Rpat IB Su Linux

Total Page:16

File Type:pdf, Size:1020Kb

Rpat IB Su Linux https://www.rmastri.it/news.php?item.14 Pagina 1/10 rPat IB su linux admin, dom 03 maggio 2009 - 19:47:18 rPat IB, il programma per l'esercizio sui quiz delle patenti A1, A e B con la nuova interfaccia prevista per le prove di esame al computer in 8 lingue, è molto leggero perché sfrutta a fondo le risorse già presenti sul computer. Il suo motore, denominato "Intelligent Browser" si appoggia ad Internet Explorer e a Media Player, risultando ben integrato con l'ambiente Windows, ma, al tempo tesso, difficilmente portabile in altri ambienti. E' quindi impossibile pensare di eseguirlo in ambiente Linux, sfruttando l'ormai maturo framework Wine? Certamente l'impiego di rPat IB sotto Linux non è cosa facile come quello di rPat...entino (si vedano le istruzioni pubblicate sul questo sito), ma non è impossibile. Nelle righe che seguono mostreremo in che modo effettuarne l'installazione e con quali risultati. Come abbiamo fatto in precedenza faremo riferimento all'ambiente Ubuntu, utilizzando la nuova versione 9.04 "Jaunty Jackalope". Questa volta dovremo ricorrere principalmente alla shell. Le operazioni di installazione, comunque, descritte nel dettaglio, sono alla portata anche degli utenti non abituali ad utilizzare la "riga di comando". https://www.rmastri.it/news.php?item.14 Pagina 2/10 Operazioni preliminari Per prima cosa occorre installare Wine, non presente nell'installazione di base di Ubuntu. Aprire una finestra di bash, selezionando dal menu "Applicazioni": "Accessori" > "Terminale", e inserirvi il seguente comando: sudo apt-get install wineIl sistema chiederà all'utente di immettere la password. L'operazione di installazione di un programma richiede, infatti, il consenso di un utente amministratore. Digitare "S" alla richiesta di conferma e attendere il completamento dell'operazione di download e dell'installazione del programma. Quando il prompt sarà di nuovo disponibile, digitare: sudo apt-get install cabextractIl comando consente di installare Cabextrac, indispensabile per utilizzare in ambiente Linux gli archivi CAB nei quali sono distribuiti i programmi Microsoft (per ulteriori informazioni: http://www.cabextract.org.uk/) L'operazione sarà molto rapida. Appena ultimata sarà la volta di Winetricks, uno script che facilita il download e l'installazione di moltissime applicazioni Windows sotto Wine (per informazioni: http://wiki.winehq.org/winetricks). Winetricks deve essere scaricato direttamente dal sito dello sviluppatore (e non con apt-get): wget http://www.kegel.com/wine/winetricksTeoricamente non sarebbero necessarie ulteriori operazioni. E' però molto comodo trasformare lo script in un "comando" disponibile in ogni shell. Per farlo digitare le due righe seguenti: chmod +x winetricks https://www.rmastri.it/news.php?item.14 Pagina 3/10 sudo mv winetricks /usr/local/bin Installazione dei componenti Windows A questo punto si può avviare Winetricks, digitando semplicemente: winetricksLo script apre una finestra nella quale è possibile avviare l'installazione di vari programmi o accessori per l'ambiente Wine. Inizialmente selezionare (in modo che le caselle appaiano spuntate) le voci: "corefonts", "vb6run" e "ie6": La prima scelta installa i font caratteristici di Windows (come: Arial, Courier, Trebuchet, Verdana, ecc.); la seconda la libreria runtime di Visual Basic 6.00 (che serve anche a rPat...entino e a diversi altri programmi); la terza Internet Explorer 6.0. Ebbene sì: per far funzionare rPat IB su Linux è indispensabile inserire tutto il browser di Microsoft (anche se in una vecchia e relativamente poco ingombrante versione) in Wine. Nota. Per l'installazione di Internet Explorer su Linux esiste un'altra procedura, molto semplice, denominata IEs4Linux. Si tratta di una soluzione probabilmente più semplice per chi vuole vedere il browser per Windows in azione su Linux, ma non serve al nostro scopo. Al termine della selezione (si consiglia di non aggiungere altre voci e di compiere le ulteriori installazioni in un altro momento) fare click https://www.rmastri.it/news.php?item.14 Pagina 4/10 su OK e attendere. Lo script inizia a scaricare e a installare i file. L'intervento dell'utente sarà richiesto, al momento dell'installazione di vbrun60 e per quella di Internet Explorer: Non c'è comunque alcuna scelta da fare, ma solo da confermare quanto proposto dalla procedura. Non appena il prompt sarà nuovamente disponibile, si può riavviare Winetricks e procedere all'installazione di Windows Media Player, necessario a rPat IB per la riproduzione degli effetti sonori. Nella lista dei programmi selezionare wmp10 e fare click su Ok. Prima che parta il setup di Media Player sarà necessario dare conferma all'installazione di altri due accessori (Visual C++ 6.0 VCREDIST.EXE Pack e Windows Script 5.6). https://www.rmastri.it/news.php?item.14 Pagina 5/10 Lasciare le impostazioni di default e dare l'assenso all'ulteriore installazione di Windows Media Player Codecs. Quando invece, terminato il processo, comparirà la finestra del programma, sarà opportuno dire di no alla proposta di scansione del computer in vista della ricerca di file multimediali e poi chiudere lo stesso Media Player. https://www.rmastri.it/news.php?item.14 Pagina 6/10 Installazione e avvio di rPat IB E' giunto il momento di scaricare e installare rPat IB. Dal momento che è ancora aperta la finestra "terminale" è più comodo, invece che lanciare il browser e andare nel sito di rPat, utilizzare il comando wget che permette di scaricare direttamente il file: wget http://www.rmastri.it/request.php?5Ultimato il download, per avviare l'installazione basta digitare: wine rpatib40017.exe(Nota. In futuro il nome del file potrebbe essere diverso) per indicare che vogliamo eseguire con Wine il programma di istallazione di rPat. Dopo qualche istante comparirà questa finestra. Ovviamente si può procedere con le impostazioni di default, esattamente come se ci si trovasse in ambiente Windows. L'installazione introdurrà dei link sul desktop (file lnk) e delle icone compariranno nel menù di Wine. Nessuna di queste cose tuttavia sarà in grado di aprire correttamente il programma o il manuale di teoria. Vedremo dopo come creare correttamente i "lanciatori"; per adesso, per verificare se tutto ha funzionato, avviamo rPat IB dal terminale. Il comando completo è: wine c:\\Programmi\\rpatib\\ib.exe c:\\Programmi\\rpatib\\rpat\\rpat.ibiE' indispensabile digitare due volte tutti i caratteri "backslash". Se tutto è andato bene comparirà questa finestra: https://www.rmastri.it/news.php?item.14 Pagina 7/10 Ritocchi finale e test Modifichiamo ora i link presenti nei menù di Wine . Per farlo selezioniamo dal menù "Risorse" di Ubuntu "Cartella home". Nella finestra di Nautilus (l'equivalente in Ubuntu dell'Esplora risorse di Windows) selezioniamo dal menù "Visualizza": "Mostra file nascosti", facendo apparire una serie di cartelle di configurazione presenti all'interno della cartella home dell'utente. Localizziamo tra queste ".local" e poi ancora "share" / "applications" / "wine" / "Programmi" / "rPat". Quest'ultima, la cartella "rPat", dovrebbe contenere tre file che corrispondono alle tre voci del menù di Wine relativo a rPat IB. Selezioniamo "rPat IB 4.00.desktop" facendo click con il bottone destro del mouse. Nel menù di cotesto sceglieremo "Proprietà", facendo apparire la finestra che segue: https://www.rmastri.it/news.php?item.14 Pagina 8/10 Occorrerà cancellare tutto il contenuto della casella "Comando" inserendo al suo posto il comando sopraindicato necessario per avviare rPat IB, ossia: wine c:\\Programmi\\rpatib\\ib.exe c:\\Programmi\\rpatib\\rpat\\rpat.ibiChiusa la finestra, ripeteremo l'operazione per il file: "Manuale di teoria.desktop". Il comando per avviare il manuale (che funziona anche dalla finestra bash) è: wine c:\\Programmi\\rpatib\\ib.exe c:\\Programmi\\rpatib\\rpat\\manuale.ibiVerifichiamo quindi che l'operazione sia andata a buon fine e se selezionando dal menu "Applicazioni": "Wine" > "Programmi" > "rPat" > "rPat IB 4.0" accade qualcosa di buono. Potrebbe essere più comodo avere le icone sul desktop. Quelle prodotte dall'installazione possono essere cancellate senza problemi. Per crearne delle nuove aprire il sopracitato menù di Wine e fare click con il bottone destro del mouse sull'icona di rPat IB 4.0. Dal menù di contesto selezionare "Aggiungi questo lanciatore alla scrivania" come mostrato in figura. https://www.rmastri.it/news.php?item.14 Pagina 9/10 Si può ripetere l'operazione per il manuale. E' il momento di dichiarare se, e quanto, il programma è efficiente . Non ci sentiamo di dire che "funziona perfettamente". In realtà ci sono alcune cose che non funzionano. Se si tenta di stampare una scheda, per esempio, si produrrà l'errore: Line: 639 Char: 1 Error: Invalid argument Code: 0 URL: res://C:\windows\system32\shodclc.dll/preview.dlgQuesta è la pecca più rilevante. Per il resto sulla nostra macchina abbiamo notato che l'esecuzione degli effetti sonori non è sempre felice (talora i suoni appaiono un po' "tagliati") e che in alcuni casi i pulsanti non rispondo al click durante l'esecuzione dell'esame. Ciò è probabilmente dovuto ad aggiornamento del "focus" legato al funzionamento del timer che computa la durata della prova. Il problema non si verifica se si attiva la modalità a tutto schermo, dalle opzioni di rPat IB, operazione che consigliamo di fare subito. https://www.rmastri.it/news.php?item.14 Pagina 10/10 Per il resto il programma è usabile, anche se ci riserviamo di approfondire la cosa. Chiediamo ai lettori che vorranno ripetere questo esperimento di inviarci informazioni, commenti, suggerimenti, impressioni, ecc. Si può usare il modulo accessibile dal menù "Recapiti" sulla sinistra, oppure fare click direttamente sul link sottostante. Invia un commento .
Recommended publications
  • My Cloud EX2 Ultra
    My Cloud™ EX2 Ultra Privater Cloud-Speicher Bedienungsanleitung WD Service und Support Sollten Probleme auftreten, geben Sie uns bitte Gelegenheit, sie zu beheben, bevor Sie das Produkt zurücksenden. Viele technische Fragen können über unsere Knowledge Base oder unseren E-Mail-Support unter http://support.wd.com beantwortet werden. Falls Sie dort keine geeignete Antwort finden oder Sie einen persönlichen Kontakt bevorzugen, rufen Sie WD unter der unten angegebenen Telefonnummer Ihres Landes an. Ihr Produkt schließt eine 30-tägige kostenlose telefonische Unterstützung während der Garantiezeit ein. Diese 30-tägige Frist beginnt mit dem Datum Ihres ersten telefonischen Kontakts mit dem technischen Support von WD. Der E-Mail-Support ist für die gesamte Garantiezeit kostenlos, und unsere gesamte Knowledge Base ist rund um die Uhr verfügbar. Damit wir Sie weiterhin über neue Funktionen und Serviceleistungen informieren können, denken Sie bitte daran, Ihr Produkt im Internet zu registrieren unter http://register.wd.com. Zugriff auf den Onlinesupport Auf unserer Produktsupport-Website unter http://support.wd.com können Sie unter den folgenden Themen wählen: Downloads – Laden Sie Treiber, Software und Updates für Ihr WD-Produkt herunter. Registrierung – Registrieren Sie Ihr WD-Produkt, um die neuesten Updates und Sonderangebote zu erhalten. Garantie- und Austauschservices – Informationen über Garantie, Produktersatz (RMA), RMA-Status und Datenwiederherstellung. Knowledge Base – Suchen Sie nach Schlüsselwort, Ausdruck oder Antwort-ID. Installation – Hier finden Sie online Hilfe zur Installation Ihres WD-Produkts oder Ihrer Software. WD Community – Tauschen Sie Ihre Gedanken mit anderen WD-Benutzern aus. Online-Schulungszentrum – Kommen Sie hierhin, um das meiste aus Ihrem privaten Cloud-Speichergerät herauszuholen: (http://www.wd.com/setup).
    [Show full text]
  • Symantec Netrecon™ 3.6 Security Update 21 Release Notes Symantec Netrecon Security Update 21 Release Notes
    Symantec NetRecon™ 3.6 Security Update 21 Release Notes Symantec NetRecon Security Update 21 Release Notes The software that is described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version: v3.6 040831 Copyright Notice Copyright 2004 Symantec Corporation. All Rights Reserved. Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. No part of this publication may be copied without the express written permission of Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014. Trademarks Symantec and the Symantec logo are U.S. registered trademarks, and Symantec NetRecon, Symantec Enterprise Security Architecture, Symantec Enterprise Security Manager, LiveUpdate, and Symantec Security Response are trademarks of Symantec Corporation. Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Other product names that are mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Printed in the United States of America. 3 Technical support As part of Symantec Security Response, the Symantec Global Technical Support group maintains support centers throughout the world.
    [Show full text]
  • Symantec Netrecon™ 3.6 Security Update 24 Release Notes Symantec Netrecon Security Update 24 Release Notes
    Symantec NetRecon™ 3.6 Security Update 24 Release Notes Symantec NetRecon Security Update 24 Release Notes The software that is described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version: v3.6 040930 Copyright Notice Copyright 2005 Symantec Corporation. All Rights Reserved. Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. No part of this publication may be copied without the express written permission of Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014. Trademarks Symantec and the Symantec logo are U.S. registered trademarks, and Symantec NetRecon, Symantec Enterprise Security Architecture, Symantec Enterprise Security Manager, LiveUpdate, and Symantec Security Response are trademarks of Symantec Corporation. Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Other product names that are mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Printed in the United States of America. 3 Technical support As part of Symantec Security Response, the Symantec Global Technical Support group maintains support centers throughout the world.
    [Show full text]
  • Detecting and Analyzing Insecure Component Integration
    Taeho Kwon December 2011 Computer Science Detecting and Analyzing Insecure Component Integration Abstract Component technologies have been widely adopted for designing and engineering software ap- plications and systems, which dynamically integrate software components to achieve desired func- tionalities. Engineering software in a component-based style has significant benefits, such as im- proved programmer productivity and software reliability. To support component integration, oper- ating systems allow an application to dynamically load and use a component. Although developers have frequently utilized such a system-level mechanism, programming errors can lead to insecure component integration and serious security vulnerabilities. The security and reliability impact of component integration has not yet been much explored. This dissertation systematically investigates security issues in dynamic component integration and their impact on software security. On the conceptual level, we formulate two types of insecure component integration—unsafe component loading and insecure component usage—and present practical, scalable techniques to detect and analyze them. Our techniques operate directly on soft- ware binaries and do not require source code. On the practical level, we have used them to discover new vulnerabilities in popular, real-world software, and show that insecure component integration is prevalent and can be exploited by attackers to subvert important software and systems. Our research has had substantial practical impact and helped
    [Show full text]
  • Windows® Scripting Secrets®
    4684-8 FM.f.qc 3/3/00 1:06 PM Page i ® WindowsSecrets® Scripting 4684-8 FM.f.qc 3/3/00 1:06 PM Page ii 4684-8 FM.f.qc 3/3/00 1:06 PM Page iii ® WindowsSecrets® Scripting Tobias Weltner Windows® Scripting Secrets® IDG Books Worldwide, Inc. An International Data Group Company Foster City, CA ♦ Chicago, IL ♦ Indianapolis, IN ♦ New York, NY 4684-8 FM.f.qc 3/3/00 1:06 PM Page iv Published by department at 800-762-2974. For reseller information, IDG Books Worldwide, Inc. including discounts and premium sales, please call our An International Data Group Company Reseller Customer Service department at 800-434-3422. 919 E. Hillsdale Blvd., Suite 400 For information on where to purchase IDG Books Foster City, CA 94404 Worldwide’s books outside the U.S., please contact our www.idgbooks.com (IDG Books Worldwide Web site) International Sales department at 317-596-5530 or fax Copyright © 2000 IDG Books Worldwide, Inc. All rights 317-572-4002. reserved. No part of this book, including interior design, For consumer information on foreign language cover design, and icons, may be reproduced or transmitted translations, please contact our Customer Service in any form, by any means (electronic, photocopying, department at 800-434-3422, fax 317-572-4002, or e-mail recording, or otherwise) without the prior written [email protected]. permission of the publisher. For information on licensing foreign or domestic rights, ISBN: 0-7645-4684-8 please phone +1-650-653-7098. Printed in the United States of America For sales inquiries and special prices for bulk quantities, 10 9 8 7 6 5 4 3 2 1 please contact our Order Services department at 1B/RT/QU/QQ/FC 800-434-3422 or write to the address above.
    [Show full text]
  • Effective Web Design, Second Edition
    Effective Web Design Effective Web Design, Second Edition Ann Navarro SYBEX® Associate Publisher: Cheryl Applewood Contracts and Licensing Manager: Kristine O'Callaghan Acquisitions and Developmental Editor: Raquel Baker Editors: Joseph A. Webb, James A. Compton, Colleen Wheeler Strand Production Editor: Dennis Fitzgerald Technical Editor: Marshall Jansen Book Designer: Maureen Forys, Happenstance Type-O-Rama Graphic Illustrator: Tony Jonick Electronic Publishing Specialist: Maureen Forys, Happenstance Type-O-Rama Proofreaders: Nelson Kim, Nancy Riddiough, Leslie E.H. Light Indexer: Ann Rogers CD Coordinator: Christine Harris CD Technician: Kevin Ly Cover Designer: Design Site Cover Illustrator/Photographer: Dan Bowman Copyright © 2001 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. World rights reserved. page 1 Effective Web Design The author(s) created reusable code in this publication expressly for reuse by readers. Sybex grants readers limited permission to reuse the code found in this publication or its accompanying CD-ROM so long as (author(s)) are attributed in any application containing the reusable code and the code itself is never distributed, posted online by electronic transmission, sold, or commercially exploited as a stand- alone product. Aside from this specific exception concerning reusable code, no part of this publication may be stored in a retrieval system, transmitted, or reproduced in any way, including but not limited to photocopy, photograph, magnetic, or other record, without the prior agreement and written permission of the publisher. An earlier version of this book was published under the title Effective Web Design © 1998 SYBEX Inc. Library of Congress Card Number: 2001088112 ISBN: 0-7821-2849-1 SYBEX and the SYBEX logo are either registered trademarks or trademarks of SYBEX Inc.
    [Show full text]
  • Dc60 Java and Web Programming Dec 2014
    DC60 JAVA AND WEB PROGRAMMING DEC 2014 Q.2 a. What is Java Runtime Environment? Explain the key differences between C++ and Java. Q2. A) The Java Runtime Environment (JRE) is what you get when you download Java software. The JRE consists of the Java Virtual Machine (JVM), Java platform core classes, and supporting Java platform libraries. The JRE is the runtime portion of Java software, which is all you need to run it in your Web browser. When you download Java software, you only get what you need - no spyware, and no viruses. C++ Java Strongly influenced by C syntax, with Object- Strongly influenced by C++/C syntax. Oriented features added. Provides the Java Native Interface and Compatible with C source code, except for a recently Java Native Access as a way to directly few corner cases. call C/C++ code. Write once, run anywhere / everywhere (WORA / Write once, compile anywhere (WOCA). WORE). Allows procedural programming, functional Strongly encourages exclusive use of the object- programming, object-oriented programming, generic oriented programming paradigm. Includes support programming, and template metaprogramming. for generic programming and creation of scripting Favors a mix of paradigms. languages. Runs as native executable machine code for the Runs in a virtual machine. target instruction set(s). Provides object types and type names. Allows Is reflective, allowing metaprogramming and reflection through RTTI. dynamic code generation at runtime. Has multiple binary compatibility standards Has a single, OS- and compiler-independent (commonly Microsoft (for MSVC compiler) and binary compatibility standard, allowing runtime Itanium/GNU (for virtually all other compilers)). check of correctness of libraries.
    [Show full text]
  • The User Friendly Guide to INTERNET & COMPUTER TERMS
    The User Friendly Guide to INTERNET & COMPUTER TERMS Charles Steed Gold Standard Press Inc. Reno, Nevada Copyright ã 2001 Charles Steed and Gold Standard Press Inc. Permission is granted to ALL USERS and readers to download, print and freely dis- tribute The User Friendly Guide To Internet & Computer Terms. No changes to this text is authorized. THIS TEXT MAY NOT BE SOLD EXCEPT BY AUTHORIZED AGENTS OR REPRESENTATIVES OF GOLD STANDARD PRESS INC. For information, contact Gold Standard Press Inc. 1475 Terminal Way, Suite E, Reno, Nevada 89502, tel. 360-482-2510. This book contains information gathered from many sources. It is published for gen- eral reference and not as a substitute for independent verification by users when circumstances warrant. It is sold with the understanding that neither the author nor publisher is engaged in rendering legal, psychological, accounting or professional advice. The publisher and author disclaim any personal liability, either directly or indirectly, for advice presented within. Although the author and publisher have used care and diligence in the preparation, and made every effort to ensure the accuracy and completeness of information contained in this book, we assume no responsibility for errors, inaccuracies, omissions, or any inconsistency herein. Any slights of people, places, publishers, books, or organizations are unintentional. The online version of this text has been slightly modified to faciliate easy download- ing. No significant differences from the printed version are present. Library of Congress
    [Show full text]
  • По Неофициални Статистически Данни Повече От 80% От Дяла На Използваните Браузери Се Пада На Microsoft Internet Explorer
    Ангелина Тагарева, ф.н. 43153, 3 курс, специалност информатика Радостин Цанев, ф.н. 43089, 3 курс, специалност информатика Анализ на излезлите експлойти за Internet Еxplorer Курсов проект по Мрежова Сигурност – Сигурен Код Ангелина Тагарева, ф.н. 43153 Радостин Цанев, ф.н. 43089 По неофициални статистически данни повече от 80% от дяла на използваните браузери се пада на Microsoft Internet Explorer. Като най-често използван интернет браузер, сигурността очевидно не е била основна задача при имплементирането му. Свидетелство за това са многобройните уязвимости и експлойти, излези за този продукт. Интересното в случая е, че уязвимостите в MS IE са пъти повече от конкурентни open source решения, въпреки че кодът на браузера е затворен. Преди за започнем същинското изложение на излезлите експлйти за Microsoft Internet Explorer, ще направим няколко уточнения. Първо е важно да отбележим каква е разликата между уязвимост и експлойт. Уязвимост представлява проблем в сигурността на даден софтуер. Експлойтът е програмен код, който се възплозва от тази уязвимост. Тези две понятия вървят ръка за ръка, затова в нашето изложение ще посочваме първо за каква уязвимост се отнасят дадените експлойти и чак след това ще пристъпваме към самото им разглеждане. В политиката за сигурността на IE е застъпена идеята за различни зони на сигурност. Те биват четири вида: Internet Zone, Local Zone, Trusted Sites и Restricted Sites. Според официалния сайт на Microsoft, "Сигурността, залегната в Internet Explorer 6 е добре балансирана. При първата инсталлация на браузера, той поставя всички уеб сайтове в Internet Zone със средно ниво на сигурност. По този начин може да браузвате сигурно и ще бъдете предупраждавани преди свалянето на потенциално опасно съдържание".
    [Show full text]
  • Internet Explorer
    Internet Explorer From Wikipedia, the free encyclopedia Jump to: navigation, search Windows Internet Explorer Wikipedia's Main Page in Windows Internet Explorer 7 running on Windows Vista. Developed by Microsoft Initial release August 1995 (12–13 years ago) Latest release 7.0.5730.13 (Windows XP/Windows 2003 Server) 7.0.6001.18000 (Windows Vista SP1) / 2008 Preview release 8.0.6001.17184 (IE8, Beta 1) / March 5, 2008 OS Microsoft Windows Mac OS System 7 to Mac OS X (discontinued) Solaris and HP-UX (discontinued) Genre Web browser and RSS Reader License Proprietary EULA Website microsoft.com/ie Windows Internet Explorer (formerly Microsoft Internet Explorer abbreviated MSIE), commonly abbreviated to IE, is a series of graphical web browsers developed by Microsoft and included as part of the Microsoft Windows line of operating systems starting in 1995. It has been the most widely used web browser since 1999, attaining a peak of about 95% usage share during 2002 and 2003 with IE5 and 6 but steadily declining since, despite the introduction of IE7. Microsoft spent over 100 million dollars (USD) a year [1] in the late 1990s, with over 1000 people working on IE by 1999. [2] Internet Explorer was first released as part of the add-on package Plus! for Windows 95. Later versions were available as free downloads, or in service packs, and included in the OEM service releases of Windows 95 and later versions of Windows. The most recent release is version 7.0, which is available as a free update for Windows XP Service Pack 2, and Windows Server 2003 with Service Pack 1 or later, Windows Vista, and Windows Server 2008.
    [Show full text]
  • My Cloud EX2 Ultra Private Cloud Storage Software
    My Cloud™ EX2 Ultra Private Cloud Storage User Manual WD Service and Support Should you encounter any problem, please give us an opportunity to address it before returning this product. Most technical support questions can be answered through our knowledge base or email support service at http://support.wd.com. If the answer is not available or if you prefer, please contact WD at the best telephone number shown below. Your product includes 30 days of free telephone support during the warranty period. This 30-day period starts on the date of your first telephone contact with WD Technical Support. Email support is free for the entire warranty period and our extensive knowledge base is available 24/7. To help us keep you informed of new features and services, remember to register your product online at http://register.wd.com. Accessing Online Support Visit our product support website at http://support.wd.com and choose from these topics: Downloads—Download drivers, software, and updates for your WD product. Registration—Register your WD product to get the latest updates and special offers. Warranty & RMA Services—Get warranty, product replacement (RMA), RMA status, and data recovery information. Knowledge Base—Search by keyword, phrase, or answer ID. Installation—Get online installation help for your WD product or software. WD Community—Share your thoughts and connect with other WD users. Learning Center — Start here to get the most out of your Private Cloud Storage device (http://www.wd.com/setup). Contacting WD Technical Support When contacting WD for support have your WD product serial number, system hardware, and system software versions available.
    [Show full text]
  • Seventh Framework Programme Information and Communication Technologies
    SEVENTH FRAMEWORK PROGRAMME NFORMATION AND OMMUNICATION ECHNOLOGIES I C T Project Accessibility Assessment Simulation Environment for New Applications Design and Development (ACCESSIBLE, Grant Agreement No. 224145) Deliverable D 2.1 - State of the Art Survey in Accessibility Research and Market Survey Lead beneficiary CS WP. no, title WP2 – User needs, benchmarking, accessibility and and activity type simulation requirements (RTD) Contributing Task (s) Task 2.2: Literature review and market survey Dissemination Public level Delivery date January 2010 Status Updated Final File name and “ACCESSIBLE_D2.1_FINAL_updated_Jan2010.doc”, 10486 Kb size ACCESSIBLE Deliverable D2.1 -PU- Grant Agreement No. 224145 Authors List Leading Author (Editor) Surname Initials Beneficiary Name Contact email (Short Name) Staehli Benjamin SB CS [email protected] Co-authors (In alphabetic order) # Surname Initials Beneficiary Name Contact email (Short Name) 1 Mourouzis Alexandros MA CERTH/HIT [email protected], 2 Chalkia Eleni CE CERTH/HIT [email protected] 3 Bekiaris Evangelos BE CERTH/HIT [email protected] 5 Lopes, Rui R. FFCUL [email protected] 6 Kavadias Christoforos Ch. Solinet [email protected] 7 Antona AM FORTH [email protected] (add lines as appropriate) Peer Reviewers List # Surname Initials Contact email 1 Ntoa Stavroula NS [email protected] 2 Nitsch H [email protected] January 2010 -iii- CS ACCESSIBLE Deliverable D2.1 -PU- Grant Agreement No. 224145 History of versions Table Date Comments September 2009 1st version of D2.1 November 2009 First updated version of D2.1 with optimised methodological framework, updated standards and devices SoA. January 2010 Second updated version after the comments of the reviewers on the first ACCESSIBLE review.
    [Show full text]