories list, click Tools. 5. In the Commands list, click Security, and then click OK. The Security command now appears in the Controls list. 6. Use the Move Up and Move Down buttons to position the Security command where you want. 7. Click Close twice. Access sandbox mode For an additional layer of safety while working in Access, you can run the program in sandbox mode. What is sandbox mode? Simply put, running in sandbox mode helps ensure that any potentially dangerous commands that could be run from an Access expression will be blocked. Access is "playing safely in a sandbox," so to speak, and is not being allowed to hurt anything outside its domain. How sandbox mode protects your computer In Access, it's possible to run dangerous VBA code in expressions — strings of instructions that Access can use to perform operations on your database. These expressions can include commands and properties that could delete files, change file attributes, start other programs, change Access settings, or change environment settings (for example, the PATH statement) on your computer. Running Access in sandbox mode helps prevent dangerous code from being run in expressions. Important Code in a module or macro cannot be disabled by sandbox mode. To prevent macros or VBA code from being run in Access or to safely remove such code from your database altogether, you can do one or both of the following: Remove the macros or the modules that contain the code, or disconnect the modules that contain code connected to the database objects. Take care to ensure that you don't inadvertently remove functionality from your forms, reports, and other database objects. Functions and properties that are blocked in sandbox mode HTTP://SUPPORT.MICROSOFT.COM/DEFAULT.ASPX?SCID=KB;EN-US;294698&PRODUCT=ACC and HTTP://OFFICE.MICROSOFT.COM/EN-US/ASSISTANCE/HP010447361033.ASPX How do you identify and fix functions and properties that are blocked in sandbox mode so that your database continues to function properly? If you have Microsoft Office Access 2003 Developer Extensions installed, you can use the Custom Startup Wizard to search for all the expressions that are blocked in sandbox mode. The Custom Startup Wizard helps you create new databases with custom startup options based on a development database, but it also provides an option to find the expressions that are blocked in sandbox mode. For more information on how to identify and fix unsafe expressions, see: Frequently asked questions about Access security warnings, Question 19 HTTP://OFFICE.MICROSOFT.COM/EN-US/ASSISTANCE/HA011225981033.ASPX#190 Access 2003 Developer Extensions are part of the new Visual Studio Tools for the Microsoft Office System software package. Visual Studio Tools for the Microsoft Office System HTTP://MSDN.MICROSOFT.COM/HOWTOBUY/VSTO/DEFAULT.ASPX Visual Studio Tools for the Microsoft Office System Version Upgrade $199 US Estimated Price $499 US The Jet 4.0 Service Pack 8 update To run Access in sandbox mode, you must first install the Service Pack 8 (SP8) update for Microsoft Jet 4.0 — a program that Access uses behind the scenes for many of its operations, such as running queries and updates. At any time, go to Microsoft.com, click Windows Update in the left column, and then install all high-priority and critical Windows updates. Before you do this, you first may be able to determine if the Jet 4.0 SP8 update has already been installed on your computer by looking in the Add or Remove Programs section of Control Panel. If you have installed the Service Pack 2 (SP2) update for Windows XP, at the top of the Add or Remove Programs window, make sure that the Show updates check box is selected. If you find the Windows Hotfix KB837001 or KB829558, the Jet 4.0 SP8 update has been installed. You should still install all critical and high-priority Windows updates, however. Important This update to the Jet engine is a vital part of security in Access and should be installed for every computer that runs Access. In fact, it's part of the Windows critical updates. Note In order to install the Jet 4.0 SP8 update, you must have Administrators permissions on your computer. See your Office administrator for more details. What happens if you enable sandbox mode without installing the latest Jet service pack? Under these circumstances, several Access features will not work properly. These features were not installed or are not enabled because the latest version of the Jet service pack is required for Access to be in sandbox mode, yet retain its full functionality. The following is a list of things that might not work properly if you enable sandbox mode before installing the latest Jet service pack: · Wizards may not start. · Switchboards created by using the Switchboard Manager won't function properly. · You can't use the RunCode macro action to call a Visual Basic for Applications (VBA) procedure. · Event handlers that call VBA procedures won't function. · VBA procedures that are called from a property sheet or used in an SQL statement won't function. · The following VBA functions won't work when called from a property sheet or used in an SQL statement: · FormatCurrency · FormatDateTime · FormatNumber · FormatPercent · InStrB · InStrRev · MonthName · Replace · StrReverse · WeekDayName After you have installed the Jet update When you start Access for the first time after installing the Jet 4.0 SP8 update, and Access is set to either the Medium or High macro security level, you will see the message shown above. What does this message mean? Simple — click Yes to block unsafe expressions and run Access in sandbox mode. Assuming that you are running Access at the High or Medium macro security level, you're all set — and you should not see any more messages about sandbox mode, unless you change the macro security level and then explicitly choose to allow blocked expressions. If your macro security level is set to Low, you won't be prompted about blocking unsafe expressions when you start Access for the first time after installing the Jet update. Only when you change the macro security level to Medium or High will you see the message shown above. Change your macro security level to Medium or High, and then click Yes to block unsafe expressions.
Recommended publications
  • Microsoft Office
    Microsoft Office MICROSOFT OFFICE INTRODUCTION Microsoft Office is an office suite of desktop applications, servers and services for the Microsoft Windows and OS X operating systems. It was first announced by Bill Gates of Microsoft on August 1, 1988 at COMDEX in Las Vegas. Initially a marketing term for a bundled set of applications, the first version of Office contained Microsoft Word, Microsoft Excel and Microsoft PowerPoint. Over the years, Office applications have grown substantially closer with shared features such as a common spell checker, OLEdata integration and Visual Basic for Applications scripting language. Microsoft also positions Office as a development platform for line-of-business software under the Office Business Applications brand. On 10 July 2012, Softpedia reported that Office is used by over a billion people worldwide. The current versions are Office 2013 for Windows, released on October 11, 2012; and Office 2011 for OS X, released October 26, 2010 On 24 October 2012, the RTM final code of Office 2013 Professional Plus was released to TechNet and MSDN subscribers for download. On 15 November 2012, the 60-day trial version of Office 2013 Professional Plus was released for download. All devices running Windows Phone and Windows RT come pre-installed with Office Mobile and Office RT, respectively. Office Mobile is also available for Android phones and the iPhone. A version of Office for the iPad was launched in March 2014. A web-based version of Office called Office Online, is also available COMPONENTS Word Microsoft Word is a word processor and was previously considered the main program in Office.
    [Show full text]
  • First Look 2007 Microsoft Office System Ebook
    A02L622655.fm Page iii Friday, May 19, 2006 3:23 PM PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2006 by Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. Library of Congress Control Number 2005939242 ISBN-13: 978-0-7356-2265-4 ISBN-10: 0-7356-2265-5 Printed and bound in the United States of America. 1 2 3 4 5 6 7 8 9 QWE 1 0 9 8 7 6 Distributed in Canada by H.B. Fenn and Company Ltd. A CIP catalogue record for this book is available from the British Library. Microsoft Press books are available through booksellers and distributors worldwide. For further information about international editions, contact your local Microsoft Corporation office or contact Microsoft Press Inter- national directly at fax (425) 936-7329. Visit our Web site at www.microsoft.com/mspress. Send comments to [email protected]. Microsoft, ActiveX, Excel, InfoPath, Microsoft Press, MSDN, OneNote, Outlook, PivotChart, PivotTable, PowerPoint, SharePoint, Visio, Windows, Windows Mobile, and Windows Vista are either registered trade- marks or trademarks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners. The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred.
    [Show full text]
  • Geschichte Von Microsoft Office - Der Große Überblick
    Geschichte von Microsoft Office - der große Überblick 10.11.2018 | 08:21 Uhr | Thomas Joos | PC-WELT 1989 hat Microsoft erstmalig seine Unternehmensanwendungen zu einer Office-Suite zusammengeschnürt, und zwar erst für Apple Macintosh und dann für Windows. Begleiten Sie uns auf eine kleine Zeitreise durch die Meilensteine der Office-Geschichte. Microsoft Office - vom Apple bis in die Cloud © Microsoft Viele Anwender arbeiten seit den ersten Versionen mit den Microsoft-Produkten in der Office- Suite, einige sind erst mit späteren Versionen vertraut. In diesem Beitrag geben wir eine Übersicht darüber, welche Versionen es gab und welche Besonderheiten diese geboten haben. Begleiten Sie uns ein paar Jahre zurück in die Geschichte von Microsoft Office und Windows. Word, Excel und PowerPoint - wie alles begann Auch heute noch sind Word (Textverarbeitung), Excel (Tabellenkalkulation) und PowerPoint (Präsentationsprogramm) die drei Kernprogramme in Microsoft Office. Schon weit bevor die Office-Pakete geschnürt wurden, hat Microsoft diese Programme einzeln angeboten. Word 1.0 wurde 1983 für MS DOS zur Verfügung gestellt. Das Programm basiert auf Bravo, dem ersten Textverarbeitungsprogramm mit dem WYSIWYG-Ansatz (What you see is what you get), also der Bearbeitung von Text und dem sofortigen Anzeigen des Ergebnisses. Der Entwickler von Bravo, Charles Simonyi, wechselte 1981 zu Microsoft und arbeitete seitdem an der Entwicklung von Word mit. Neben seinen Flügen zur ISS 2007/2009 war der Milliardär auch für verschiedene Office-Suiten verantwortlich. Word ist das wichtigste Programm in der Office-Suite und in folgenden Versionen erschienen: • 1983: Word 1 • 1985: Word 2 • 1986: Word 3 • 1987: Word 4 • 1989: Word 5 • 1990: Word 5.5 • 1993: Word 6 Herausragend waren bereits in der ersten Version die Formatierungsmöglichkeiten und die Mausunterstützung.
    [Show full text]
  • Outlook 2003?
    Microsoft® OOuuttllooookk 22000033 Student Edition Complete Your Organization’s Name Here CustomGuide Computer Courseware © 2004 by CustomGuide, Inc. 1502 Nicollet Avenue South, Suite 1; Minneapolis, MN 55403 This material is copyrighted and all rights are reserved by CustomGuide, Inc. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual, or otherwise, without the prior written permission of CustomGuide, Inc. We make a sincere effort to ensure the accuracy of the material described herein; however, CustomGuide makes no warranty, expressed or implied, with respect to the quality, correctness, reliability, accuracy, or freedom from error of this document or the products it describes. Data used in examples and sample data files are intended to be fictional. Any resemblance to real persons or companies is entirely coincidental. The names of software products referred to in this manual are claimed as trademarks of their respective companies. CustomGuide is a registered trademark of CustomGuide, Inc. Table of Contents Introduction .......................................................................................................................... 7 Chapter One: The Fundamentals...................................................................................... 11 Lesson 1-1: What’s New in Outlook 2003?.........................................................................12
    [Show full text]
  • Hyperion® System™ 9 BI+™ Workspace™ Release 9.2 User's
    HYPERION® SYSTEM™ 9 BI+™ WORKSPACE™ RELEASE 9.2 USER’S GUIDE Copyright 1989–2006 Hyperion Solutions Corporation. All rights reserved. “Hyperion,” the Hyperion logo, and Hyperion’s product names are trademarks of Hyperion. References to other companies and their products use trademarks owned by the respective companies and are for reference purpose only. No portion hereof may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose other than the recipient’s personal use, without the express written permission of Hyperion. The information contained herein is subject to change without notice. Hyperion shall not be liable for errors contained herein or consequential damages in connection with the furnishing, performance, or use hereof. Any Hyperion software described herein is licensed exclusively subject to the conditions set forth in the Hyperion license agreement. Use, duplication or disclosure by the U.S. Government is subject to restrictions set forth in the applicable Hyperion license agreement and as provided in DFARS 227.7202-1(a) and 227.7202-3(a) (1995), DFARS 252.227-7013(c)(1)(ii) (Oct 1988), FAR 12.212(a) (1995), FAR 52.227-19, or FAR 52.227-14, as applicable. Hyperion Solutions Corporation 5450 Great America Parkway Santa Clara, California 95054 Printed in the U.S.A. Contents Preface . xix Purpose . xix Audience . xix Document Structure . xix Where to Find Documentation . xx Help Menu Commands . xxi Conventions . xxii Additional Support . xxiii Education Services . xxiii Consulting Services . xxiii Technical Support . xxiii Documentation Feedback .
    [Show full text]
  • [MS-OCPROTO]: Office Client Protocols Overview
    [MS-OCPROTO]: Office Client Protocols Overview This document provides an overview of the protocols in the Microsoft® Office system. It is intended for use in conjunction with the Microsoft protocol technical documents, publicly available standard specifications, network programming art, and Microsoft Windows distributed systems concepts. It assumes that the reader is either familiar with the aforementioned material or has immediate access to it. This system does not require use of Microsoft programming tools or programming environments to implement the protocols within it. Implementers who have access to Microsoft programming tools and environments are free to take advantage of them. Intellectual Property Rights Notice for Open Specifications Documentation . Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages, standards as well as overviews of the interaction among each of these technologies. Copyrights. This documentation is covered by Microsoft copyrights. Regardless of any other terms that are contained in the terms of use for the Microsoft website that hosts this documentation, you may make copies of it in order to develop implementations of the technologies described in the Open Specifications and may distribute portions of it in your implementations using these technologies or your documentation as necessary to properly document the implementation. You may also distribute in your implementation, with or without modification, any schema, IDL's, or code samples that are included in the documentation. This permission also applies to any documents that are referenced in the Open Specifications. No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. Patents. Microsoft has patents that may cover your implementations of the technologies described in the Open Specifications.
    [Show full text]
  • Taking Control of Your Documents
    Taking Control of Your Documents How to free yourself from Microsoft Office dependency in three easy steps The Objective When you save a document in your word processor, your work is encoded in a particular file format. You often have a choice of formats that you can use, with names like DOC, DOCX, RTF, WPD or ODT. Your choice of format will influence whether others can easily read your document today, whether you yourself will be able to read your document ten years from now, and whether you will be able to migrate painlessly to another word processor or operating system if and when you choose to do so. Although many users simply click “Save” and give no thought to which format is being used under the covers, this unthinking use of the word processor's default settings is a recipe for vendor lock-in. In fact, several vendors intentionally set their default format to be ones which will only work well with their own software, fostering dependency on that vendor's software and lessening the user's ability to take advantage of other options in the market. The more documents you save and accumulate in a vendor's proprietary format, the harder it will be for you to consider any other choices. The objective of this paper is to show you, the user, how to extricate yourself from this cycle of dependency and take control of your documents. Specifically, we show how you can, in three easy steps, free yourself from a Microsoft Office dependency. In the end you may, of course, choose to remain on Microsoft Office.
    [Show full text]
  • Professor Teaches Microsoft Office 2003 & 2007, Windows, Web
    PROFESSOR TEACHES MICROSOFT OFFICE 2003 & 2007, WINDOWS, WEB & GRAPHICS Professor Teaches® provides realistic, interactive, and complete training for Office, Windows, Web Design and Graphics. Users may build their skills with 50+ tutorials and learn everything they will need, from beginning to advanced topics. Each interactive tutorial is organized for fast and easy learning with practical exercises that build skills quickly and effectively. Features: Thousands of learning topics 5 to 10 Hours of Training per Course Beginner to Advanced Topics Self-Paced Learning Objectives Introductions & Summaries Interactive Exercises Professional Voice Narration Realistic Simulation of Software End-of-Chapter Quiz Questions Checkmarks for Completed Topics Glossary, Index & Search Professor Answers for Instant Training User will interact to perform the correct action during each exercise for better learning and retention. Professor Teaches Office is a complete multimedia-training Microsoft application. It offers instruction from beginning to advanced features of each Microsoft Office software program, Microsoft Windows, and several popular Web-creation programs. It offers a comprehensive set of training programs which include hundreds of practical exercises designed to build essential skills quickly and effectively. Step-by-step interactive instructions make learning easy. Plus, with the included Professor Answers reference feature you can browse all these courses by topic or keyword to quickly access training topics just when you need them. Refresh your memory, brush up your skills, or learn new tips with Professor Answers. Users will discover how these powerful, self-paced training programs will improve their computer skills, increase their efficiency, and enhance their productivity. Professor Answers allows you to browse through all the training topics in every Professor Teaches tutorial, or you can search using keywords for just the training you need, right when you need it.
    [Show full text]
  • IDOL Keyview Viewing SDK 12.7 Programming Guide
    KeyView Software Version 12.7 Viewing SDK Programming Guide Document Release Date: October 2020 Software Release Date: October 2020 Viewing SDK Programming Guide Legal notices Copyright notice © Copyright 2016-2020 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Documentation updates The title page of this document contains the following identifying information: l Software Version number, which indicates the software version. l Document Release Date, which changes each time the document is updated. l Software Release Date, which indicates the release date of this version of the software. To check for updated documentation, visit https://www.microfocus.com/support-and-services/documentation/. Support Visit the MySupport portal to access contact information and details about the products, services, and support that Micro Focus offers. This portal also provides customer self-solve capabilities. It gives you a fast and efficient way to access interactive technical support tools needed to manage your business. As a valued support customer, you can benefit by using the MySupport portal to: l Search for knowledge documents of interest l Access product documentation l View software vulnerability alerts l Enter into discussions with other software customers l Download software patches l Manage software licenses, downloads, and support contracts l Submit and track service requests l Contact customer support l View information about all services that Support offers Many areas of the portal require you to sign in.
    [Show full text]
  • Student Profile Integrated Business Applications 2 Course Code: 5021
    Student's Name/Initials / Date Teacher’s Initials Date STUDENT PROFILE INTEGRATED BUSINESS APPLICATIONS 2 COURSE CODE: 5021 Microsoft Office 2003 Specialist (MOS) Certification Preparation Course for Word and Excel Expert Level Microsoft Office 2007 (MCAS) Certification (After completion of IBA 1 & 2) DIRECTIONS: Evaluate the student using the applicable rating scales below and check the appropriate box to indicate the degree of competency. The ratings 3, 2, 1, and N are not intended to represent the traditional school grading system of A, B, C, and D. The description associated with each of the ratings focuses on the level of student performance or cognition for each of the competencies listed below. COURSE DESCRIPTION: This course of study is designed to teach the student advanced computer concepts as related to processing data into useful information needed in business situations by using advanced database spreadsheet, word processing, and presentation software capabilities. Given the necessary equipment, supplies, and appropriate software, the student will be able to successfully complete the standards necessary for national credentials. This course is recommended for students in grades 10-12. The prerequisite for this course is successful completion of Integrated Business Applications 1. CREDIT: 1 unit PERFORMANCE RATING COGNITIVE RATING 3 - Skilled--can perform task independently with no supervision 3 - Knowledgeable--can apply the concept to solve problems 2 - Moderately skilled--can perform task completely with limited supervision 2 - Moderately knowledgeable--understands the concept 1 - Limitedly skilled--requires instruction and close supervision 1 - Limited knowledge--requires additional instruction N - No exposure--has no experience or knowledge of this task N - No exposure--has not received instruction in this area __ __ __ __5.
    [Show full text]
  • Microsoft Office XP/2003 Executable Content Security Risks and Countermeasures
    UNCLASSIFIED Date 2/05/2005 I33-001-05 Microsoft Office XP/2003 Executable Content Security Risks and Countermeasures Architectures and Applications Division of the Systems and Network Attack Center (SNAC) Information Assurance Directorate Author: National Security Agency Brett Sovereign ATTN: I333 9800 Savage Rd. STE 6704 Ft. Meade, MD 20755-6704 (410) 854-6191 commercial (410) 854-6510 facsimile [email protected] UNCLASSIFIED UNCLASSIFIED Abstract This paper provides an overview of the security threats from embedded scripts and binary executables in Office 2003/XP files. It also recommends ways to mitigate these threats with an eye to minimizing operational impact to users. The four applications covered in this paper are: Microsoft Word - the word processing application Microsoft Excel - the spreadsheet application Microsoft PowerPoint - the presentation application Microsoft Outlook - the mail/groupware application Microsoft Office 2003 and XP provide incremental improvements to security compared to Office 2000 as well as better administration tools. This document describes these improvements and features, and suggests how best to configure Office 2003/XP to counter most executable content attacks. Disclaimer GUIDANCE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE EXPRESSLY DISCLAIMED. IN NO EVENT SHALL THE CONTRIBUTORS BE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    [Show full text]
  • Corel PDF Fusion?
    Version 1.14 September 2014 Contents Preface . 5 What is in this document? . 5 What other information is available? . .6 Font conventions . .6 Chapter 1: Introduction . .7 1.1 What is Corel PDF Fusion? . .7 1.2 How to use this manual . .7 Chapter 2: How to install Corel PDF Fusion . 9 2.1 What are the installer options? . 9 2.2 What you need . .10 2.3 Installing Corel PDF Fusion . .11 2.4 Removing Corel PDF Fusion . .12 2.5 Entering your serial number . .13 2.6 Associating XPS and PDF files with Corel PDF Fusion . .13 2.7 The file system . .14 2.8 Open Corel PDF Fusion . .14 2.9 Open Corel PDF Converter . .14 2.10 Product update . .14 Chapter 3: Getting to know Corel PDF Fusion . .15 3.1 What can you do with Corel PDF Fusion? . .15 3.2 How do you use Corel PDF Fusion? . .16 3.3 What is a document format or PDL? . .17 3.4 What are the features of Corel PDF Fusion? . .18 3.5 What next? . .25 Chapter 4: The Corel PDF Fusion work area . .26 4.1 Open Corel PDF Fusion . .27 4.2 The Page, Assembly, Flick and Presentation View . .29 4.3 The Navigation pane . .44 4.4 Customize your work area . .48 Chapter 5: The Corel PDF Batch Converter work area . .56 5.1 Open Corel PDF Batch Converter . .56 INDEX CONTENTS 2 COREL PDF FUSION USER GUIDE CONTENTS INDEX CONTENTS 3 Chapter 6: How do I...? . .60 6.1 Convert files . .61 6.2 Create a new document from existing files .
    [Show full text]