...================================================================== Robin Hood – The Legend of Sherwood v1.0 Readme file – October 25th, 2002 ================================================================== Thank you for purchasing Robin Hood – The Legend of Sherwood. The Spellbound Team wishes you a lot of fun with their new game. This readme file contains useful information that could help you to solve problems with the game. ================================================================== CONTENTS Getting Started · System Requirements · DirectXtm and driver information · Installing and starting the game · Uninstallation Problems and Solutions · Performance optimisation on slow systems · Known problems · Technical Support ================================================================== GETTING STARTED ================================================================== System Requirements ------------------------------------------------------------------ OS: Windows 98/ME/2000/XP CPU: 233 MHz Intel Pentium II or similar CPU RAM: 64 MB CD/DVD-ROM speed: 4x Hard drive space: 1GB available Video: 4 MB RAM and DirectXtm-compatible Sound: DirectXtm compatible sound device Input: Keyboard, Mouse Recommended: CPU: 500 MHz Pentium III or similar CPU RAM: 128 MB DirectXtm and driver information ------------------------------------------------------------------ ...
Words: 1079 - Pages: 5
... Oregon. TASK Make a report on the Windows Control Panel with screen shots and your experience with control panel. The Control Panel for Windows7 on a Network Control Panel for a PC Control Panel The Control Panel is a part of the Microsoft Windows graphical user interface which allows users to view and manipulate basic system settings and controls via applets, such as adding hardware, adding and removing software, controlling user accounts, and changing accessibility options. Additional applets can be provided by third party software. The Control Panel has been an inherent part of the Microsoft Windows operating system since Windows 2.0, with many of the current applets being added in later versions. Beginning with Windows 95, the Control Panel is implemented as a special folder, i.e. the folder does not physically exist, but only contains shortcuts to various applets such as Add or Remove Programs and Internet Options. Physically, these applets are stored as .cpl files. For example, the Add or Remove Programs applet is stored under the name appwiz.cpl in the SYSTEM32 folder. In recent versions of Windows, the Control Panel has two views, Classic View and Category View, and it is possible to switch between these through an option that appears on either the left side or top of the window. Many of the individual Control Panel applets can be accessed in other ways. For instance, Display Properties can be accessed by right-clicking on an empty area of the desktop...
Words: 549 - Pages: 3
...Windows Enabler Overview: Windows Enabler is a program that runs on Microsoft Windows 95/98/Me/NT4.0/2000. It allows the user to enable disabled windows and controls such as buttons and tick boxes and choose menu options that would normally be disabled. This is obviously a very dangerous practice if used recklessly but having said that, you’d be surprised at how often it comes in handy. Windows Enabler has a very simple user interface; it appears as an icon in the system tray and can be turned on and off simply by clicking on it. Windows enabler may be freely distributed as long as the entire package (or a superset) is distributed unaltered. Installing: Windows Enabler is a very simple utility and does not ship with an install program. The installation process is simple; just copy the two files (“Windows Enabler.exe” and “EnablerDLL.dll”) somewhere on your system and run “Windows Enabler.exe” to run the program. I normally place a shortcut to “Windows Enabler.exe” in my “Startup” program group so Windows Enabler is always available! Windows enabler does not make any registry entries or use any data files so uninstalling is accomplished by simply deleting its files (“Windows Enabler.exe” and “EnablerDLL.dll”). Using Windows Enabler: To run Windows Enabler execute the file “Windows Enabler.exe”; the simplest way to do this is to place a shortcut to it somewhere on your system such as the desktop, the start menu or the “Startup” program group. When Windows Enabler...
Words: 595 - Pages: 3
...Summary A malicious program that secretly integrates itself into program or data files. It spreads by integrating itself into more files each time the host program is run. Disinfection & Removal Automatic Disinfection Allow F-Secure Anti-Virus to disinfect the relevant files. For more general information on disinfection, please see Removal Instructions. Technical Details The CIH virus was first located in Taiwan in early June 1998. After that, it has been confirmed to be in the wild worldwide. It has been among the ten most common viruses for several months. CIH has been spreading very quickly as it has been distributed through pirated software. History It seems that at least four underground pirate software groups got infected with the CIH virus during summer 1998. They inadvertently spread the virus globally in new pirated softwares they released through their own channels. These releases include some new games which will spread world-wide very quickly. There's also a persistent rumor about a 'PWA-cracked copy' of Windows 98 which would be infected by the CIH virus but F-Secure has been unable to confirm this. Later on, CIH was distributed by accident from several commercial sources, such as: • Origin Systems website where a download related to the popular Wing Commander game was infected • At least three European PC gaming magazines shipped magazines where the cover CD-ROM was infected - one of them even included a note inside advising users to disinfect their...
Words: 693 - Pages: 3
...Ping tool is a computer network administration utility used to test the reachability of a host on an Internet Protocol network and to measure the round-trip time for messages sent from the originating host to a destination computer. Ping stands for Packet Inter Net Groper and its syntax is PING [options] destination_host 4. List steps used in creating a network layout (4 Marks) 5. Discuss the net watcher as a network tool (4 Marks) The Net Watcher is a system tool in Microsoft Windows 95 and in Windows 98 that is used for monitoring shared resources on other computers that are running on Windows 95 and Windows 98. Remote administration must be enabled on the computers to be monitored by using the Passwords Utility in the Control Panel. The Net Watcher can be referred to as the Windows 95 and the Windows 98 equivalent of the more powerful Windows NT tool Server Manager and the Windows 2000 tool Computer Management. The Net Watcher shows all the current connections to a computer running Windows 95 or 98, along with the names of the connected users, the printers and files that are in use and the level of access that is granted. The computer administrator can use the Net Watcher to close the files that are in use, disconnect particular users from the shared...
Words: 339 - Pages: 2
...career. EDUCATION: NJ State Dept of Workforce Development Certified Fork Lift Operator Windsor Institute of Technology M.C.S.E., M.C.S.A., C.I.W., MSOFFICE, AND A+. Alpha Train Computer Corp. Client Server Technician Program Chubb Institute Data Center Support Program De-Vry Technical Institute Electronic Technician Program Middlesex County College Associate Degree in Business Highlights of qualifications: HARDWARE: AS400, IBM Compatible, Mainframe, MS Office, Lotus Notes. Software: Microsoft Exchange, Phone Access Linkup, Electronic Mail, Visual Basic, SQL, MS Windows 95, JCL, MVS, SNA. Manager & Server, 1.2 & 2.0 SQL Server, and ARCServe, MS-DOS 6.x, Windows 3.1, W95 – 98, Windows NT, MS Office Suite Applications, Ms Outlook, Ghost, Palm Pilot Software, Internet Explorer, Netscape Navigator, Microsoft SMS 1.2/2.0. Operating Systems: Installed Windows 95, Windows3.1, Windows NT 4.0, Windows 98, Windows 2000-, Windows NT 3.51 & 4.0, Unix, and PERL Script. Topology/: Token Ring and Ethernet, IPX/SPX, TCP/IP, NetBEUI, Protocols NETBIOS. EXPERIENCE: Bankers Life and Causality 05/10-09/11 Life Insurance Sales AT&T Mobility 10/07-08/09 Retail Sales Consultant * Sales and service of clients to suit their needs for wireless communications. * Complying with customer service needs and proper guidance with their equipment. * Receiving cash/credit/debit payments and assisting clients with...
Words: 642 - Pages: 3
...Microsoft to future successful. After that, Microsoft found an instant success where they launch the window 3.0 which is offered an improved set of windows icons and application like file manager and program manager where still being used today. Microsoft doing a magazine advertising and received endorsement from the top computer magazine in the industry is another key for successful. This strategy can increase the named of Microsoft and making Microsoft windows and Microsoft office the must have software in the world. This campaign has given the name to Microsoft and they are able to get more market share. Another Microsoft strategy is used of slogan “Where Do You Want To Go Today”. This slogan has been used when they launch Windows 95 and Windows...
Words: 321 - Pages: 2
...d. Supply chaining 3. Friedman argues that 8/9/95 is a significant date in the history of globalization. Why? a. Netscape went public, ushering in the Internet boom, which led to massive investment in fiber optics and other high tech infrastructure b. Bill Gates and Microsoft introduced Windows 95, which revolutionized the way in which companies manage information c. NAFTA was ratified by the governments of the U.S., Mexico and Canada, forming the world's largest free trade area d. Bill Clinton signed a free trade accord with China, the last major bastion of Communism in the world 4. Friedman mentions many companies that are using information technology to better serve their customers and enhance their position in the marketplace. Which of the following is a company he does NOT discuss? a. Southwest Airlines b. McDonald's c. Jet Blue d. Apple Computer 5. The owner of an American manufacturing company closes his factory in Canton, Ohio and opens a new one in Canton, China. According to Friedman, this is an example of: a. Outsourcing b. Offshoring c. Insourcing d. Open-Sourcing 6. Friedman argues that 11/9 is a critical date in the history of globalization. Why? a. Friedman is dyslexic; terrorists struck the Twin Towers in New York on 9/11 - not 11/9 b. The Berlin Wall fell on 11/9/89, symbolizing the end of Communism c. Bill Gates and Microsoft introduced Windows 95 on 11/9/95, which revolutionized the...
Words: 633 - Pages: 3
...1 Open Active Directory Users and Computers. 2 In the console tree, right-click the folder in which you want to add a user account. (Active Directory Users and Computers/domain node/folder) 3 Point to New, and then click User. 4 In First name, type the user's first name. 5 In Initials, type the user's initials. 6 In Last name, type the user's last name. 7 Modify Full name to add initials or reverse order of first and last names. 8 In User logon name, type the user logon name, click the UPN suffix in the drop-down list, and then click Next. 9 If the user will use a different name to log on to computers running Windows 95, Windows 98, or Windows NT, then you can change the user logon name as it appears in User logon name (pre-Windows 2000) to the different name. 10 In Password and Confirm password, type the user's password, and then select the appropriate password options. To perform this procedure, you must be a member of the Account Operators group, Domain Admins group, or the Enterprise Admins group in Active Directory, or you must have been delegated the appropriate authority. As a security best practice, consider using Run as to perform this procedure. For more information, see Default local groups, Default groups, and Using Run as. To open Active Directory Users and Computers, click Start, click Control Panel, double-click Administrative Tools, and then double-click Active Directory Users and Computers. To add a user, you can also click...
Words: 317 - Pages: 2
...Command & Conquer™: Yuri’s Revenge™ LATE BREAKING NEWS FROM THE FRONT Copyright 2001 Electronic Arts Inc. All rights reserved. Westwood Studios™ is an Electronic Arts™ brand. Version #: 1.001 November 12th, 2001 For latest news and updates visit WWW.WESTWOOD.COM - - TOP SECRET - - Commander: Thanks for your continued participation in the global war effort against the madman Yuri. Our boys at the Lab have come up with some modifications for your arsenal that should improve your battle experiences. Review the following bulletin from Command Headquarters with great care. Commit it to memory. Your understanding of these could be crucial to your victory or defeat on the battlefield! Good Luck. --President Michael Dugan CHANGES & FEATURE UPDATES: General: • To maximize game performance for all game modes, it’s best to set the game’s resolution to 640 x 480 pixels. The higher the resolution setting, the slower the game’s performance, especially on lower end PCs. • Another way to maximize WOL game performance is to never adjust the Internet Connection Slider (in WOL Options Screen). The game determines the optimal setting before starting the battle. This is often confused by users in believing moving this slider will increase the game’s speed, which it does not. • PCs with more than one CD Rom device caused the game to launch slowly. This has been fixed. Units & Structures: ...
Words: 3997 - Pages: 16
...DHCP client may be incorrect. For example, a client may acquire its IP address from a DHCP server, but the DNS records would not reflect the IP address acquired nor provide a mapping from the new IP address to the computer name (FQDN). In Windows 2000, DHCP servers and clients can register with DNS to provide this update service if the DNS server supports DNS with dynamic updates. The Windows 2000 DNS service supports dynamic updates. A Windows 2000 DHCP server can register with a DNS server and update pointer and address (A) resource records on behalf of its DHCP-enabled clients using the DNS dynamic update protocol. The ability to register both A and PTR type records lets a DHCP server act as a proxy for clients using Microsoft Windows 95 and Windows NT 4.0 for the purpose of DNS registration. DHCP servers can differentiate between Windows 2000 and other clients. An additional DHCP option code (option code 81) enables the return of a client's FQDN to the DHCP server. If implemented, the DHCP server can dynamically update DNS to modify an individual computer's resource records with a DNS server using the dynamic update protocol. This DHCP option permits the DHCP server the following possible interactions for processing DNS information on behalf of DHCP clients that...
Words: 429 - Pages: 2
...NT1110 Computer Structure and Logic Week 7 Unit 9 Quiz 1. Biometrics is used to authenticate based on: a. something you know. b. something you are. c. something you have. d. something you do. 2. Which of the following is used to encrypt an entire hard disk? a. EFS b. NTFS c. BitLocker d. Local Audit Policy 3. Which file system provides the most features? a. FAT b. FAT16 c. FAT32 d. NTFS 4. An example of something a user knows used for authentication is a: a. retina scan. b. thumbprint. c. PIN. d. signature. 5. A firewall that protects against malicious traffic inbound and outbound is called a/an __________ firewall. a. one-way b. two-way c. pass through d. filtering 6. Files encrypted with EFS cannot be opened by: a. the user who encrypted them. b. EFS key holders. c. administrators. d. guest users. 7. Which is not a good password management technique? a. Changing passwords periodically b. Enforcing a minimum password length c. Telling a friend your password in case you forget it d. Preventing old passwords from being reused NT1110 Computer Structure and Logic Week 7 Unit 9 Quiz 8. Sending an email that tricks a user into providing personal information is a form of: a. baiting. b. phishing. c. pretexting. d. Trojan horsing. 9. Which is not a Windows account level? a. Administrator b. Guest c. Limited d. Supervisor 10. Which permission is needed to access and run programs? a. List b. Modify c. Read and execute d. Write 11. This is a graphical file-management...
Words: 591 - Pages: 3
...Command & Conquer™: Yuri’s Revenge™ LATE BREAKING NEWS FROM THE FRONT Copyright 2001 Electronic Arts Inc. All rights reserved. Westwood Studios™ is an Electronic Arts™ brand. Version #: 1.001 November 12th, 2001 For latest news and updates visit WWW.WESTWOOD.COM - - TOP SECRET - - Commander: Thanks for your continued participation in the global war effort against the madman Yuri. Our boys at the Lab have come up with some modifications for your arsenal that should improve your battle experiences. Review the following bulletin from Command Headquarters with great care. Commit it to memory. Your understanding of these could be crucial to your victory or defeat on the battlefield! Good Luck. --President Michael Dugan CHANGES & FEATURE UPDATES: General: • To maximize game performance for all game modes, it’s best to set the game’s resolution to 640 x 480 pixels. The higher the resolution setting, the slower the game’s performance, especially on lower end PCs. • Another way to maximize WOL game performance is to never adjust the Internet Connection Slider (in WOL Options Screen). The game determines the optimal setting before starting the battle. This is often confused by users in believing moving this slider will increase the game’s speed, which it does not. • PCs with more than one CD Rom device caused the game to launch slowly. This has been fixed. Units & Structures: ...
Words: 5820 - Pages: 24
... Oregon. TASK Make a report on the Windows Control Panel with screen shots and your experience with control panel. The Control Panel for Windows7 on a Network Control Panel for a PC Control Panel The Control Panel is a part of the Microsoft Windows graphical user interface which allows users to view and manipulate basic system settings and controls via applets, such as adding hardware, adding and removing software, controlling user accounts, and changing accessibility options. Additional applets can be provided by third party software. The Control Panel has been an inherent part of the Microsoft Windows operating system since Windows 2.0, with many of the current applets being added in later versions. Beginning with Windows 95, the Control Panel is implemented as a special folder, i.e. the folder does not physically exist, but only contains shortcuts to various applets such as Add or Remove Programs and Internet Options. Physically, these applets are stored as .cpl files. For example, the Add or Remove Programs applet is stored under the name appwiz.cpl in the SYSTEM32 folder. In recent versions of Windows, the Control Panel has two views, Classic View and Category View, and it is possible to switch between these through an option that appears on either the left side or top of the window. Many of the individual Control Panel applets can be accessed in other ways. For instance, Display Properties can be accessed by right-clicking on an empty area of the desktop...
Words: 549 - Pages: 3
...SINFOCORP SRL Manual para crear Instalador VB.NET Tutorial para crear instalador de Proyecto en Visual Basic .NET Carlos Hidalgo Lache 1 SINFOCORP SRL Manual para crear Instalador VB.NET PROGRAMAS DE INSTALACIÓN Introducción Una vez que una aplicación VB.NET ha sido desarrollada, comprobada y compilada, debe ser instalada en las máquinas cliente donde será utilizada en el futuro. En ese proceso el entorno .NET suministra una serie de métodos y herramientas para realizar programas instaladores dependiendo del tipo de aplicación creada y de las características de dicha máquina cliente. El programa instalador debe ocuparse de cargar la aplicación en la máquina cliente así como cualquier otro archivo o recurso que ésta emplee en su funcionamiento, ya sea en el estado actual o en el futuro previsto. Se distinguen tres tipos de instalaciones: instalación XCOPY programa instalador de aplicación programa instalador de módulo Instalación XCOPY Es el método más sencillo de instalación y no precisa el uso de ninguna herramienta de Visual Studio.NET por lo que constituye un método accesible a cualquier desarrollo. Se basa en el proceso de copia de la carpeta de la aplicación en la máquina cliente utilizando para ello el comando XCOPY de MSDOS disponible en cualquier sistema Windows. Para utilizarlo debe accederse a la línea de comandos desde Inicio Þ Todos los Programas Þ Accesorios Þ Símbolo del Sistema y la sintaxis a emplear es XCOPY ruta_carpeta_origen...
Words: 4418 - Pages: 18