Apple Version 3 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Apple Version 3, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Apple Version 3 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Apple Version 3. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Apple Version 3 should contain:
- informations concerning technical data of Apple Version 3
- name of the manufacturer and a year of construction of the Apple Version 3 item
- rules of operation, control and maintenance of the Apple Version 3 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Apple Version 3 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Apple Version 3, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Apple service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Apple Version 3.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Apple Version 3 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

                                 V ersion 3 September 1, 200[...]

  • Page 2

     The products described in this User's Guide are licensed products of NetPurifier, Inc. This User's Guide contains proprietary information protected by copy right, and this User's Guide and all accompanying softwa re and documentation are copyrighted. NetPurifier, Inc. , hereafter re ferred to as NetPurifier, does not warrant that[...]

  • Page 3

                            Ta ble of C onten ts........................................................................ i Introdu ctio n an d Ge ttin g Sta rted ........................................... 1 -1 Features .......................................... ................[...]

  • Page 4

                           DNS ............................................................... .................................3-8 Com pleting the DNS/Gate way Configur ation .................................3-8 DHCP Conf iguration .....................................[...]

  • Page 5

                                              !          "     #        !          "     #     [...]

  • Page 6

                         $ $ $ $ H o w N e t Pu r i f i e r W o rk s Ov erv ie w NetPurifier is a hardware-and-softw are, set-it-and-forget-it device that plugs into your networ k and redirects all Internet traffic to itself. Only the NetPurifier communica tes directly with the Intern[...]

  • Page 7

                          % % % % Se n s it iv i ty L ev els Level 1 This level is suggested only for the youngest children or where the strictest policy is en for ced.  In c o r p or a tes v e ry s t ri c t fi l t e ri ng a n d m i n im a l d o w n l oa d i ng ca pa bi li ti es[...]

  • Page 8

                         & & & & Level 4 This level is suggested fo r public access points such as kiosks and library terminals, High School and colleges and filtered adult use.  P or n i s n o t a l l o w e d .  We b ba se d e ma i l a l l o w e d .  D ow n l[...]

  • Page 9

                          ' ' ' ' through this document, w e have added blue-colored ho t links to the Table of Contents, index , chapters, and appendixes in this User’s Guide. Clicking one o f these hot links automatically moves you to that location in this U[...]

  • Page 10

                         ( ( ( ( G et t i n g S t a r t e d NetPurifier suggests that the following order of installation and configuration is followed. 1. H av e th e f ol lo w i n g i n f or ma t io n a v ai l a bl e w he n i ns ta l li n g an d c o n fi gu r i n g N e tP ur i fie r[...]

  • Page 11

             "     )           $ $ $ $                $           #     )                #     )         ?[...]

  • Page 12

             "     )          $ $ $ $    $ $ $ $ Po wer On a nd In d ica t o r L i g ht s After all connections are made Ne tPurifier may be powered on by pressing the power switch on the fron t of the unit. The green indicator light indicates th at NetPurifier is pow[...]

  • Page 13

             "     )           $ $ $ $    % % % % Wi n do ws 2 000 / X P 1. R i gh t c l i c k M y N e tw or k P l a c es 2. C l ic k P r o pe rt i es o f th e Lo c al A rea N e tw or k y ou a re u si n g . 3. D ou bl e c l i c k In te r n e t P ro to co l . 4. S e[...]

  • Page 14

             "     )          $ $ $ $    & & & & M a k i n g a c o n n e c t i o n NetPurifier is accessed by pointing your browser to 192.168.1.9:10000. Upon a success ful connection you will see: Fi g ur e 2- 2 : Web m in Lo g i n You are now ready t[...]

  • Page 15

         "     "     )            % % % %                %       #    #      #    #      #    #      #    #    ?[...]

  • Page 16

         "     "     )          % % % %    $ $ $ $ Ch ang i n g t h e d efa u lt pa s s wo r d Upon successful login you w ill be presented with the W ebmin interface. Fi g ur e 3- 2 : Se le c t W eb m i n U s er s After clicking on Securit y you will be presente[...]

  • Page 17

         "     "     )            % % % %    % % % % To change the default passw ord enter the new passw ord, change the Password drop down selection to set to , click on Save. Important: NetPurifier is factory configured to allow login access from any comp[...]

  • Page 18

         "     "     )          % % % %    & & & & D N S /G a t e wa y C o n f i g u r a t i o n Fi g ur e 3- 4 : Se le c t N e tw or k Co n fi g ur ati on In this section the DNS and Gatew ay settings of your netw ork will be configured. To acces[...]

  • Page 19

         "     "     )            % % % %    ' ' ' ' Ne t wor k In t er f a ce s ( I P A dd r es s C o n f ig u r a ti o n) NetPurifier is factory configured to an IP of 192.168.1.9 with a subnet mask of 255.255.255.0. If your ne twork d[...]

  • Page 20

         "     "     )          % % % %    ( ( ( ( Warning: Entering the wrong IP address and subnet mas k will cause you to lose communication w ith NetPurifier. If you do not reme mber the information entered you will not be able to reconnec t with NetPurifier.[...]

  • Page 21

         "     "     )            % % % %    * * * * Ro ut in g an d G at e wa y s Fi g ur e 3- 8 : En te r i ng Ga t e wa y IP Enter the IP address of the Internet Gateway that NetPurifier wi ll use to access the Internet. This may be the same Internet gat[...]

  • Page 22

         "     "     )          % % % %    + + + + DN S Fi g ur e 3- 9 : En te r i ng DN S S et t i ng s Enter the DNS settings t hat NetPurifier will use to resolve Domain Names. These may be the same DNS servers that the client computers are using. W he n compl[...]

  • Page 23

         "     "     )            % % % %    , , , , D H C P C o n f i g u r a t i o n NetPurifier can operate in conjunction w ith an existing DHCP server or with its own built-in DHC P server. In either case the key to the successful operation of N etPuri[...]

  • Page 24

         "     "     )          % % % %    - - - -  S et t i ng u p th e S ub ne t Fi g ur e 3- 1 1 : S e le c t in g N e t wor k Click on the current IP ad dress as shown above to exp ose the DHCP subnet settings Fi g ur e 3- 1 2 : S e tt i n g t he [...]

  • Page 25

         "     "     )            % % % %        Edit Client Options The example below shows the factory defaults for setting the DHCP Client options If your netw ork uses different settings then replace the values show n with your n[...]

  • Page 26

         "     "     )          % % % %    $ $ $ $ P o r t B l o c k e r Port Blocker allows the selectiv e enabling and disabling of ports. This can restrict or allow the use o f certain applications such as email, peer-to-peer music sharing and inst[...]

  • Page 27

         "     "     )            % % % %    % % % % Ch ang i n g P o rt B lo cke r Co n f i gu r at ion Fi g ur e 3- 1 5 : C ha ngi n g P o r t B l oc k e r C o nf i gu r a ti on En a bl i n g Co m m on Po rt s To enable services such as F TP, [...]

  • Page 28

         "     "     )          % % % %    & & & & A ddi n g U s er De f i n ed Por t s If a port is not listed it may be entered manually by entering the port number in User Defined Ports. A ran ge of ports may be entered by using ran[...]

  • Page 29

         "     "     )            % % % %    ' ' ' ' C h a n g i n g le v e ls , l is t s a n d m e s s a g e s Ch ang i n g L ev el s Changing Sensitivity Levels on NetPu rifier is as simple as clicking on the level desired.[...]

  • Page 30

         "     "     )          % % % %    ( ( ( ( Fi l t er M a t ri x Smart Filter Technolog y B=banned De scription Level 1 Level 2 Level 3 Level 4 Smart Filter Thresh old 50 100 150 200 Banned Sites Filter B=banned Description Level 1 Level 2 Leve[...]

  • Page 31

         "     "     )            % % % %    * * * * Banned File Extensions B=banned Description Level 1 Level 2 Level 3 Level 4 .cpl Con trol Panel extension B .crt Secu rity certificate B .dll W indows system file B .exe Program B B B .hlp Hel[...]

  • Page 32

         "     "     )          % % % %    + + + + B=banned Description Level 1 Level 2 Level 3 Level 4 .pif Short cut to MS-DOS program B .prf Microsoft Outlook p rofile settings B .reg W indows registry entries B .scf W indows Explorer command B .sc[...]

  • Page 33

         "     "     )            % % % %    , , , , B=banned Description Level 1 Level 2 Level 3 Level 4 .cdr Mac dis k image B .dmg Mac dis k image B .smi Mac self mounting disk image B .sit Mac com pressed file B .sea Mac compressed file, sel[...]

  • Page 34

         "     "     )          % % % %    $- $- $- $-  A ddi n g t o t he E xc ept io n S i t e l i s t To access the Exception Site list click on Exception Site List. Place sites that you w ish to except from NetPurifier filtering in the Exception Site List. ?[...]

  • Page 35

         "     "     )            % % % %    $ $ $ $ A ddi n g t o t he E xc ept io n I P li s t To access the Exception IP list clic k on Exception IP List . Place the IP’s of computers that yo u do not want filtered by NetPurifier in this li[...]

  • Page 36

         "     "     )          % % % %    $$ $$ $$ $$ Ch ang i n g t h e A cc es s D en i ed p a ge me ss ag e  Fi g ur e 3- 1 9 : C ha ngi n g A cce ss De nie d Me s s a ge W he n NetPurifier determi nes that an Internet page should not be shown to the reque[...]

  • Page 37

         "     "     )            % % % %    $% $% $% $% A dd t o B a nn ed S it e L i st If a site is found that you believe should be banned it may be easily added using the Banned Site List. To add a site, enter the n ame of the site. It is not necessary[...]

  • Page 38

         "     "     )          % % % %    $& $& $& $&[...]

  • Page 39

       )          )            & & & &                &     )                   )                [...]

  • Page 40

       )          )          & & & &    $ $ $ $ N e t wo r k F lo w 1. U se r re qu e s ts w e b p a g e ( 1) . N e tP ur i fie r ch e c k s i nt e r na l ca che f o r p a g e . I f l o ca ll y ca che d, N etP ur i fi er re spo n ds t o re que st i mm e d ia t[...]

  • Page 41

       )          )            & & & &    % % % % Bl ack l i st NetPurifier maintains a Bl acklist of sites that have been deemed unacceptable. The list is cate gorized as follows: Categories Advertising Mail Aggressive Pornography Audio-video Proxy Drug[...]

  • Page 42

       )          )          & & & &    & & & & Sm a rt F il t e r T ech n o l o gy Blacklists and the PICs rating system are very effective if the offending web site is know n and if they properly rate themselves. 100’s of new sites catering[...]

  • Page 43

            .      "                        /                 #              #              #    [...]

  • Page 44

            .      "           $ $ $ $[...]

  • Page 45

                 0                            /         !        1           !        1           ![...]

  • Page 46

                 0                $ $ $ $ T e c h n i c a l S u p p o r t NetPurifier provides technical phone support at 866 875-1254. Email support is availabl e at support@netpurifier.com . You can also fax your questions to us at our 24-hour fax number: 408-265- [...]

  • Page 47

     )                                   /       !    !           !    !           !    !           ! [...]

  • Page 48

     )                       $ $ $ $ Caching Proxy N et P u ri fi e r i n c o rp o ra t es a ca c h i n g p r o x y th a t c a ch es w e b pa ge s tha t ha v e b ee n a cc es s ed a n d fi l t e r ed . S ub s e qu en t ac ces se s to t h e s e p a g e s are s e rv ed fr om th e c a[...]

  • Page 49

        [...]