4 extras, Extras, 9 menu functions and symbols – JUMO PC Security Manager Software PCS (B 70.9703.0) User Manual

Page 59

Advertising
background image

59

9 Menu functions and symbols

9.4 Extras

Enable (unlock)
program
options

If no valid license number was entered during the installation of a program,
then it will only run in demo mode, and some functions, e.g. “save”, will be
blocked. This function can be used to register a program at a later date and so
change it from a demo version into a full version.

Compress
user list

Repeated editing of a user list (removing and inserting) means that the list
(database) on the PC hard disk becomes larger and larger. This function
rebuilds the user list and saves it in a more compact form. This can speed up
access to the list.

User list in
device
– reset

This function first checks whether a connection to a device has been
established. If there is no connection, the software will automatically attempt
to access another device. If there is a standard (default) device, then it will be
used, otherwise the user must select a device from the device list. It is not
necessary to be logged in to the device to make the connection.

If a connection has been made to a device, then the user list for the device will
be reset to the factory default setting. The factory default setting has just two
users: “Master” (password: 9200) and User (password: 0).

Internal
memory in
device – delete

If you are authorized to use this function, you can use it to delete and re-
initialize the internal memory of a device. This may make sense after a test
phase, for instance, to delete the test data.

Log-in
– repeat /
password
– change

This is a standard dialog that helps to protect the PCS software from
unauthorized access. Logging in involves the mandatory identification via the
password query.

Cancel immediately closes down the software.

By activating the

button and then setting the

option you can change your password after

logging in.

You can also use this function if the rights for the user who is logged in have
been altered. The altered rights for the user will only be re-initialized and
recognized after a fresh log-in.

A

This function should only be used if none of the users is able to log
in to the device any more. This may be the case if,for instance, an
incorrect rights file was sent to the device or all users have been
blocked.

This function is only linked to the PCS software rights, and not to
device rights. In other words, if you are authorized to perform the
function within the PCS software, then you do not need to be
logged in to the device.

Advertising