Publisher's Version/PDF (3.676Mb)

Total Page:16

File Type:pdf, Size:1020Kb

Publisher's Version/PDF (3.676Mb) III Public Access Com puter Software · Management · BV RICHARD \NAVNE 24 JUNE 2004 ' COMPUTERS IN LIBRARIES feature: PAC management tools ost libraries now recog­ nize that public access computers are essential M to providing excellent service to patrons. Managing these computers has become a major re­ sponsibility for library staffs. Patrons expect to find secure and well-main­ tained computers that have simple, stable, and predictable interfaces. In my capacity as assistant director for Information Systems at The Uni­ versity of Texas Southwestern Medical Center at Dallas (UT Southwestern) Library, I have grappled with public access computer issues for years. Ten years ago there were few software tools available; however, today there are many easy-to-use and cost-effective al­ ternatives to help manage public ac­ cess computers. Tools to Help Manage PACs I'm about to describe a representa­ tive sample of software tools in several important categories. This article does or not attempt to address all programs in Tools all software management categories • because there are too many products to do that. I'll discuss specific products LI rarl from specific vendors, but won't rec­ ommend any. You should do further re­ search and make a purchase decision appropriate to your environment. Most of the software discussed in this arti­ cle is available for testing prior to pur­ chase. Some of the programs are free. The categories of management soft­ ware that I will address are setup soft­ ware, security programs, integrity main­ Today, there are many tenance software, browser control tools, antivirus software, anti-spyware soft­ easy-to-use and cost-effective ware, patch management tools, session managers, print management systems, system utilities, and some Microsoft tools to help manage software options. However, I won't ad­ dress filtering software, anti-spam soft­ public access computers. ware, privacy tools, network trouble­ shooting tools, firewall software, and some other categories of management tools in this article. }} COMPUTERS iN LIBRARIES feature: PAC management tools Computer Setup configurations. In December 2003, Fortres 101 from Fortres Grand does Symantec acquired PowerQuest. not provide a menu, but it does lock I prefer an iterative method of de­ Develop a test environment ifpossi­ down specific Windows settings. By lock­ veloping a new computer configura­ ble. Then you can try various software ing Windows settings, you can control tion. Richard Wayne's Iterative Devel­ packages without impacting your pro­ what your patrons can and can't do. Fool­ opment Methodology goes something duction systems. Your test environment Proof Security from Riverdeep is another like this: should mimic your production environ­ product that provides desktop security ment as closely as possible. Microsoft's by locking down Windows features. • Start with the best available Virtual PC 2004 can help you to emu­ hardware. The new hardware late several operating system environ­ Integrity Maintenance Software ideally consists of identical models ments on a single test computer. to minimize deployment issues. Even with security software loaded, it is likely that, over time, your public • Talk to library and information Security Programs access computer software will become technology staff and patrons, and I will discuss security programs in corrupted and collect extraneous data. then create your first hardware and two sections. Those that prevent pa­ The solution to the problem is integrity software configuration for testing. trons from intentional or unintentional maintenance software. • Place the configuration someplace mischief and access are presented in Centurion Technologies provides where you can gather further this section. The programs that clean two alternatives. Centurion Guard uses staff feedback. up the potential clutter after patron both hardware and software. Drive­ sessions are listed in the next section Shield uses software only. Upon reboot, • Develop a second computer ("integrity maintenance software"). any changes patrons have made are re­ configuration based upon moved, and the system is restored to staff feedback. its initial configuration. • Place the configuration in a /I You need to have Deep Freeze from Faronics Tech­ location to gather further staff nologies and Clean Slate from Fortres and patron feedback. aggressive[ real-time Grand are also software-only options for integrity maintenance. All of the • Develop a third configuration based products in this category allow you to upon staff and patron feedback. virus scanning protect only the drives that you wish • Place the configuration in a to protect. For example, if you have an limited number of locations for 1f antivirus product on your D:\ drive, further staff and patron feedback. enabled at all times. then you could configure the software Further revise the configuration to protect your C: \ drive from changes, if necessary after usage. CybraryN from Computers By De­ but not your D: \ drive. sign prevents changes to a PC's config­ • Replicate the revised configuration uration. It can be configured to au­ by replacing the old configuration Browser Control Tools thenticate to your integrated library with the revision. system (ILS). For example, CybraryN Let's face it, the Web is tremendously works with systems from Innovative, popular with our library patrons. As a Once you have developed your final Dynix, Sirsi, Gaylord, and other ILS result, they will attempt to use every configuration, preserve it. Make a copy vendors. If a patron does not have a available computer for general Web ac­ of the configuration and place it on a valid bar code, has excessive overdues, cess. Sometimes, these can be comput­ server, another computer, an external or is not a valid patron type, then he or ers designated for OPAC or licensed hard drive, or a DVD. Then you can she will not be able to use the public ac­ database use only. When that happens, replicate your configuration using soft­ cess computer if you design it that way. you want to make sure that only the cat­ ware tools like these: CybraryN provides a menu and alog or subscription databases can be Symantec Ghost can back up, store, other features to prevent patrons from accessed from those computers. If you and replicate configuration images. corrupting the computer's software. The don't, they will end up becoming general PowerQuest's DeployCenter has su­ patron is locked into the CybraryN in­ Internet access computers. perseded PowerQuest's Drive Image terface and cannot execute programs or Public Web Browser (PWB) from Pro and can also help deploy software utilities that damage the configuration. TeamSoftware Solutions controls Web 26 JUNE 2004 » COMPUTERS IN LIBRARIES feature: PAC management tools browser sessions. PWB replaces the In­ cation (for non-commercial use) is Ad­ ured for use in a patron self-service ternet Explorer interface with an in­ aware from Lavasoft. mode or a staff-managed mode. It even terface that is highly configurable. It supports making reservations via the allows you to specifY sites that can or Patch Management Tools Web or telephone. can't be accessed via the browser. PWB also lets you customize a number of Information technology profession­ other options such as buttons, drop­ als have been accustomed to keeping II Running anti-spyware down menu items, home page default, antivirus software up-to-date. The pop-up policies, printing settings, and Blaster worm opened our eyes to a new software on a system for download capabilities. threat in 2003-we saw that Windows K-Meleon from kmeleon.org also al­ systems also needed to be kept up-to­ lows you to control many browser func­ date with critical updates issued by the first time can be tions. It is free, open source software. Microsoft. The industry has been in a WINSelect from Faronics gives you whirlwind of activity since Blaster, try­ control over many browser and Win­ ing to anticipate the next round of ma­ an enlightening and dows features. licious software. There are a number of applications available to help keep shocking experience. /I Antivirus Software systems patched and secure. Microsoft has developed a patch In 1992, extensive media coverage led management tool called Software Up­ Comprise Technologies offers Smart to Michelangelo virus hysteria. It was a date Services or SUS. It is used to de­ Access Management or SAM. It has a DOS-based virus and was a new expe­ ploy critical Windows updates through­ number of interesting modules for rience for computer users at that time. out your library. As ofthis writing, SUS time, reservation, Internet, desktop, At UT Southwestern, we distributed 1.0 with Service Pack 1 is available. and report management. Michelangelo detection and removal SUS 2.0 is in development and has been tools on diskette to hundreds of cus­ renamed ''Windows Update Services." Print Management Systems tomers at a centralized "crisis center." Shavlik Technologies provides a Virus writers have come a long way, powerful patch management product Print management systems help to and so have the applications to combat called HFNetChkPro. The Microsoft reduce wasted paper and ink cartridges. them. Today, you need to update your Baseline Security Analyzer (MBSA) They also make the printing cost-recov­ antivirus software at least daily. You uses the HFNetChkPro scanning en­ ery process more efficient for both pa­ need to have aggressive, real-time gine. MBSA is a free tool that allows trons and staff. virus scanning enabled at all times. systems administrators to identify re­ With LPT:One from EnvisionWare, A number of good tools are available quired patches for computers through­ you can set a price per page, a maximum to help with this effort. A few of the out the network. number of pages that a patron can print, major antivirus vendors are Computer and different prices per printer. A sim­ Associates, McAfee, Panda, Sophos, Session Managers ple dialogue leads the patron through and Symantec.
Recommended publications
  • Veritas Backup Reporter 6.5 Installation Guide Veritas Backup Reporter Installation Guide
    Veritas Backup Reporter 6.5 Installation Guide Veritas Backup Reporter Installation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 6.5 PN: : (HRO7210)SKU 11132088 Legal Notice Copyright © 2008 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Actionable Infrastructure™, Active Extensions™, ActiveAdmin™, Anti-Freeze™, Application Saver™, Backup Exec™, Bare Metal Restore™, BindView™, Bloodhound™, Bootguard™, Brightmail™, bv-Admin™, bv-Control™, CarrierScan™, CleanSweep™, ColorScale™, CommandCentral™, Confidence Online™, CrashGuard™, Day-End Sync™, dbAnywhere™, DeepSight™, Defender™, Digital Immune System™, DiskDoubler™, DiskLock™, Drive Image™, Enterprise Security Manager™, Enterprise Vault™, FlashSnap™, FlowChaser™, Ghost Walker™, Ghost™, GoBack™, Healthy PC™, i3™, iCommand™, I-Gear™, Indepth™, Information Integrity™, Intellicrypt™, Intruder Alert™, LiveUpdate™, LiveState™, Mail-Gear™, ManHunt™, ManTrap™, MicroMeasure™, Mobile Update™, NetBackup™, NetProwler™, NetRecon™, Norton™, Norton 360™, Norton AntiSpam™, Norton AntiVirus™, Norton Commander™, Norton Editor™, Norton Guides™, Norton Internet Security™, Norton Mobile Essentials™, Norton Password Security™, Norton SystemWorks™, Norton Utilities™, Norton WinDoctor™, OmniGuard™, OpForce™, PartitionMagic™, pcAnywhere™, PowerQuest™, PowerVPN™, Procomm™, Procomm Plus™,
    [Show full text]
  • 293202846.Pdf
    ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ ## ## ## ## ### ######## ######## ########³ ³ ## ## ## ## ## ## ## ## ## ## ## ³ ³######### ## ## ## ## ## ## ## ## ## ³ ³ ## ## ## ## ## ## ## ######## ###### ## ³ ³######### ## ## ## ######### ## ## ## ## ³ ³ ## ## ## ## ## ## ## ## ## ## ## ³ ³ ## ## ### ### ## ## ## ## ######## ########³ ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³ This site list brought to you by all of us in ³ ³ the best warez channel on FDFnet, #Warez. ³ ³ ÚÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´irc.fdfnet.netÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÙ ³ ³ Dont be a leech. Contribute! ³ ³ To add a site /msg Balthor SITE xxx.xxx.xxx.xxx /dirs L: & P: ³ ³ For posting you will be +ved until your site is removed. ³ ³ Please only post VERIFIED sites ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÄÄÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³ . .. .:ÃNewS´: .. ³ ³ ÀÄÄÄÄÙ ³ ³ 02-15-2002 ³ ³ ³ ³ At long last the OOmpah forums are back! Go ahead, post ³ ³ something at http://oompah.tk/ ³ ³ ³ ³ The list that you are currently viewing is a 6 hour time ³ ³ delayed version of our complete list. Site posters receive ³ ³ access to the complete list which contains ALL of the sites. ³ ³ Upon verifcation of your site post, you will gain access to ³ ³ the current list, access to our !search, and you will also ³ ³ see new sites immediately after they are verified (6 hours ³ ³ before everybody else!). ³ ³ ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÄÄÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³ . .. .: Other Info : .. ³ ³ ³ ³ PSST!
    [Show full text]
  • Norton Ghost 10.0 User's Guide
    User’s Guide Norton Ghost User’s Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 10.0 PN: 10421093 Copyright Notice © 2005 Symantec Corporation. All Rights Reserved. Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. No part of this publication may be copied without the express written permission of Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014. Trademarks Symantec, the Symantec logo, Norton Ghost, and Norton PartitionMagic are U.S. registered trademarks of Symantec Corporation SmartSector and LiveUpdate are trademarks of Symantec Corporation. Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. IBM, OS/2, and OS/2 Warp are registered trademarks of International Business Machines Corporation. Maxtor OneTouch is a trademark of Maxtor Corporation. Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Printed in the United States of America. 10 9 8 7 6 5 4 3 2 1 Symantec Software License Agreement IMPORTANT: PLEASE READ THE TERMS AND disk of Your computer and retain the original CONDITIONS OF THIS LICENSE AGREEMENT for archival purposes; CAREFULLY BEFORE USING THE SOFTWARE.
    [Show full text]
  • Veritas Backup Reporter Getting Started Guide Veritas Backup Reporter Getting Started Guide
    Veritas Backup Reporter Getting Started Guide Veritas Backup Reporter Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 6.0 PN: : (HRO7210)SKU 11132088 Legal Notice Copyright © 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Actionable Infrastructure™, Active Extensions™, ActiveAdmin™, Anti-Freeze™, Application Saver™, Backup Exec™, Bare Metal Restore™, BindView™, Bloodhound™, Bootguard™, Brightmail™, bv-Admin™, bv-Control™, CarrierScan™, CleanSweep™, ColorScale™, CommandCentral™, Confidence Online™, CrashGuard™, Day-End Sync™, dbAnywhere™, DeepSight™, Defender™, Digital Immune System™, DiskDoubler™, DiskLock™, Drive Image™, Enterprise Security Manager™, Enterprise Vault™, FlashSnap™, FlowChaser™, Ghost Walker™, Ghost™, GoBack™, Healthy PC™, i3™, iCommand™, I-Gear™, Indepth™, Information Integrity™, Intellicrypt™, Intruder Alert™, LiveUpdate™, LiveState™, Mail-Gear™, ManHunt™, ManTrap™, MicroMeasure™, Mobile Update™, NetBackup™, NetProwler™, NetRecon™, Norton™, Norton 360™, Norton AntiSpam™, Norton AntiVirus™, Norton Commander™, Norton Editor™, Norton Guides™, Norton Internet Security™, Norton Mobile Essentials™, Norton Password Security™, Norton SystemWorks™, Norton Utilities™, Norton WinDoctor™, OmniGuard™, OpForce™, PartitionMagic™, pcAnywhere™, PowerQuest™, PowerVPN™, Procomm™, Procomm Plus™,
    [Show full text]
  • Microsoft Windows 95/98/ME/2000/XP/2003/Vista/7 32-B
    SoftKey Revealer retrieves Serials and Keys for over 700 software products: Microsoft Windows 95/98/ME/2000/XP/2003/Vista/7 32-bit Microsoft Office XP/2003/2007 Microsoft Internet Explorer 010 Editor 3 3D Screensavers (many) 3Planesoft Screensavers AAA LOGO ABBY FineReader 7, 8 Absolute Time Corrector Acala Products Access Password Recovery Genie ACDSee Products AceMoney Active Desktop Calendar 6,7 Actual Window Manager 4,5,6 Addweb Website Promoter 6,7,8 Adobe Acrobat 5, 6, 7, 8 Adobe Acrobat Distiller 6 Adobe After Effects 6, 6.5, 7 Adobe Illustrator 10,CS,CS2 Adobe Lightroom 1.0 Adobe Photoshop 5, 5.5, 6, 7, CS, CS2 Adobe Photoshop Elements 3, 4 Adobe Premiere 5, 5.5, CS3 Advanced SystemCare Pro 3 AirplanePDQ Alice-soft Products Alien Skin Eye Candy 4, 5 Alcohol 120% All Image All Media Fixer Amabilis 3D Canvas 6 Ashampoo Products Ashampoo Burning Studio ASPack Atlantis Word Processor 1.x Atomic ZIP Password Recovery Audio Recorder Deluxe Autodesk Products -AutoCAD -AutoCAD Electrical -AutoCAD LT -AutoCAD Mechanical -Autodesk Architectural Desktop -Autodesk Building Systems -Autodesk Civil 3D -Autodesk Land Desktop -Autodesk Map 3D -Autodesk Survey -Autodesk Utility Design -Autodesk VIZ Autoplay Menu Builder AutoWorld 3D Garage AVI Toolbox Avira AntiVir PersonalEdition Classic Axailis IconWorkshop Axialis Professional Screen Saver Producer BadCopy BeFaster Belarc Advisor BitComet Acceleration Patch BootXP 2 Borland C++ Builder 6, 7 Borland Delphi 5, 6, 7, 8 CachemanXP Cakewalk SONAR Producer Edition 4,5,6,7,8 CD2HTML CDMenu CDMenuPro
    [Show full text]
  • Powerquest Partition Magic Free Download with Crack and Keygen
    Powerquest partition magic free download with crack and keygen PowerQuest Partition Magic v8.0 Beta serial key, crack and keygen. ● Partition Magic Free Download for Windows 10 64 Bit ● Partition Magic for Windows 7 (32 bit & 64 bit) ● Free Download Partition Magic Full Version for Windows 10 ● [Free]Partition Magic Portable Download Windows 10 Server ● Powerquest Partition Magic Patch How to use Partition Magic, Boot Magic, Powerquest by YankeesNYwins Mar 21, 2020 3: 59AM PDT Drive Image and Norton Ghost with Vista. It has the ability to check, format, delete, resize and copy volume sets on Windows Server. PartitionMagic Overview (Pros & Cons) Partition. After inserting the PowerQuest Partition Magic 7.0 CD in to your computer, run the installation program: Click on the Install option and then click on PartitionMagic. And drag-and-drop partition copying. This software is an environment-friendly and straightforward to make use of. Out there for Home windows Operation Programs. We have 1032 Partition Magic Software torrents for you! Support Windows XP, Windows 7, Windows 8/8.1 and Windows 10 (all editions, 32/64 bit). Partition Magic 8 Plus Crack Full Version Free: Partition Magic 8 Plus crack is a well-known software. Admin May 20, 2020 System Tools 0 Comment. PowerQuest(R) Partition Magic(R). EaseUS Partition Master 12.9 Crack The EASEUS Partition Master 12.9 Crack can use many tasks faster than some other pc software that is comparable. MT, Monday through Friday. Partition Magic 6.0 is an unique software in its kind. I have a PC-DOS/Win3.1 partition and a Win98SE partition on the same hard drive and a.
    [Show full text]
  • Veritas Backup Reporter 6.5 Clustering Guide Veritas Backup Reporter Clustering Guide
    Veritas Backup Reporter 6.5 Clustering Guide Veritas Backup Reporter Clustering Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 6.5 PN: : (HRO7210)SKU 11132088 Legal Notice Copyright © 2008 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Actionable Infrastructure™, Active Extensions™, ActiveAdmin™, Anti-Freeze™, Application Saver™, Backup Exec™, Bare Metal Restore™, BindView™, Bloodhound™, Bootguard™, Brightmail™, bv-Admin™, bv-Control™, CarrierScan™, CleanSweep™, ColorScale™, CommandCentral™, Confidence Online™, CrashGuard™, Day-End Sync™, dbAnywhere™, DeepSight™, Defender™, Digital Immune System™, DiskDoubler™, DiskLock™, Drive Image™, Enterprise Security Manager™, Enterprise Vault™, FlashSnap™, FlowChaser™, Ghost Walker™, Ghost™, GoBack™, Healthy PC™, i3™, iCommand™, I-Gear™, Indepth™, Information Integrity™, Intellicrypt™, Intruder Alert™, LiveUpdate™, LiveState™, Mail-Gear™, ManHunt™, ManTrap™, MicroMeasure™, Mobile Update™, NetBackup™, NetProwler™, NetRecon™, Norton™, Norton 360™, Norton AntiSpam™, Norton AntiVirus™, Norton Commander™, Norton Editor™, Norton Guides™, Norton Internet Security™, Norton Mobile Essentials™, Norton Password Security™, Norton SystemWorks™, Norton Utilities™, Norton WinDoctor™, OmniGuard™, OpForce™, PartitionMagic™, pcAnywhere™, PowerQuest™, PowerVPN™, Procomm™, Procomm Plus™, PureDisk™,
    [Show full text]
  • Veritas Backup Reporter Administrator's Guide Veritas Backup Reporter Administrator's Guide
    Veritas Backup Reporter Administrator's Guide Veritas Backup Reporter Administrator's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 6.0 PN: : (HRO7210)SKU 11132088 Legal Notice Copyright © 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Actionable Infrastructure™, Active Extensions™, ActiveAdmin™, Anti-Freeze™, Application Saver™, Backup Exec™, Bare Metal Restore™, BindView™, Bloodhound™, Bootguard™, Brightmail™, bv-Admin™, bv-Control™, CarrierScan™, CleanSweep™, ColorScale™, CommandCentral™, Confidence Online™, CrashGuard™, Day-End Sync™, dbAnywhere™, DeepSight™, Defender™, Digital Immune System™, DiskDoubler™, DiskLock™, Drive Image™, Enterprise Security Manager™, Enterprise Vault™, FlashSnap™, FlowChaser™, Ghost Walker™, Ghost™, GoBack™, Healthy PC™, i3™, iCommand™, I-Gear™, Indepth™, Information Integrity™, Intellicrypt™, Intruder Alert™, LiveUpdate™, LiveState™, Mail-Gear™, ManHunt™, ManTrap™, MicroMeasure™, Mobile Update™, NetBackup™, NetProwler™, NetRecon™, Norton™, Norton 360™, Norton AntiSpam™, Norton AntiVirus™, Norton Commander™, Norton Editor™, Norton Guides™, Norton Internet Security™, Norton Mobile Essentials™, Norton Password Security™, Norton SystemWorks™, Norton Utilities™, Norton WinDoctor™, OmniGuard™, OpForce™, PartitionMagic™, pcAnywhere™, PowerQuest™, PowerVPN™, Procomm™, Procomm Plus™,
    [Show full text]
  • FORM 425 SYMANTEC CORP − SYMC Filed: January 20, 2005 (Period: )
    FORM 425 SYMANTEC CORP − SYMC Filed: January 20, 2005 (period: ) Filing of certain prospectuses and communications in connection with business combination transactions Filed by Symantec Corporation Pursuant to Rule 425 Under the Securities Act of 1933 And Deemed Filed Pursuant to Rule 14a−12 Under the Securities Exchange Act of 1934 Subject Company: VERITAS Software Corporation Commission File No.: 000−26247 This transcript contains forward−looking statements, including expectations regarding the post−closing integration of the businesses and product lines of Symantec and VERITAS and other matters that involve known and unknown risks, uncertainties and other factors that may cause actual results, levels of activity, performance or achievements to differ materially from results expressed or implied by this press release. Such risk factors include, among others: difficulties encountered in integrating merged businesses; uncertainties as to the timing of the merger; approval of the transaction by the stockholders of the companies; the satisfaction of closing conditions to the transaction, including the receipt of regulatory approvals; whether certain market segments grow as anticipated; the competitive environment in the software industry and competitive responses to the proposed merger; and whether the companies can successfully develop new products and the degree to which these gain market acceptance. Actual results may differ materially from those contained in the forward−looking statements in this press release. Additional information concerning these and other risk factors is contained in the Risk Factors sections of Symantec’s and VERITAS’ most recently filed Forms 10−K and 10−Q. Symantec and VERITAS undertake no obligation and do not intend to update these forward−looking statements to reflect events or circumstances occurring after the date of this press release.
    [Show full text]
  • Veritas Backup Reporter Installation Guide Veritas Backup Reporter Installation Guide
    Veritas Backup Reporter Installation Guide Veritas Backup Reporter Installation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 6.2 PN: : (HRO7210)SKU 11132088 Legal Notice Copyright © 2007 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Actionable Infrastructure™, Active Extensions™, ActiveAdmin™, Anti-Freeze™, Application Saver™, Backup Exec™, Bare Metal Restore™, BindView™, Bloodhound™, Bootguard™, Brightmail™, bv-Admin™, bv-Control™, CarrierScan™, CleanSweep™, ColorScale™, CommandCentral™, Confidence Online™, CrashGuard™, Day-End Sync™, dbAnywhere™, DeepSight™, Defender™, Digital Immune System™, DiskDoubler™, DiskLock™, Drive Image™, Enterprise Security Manager™, Enterprise Vault™, FlashSnap™, FlowChaser™, Ghost Walker™, Ghost™, GoBack™, Healthy PC™, i3™, iCommand™, I-Gear™, Indepth™, Information Integrity™, Intellicrypt™, Intruder Alert™, LiveUpdate™, LiveState™, Mail-Gear™, ManHunt™, ManTrap™, MicroMeasure™, Mobile Update™, NetBackup™, NetProwler™, NetRecon™, Norton™, Norton 360™, Norton AntiSpam™, Norton AntiVirus™, Norton Commander™, Norton Editor™, Norton Guides™, Norton Internet Security™, Norton Mobile Essentials™, Norton Password Security™, Norton SystemWorks™, Norton Utilities™, Norton WinDoctor™, OmniGuard™, OpForce™, PartitionMagic™, pcAnywhere™, PowerQuest™, PowerVPN™, Procomm™, Procomm Plus™, PureDisk™,
    [Show full text]
  • Veritas Backup Reporter 6.5 Administrator's Guide Veritas Backup Reporter Administrator's Guide
    Veritas Backup Reporter 6.5 Administrator's Guide Veritas Backup Reporter Administrator's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 6.5 PN: : (HRO7210)SKU 11132088 Legal Notice Copyright © 2008 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Actionable Infrastructure™, Active Extensions™, ActiveAdmin™, Anti-Freeze™, Application Saver™, Backup Exec™, Bare Metal Restore™, BindView™, Bloodhound™, Bootguard™, Brightmail™, bv-Admin™, bv-Control™, CarrierScan™, CleanSweep™, ColorScale™, CommandCentral™, Confidence Online™, CrashGuard™, Day-End Sync™, dbAnywhere™, DeepSight™, Defender™, Digital Immune System™, DiskDoubler™, DiskLock™, Drive Image™, Enterprise Security Manager™, Enterprise Vault™, FlashSnap™, FlowChaser™, Ghost Walker™, Ghost™, GoBack™, Healthy PC™, i3™, iCommand™, I-Gear™, Indepth™, Information Integrity™, Intellicrypt™, Intruder Alert™, LiveUpdate™, LiveState™, Mail-Gear™, ManHunt™, ManTrap™, MicroMeasure™, Mobile Update™, NetBackup™, NetProwler™, NetRecon™, Norton™, Norton 360™, Norton AntiSpam™, Norton AntiVirus™, Norton Commander™, Norton Editor™, Norton Guides™, Norton Internet Security™, Norton Mobile Essentials™, Norton Password Security™, Norton SystemWorks™, Norton Utilities™, Norton WinDoctor™, OmniGuard™, OpForce™, PartitionMagic™, pcAnywhere™, PowerQuest™, PowerVPN™, Procomm™, Procomm
    [Show full text]
  • Solutions. Services. Response
    symantec corporation 2001 annual report Solutions. Services. Response. 2001 annual report 20330 Stevens Creek Blvd. Cupertino, CA 95014 USA www.symantec.com corporate directory Board of Directors Executive Officers Other Senior Executives Tania Amochaev John W. Thompson Cress Carter Chairman of the Executive Committee, Chairman of the Board, President and Vice President, Global Enterprise QRS Corporation (retired) Chief Executive Officer Marketing Charles M. Boesenberg Art Courville Rob Clyde President, Senior Vice President, General Counsel Vice President, Chief Technical Officer Post PC Ventures and Secretary John Holland Dr. Per-Kristian Halvorsen Stephen G. Cullen Vice President, Worldwide Security Services Center Director, Solutions & Services Senior Vice President, Consumer Products Technologies Center, Hewlett-Packard Steve Messick Laboratories Don Frischmann Vice President, North America Senior Vice President, Communications Enterprise Sales Robert S. Miller and Brand Management Chairman of the Board, Federal Mogul Akihiko Narita Corporation Dieter Giesbrecht President SKK and Vice President, Japan Senior Vice President, World Wide Bill Owens Sales and Services Cecil Perez Co-Chief Executive Officer and Vice Vice President, Latin America Chairman, Teledesic LLC Gail E. Hamilton Executive Vice President, Product, Allyson Seelinger George Reyes Delivery and Response Vice President, Consumer Sales Vice President and Treasurer, Sun Microsystems Greg Myers Garry Sexton Senior Vice President, Finance and Chief Vice President, Asia Pacific
    [Show full text]