Copyright © 2002-2010 Motorola, Inc. All Rights Reserved.Last Modified August, 2010Getting Started with Timbuktu for Windows, version 9.0
10 | Chapter 2: Installing and Starting TimbuktuStarting and Shutting Down Timbuktu The Timbuktu Host will start automatically when you start Windows
Removing Timbuktu | 11Removing TimbuktuShould you wish to remove Timbuktu from your computer, it is important to follow the correct removal procedure.
12 | Chapter 2: Installing and Starting Timbuktu
| 13 Chapter 3: Configuring the Timbuktu GuestOnce you have installed Timbuktu, you can review and change your configuration settings. This chapter de
14 | Chapter 3: Configuring the Timbuktu GuestThe General Tab On the General tab, you can set the Timbuktu computer name. By default, Timbuktu uses y
Setting Timbuktu Guest Preferences | 15The Observe/Control TabTimbuktu Control and Observe sessions take place in a screen-sharing window, which displ
16 | Chapter 3: Configuring the Timbuktu GuestThe LDAP Tab Timbuktu’s LDAP support allows Timbuktu users to find other Timbuktu computers without kno
Setting Timbuktu Guest Preferences | 17The Logging Tab Timbuktu supports multiple options for local and centralized event logging. Among other options
18 | Chapter 3: Configuring the Timbuktu GuestConfiguring Incoming AccessBecause the Timbuktu Host is a separate application from the Timbuktu Guest,
| 19 Chapter 4: Configuring the Timbuktu Host Once you have installed Timbuktu, you can review and change your configuration settings. This chapter de
Copyright noticeCopyright © 2002-2010 Motorola, Inc. v. 08.2010All rights reserved.This manual and any associated artwork, software, product designs o
20 | Chapter 4: Configuring the Timbuktu Host•NT Users—Creates and assigns access privileges to NT User accounts. Because NT Users are authen-ticated
Setting Timbuktu Host Preferences | 21The General TabOn the General tab, you can enter an email address for the Internet Locator, which allows other T
22 | Chapter 4: Configuring the Timbuktu HostThe Guest User TabUse the Guest User tab to assign Timbuktu service privileges to the Guest User account
Setting Timbuktu Host Preferences | 23The NT Users Tab On the NT Users tab, you can assign Timbuktu services to NT Users—users and members of user gro
24 | Chapter 4: Configuring the Timbuktu HostThe Registered Users TabOn the Registered Users tab, you can assign Timbuktu services to Registered User
Setting Timbuktu Host Preferences | 25The Remote Control TabTimbuktu Control and Observe sessions take place in a screen-sharing window, which display
26 | Chapter 4: Configuring the Timbuktu HostSecure screen blanking works differently depending on whether you are working at your computer when the
Setting Timbuktu Host Preferences | 27The Send TabThe Send service lets Timbuktu users send messages to other Timbuktu computers. On the Send tab, you
28 | Chapter 4: Configuring the Timbuktu HostThe Notify TabThe Notify service lets Timbuktu users query another computer to determine whether its use
Setting Timbuktu Host Preferences | 29The LDAP TabTimbuktu’s LDAP support allows Timbuktu users to find other Timbuktu computers without knowing their
| iii ContentsChapter 1: Introduction and Feature Overview ... 5What Timbuktu Can D
30 | Chapter 4: Configuring the Timbuktu HostThe Logging TabTimbuktu supports multiple options for local and centralized event logging. You can enabl
Managing User Accounts | 31Managing User AccountsBefore your computer will allow incoming Timbuktu connections, you must grant user access to one or m
32 | Chapter 4: Configuring the Timbuktu HostIf desired, assign Timbuktu services to Guest Users on the Guest Users tab. Recall that the services you
| 33 Chapter 5: Making ConnectionsThis chapter discusses how you can use the connection tabs in the Timbuktu Guest window to connect to other Timbuktu
34 | Chapter 5: Making ConnectionsTimbuktu MenusUse the menus at the top of the window to make connections, customize the Timbuktu Guest, and view th
The Timbuktu Connection Process | 35As long as you have been granted access as a Guest User, Ask for Permission User, Registered User, or NT User, you
36 | Chapter 5: Making Connections• Use the Scanner tab to search your network for active Timbuktu computers.Timbuktu will scan your local network an
The Timbuktu Connection Process | 37When you don’t know a computer’s IP address and it isn’t located on a network the Scanner can access, enter search
38 | Chapter 5: Making ConnectionsWhen you establish a connection from the Recent Connections tab, you can use the same Timbuktu service as before or
The Timbuktu Connection Process | 39Address Books tab to view the contents of your address books and connect to the computers you have saved. To save
iv | ContentsManaging User Accounts... 31Before You Create
40 | Chapter 5: Making Connections• If you have a Registered User account on the other computer, select the Log In as Registered User radio button. E
| 41 Chapter 6: Timbuktu ServicesThis chapter introduces you to each of the many Timbuktu services: Control, Observe, Exchange, Send, and Notify. Each
42 | Chapter 6: Timbuktu ServicesWhen you maximize the screen-sharing window, your preferred behavior will occur unless the remote computer’s screen
The Exchange Service: Copying and Moving Files Between Computers | 43Using the Capture Frame as a Guest To begin any outgoing Control or Observe sessi
44 | Chapter 6: Timbuktu ServicesTo copy files and folders between computers, select the computer on any of the connection tabs in the Timbuktu Guest
The Notify Service: Requesting Notification When Another User is Active | 45The Notify Service: Requesting Notification When Another User is ActiveTim
46 | Chapter 6: Timbuktu Services
| 47 Chapter 7: Managing the Timbuktu HostMost of your interactions with Timbuktu services will be as the guest computer, using services to connect to
48 | Chapter 7: Managing the Timbuktu HostThe Ask for Permission dialog box provides the name of the computer requesting the connection and the servi
Controlling and Monitoring Incoming Access | 49Responding to Notify RequestsWhen another user uses the Notify service to request notification of your
| 5 Chapter 1: Introduction and Feature OverviewWelcome to Timbuktu for Windows™, version 9.0!Timbuktu gives you total access to your network. Compute
50 | Chapter 7: Managing the Timbuktu HostTimbuktu also supports centralized logging for all the Timbuktu computers on your network: the NT Event Log
| 51 Chapter 8: Getting HelpTimbuktu was designed to be as intuitive and easy to use as possible. This manual and the online Help should answer most o
52 | Chapter 8: Getting Help
| 53 Appendix A: Key Mapping and Service IconsTimbuktu Keyboard Mapping Controlling a Macintosh computer is usually identical to controlling a Windows
54 | Appendix A: Key Mapping and Service Icons A remote user is using the Exchange service with your computer. A remote user is using the Send serv
| 55IndexAactivity log 50Activity Log option 50Ask for Permission accessLog In dialog box 39requesting 39Ask for Permission dialog box 32, 47Ask
Index | 56Iicons 53incoming accessconfiguring 19notification 48Internet Locator 21Kkeyboard shortcuts 53LLDAP preferences, changing 16LDAP serv
Index | 57shortcuts, keyboard 53software requirements 8starting Timbuktu 10startup, starting Timbuktu 10Ttabs. See connection tabsTCP/IP address
6 | Chapter 1: Introduction and Feature OverviewTimbuktu FeaturesNew in Timbuktu for Windows, Version 9: The Timbuktu Host and Timbuktu GuestTimbuktu
Connecting with Timbuktu | 7Connecting with Timbuktu Timbuktu communicates with other Timbuktu computers over TCP/IP networks using the same protocol
8 | Chapter 1: Introduction and Feature OverviewMinimum Software Requirements• Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Wi
| 9 Chapter 2: Installing and Starting Timbuktu This chapter will guide you as you install or remove Timbuktu on a local computer.Installing TimbuktuT
Kommentare zu diesen Handbüchern