The NovoCRM Full install includes both the Server and Client setup packages. Once you have downloaded the installer package, extract it from the ZIP file format onto your local disk (Right click and select, Extract All). Ensure you are logged on as the local Administrator on the machine running the setup. This is required to install both the client and server.
NovoCRM supports multiple version of the Microsoft Windows operating system. Please review the installation notes for each operating system to ensure NovoCRM installs successfully. Windows 2000, Windows 2003 Server, Windows XP NovoCRM requires the .NET Framework 2.0 to be installed. Windows Vista NovoCRM requires the .NET Framework 2.0 to be installed. Microsoft Windows Vista installs the .Net Framework 3.0 by default. You can install both the Server and Client on one machine or have the server running on a dedicated machine with the NovoCRM Client installed on users local machines.
Download pdf NovoCRM - Quick Start Guide
Showing posts with label Utility. Show all posts
Showing posts with label Utility. Show all posts
Tuesday, September 30, 2008
Sunday, September 28, 2008
Self Service Reset Password Management GPO Distribution Guide
Self Service Reset Password Management (from here on the abbreviation 'SSRPM' will be used) is an application which allows users to reset their own (Active Directory) passwords. SSRPM is divided into three main software components, knowingly: The SSRPM Admin Console The SSRPM Service (with the SSRPM Database) The SSRPM User Client Software (the SSRPM Enrollment Wizard, the SSRPM Reset Wizard and the SSRPM GINA or SSRPM Credential Provider (when running Windows Vista))
The installation of SSRPM consists of the following steps: The installation of the SSRPM Admin Console, the SSRPM Service and finally the SSRPM User Client Software. The SSRPM User Client Software must be installed on each client workstation of all end-users which will use SSRPM. Instead of installing the software manually on the client workstations separately, it can be distributed and installed automatically on all client workstations.
This can be accomplished by using a so-called Group Policy Object or GPO, and can save a lot of time (especially with larger networks). The SSRPM User Client Software can be upgraded and removed centrally by using the same GPO as well. This document describes how the SSRPM User Client Software can be installed, upgraded and removed automatically from the client computers in your network by using a GPO.
Download pdf Self Service Reset Password Management GPO Distribution Guide
The installation of SSRPM consists of the following steps: The installation of the SSRPM Admin Console, the SSRPM Service and finally the SSRPM User Client Software. The SSRPM User Client Software must be installed on each client workstation of all end-users which will use SSRPM. Instead of installing the software manually on the client workstations separately, it can be distributed and installed automatically on all client workstations.
This can be accomplished by using a so-called Group Policy Object or GPO, and can save a lot of time (especially with larger networks). The SSRPM User Client Software can be upgraded and removed centrally by using the same GPO as well. This document describes how the SSRPM User Client Software can be installed, upgraded and removed automatically from the client computers in your network by using a GPO.
Download pdf Self Service Reset Password Management GPO Distribution Guide
Ez PC Lock User Guide
Ez PC Lock is a software program that allows you to remotely control the PC access time of any computer that you allow your employees or contractors access to, anywhere in the World. You can Lock, Restart, turn the power off on any PC that belongs to your account.
When to use Ez PC Lock
We recommend you to use Ez PC Lock on any computer in your office or outside of it. By allowing access to Computers and Laptops only for business use, you will extend your hardware lifetime and also minimize the chance of your system being destroyed by Viruses, SPY or Adware. You can also save money by minimizing electricity bills. The remote computers can be controlled from any computer that has Ez PC Lock Administrator installed and has logged in to the Secure Network with correct External ID and password (you can control remote PCs time from your office or home computer).
Here only a few examples of how Ez PC Lock can help you:
Example 1: Your Company has the flexibility to allow your employees to work from home. You gave laptops to a group of people and want to make sure that they don't use these laptops for their own needs. So, you can create a schedule for each of your employees, for example, You can allow PC use from 9 to 5 PM Monday to Friday,at all other times the computer will be turned off..
Download pdf Ez PC Lock User Guide
When to use Ez PC Lock
We recommend you to use Ez PC Lock on any computer in your office or outside of it. By allowing access to Computers and Laptops only for business use, you will extend your hardware lifetime and also minimize the chance of your system being destroyed by Viruses, SPY or Adware. You can also save money by minimizing electricity bills. The remote computers can be controlled from any computer that has Ez PC Lock Administrator installed and has logged in to the Secure Network with correct External ID and password (you can control remote PCs time from your office or home computer).
Here only a few examples of how Ez PC Lock can help you:
Example 1: Your Company has the flexibility to allow your employees to work from home. You gave laptops to a group of people and want to make sure that they don't use these laptops for their own needs. So, you can create a schedule for each of your employees, for example, You can allow PC use from 9 to 5 PM Monday to Friday,at all other times the computer will be turned off..
Download pdf Ez PC Lock User Guide
Wednesday, September 24, 2008
In-a-Flash User Guide
You have received your Perspective Desktop application files on a USB Identity Token. Insert this USB flash drive into one of the open USB slots on your computer. The Perspective Identity Token window will appear. Click on ‘Launch Perspective Desktop’ using the program provided on the device’.
Once the application is launched, you will see the “loading progress” dialog, which will remain present until the application
is fully loaded into memory. This may take anywhere from a couple of seconds up to several minutes, depending on the speed of your computer and what else your computer is doing at the time. Please be patient while the application loads.
Once successfully logged in, the Perspective Desktop window will appear, giving you a one-click dashboard to access all your information resources in a secure environment. Features include:
• Remote Desktop Control / Accessing Remote Files
• Instant Messaging
• Text Conferencing
• File Transfer
Download pdf In-a-Flash User Guide
Once the application is launched, you will see the “loading progress” dialog, which will remain present until the application
is fully loaded into memory. This may take anywhere from a couple of seconds up to several minutes, depending on the speed of your computer and what else your computer is doing at the time. Please be patient while the application loads.
Once successfully logged in, the Perspective Desktop window will appear, giving you a one-click dashboard to access all your information resources in a secure environment. Features include:
• Remote Desktop Control / Accessing Remote Files
• Instant Messaging
• Text Conferencing
• File Transfer
Download pdf In-a-Flash User Guide
Tuesday, September 23, 2008
Avast! + Transcode 360 + Vista Installation Guide
Transcode 360 enables the playback of unsupported video over Xbox 360 and Media Center Extender devices. This software is designed to run on Windows XP Media Center Edition 2005 and Microsoft Vista. Transcode 360 is fully featured, providing a clear and efficient interface, tightly integrated with your Media Center PC to enable a much more seamless experience than other 3rd party solutions. On your media extender, highlight the video you wish to watch and press the Info button on your remote to start enjoying video played back to you via Transcode 360.
Definition: A transcoder is a process that converts media from one format to another, in this case to high-quality MPEG2 for streaming to a Media Center Extender device such as the Xbox 360.
It is now a well-known fact that "Transcode" doesn't work with Vista if avast! (antivirus) is installed. As such, we've made available the instructions below to get your Xbox 360 up and running movies on your PC monitor, with very little time and effort wasted on your behalf. Thanks to JacobKlein's entry up on runtime360.com forum, here's what you need to do:
Get the latest versions of each
- I'm using Windows Vista RTM
- I'm using Transcode 360 for Vista v1.6.1 Beta
- I'm using avast! Home Edition v4.7.925 Beta
Download pdf Avast! + Transcode 360 + Vista Installation Guide
Definition: A transcoder is a process that converts media from one format to another, in this case to high-quality MPEG2 for streaming to a Media Center Extender device such as the Xbox 360.
It is now a well-known fact that "Transcode" doesn't work with Vista if avast! (antivirus) is installed. As such, we've made available the instructions below to get your Xbox 360 up and running movies on your PC monitor, with very little time and effort wasted on your behalf. Thanks to JacobKlein's entry up on runtime360.com forum, here's what you need to do:
Get the latest versions of each
- I'm using Windows Vista RTM
- I'm using Transcode 360 for Vista v1.6.1 Beta
- I'm using avast! Home Edition v4.7.925 Beta
Download pdf Avast! + Transcode 360 + Vista Installation Guide
Subscribe to:
Posts (Atom)