Acer Veriton N2620G User Manual

Page 14

Advertising
background image

14 | Understanding Your Thin Client

Using the FBWF

The FBWF operates by providing a shadow write to the system RAM.
When enabled, any writes that are normally written to the storage media,
are instead redirected to the RAM overlay. During a reboot, this overlay
is discarded so the operating system remains in its original state. As its
name implies, FBWF is based on files. This means you can exclude
certain files and directories from the protection of the write filter. Any
files that are in this list are ignored by FBWF and subject to modification
(or deletion) just as they normally would on any standard Windows
environment. Acer thin clients include a management utility for
configuring FBWF. The FBWF Manager utility can only be accessed by
Administrators.

To open the FBWF Manager, log-in as the administrator.

Click Start-> All Programs-> Echo Control Panel.

Click FBWF

By default, FBWF is enabled with basic exclusions set for the Persistent
Registry
and Documents and Settings for all users. This means any
changes made under the C:\Documents and Settings folder, such as
desktop icons, start menu items, and browser favorites, will be written
directly to the flash device immediately and without overlay protection.

What is Persistence?

Persistence in its simplest definition is the term used to describe data on
a local drive or disk that exists and survives from session to session.
Persistent data will be secure after every reboot and every change made
will be applied until another user reconfigures your changes. If you do
not have the File-Based Write Filter installed on your terminal for
protection, your local drive remains in a Persistent state. All changes
made to the desktop, program files, user settings files, or important
Windows system files are permanently stored on the drive or disk. In the
unfortunate event of a malicious network attack or virus, your files may
be harmed in the process if Persistence is left on. When the FBWF filter
is enabled and files can be protected, all changes made, including
accidental virus entries, are wiped upon reboot.

Advertising
This manual is related to the following products: