Please wait while the HTML Manual is loading... or
Download the PDF Manual
(get Adobe Acrobat here)
     (603KB)
Buy Now! Home
Home | Buy Now | Manual | FAQ | What Customers Say | Press | Site License | About Us | Support

prod_remote.gif (6283 octets)

Remote-Anything!
version 3.5

prod_smart-pc.gif (5001 octets)

dot_krome_small.GIF (964 octets) Remote-Anything is the solution to administer or control computers via a LAN, WAN or the Internet.

Whether you have to administer hundreds of PCs or you want to provide user assistance, training, maintenance services, or check service quality, RA is the ideal tool: Even with a small support staff you can offer best-of-breed user services at an affordable cost!

Its as easy as sending the 70KB Agent to End User, you can help them without complicated setup or confusing configuration questions. Deployment on demand.. gives you the power to help right NOW!, when you're needed.

TWD Industries enhances RA in response to clients requests so you can be sure that it will always match your needs. We efficiently act on new feature requests to make sure that your product is always up to date and able to satisfy your expectations.

dot_finger.gif (1007 octets) In this document, we will see how to:

ico_install.gif (1111 octets)

Install

Master and Slave

Use

Master and Slave

Configure

Password, Port Number, IP Address Filtering, Email Notification

Update

Master and Slave

ico_uninstall.gif (1004 octets)

Uninstall

Master and Slave

dot_note.gif (139 octets) There is no other product like Remote-Anything: its value grows with the time. In fact, instead of having an obsolete product after a new version is shipped, users of Remote-Anything enjoy free updates which they can download from the TWD Industries' web site.

As we know that evolution and durability are key criteria in the process of product selection, TWD Industries, separates itself from the competition by providing source code under special terms and adds specific functions to its products when required by customers. This is our guaranty for transparency and honesty.

It allows customers to make sure that their investment will continue as a valuable tool in their network and user management toolkit.

Lastly, our FAQ (Frequently Asked Questions) contains answers to many regular questions and provides a easy understanding of our product strengths and positioning.

ico_install.gif (1111 octets) Install Remote-Anything

dot_krome_small.GIF (964 octets) Remote-Anything consist of two programs:

  Master.exe  250 Ko to be installed on the network administrator's PC
  Slave.exe     70 Ko to be installed on all remotely accessed PCs

 A Master and a Slave (Agent) must be copied and installed on -at least- two different computers (the Slave.exe file on ONE computer and the Master.exe file on ANOTHER computer): The Master application is used to access, view and optionally control all activities of the Slave (Agent) workstation. Slave.exe is a Windows service and will start at boot time before Windows if properly installed (this allows you to log in).

RA only supports PCs connected to networks using the TCP/IP protocol (see the FAQ to learn how to install and configure TCP/IP on your Windows (95,98,2000 system).

When you UPDATE RA please follow the Update instructions!
[DO NOT UNINSTALL THE PREVIOUS VERSION OF THE SLAVE]


 To install a Master, you just copy the file Master.exe on the hard-disk of a PC that will function as the RA - Adminstrative Master.

The first time you run the Master program you have to type in the supplied registration UserKey. This registration key is related to your BiosKey (see the image on the right):

If you do not have a UserKey you can type 'TRIAL' to run Master in demo version (in this case, you will only be able to access Slaves with the password 'TRIAL' and the port number '4000').

 A personalized UserKey secures your Master: now, if someone copies this Master or steals your hard-disk, he will not be able to access the Slaves installed on your network because the Master will work in demo mode only (and will not be able to use passwords different from 'TRIAL' and ports different from '4000').

License keys are based on the Bios, not on hidden data on a hard-disk.


 To install a Slave, copy Slave.exe in the Windows directory on the hard-disk of the PC
(usually C:\Windows for 95/98 and C:\WinNT for NT or 2000).

Warning: if you define a personalized password or a port number with a Demo version, RA will not work.

Note: If you have entered a valid UserKey in your Master then you are using a registered version of RA, and you have to personalize your installation by defining a password (different from 'trial'). If you do not do that, RA will work in demo mode.

You can Bind a password and a port number into the Slave.exe file itself.
It means that once the Slave.exe file has been configured, you will only have to run it on a End User PC to allow access to the Administrative Master (Slave will be installed and running with your own default options). Rebooting (or stop/restart service) is not necessary. See Security Options of Remote-Anything to learn how to bind Slave.

dot_gold_arrow.gif (880 octets) NT: you need to have administrator privileges to install a Slave on NT. At any moment, you can start/stop the Slave service with the 'net stop' and 'net start' DOS commands (C:\WinNT> net start slave). Additionally you can also run the Slave service simply by calling it without arguments: C:\WinNT\Slave.

If you have bound password and port into the Slave.exe file, installing the Slave service and having it running is just as easy as running it without arguments from a command line (or double-clicking on Slave.exe).

If you do not want to bind the password into the Slave.exe file, you have to configure the password manually for each Slave PC: run Slave.exe with the given arguments (it has been copied in C:\Windows in this example):

 C:\Windows\Slave -i password (where 'password' is the password you want to define)
C:\Windows\Slave -p password xxxx (where 'xxxx' is your port number 0-65535)

(a password cannot contain space characters but can can up to 36 characters long)
(defining a port is optional, the default port number is 4000. See the FAQ for available port numbers)

If you are in front of the PC where you wish to install the Slave, you can open a DOS box to do so:

Doing so, you defined a password and a port number (optional: the default port number is 4000) for the given Slave.

If you define a port number different from 4000, you also have to configure your Master (see how to do that on the next page).

- If Slave does not start automatically at boot time:
Slave.exe is a Windows service and as such should start
BEFORE Windows at boot time if it is properly installed.To make sure this is the case, check that Slave.exe is located in the Windows directory (usually C:\Windows or C:\WinNT), delete the HKML/Software/TWD registry key with RegEdit, and then run it this way to force the installation as a service:

Slave -i password (where 'password' should be the password you want to define)
(Example: Slave -i secret)

 Remote-Anything is sold with a certain number of Slaves. If, in the future, you wish to add Slaves to your network, you will only have to get a new UserKey by contacting TWD Industries at order@TWD-Industries.com. After entering your new UserKey in the Master, Licenses will be automatically updated.

 Use Remote-Anything

Remote-Anything is very efficient: being extremely optimized, it allows you to remotely use drawing software or to watch a video playing on a distant Slave computer. By using a very efficient compression algorithm, it saves the bandwidth of your network and using on-the-fly encryption RA makes sure that nobody snoops around. Do not worry about having to keep and maintain a list of IP addresses: RA detects and lists for you the PCs you can reach on your network so all you have to do is to choose one!

You can now invoke Slave.exe with the -h parameter to get the following help:

Some new options have been implemented, they are described in the Security Options section.

The Slave service can be run (without arguments) from command line or with a double-click on any Windows version.

Slave Help

dot_krome_small.GIF (964 octets) Once Slaves have been installed, you can use a Master to remotely access your computers. When you run a Master you can see the following connection dialog box:

 The button detects Slaves installed on the local network. If you click on it, you will see the list of the IP addresses and machines names (209.237.155.62 and dev_jadams for example), then you just have to select an IP address. You can also simply type an IP address or a machine name directly in the 'Slave' edit field.

After having selected a Slave, type a password (the one you defined for your Slave or 'Trial' if you use a demo version) and click on the Connect button.

You have many columns of useful information when using the detection feature (Password, Port, UserName, PC working for hh:mm:ss, OS version, CPU type, Total and Free RAM, Total and Free Disk space, Internet Connection Status, Modem or Switch). Also, the the position and size of the window and the columns are saved after each session.


You can resize each column to a null size if you want to hide some of them.

The Shut Down and Ping (check for machine availability) buttons have been replaced by a combo box with some other commands like: Hardware Inventory, Reboot, Log Off, Lock Up and Uninstall. This allow you to apply commands to one or several selected Slaves from the Slave List with a single mouse click (if the Slave has been configured to accept these commands). There is more to come soon in this area with far more advanced features.

You can, for example, select all the Slaves, try to shut down them, wait a bit, and then click on the Ping button to check if they are all shut down (a blue PC icon will show PCs which are not shut down).
You will see the following window while the Master is attempting to establish the connection with a Slave. If it fails, an error message will tell you why after a 1 minute timeout (this is a Windows timeout).

 

 The Chat  button opens a dialog box to start a Chat session with the selected Slave User(s):

 You can change your Nick Name and enable or disable on-the-fly the Conference Mode. In the normal mode, the answers you receive from Slave User(s) will not be visible to the other Slave User(s). The Conference Mode will broadcast every Slave User answer so all of them will know what was written (they will not only see your text). The Conference Mode is only available when you establish a session with more than one Slave.

 The button allows you to save the Chat text in a Text File.

 There is an extra column (reduced by default) which you can enlarge to check the location of a person. To show it, just put the mouse cursor between the two columns and drag it to the right.

Chat Dialog

IP Column

 The File Browser  button opens the File Browser to transfer files between the selected Slave PC and your PC (the File Browser is described later in this document).

 The   button opens a 'save as' dialog box to allow you to store the Slave List in an ASCII text file on a disk.

 The   button opens Adobe Acrobat to read the RA Manual (if available as a PDF file on your system) or opens your Internet Browser to load the last version of this Manual from the TWD Industries website.

 The Options button opens a dialog box which allows you to change the port number used by the Master. If you change it, do not forget to change it also for Slaves (see 'Security Options'). You can also enable or disable:

 Progress Bar (show incoming transfered data)
 Hide Passwords (will not show them any more)
 Clipboard Sharing (between Master and Slave)
 Hide Splash Screen (discarts the dialog box)
 Tell Slave we connect (Slave will be notified of when the Master connects)
 Remove Wallpaper (before getting first frame)
 Monitor Only (define here the default value)
 Streaming (speedup slow connections)
 Compression (speedup slow connections)
 Data Encryption (secures transmissions)
 Acks (keeps alive the connection)
 Log out when disconnect (log off from Windows 9x, NT and 2000 and start the screen saver on Windows 9x)

 Specify a Log File (where all operations will be stored, this is useful in case of severe security requirements or for isolating or debugging a problem). Alternatively, the log can be redirected to a Console window.

 Max Frames per second, this is important:
This value will define the number of screen updates per second you want the Slave to send to the Master. The fastest the best for animation speed but also the most demanding for the Slave CPU.
If you are using a slow connection (Internet or dial-up) you will set a value in the range of 1-4 because the bandwidth you have will not allow you to get more. On fast networks, use 10, 20 or 50 (up to 100).

Adress Book: clicking it will display all the IP addresses you used to establish a connection with (they are represented by a black PC image in the Slaves' List).

The EDIT button opens a dialog box which allows to add, delete, or modify addresses, as shown here:

Each time a connection is established, the IP address and the machine name are stored in the Address Book. You can quickly fill this Adress Book just by testing Slaves after the installation.

You can now store both port and password, and import (*.reg file) or export the AddressBook.

prod_remote_broadcast.gif (1300 octets)

Broadcast: it sends an information request over the network to detect Slaves which are running. Detected PCs, if any, are displayed (with a blue PC icon) in the Slaves' List. This is very useful for finding Slaves the first times, when addresses are not yet stored in the Address Book. And this allows also to check which PCs are running and available on the network at a given time. If you do not see the address of a PC and know that this PC is available, click two or three times on this button. The PC you are looking for may be too busy to answer immediately or may be too far from where you are and the answer of the distant PC may take a few seconds to come back to you.

If the broadcast does not work for you because you have devices which are not routing those packets (see the FAQ for more about this), then you can use Ping or Hardware Inventory from the combo box.


You can call Master.exe directly from your Desktop: just create a shortcut with the following information and you will be able to establish a connection in just ONE CLICK:

Master.exe <IP_Address> <Password> [Port]

This feature allows the Master to be called by any other program or even a script.


 Once connected, you can see a window showing the screen of the distant PC:

If this is not the case, consult the FAQ or contact our Technical Support.


 Once you are connected, the Master menu can be displayed by clicking on the Title Bar with the right mouse button or by clicking on the sun icon (see image below) with the left mouse button:

 Connection details opens a dialog box with information about the current connection:

This dialog box is very important:it will allow you to test and experiment the best settings for your connection while you are connected.

You can play with the settings  to find the best possible refresh rate.

Compression, Streaming and Active Window will speedup a modem connection but slow down a LAN connection (Active Window will only refresh the current window so if you need to refresh the full-screen just click on the place you want to be updated).

If you want to reduce the impact of your incoming connection on a Slave CPU, you can reduce the number of Frames per second (and even disable Acks).

 Connect to a new Slave allows you to open a new window on another distant PC (thus you can intervene on more than one computer at the same time).

 Full screen switches the Full Screen mode and the windowed mode (and vice-versa). To toggle  the Full Screen mode and the windowed mode, you can also use the Ctrl+F12 hotkey.

 Refresh screen sends a request to the Slave to update the distant screen on the Master.

 Full screen Updates (default mode) scans the full screen to find changes and updates the full screen.

 Active Window Updates only updates the foreground window (this mode is faster than the Full screen Updates mode and requires less CPU resources of the Slave PC but does not redraw the full screen; some operations like window moves may leave unwanted remainders. To erase them, you just have to click one time on the desktop window (it forces a full-screen refresh). This mode is especially useful to watch real time windowed video. It is also useful when you want to do something accurately with the mouse cursor, like drawing, because the mouse is more responsive.
The smallest the Active Window, the best the results will be.

 Monitor only switches the visualization mode (mouse and keyboard inactive) and the active mode (where mouse moves and keystrokes are transmitted to the distant PC).

 Remove wallpaper on Slave removes the wallpaper from the distant desktop. It speeds up transmissions since there is less information to process (Windows 9x only).

 Save Screen as a BMP file opens a 'save as' dialog box which allows to save a copy of the distant screen as a bitmap.

 Start ScreenSaver on Slave immediately runs a screen saver (Windows 9x only). This is really handy when you want to block the access to a PC after you have finished working remotely on it. In this case, you have to use a password-protected screen saver. NOTE: the screen saver may be immediately disabled if you are moving the mouse to select this option (use the beyboard or switch to 'Monitor Only' before selecting this menu option)

 Switch off Screen of Slave immediately power off the screen (Windows 9x only). This option will really prevent everybody from working on the PC since it is not possible to see the screen contents. NOTE: This option will act like a screen saver if the display is NOT able to power off, in this case this option may be immediately disabled if you are moving the mouse to select it (use the beyboard or switch to 'Monitor Only' before selecting this menu option)

 Transfer Files between PCs displays an Explorer-like window with local and distant file systems and allows drag & drop to send and receive files (rename, delete them, etc.).

 Send Commands to Slave displays a dialog box which allows you to run programs, to open documents, to send e-mail, or to surf on the Internet with the distant PC. This is an equivalent of the 'Run' option of the Windows' Start menu.

 Send a Dialog Box to Slave allows to send a dialog box (with a title, a text, and an icon) on the distant PC.

 Get Passwords of Slave allows to get the passwords cached by Windows on the distant PC. Here is the screen saver password (if any) and those defined by applications, network, Internet connections, etc. (Windows 9x only).

 Play a Sound on Slave plays a WAV sound on the distant PC (this is the default sound: 'ding', if you did not change it).

 Cut Internet connections on Slave stops immediately every active connection on the distant PC (HTTP, FTP, Email, etc.).

 Lockup Slave hangs the distant PC. Nobody -including you- will be able to do something on it until it is MANUALLY restarted.

 Reboot Slave forces all applications to quit and reboots the distant PC. You will be able to reconnect to this PC once Microsoft Windows has restarted.

 Shut Down Slave forces all applications to quit and switches off the distant PC (the PC will power-off if it implements this feature).

 Send Ctrl+Alt+Del, Send Ctrl+Esc, Send Alt+Tab, Send Shift+Esc sends complex keystrokes to the distant PC that would be interpreted by the local computer if typed on the Master's keyboard.

 Ctrl Key, Alt Key will keep 'pressed' these control keys on the distant PC. You will have to deselect those options to 'release' the chosen control keys.

 About Remote-Anything displays a dialog box where the Technical Support e-mail address and the product version number of your copy can be found.

 

 The Send Commands to distant PC option opens a dialog box which allows to run programs without knowing where they are located, to open documents without knowing which program is associated with, etc.

It is faster than a DOS box or than the Explorer since you do not have to look for what you want. Note that this is NOT a DOS prompt equivalent (del c:\autoexec.bat will not work).

Try: C:\Windows, image.bmp, Letter.doc, readme.txt, mailto:bgates@microsoft.com, SysEdit, RegEdit, etc.

 

 

 The Send a Dialog Box to distant PC option opens a dialog box which allows you to define a message you want to send to the distant PC :

Choose an icon if you want one and type the title and text of your message. This message will be displayed immediately on the distant PC and will stay there until someone clicks on the 'OK' button.

prod_remote_send_msg.gif (7196 octets)

This is an alternative way to communicate in the company… and the only one which grants you that the addressee will get the message as soon as he uses his PC.

Note: We intend to enhance its use by allowing the Slave to record answers in a log file.

 

 The Get Passwords of distant PC option gets all the passwords cached by Windows. You will find, for example, screen saver passwords, passwords of Windows applications like Microsoft FrontPage, and passwords defined for Internet connections as well as network passwords.

You will thus be able to obtain the screen saver password of a PC which is inaccessible due to a password-protected screen saver… and stop this screen saver the clean way.

NOTE: This feature is not accessible under Windows 2000

 

 The Transfer Files between PCs option gives you a two paned  window which allows you to copy files from one PC to another, using drag & drop, just as you could  with Windows Explorer.

 Those transfers are made without disturbing the Slave End User and without the need for an active Windows Session or shared disks.

 To create a new folder type [Ins] or use the menu.

 To rename a file or a directory, just click on its name to edit it or type [F2].

 The [F5] key updates a file list.

The File Browser allows now to rename folders and to edit the file attributes. Also, the position and size of the window and the columns are saved after each session.
If you hit the ENTER key while a file is selected, then you will see the Attributes dialog box which allows you to rename a file or to change its attributes.

Note that you can rename a file simply on clicking on its name in the File List.

 The file copy dialog is now more detailled: you have the transfer rate, current status for each file, the total number of bytes to copy and the total estimated remaining time. The copy is synchronized: if you hit the 'CANCEL' button while a copy is in progress, the process will be interrupted after the current file is copied.

The same synchronized system is used for file deletion. But, as file deletion is an extremely fast process, it may be difficult to stop it and almost impossible to stop it where you want it to stop.

 While displaying the file browser, you are still able to see what the distant user is doing. So, it allows you to check or update the distant system without disturbing the distant user and without being obliged to physically go where the distant PC is.

Of course, you can move, or minimize the file browser window at any time so you will benefit from the best possible view and bandwidth.

 To transfer files quickly, you can minimize the window of the distant screen (see below) so that it is minimized at the bottom of the screen, on the Task Bar. If you do this, as the Master will not actevely requests Slave updates of the distant screen, you will benefit from all the available bandwidth during file transfers.

If you minimize the distant PC window into the Task Bar, the Master will stop sending requests to the Slave but will keep the connection open. This allows to keep a connection active while not using network and CPU resources of both distant and local PCs. When you want to access the Slave again, click on Remote-Anything in the Task Bar (see the image below). You can 'freeze' several connections this way at the same time.

 If the distant user modifies the structure of a disk (deleting a directory for example), RA will automatically update the modified objects in the file browser if you select one of them.

 The About menu option displays a dialog box with the product version number.

To get free upgrades of our products, come often on our web site to check for new versions.

The Protocols button will allow you to check which protocols are installed on the Master PC (note that some users reported errors on this dialog which only uses Microsoft calls...).

  Security Options of Remote-Anything

 Once RA is installed, and even before installing it, you have a number of very good reasons to think about modifying the default password and port number used by Masters and Slaves:

 changing passwords from time to time enhances the security of your systems
 employees who know passwords may have left the company or moved to another department
 different passwords may give access to different resources in the company (R&D, Sales, etc.)
 you have 65535 possible port numbers, choose yours! (find reserved port numbers in the FAQ)

You can now Bind a password and a port number into the Slave.exe file itself.
It means that once the Slave.exe file has been configured, you will only have to run it (without arguments) on a PC to have the Slave service being installed and running (whether it is under Windows 9x, NT or 2000).

The syntax is: Slave.exe -c <Password> <PortNumber> [SmtpServer] [EMailAddress]
where: (parameters between <> are mandatory and between [] are optional)

<Password> is the password you want to define for the Slave(s)
<PorNumber> is the port number you want to use with the Slave(s)
[SmtpServer] is your outgoing SMTP Mail Server (i.e. mail.your_isp.com)
[EMailAddress] is the email address where you want to be notified when a Slave is connected to the Internet

If you define the optional e-mail parameters, then you will be notified when the Slave is connected to the Internet: Slaves will send you this kind of email when they are connected to the Internet:

---------------------------------------------------------------------------------
**This is an automated E-Mail from RA**

The Slave you are looking for is now connected to the Internet:

IP Address: 100.100.100.10,
209.237.155.134
User Name: TOM
PC   Name: sales_treed
PC active for: 00 hour(s) 35 minute(s) 08 second(s)
---------------------------------------------------------------------------------

WARNING: the email notification will work ONLY IF:
- you are using the smtp server (entrant e-mail) which comes with your e-mail address (i.e. smtp server: 'mail.my_isp.com' and e-mail address 'my_name@my_isp.com')
AND
-  if the smtp server you are using belongs to  the ISP (Internet Service Provider) of the Slave PC
  (because smtp servers reject entrant e-mail fom unknown IP addresses to avoid spam)

It will create a new copy of Slave.exe called my_Slave.exe. Rename this copy to Slave.exe and copy it on the PC(s) you want to remotely access. In this case, running the file Slave.exe will install it with the options you defined.

Note: those options will be effective on the Slave PC ONLY IF the PC does not already have a Slave password installed in the Registry!
(If you want to overwrite the Registry information with the Slave.exe options, you have to delete first the corresponding entries under the HKey_Local_Machine/Software/TWD/Remote-Anything Key).


You can now edit the Slave Options in a dialog box: just type: Slave -o <your_password> (or 'trial' if you are using a demo) and you will see the following dialog box:

When you change the port number of a Slave, ALWAYS Stop and restart the Slave Service ('Slave.exe -s <password>' to stop it and then run Slave.exe again) or you will not be able to run the File Browser from the Master.

  You can now Accept or Reject Manually incoming Master connections. If you select this checkbox, then all incoming Master connections will display the following dialog box before being able to access the Slave PC:

This dialog box will stay flashing and beeping (with the Windows default sound) for 30 seconds and will reject the connection if nobody accepts the connection (or if someone rejects the connection before the 30 seconds).
You have the opportunity to start a Chat session with the incoming Master before getting connected.

You can create a personalized Slave.exe file from this dialog box (using the 'Create my_Slave.exe' button).When you do that, all the options currently selected in this dialog box will be stored in the 'my_Slave.exe' file (with the exception of the 'Authorized Master IP Addresses' List).

You can also define precisely what features a Master will be able to use on the Slave. This is very handy to restrict rights of Master users who only need the remote access but not need the file transfer for example. When you disable a Master feature for a Slave, this feature will not be displayed in the Master menu when the Master is connected to this Slave.

You can disable very critical features like: Lock up PC, Clipboard Sharing, Get Passwords, Reboot or ShutDown commands.

Note: Those changes will take effect only if you bind a Slave with the new options. Changing the checkbox states of an already installed Slave will *not* change the rights. To change the rights of an already installed Slave, just make another Slave program and update the old one (you just have to copy it on the Slave PC and then run it, it will replace the old Slave program during the next boot).

There is a way to be able to use of all the Master features of a restricted Slave. This feature will also allow to access the Slave PC whatever is the Slave password. This feature is very useful for an administrator who spreads thouthands of Slaves over different departments: each department may want to define a different password for confidentiality (changing the existing Slave password). The administrator will still be able to access the Slaves. To use this feature, you only have to bind a 'supervisor password' in the Slave.exe file.
The syntax to use (at a DOS prompt under Windows) is:

Slave -a <supervisor_password> (where <supervisor_password> is your supervisor password)
Example: C:\Windows> Slave -a pharaon

Note: Once bound into Slave.exe, a supervisor password cannot be changed. To define a new supervisor password, you have to work with a 'virgin' (original) Slave.exe file.

You can define IP Address Filtering which prevents someone from using your Slave(s). This will allow only authorized IP addressed Masters to have access to the network Slave machines.
To edit an item of the list, just click on it. 
As shown on the picture, this list can contain both IP addresses (ie: 192.168.28.162) and Masks (ie: 223.48.255.255).
This list can be edited directly in the registry under the "HKEY_LOCAL_MACHINE\Software\TWD\Remote-Anything\Allowed IP Addresses" value.

To define such a configuration for multiple hosts, you just have to define the same Registry entries (a simple *.reg file exported from the RegEdit.exe utility can do this).


 The password modification may be done remotely from a Master (menu option 'Send Commands to distant PC') or directly from the keyboard of a Slave (in a DOS box under Windows). The commands to use are identical in both cases :

 The space character cannot be used in passwords.

Once complete, the old password has been replaced in the Windows' Registry of the Slave. RA will now use the new password for each new connection.

 Changing the port number is very similar :

When you change the port number of a Slave, ALWAYS Stop and restart the Slave Service ('Slave.exe -s <password>' to stop it and then run Slave.exe again) or you will not be able to run the File Browser from the Master (alternatively, a simple reboot will do the job).

 Update Remote-Anything

 TWD Industries offers free updates of RA (see http://www.twd-industries.com). So, updating RA is very easy to do and reliable. We worked especially hard to develop a way to circumvent the Microsoft Windows limitations which prevent files loaded in memory from being deleted from disks.

ALWAYS UPDATE BOTH MASTER AND SLAVE

 Updating a Master is really easy, you just have to replace the file Master.exe where it is stored. (for example, on the Desktop: C:\Windows\Desktop\Master.exe).


 Updating a Slave is also easy and can be done remotely:

DO NOT UNINSTALL A SLAVE TO UPDATE IT: IT IS A LOSS OF TIME

On all Windows versions: simply copy the new Slave.exe file anywhere on the hard-disk and run it (without arguments). It will replace the old Slave.exe during the next boot (and will use the existing Registry options). If no old Slave can be found, it will simply install itself and will copy the bound options to the Registry.

Alternatively, you still can use the old procedure (especially if you do not want to reboot the Slave):

Windows NT and 2000: STOP the Slave service in the Service Manager (or from the command line: 'Slave -s <password>' or 'net stop Slave'), then REPLACE the C:\WinNT\Slave.exe file with the new version and then  RESTART the service (from command line: 'net start Slave'). There is NO need to restart Windows to have the procedure complete.

Windows 95/98: STOP the Slave program (from a DOS Box command line: 'Slave -s <password>'), and then copy the new file Slave.exe over the old Slave.exe file you want to update (usually it is located in the C:\Windows directory). Then run Slave just by double-clicking it. There is NO need to restart Windows to have the procedure complete.

 The simplicity of the process allow to do those operations at a very low cost.

 In a future version of RA, it will be possible to update Slaves from a Master just by selecting a group of Slaves from the list of available PCs in the RA connection dialog box.

 Uninstall Remote-Anything

 The uninstall procedure of Remote-Anything has been designed to be as simple as possible. As some customers wanted to spread thousands of Slaves on their corporate network, we focussed on a way to circumvent the Microsoft Windows limitations which prevent files loaded in memory from being deleted from disks.

When you UPDATE RA please follow the Update instructions!
[DO NOT UNINSTALL THE PREVIOUS VERSION OF THE SLAVE]

 Uninstall a Master cannot be easier, you just have to delete the file Master.exe where you copied it (for example, on the Desktop: C:\Windows\Desktop\Master.exe).


 Uninstall a Slave in almost as fast, and there are three different ways to do so:

 The first method makes use of Uninstall_Slave.exe (which can be downloaded from our website). You have to run it on every PC from where you want to uninstall Slaves. This can be done by e-mail with an attachment. Users will only have to click on the uninstall icon to remove the Slave from their system.

 

 The second method, which is used remotely, requires the use of a Master. In that case, you use the 'Send Commands to distant PC' option and type the following command as shown in the next image :

 The third method, which can be used locally, makes use of a DOS box on the local PC. In that case, you type the following command as shown in the image hereafter:

Alternatively, you can first stop the Slave service ('Slave -s <password>' or 'net stop Slave') and then delete the Slave.exe file itself.

This last way to uninstall a Slave is easy to use but may be difficult to apply on hundreds or thousands of PCs. The two other methods may make this task easier.

 All procedures remove every file of RA from the disks after Windows is restarted.

 In a future version of RA, it will be possible to uninstall Slaves from a Master just by selecting a group of Slaves from the list of available PCs in the RA connection dialog box.

System Specifications (minimum requirements)

  A PC or compatible, 386, 486, Pentium or higher
  4 MB of RAM or more
  A VGA adapter or higher
  A hard-disk with 600 KB of free space
  A mouse and a keyboard
  A network adapter or a modem or a cable (null-modem or parallel)
  Windows 95/98, NT 4.0, 2000 or higher

Copyright Notice

Copyright © 1998-2000 TWD Industries LLC. All rights reserved.

This document cannot be reproduced without the written authorization of TWD Industries LLC, 1313 North Market Street, Wilmington, DE 19801-1151, U.S.A. (http://www.twd-industries.com info@twd-industries.com)

Trade Marks

Remote-Anything is a trade mark of TWD Industries LLC. Windows is a trade mark of Microsoft Corporation. Other product names in this document may be trade marks of their respective companies and are herewith recognized.


 The software described in this document is provided with a License Agreement and may not be used without acceptance of the terms of this License. This software is licensed, not sold. The fee you pay entitles you to use the software, not to own it. The software  is copyrighted material owned by TWD Industries LLC.

This is a legal agreement between you, the end user, and TWD Industries LLC, a Delaware U.S.A. company.

GRANT OF LICENSE – This TWD License Agreement permits you to use one copy of the TWD Industries software product acquired with this License on any single computer, provided the software is in use on only one computer at any time. If you have multiple Licenses for the software then at any time you may have as many copies of the software in use as you have Licenses. The software is "in use" on a computer when it is loaded into the temporary memory (i.e. RAM) or installed into the permanent memory (e.g. hard disk, CD ROM, or other storage device) of that computer, except that a copy installed on a network server for the sole purpose of distribution to other computers is not "in use". If the anticipated number of users of the software will exceed the number of applicable Licenses, then you must have a reasonable mechanism or process in place to assure that the number of persons using the software concurrently does not exceed the number of Licenses.

COPYRIGHT - The software is owned by TWD Industries or its suppliers and is protected by United States copyright laws, international treaty provisions, and all other applicable national laws. Therefore, you must treat the software like any other copyrighted material (e.g. a book or musical recording) except that if the software is not copy protected you may either make one copy of the software solely for backup or archival purposes, or transfer the software to a single hard disk provided you keep the original solely for backup or archival purposes. You may not copy the Product manual(s) or technical and commercial written materials accompanying the software.

OTHER RESTRICTIONS – You may not rent or lease the software, but you may transfer your rights under this TWD Industries License Agreement on a permanent basis provided that you transfer all copies of the software and all written materials, and the recipient agrees to the terms of this agreement. You may not reverse engineer, decompile or disassemble the software. Any transfer must include the most recent update and all prior versions.

LIMITED WARRANTY

LIMITED WARRANTY – TWD Industries warrants that the software will perform substantially in accordance with the accompanying Product Manual(s) for a period of 60 days from the date of receipt; and any TWD Industries supplied hardware accompanying the software will be free from defects in materials and workmanship under normal use and service for a period of one year from the date of receipt. Any implied warranties on the software and hardware are limited to 60 days and one (1) year, respectively.

CUSTOMER REMEDIES – TWD Industries’s entire liability and your exclusive remedy shall be, at TWD Industries’s option, either return of the price paid or repair or replacement of the software or hardware that does not meet TWD Industries’s Limited Warranty and which is returned to TWD Industries with a copy of your receipt. This Limited Warranty is void if failure of the software or hardware resulted from accident, abuse, or misapplication. Any replacement software will be warranted for the remainder of the original warranty period or 30 days, whichever is longer.

NO OTHER WARRANTIES – TWD INDUSTRIES DISCLAIMS ALL OTHER WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, WITH RESPECT TO THE SOFTWARE, THE ACCOMPANYING PRODUCT MANUAL(S) AND WRITTEN MATERIALS, AND ANY ACCOMPANYING HARDWARE. THIS LIMITED WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS.

NO LIABILITY FOR CONSEQUENTIAL DAMAGES – IN NO EVENT SHALL TWD INDUSTRIES or its suppliers be liable for any other damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) arising out of the use of or inability to use this TWD industries product, even if twd industries has been advised of the possibility of such damages. In any case, twd industries entire liability under any provision of this agreement shall be limited to the amount actually paid by you for the software.

U.S. Export Controls: You agree that you will not export or re-export these products to any country, person, entity or end user subject to U.S.A. export restrictions. Restricted countries currently include, but are not necessarily limited to Cuba, Iran, Iraq, Libya, North Korea, Syria, and the Federal Republic of Yugoslavia (Serbia and Montenegro, U.N. Protected Areas and areas of Republic of Bosnia and Herzegovina under the control of Bosnian Serb forces). You warrant and represent that neither the U.S.A. Bureau of Export Administration nor any other federal agency has suspended, revoked or denied your export privileges.

This Agreement is governed by the laws of the State of Delaware, U.S.A.

Should you have any question concerning this Agreement, or if you desire to contact TWD Industries for any reason, please use the address information enclosed in this product to contact the dealer serving your country or write to: TWD Industries Customer Sales and Service, 1313 North Market Street, Wilmington, Delaware 19801-1151 or contact us by e-mail: info@twd-industries.com.

Home | Buy Now | Manual | FAQ | What Customers Say

*

Press | Site License | About Us | Contact


Copyright © 1998-2000 TWD Industries LLC
All Rights Reserved