Operate Your Own World-Wide Web Server

Total Page:16

File Type:pdf, Size:1020Kb

Operate Your Own World-Wide Web Server Behavior Research Methods. Instruments. & Computers 1997.29 (2), 189-193 Operate your own World-Wide Web server WIUlAM C. SCHMIDT, RONHOFFMAN, and JOHN MAcDONALD Dalhousie University, Halifax, Nova Scotia, Canada Although many researchers wishing to use the World-Wide Webfor academic purposes rely on cen­ tralized Webservices, they should be aware thatit is neither expensive nor difficult to operate their own server. Doing so provides research-related benefits such as complete control over their host name and documents provided, the guaranteed ability to execute common gateway interface and server-side in­ clude programs, immediate access to their collected data, and the ability to better control who partic­ ipates in their experiments. This paper surveys Web-server software features likely to be of interest to psychologists and conceptually summarizes their operation and use. The basic steps required to set up a Webserver on popular microcomputers are reviewed, and security issues concerning Web-serveropera­ tion are discussed. An accompanying resource Webpage can assist users in setting up their own servers. Numerous applications ofWeb technology promise to These include the ability to use common gateway inter­ assist psychologists. A wide range ofuses for psychology face (COl) programs, server-side includes (SSI), and have already been promoted; these include using the image maps. The benefits of operating your own Web World-Wide Web (WWW) as an instructional aid (Welch server, as opposed to entrusting this task to others, will & Krantz, 1996) and presenting lab and departmental then be examined and security issues pertaining to server Web pages (Krantz, 1995). Some of the more attractive operation discussed. uses of the WWW for psychological research involve interaction with remote participants for the purpose of THE CLIENT/SERVER RELATIONSHIP gathering data in experiments conducted via the Web. Work along this line has already been reported for psychoacous­ Figure 1 depicts a small portion ofthe Web. A client is tical experiments (Welch & Krantz, 1996) and for survey a computer that runs a Web browser, requests informa­ research (Schmidt, 1997). Other research and teaching tion from a Web server, and displays received information applications are sure to follow. to the user according to a predefined convention (hyper­ This paper provides researchers who wish to conduct text markup language, or HTML). experiments via the Web with a conceptual-level descrip­ Within HTML code, links may be found. Such links pro­ tion ofthe operation ofa Web server and familiarizes the vide URLs (universal resource locator-a specially for­ reader with features ofservers that may be ofuse in creat­ matted address ofa document on the Web) to other Web ing well-implemented experiments. Specific Web-server documents or programs, and following such links presents software is not discussed (due to the rapidity with which the user with the content referenced by these. Because of details associated with such software change and the the versatility ofthe URL, any HTML document can ref­ variations that exist across computer platforms). How­ erence any document or program on other Web servers ever, a Web page has been created (http://or.psychology. anywhere on the Web. dal.ca/r-wcs/ WebServerLinks.html) to help users get Web-server software runs in the background on the host started in finding server software that satisfies their goals computer, waiting for document requests to come from and is appropriate for their machines. This resource page various clients. The server responds to such requests by also includes rudimentary directions for setting up a sending HTML-formatted information to the client. The server on a number of popular platforms and provides specific details ofsuch requests conform to the hypertext links to other Web-server resource pages. transfer protocol (HTTP) standard. Clients send requests After discussing the basic concepts underlying the to receive the contents ofa file containing HTML (which client/server relationship, a number ofsoftware features is then displayed) or the output ofa program referenced provided by many Web-server programs will be presented. by the URL (the so-called CGI program, the output of which is displayed). The writing ofthis paper was supported by NSERC Canada and the WEB-SERVER FEATURES Izzak Walton Killam Foundation. A page maintained by the first author containing all ofthe links to the resources referenced in this paper, as Different server programs do not have identical capa­ well as topically related links, can be found at http://or.psychology. bilities. For this reason, it is important for experimenters dal.ca/-wcs/WebServerLinks.html. W.C. Schmidt's address is: Depart­ ment ofPsychology, Dalhousie University, Halifax, NS, Canada 83H 4J I to understand precisely what their server software is ca­ (e-mail: [email protected]). pable of doing. Understanding these server features can 189 Copyright 1997 Psychonomic Society, Inc. 190 SCHMIDT, HOFFMAN, AND MACDONALD Computer B Computer A specific information back to the user. The capabilities of the CGI are limited only by programmers, their imagina­ I doc.htm! tion, and the limitations inherent in HTML. Whenever a , user clicks on a button, for instance, a CGI program is called to process the information submitted. i::::~~~~:~!'il Hypertext Link Whenever a CGI program is run, privileged informa­ tion about the HTTP transaction or the environments of both the host and client computers becomes available to the CGI program. Inferences based on such information can help determine actions to take in experimental de­ livery. Table 1 lists some environmental information available to CGI programs and a few ways that such in­ formation could be used by designers ofpsychology ex­ periments to improve the integrity ofthe data collected. For a complete list ofenvironment information available to CGI programs, consult http://hoohoo.ncsa.uiuc.edu/ Computer C cgi/env. html. To be able to run CGIs at all, the experimenter needs Figure 1. The client/server relationship. to be using a Web server that is able to execute CGI pro­ grams, and must have permission to install CGI pro­ grams on the host. Not all servers have CGI capabilities, assist experimenters in overcoming many obstacles to particularly some free or inexpensive server applications. successful data collection by taking appropriate mea­ sures in the implementation oftheir experiments. Server-Side Includes (SSI) Just as CGI programs add the ability for a Web server Common Gateway Interface (CGI) Programs to dynamically deliver information in response to a user's The CGI program is the most powerful component be­ actions (i.e., clicking on a button), SSIs add the ability to hind experiments conducted via the Web, and much use­ execute programs or other directives, but at the time of ful information has already been reported on them (see document delivery and without any actions on the part of Kieley, 1996). These programs enable one to dynami­ the user. SSIs allow the Web server to deliver documents cally use information supplied by the user of the client with tailored information to the client. Built-in instruc­ computer, to transform that information, and to supply tions or specially written programs similar to CGIs are Table 1 Environment Variables Available to CGI and SSI Programs Variable Name Description Potential Use -the URL of the document referencing -ensure that only clients using authentic the CGI on host documents are sending data to your CGI -the browser the client is using to send -knowledge of the user's browser can the request assist in sending properly formatted -contains not only browser name, but HTML (i.e., lynx text browser versus version and system the user is running graphical browsers) (i.e., Windows version, MacOS CPU) -the IP address ofthe remote computer -track who is sending information to hosting the client that is making the your CGI program, or whom your SSI request is sending information to -if available, the name of the -track who is sending information to REMOTE_ADDR computer your CGI program, or whom your SSI -ifunavailable, same as is sending information to REMOTE_ADDR SERVER_NAME -the server's hostname -may be used by self-referencing URLs AUTH_TYPE -ifserver supports password protection, -useful to know how to decode userl then this variable holds protocol password information -ifserver supports password protection, -useful to access identity of user from and the script is protected, this is the within CGI/SSI username approved SCRIPT_NAME -holds virtual path to the script -may be used by self-referencing URLs PATH_INFO -URLs may contain additional info -allows extra information to be passed beyond the SCRIPT_NAME in the URL request -PATH_INFO holds this raw information WWW SERVER 191 executed by the Web server when they are encountered Most SSI-capable servers provide facilities for a num­ within an HTML document and are expanded inline. That ber of functions to Web administrators without pro­ is, before delivering information to the client, the server gramming, such as including the contents offiles in the software filters each document requested, looking for spe­ document being distributed to the client (i.e., embedding cific keywords that instruct it to carry out SSI tasks. The a file within another), the date or time that the client's extra information included can be dynamically computed request was answered, a file's last modification date, or at the time that the document is delivered, allowing spe­ any of the environment information listed in Table 2. cialized or up-to-date information to be delivered to tar­ Not all Web servers support SSIs, so this is a feature geted users. to consider when selecting Web-server software. Keep in The SSI Web-server component fits into the server­ mind that there is a small time overhead in the delivery client relationship on the server side (see the SSI loop of of SSI documents, because they must be interpreted by Computer B in Figure 1).
Recommended publications
  • Software User Guide
    Software User Guide • For the safe use of your camera, be sure to read the “Safety Precautions” thoroughly before use. • Types of software installed on your computer varies depending on the method of installation from the Caplio Software CD-ROM. For details, see the “Camera User Guide”. Using These Manuals How to Use the The two manuals included are for your Caplio Software User Guide 500SE. Display examples: 1. Understanding How to Use Your The LCD Monitor Display examples may be Camera different from actual display screens. “Camera User Guide” (Printed manual) Terms: This guide explains the usage and functions In this guide, still images, movies, and sounds of the camera. You will also see how to install are all referred to as “images” or “files”. the provided software on your computer. Symbols: This guide uses the following symbols and conventions: Caution Caution This indicates important notices and restrictions for using this camera. 2. Downloading Images to Your Computer “Software User Guide” Note *This manual (this file) This indicates supplementary explanations and useful This guide explains how to download images tips about camera operations. from the camera to your computer using the provided software. Refer to This indicates page(s) relevant to a particular function. “P. xx” is used to refer you to pages in this manual. Term 3. Displaying Images on Your This indicates terms that are useful for understanding Computer the explanations. The provided software “ImageMixer” allows you to display and edit images on your computer. For details on how to use ImageMixer, click the [?] button on the ImageMixer window and see the displayed manual.
    [Show full text]
  • Configuring DNS
    Configuring DNS The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname. The Cisco IOS software maintains a cache of hostname-to-address mappings for use by the connect, telnet, and ping EXEC commands, and related Telnet support operations. This cache speeds the process of converting names to addresses. Note You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource record type AAAA is used to map a domain name to an IPv6 address. The IP6.ARPA domain is defined to look up a record given an IPv6 address. • Finding Feature Information, page 1 • Prerequisites for Configuring DNS, page 2 • Information About DNS, page 2 • How to Configure DNS, page 4 • Configuration Examples for DNS, page 13 • Additional References, page 14 • Feature Information for DNS, page 15 Finding Feature Information Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
    [Show full text]
  • V6.5 Data Sheet
    Data Sheet Blue Prism Network Connectivity To ensure compatibility with evolving network infrastructures, Blue Prism can be deployed in environments that utilize IPv4 or IPv6 network protocols for all connections as well as those that use a hybrid approach, utilizing a combination of both protocols. This allows all Blue Prism components - Runtimes, Clients, Application Servers - to connect using the preferred or most suitable method. Resource connectivity When establishing connections to Runtime Resources, Blue Prism uses the name specified in the DNS. This is based on the machine name and can either the short name or the Fully Qualified Domain Name (FQDN). If a Resource has both IPv4 and IPv6 addresses in the DNS, the network adapter settings of the connecting device (Application Server, Interactive Client, or Resource) are used to determine which IP address should be used to establish the connection: 1. The connecting device defaults to an IPv6 connection. 2. If an IPv6 connection is not established within 1.5 seconds and if the connecting device has multiple IPv6 addresses listed in the DNS, a connection attempt is made using the next available IPv6 address. 3. If an IPv6 connection is not established, the connecting device automatically attempts to connect using IPv4. 4. If all available IPv4 addresses have been tried without success, the Resource is considered unreachable. Commercial in Confidence Page 1 of 3 ®Blue Prism is a registerd trademark of Blue Prism Limited 6.5 Data Sheet | Blue Prism Network Connectivity Resource connectivity The following diagram illustrates the logic used for connections to Runtime Resources. Commercial in Confidence Page 2 of 3 ®Blue Prism is a registerd trademark of Blue Prism Limited 6.5 Data Sheet | Blue Prism Network Connectivity Application Server connectivity Application Server connectivity Clients and Resources can connect to Application Servers using the host name, IPv4 address, or IPv6 address specified in the connection settings on the Server Configuration Details screen.
    [Show full text]
  • Changing IP Address and Hostname for Cisco Unified Communications Manager and IM and Presence Service, Release 11.5(1) First Published
    Changing IP Address and Hostname for Cisco Unified Communications Manager and IM and Presence Service, Release 11.5(1) First Published: Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • End-User Computing Security Guidelines Previous Screen Ron Hale Payoff Providing Effective Security in an End-User Computing Environment Is a Challenge
    86-10-10 End-User Computing Security Guidelines Previous screen Ron Hale Payoff Providing effective security in an end-user computing environment is a challenge. First, what is meant by security must be defined, and then the services that are required to meet management's expectations concerning security must be established. This article examines security within the context of an architecture based on quality. Problems Addressed This article examines security within the context of an architecture based on quality. To achieve quality, the elements of continuity, confidentiality, and integrity need to be provided. Confidentiality as it relates to quality can be defined as access control. It includes an authorization process, authentication of users, a management capability, and auditability. This last element, auditability, extends beyond a traditional definition of the term to encompass the ability of management to detect unusual or unauthorized circumstances and actions and to trace events in an historical fashion. Integrity, another element of quality, involves the usual components of validity and accuracy but also includes individual accountability. All information system security implementations need to achieve these components of quality in some fashion. In distributed and end-user computing environments, however, they may be difficult to implement. The Current Security Environment As end-user computing systems have advanced, many of the security and management issues have been addressed. A central administration capability and an effective level of access authorization and authentication generally exist for current systems that are connected to networks. In prior architectures, the network was only a transport mechanism. In many of the systems that are being designed and implemented today, however, the network is the system and provides many of the security services that had been available on the mainframe.
    [Show full text]
  • Configuring Smart Licensing
    Configuring Smart Licensing • Prerequisites for Configuring Smart Licensing, on page 1 • Introduction to Smart Licensing, on page 1 • Connecting to CSSM, on page 2 • Linking Existing Licenses to CSSM, on page 4 • Configuring a Connection to CSSM and Setting Up the License Level, on page 4 • Registering a Device on CSSM, on page 14 • Monitoring Smart Licensing Configuration, on page 19 • Configuration Examples for Smart Licensing, on page 20 • Additional References, on page 26 • Feature History for Smart Licensing, on page 27 Prerequisites for Configuring Smart Licensing • Release requirements: Smart Licensing is supported from Cisco IOS XE Fuji 16.9.2 to Cisco IOS XE Amsterdam 17.3.1. (Starting with Cisco IOS XE Amsterdam 17.3.2a, Smart Licensing Using Policy is supported.) • CSSM requirements: • Cisco Smart Account • One or more Virtual Account • User role with proper access rights • You should have accepted the Smart Software Licensing Agreement on CSSM to register devices. • Network reachability to https://tools.cisco.com. Introduction to Smart Licensing Cisco Smart Licensing is a flexible licensing model that provides you with an easier, faster, and more consistent way to purchase and manage software across the Cisco portfolio and across your organization. And it’s secure – you control what users can access. With Smart Licensing you get: Configuring Smart Licensing 1 Configuring Smart Licensing Overview of CSSM • Easy Activation: Smart Licensing establishes a pool of software licenses that can be used across the entire organization—no more PAKs (Product Activation Keys). • Unified Management: My Cisco Entitlements (MCE) provides a complete view into all of your Cisco products and services in an easy-to-use portal, so you always know what you have and what you are using.
    [Show full text]
  • Student Computer User Agreement
    STUDENT COMPUTER USER AGREEMENT GUIDING PRINCIPLE OF THIS AGREEMENT: Lakeside’s technological resources are dedicated to further the school’s mission and to serve the educational pursuits of its students. Students using Lakeside’s technology services are expected to behave in accordance with the Community Expectations documented in the family handbook. Students are expected to act in ways that show consideration and respect for other people and enhance an open atmosphere of trust, both offline and online. TECHNOLOGY SERVICES The use of Lakeside’s technology services – tech support, network access, email accounts, storage services, software subscriptions and all other school-owned computer resources – is a privilege, not a right. This privilege may be revoked at any time for abusive conduct, or failure to abide by the school’s expectations and/or responsible usage listed below. GENERAL EXPECTATIONS ▪ Lakeside email accounts, software and services, and onsite network access are provided primarily for school-related work. ▪ Any user of Lakeside’s electronic communications resources is expected to respect the person and privacy of others. ▪ The configuration of school-issued computers (operating system, security settings and software applications) may not be altered. ▪ Using the Lakeside computer network to exchange or store pirated software, unlawful information, or other unauthorized copyright-protected material (i.e. music, multimedia) in any file format is strictly prohibited. ▪ Students are expected to maintain the integrity of their computing devices so as not to bring viruses, malware or spyware to school. Unprotected and infected devices are forbidden to connect to the school network and, when detected, will be disconnected from the network until resolved.
    [Show full text]
  • The Management of End User Computing a Research Perspective
    HD2 8 .M414 Oe>NeV THE MANAGEMENT OF END USER COMPUTING A RESEARCH PERSPECTIVE John F. Rockart Lauren S. Flannery February 1983 CISR WP #100 Sloan WP // 1410-83 Centerfor Information Systems Research Massachusetts Institute of Technology Sloan School of Management 77 Massachusetts Avenue Cambridge, Massachusetts, 02139 THE MANAGEMENT OF END USER COMPUTING A RESEARCH PERSPECTIVE John F. Rockart Lauren S . Flannery February 1983 CISR WP #100 Sloan WP // 1410-83 Rockart - Flannery 1983 Center for Information Systems Research Sloan School of Management Massachusetts Institute of Technology MAY 3 1 1983 RECe;v£d 1- ABSTRACT Based on interviews with 200 end users and 50 information systems managers concerned with end user computing, end users can be classified into six distinct types. Each of them needs differentiated education, support and control from the Information Systems function. End users exist primarily in staff functions. They develop and use a wide spectrum of computing applications ranging from "operational systems" of the type usually developed by information systems professionals to complex analytical programs. To support a large number of their applications a new computing environment, "the third environment" (in addition to the traditional COBOL and timesharing environments) must be developed by Information Systems (I/S) management. Close attention must also be paid by I/S management to the need to involve "functional support personnel" (end users in each functional area who spend most of their time programming and aiding other end users) in the I/S end user management process. An end user strategy is needed in each organization. In addition, users cite increasing needs for support from I/S management.
    [Show full text]
  • World-Wide Web Proxies
    World-Wide Web Proxies Ari Luotonen, CERN Kevin Altis, Intel April 1994 Abstract 1.0 Introduction A WWW proxy server, proxy for short, provides access to The primary use of proxies is to allow access to the Web the Web for people on closed subnets who can only access from within a firewall (Fig. 1). A proxy is a special HTTP the Internet through a firewall machine. The hypertext [HTTP] server that typically runs on a firewall machine. server developed at CERN, cern_httpd, is capable of run- The proxy waits for a request from inside the firewall, for- ning as a proxy, providing seamless external access to wards the request to the remote server outside the firewall, HTTP, Gopher, WAIS and FTP. reads the response and then sends it back to the client. cern_httpd has had gateway features for a long time, but In the usual case, the same proxy is used by all the clients only this spring they were extended to support all the within a given subnet. This makes it possible for the proxy methods in the HTTP protocol used by WWW clients. Cli- to do efficient caching of documents that are requested by ents don’t lose any functionality by going through a proxy, a number of clients. except special processing they may have done for non- native Web protocols such as Gopher and FTP. The ability to cache documents also makes proxies attrac- tive to those not inside a firewall. Setting up a proxy server A brand new feature is caching performed by the proxy, is easy, and the most popular Web client programs already resulting in shorter response times after the first document have proxy support built in.
    [Show full text]
  • Mozilla's Attachment to Open Public Consultation Survey
    European Commission’s Open Public Consultation on eIDAS Attachment to Mozilla’s Survey Response 1 October, 2020 About Mozilla 1 Feedback on QWACs in the eIDAS Regulation 2 Historical Background of QWACs and TLS Certification 4 TLS server certificates are not the correct place to store QWAC identity information. 5 Proposed Technical Alternatives to TLS binding in eIDAS 6 ntQWACs 7 Non-TLS QWAC Delivery Mechanisms 8 Additional Transparency and Security Concerns with the EU TSP List 9 Lack of Transparency 9 Irregular Audits 9 Insufficient Risk Management 9 Recommendations 10 Appendix A: Relevant Language from the eIDAS Regulation 11 Appendix B - Bringing Openness to Identity White Paper 13 About Mozilla Mozilla is the Corporation behind the Firefox web browser and the Pocket “read-it-later” application; products that are used by hundreds of millions of individuals around the world. Mozilla’s parent is a not-for-profit foundation that focuses on fuelling a healthy internet. Finally, Mozilla is a global community of thousands of contributors and developers who work together to keep the internet open and accessible for all. 1 Since its founding in 1998, Mozilla has championed human-rights-compliant innovation as well as choice, control, and privacy for people on the internet. According to Mozilla, the internet is a global public resource that should remain open and accessible to all. As stated in our Manifesto, we believe individuals' security and privacy on the internet are fundamental and must not be treated as optional. We have worked hard to actualise this belief for the billions of users on the web by actively leading and participating in the creation of web standards that drive the internet.
    [Show full text]
  • (Malicious Software) Installed on Your Computer Without Your Consent to Monitor Or Control Your Computer Use
    Spyware is a type of malware (malicious software) installed on your computer without your consent to monitor or control your computer use. Clues that spyware is on a computer may include a barrage of pop-ups, a browser that takes you to sites you don't want, unexpected toolbars or icons on your computer screen, keys that don't work, random error messages, and sluggish performance when opening programs or saving files. In some cases, there may be no symptoms at all. While the term spyware suggests that software that secretly monitors the user's computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can: Collect information stored on the computer or attached network drives, Collect various types of personal information, such as Internet surfing habits, sites that have been visited Collect user names and passwords stored on your computer as well as those entered from the keyboard. Interfere with user control of the computer Install additional software on the computer Redirect Web browser activity. Change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs. The best defense against spyware and other unwanted software is not to download it in the first place. Here are a few helpful tips that can protect you from downloading software you don't want: Update your operating system and Web browser software, and set your browser security high enough to detect unauthorized downloads. Use anti-virus and anti-spyware, as well as a firewall software, and update them all regularly.
    [Show full text]
  • ICU Medical Mednet™ Software User Guide
    Software User Guide For a list of ICU Medical MedNet compatible devices approved by country, refer to the ICU Medical MedNet Device Compatibility Matrix available through your ICU Medical Technical Support. 430-98350-001 (%, 2017-) Notes: ICU Medical MedNet™ Software User Guide Rx Only 16037-92-01 IMPORTANT Refer to this guide for proper use, warnings, and cautions associated with the installation and upgrade of the ICU Medical MedNet™ Software performed by the ICU Medical Service Team. Please contact your sales representative for any questions associated with installing and configuring the ICU Medical MedNet™ Software. The help files included with the ICU Medical MedNet™ software are provided as reference only. Please read this entire guide before using the ICU Medical MedNet™ Software. Please also read the ICU Medical Release Notes before using the ICU Medical MedNet™ Software. Intended Use The ICU Medical MedNet™ Medication Management Suite (MMS) is intended to facilitate networked communication between MMS compatible computer systems and MMS compatible Infusion pumps. The MMS provides trained healthcare professionals with the capability to send, receive, report, and store information from interfaced external systems, and to configure and edit infusion programming parameters. The MMS is intended to provide a way to automate the programming of infusion parameters, thereby decreasing the amount of manual steps necessary to enter infusion data. All data entry and validation of infusion parameters is performed by a trained healthcare professional
    [Show full text]