Tutorial for Administration tool (1) Select (2) Depress.

Slides:



Advertisements
Similar presentations
AIMSweb Benchmark Online Training For AIMSweb Teacher Users
Advertisements

A poorly made Tutorial By Avery Oppegard. Go to Drive.google.com Login to the photo account Username: mayospartanphotos Password: gospartans.
Make-N-Take A Wiki Jenifer Marquis and Shawna Andrews.
HOW TO ADD A USER ACCOUNT ON A MAC BOOK AIR. Step 1-Logging In Log in, the Preset username and password is the first initial of your first name and then.
1 Preparing Windows 2000 installation (Week 3, Wednesday 2/25/2006) © Abdou Illia, Spring 2006.
XP Tutorial 4 New Perspectives on Microsoft Windows XP 1 Microsoft Windows XP Personalizing Your Windows Environment Tutorial 4.
Incident/Accident Reporting 1. Please remember to open the I/A form in Internet Explorer not Chrome AccidentReportForm.pdf.
Compe 341 Oracle Installation Procedure. Oracle From Click.
11 MANAGING USERS AND GROUPS Chapter 13. Chapter 13: MANAGING USERS AND GROUPS2 OVERVIEW  Configure and manage user accounts  Manage user account properties.
11 WORKING WITH COMPUTER ACCOUNTS Chapter 8. Chapter 8: WORKING WITH COMPUTER ACCOUNTS2 CHAPTER OVERVIEW  Describe the process of adding a computer to.
11 WORKING WITH COMPUTER ACCOUNTS Chapter 8. Chapter 8: WORKING WITH COMPUTER ACCOUNTS2 CHAPTER OVERVIEW Describe the process of adding a computer to.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Tutorial Introduction Fidelity NTSConnect is an innovative Web-based software solution designed for use by customers of Fidelity National Title Insurance.
The basics of the Online Portal
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Office 2013 From the START menu, select Microsoft Word. You should be prompted to log into your school Microsoft 365 account.
Computer Information Use your own login and password if possible. To get a password, you must turn in the AUP sheet handed out at registration or sent.
How to Backup FNC Files to Corporate Network Using Windows XP Created By: Ricardo G. Mesa, Systems Administrator Date: January 17, 2006.
DocuShare Training Welcome to DocuShare Training.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Chapter 18: Windows Server 2008 R2 and Active Directory Backup and Maintenance BAI617.
Another Method to Open WebSpace as a Web Folder Alternative Method for Creating Web Folder in WebSpace, Slide 1Copyright © 2004, Jim Schwab, University.
OCR Nationals Unit 1: ICT Skills for Business AO1 - Demonstrate good working practices with files, directories/folders and sub- directories/subfolders.
Office 2013 and Windows 8: Essential Concepts and Skills Microsoft Access 2013.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
70-270: MCSE Guide to Microsoft Windows XP Professional 1 Windows XP Professional User Accounts Designed for use as a network client for: Windows NT Windows.
Screenshots of the E-book download For Windows and Flash disks.
Using Windows Explorer Windows explorer is different from Internet Explorer It is a Windows program designed to let you explore your hard drive and manage.
Lesson 12: Using the Recycle Bin deleting files or folders what the Recycle Bin is restoring files from the Recycle Bin emptying the Recycle Bin identifying.
Chapter 10: Rights, User, and Group Administration.
1 Getting Started with C++. 2 Objective You will be able to create, compile, and run a very simple C++ program on Windows, using Visual Studio 2008.
Ch 17 Securing the File System. Three Ways to Protect Files NTFS Permissions Encrypting File Service BitLocker full-disk encryption – BitLocker ToGo.
Page 1 User Accounts Lecture 3 Hassan Shuja 09/21/2004.
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
Guide to MCSE , Enhanced1 Activity 1-1: Determining the Windows Server 2003 Edition Installed on a Server Objective is to determine the edition of.
Google Drive 101 Learn the Basics by Linda Morris Central High School Media Specialist.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
Your Digital Technology Briefcase My information…when and where I need it.
User Management. User Registration Policy The issues of creation and management often clash in distributed organisations Central creation and management.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Here is the log in for your control panel. Enter your user name, password and click Login.
NO MORE FLASH DRIVES How to get your stuff printed at school.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
IPad Basics 101 Tuesday, October 1, 2013 Room 113W – 4pm Ms. Johnson, Instructional Coach.
 How to install and Activate Kaspersky Endpoint Security 10  How to block usb drives and CD/DVD drives  How to manually update Virus definition  How.
Working with the interface and interacting with the iPad app.
Product Training 1 JetFlash Software Application.
Turning Gears A Presentation An animation will play when the presentation is previewed (F5). If the animation does not play, please check the system requirements.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
How to Reset Forgotten Windows 8 Password password.html.
Classroom Wiki Tutorial EDIC 763 Instructional Design Fall 2011 Aysha Bajabaa Dr. Gary Whitt 1 NextBack.
Windows XP Professional Not Finish Yet
How to Bypass Windows 8 Password without Reset Disk
TOPSpro Special Topics
The Orientation Toolkit for CARE Offices
Google Classroom Tutorials
Work with the secure empty trash:-  Here the first step is to choose “Secure Empty Trash’ and remove the option from OSX version.  As per as.
Reset Windows Vista Password--Never Easier than before
Accessing & Using NetStorage
Martus Account Set Up Benetech is a non-profit organization that develops and supports Martus, a secure information management software for human rights.
Administering Your Network
Pages.
3.1 Basic Concept of Directory and Sub-directory
Active Directory Organizational Units
How to Save to Your Learners Drive
How to Use Home Inventory Pro 2011® Household manager
How to Save to Your Learners Drive
Presentation transcript:

Tutorial for Administration tool (1) Select (2) Depress

(1) Select (2) Depress Accessing the Administration section

The Username for administration is Administrator, with capital A. If passwords are implemented, the password is Administrator until changed by the user Administrator. If passwords are not implemented, a blank password will do. (1) Type (2) Depress

(1) Select (2) Depress Administrator can get reminded of the existing accounts

Unless cornered to using passwords, it is wise not to use them. They add complexity without adding much security. If you need security, keep the computers in a locked room with no Internet access and create users on removable USB drives.

To add a new user/project, first create a top directory for its exclusive use This creates a new folder called New folder Just rename New folder into e.g. selenide

MUST exist It is convenient to give same name to user and directory, but this is not necessary Username MUST be unique because it points to a data area and thus cannot point to several of them. On the opposite, several user names might point to the same data area Select

The Toolkit has created a tree of sub-directories of the apex directory. The Toolkit has no feature to delete users, directories or files other than temporary ones like VRML plot files. This can only be performed with Windows or DOS. If directories get inadvertently deleted within Windows, only the deleted ones will be automatically re-created as new empty ones upon next login of THAT user. Here, the new user has been created on a USB flash drive, giving an inexpensive solution for security. ALL data for this user ends up on the flash drive ONLY. No trace of the modeling activity is kept elsewhere.

Unlikely to be used

End of Administration tutorial