




			   NetRemote for Windows
		      Copyright 1994 by McAfee, Inc.
			   All Rights Reserved.






Copyright 1994 by McAfee, Inc. All rights reserved. McAfee is a 
registered trademark of McAfee, Inc. NetRemote is a trademark of 
McAfee, Inc. All other products or services mentioned in this 
document are identified by the trademarks or service marks of their 
respective companies or organizations.


McAfee, Inc.
2710 Walsh Avenue               
Santa Clara, CA  95051-0963
U.S.A.

Technical Support Information
-----------------------------
McAfee provides several different methods of technical support. 
You can contact us through our Technical Support department, our 
bulletin board system (BBS), CompuServe, and Internet. When 
contacting us electronically, please provide the following items: 
product name, version number, description of question/problem, 
your name, your phone number, and how you want us to contact you 
(voice or electronic).

Phone           (908) 530-9650
FAX             (908) 576-8867
Hours           9 a.m. to 7 p.m. EST

McAfee BBS      (408) 988-4004
		1200 bps to 14,400 bps
		8 bits, no parity, 1 stop bit
		24 hours, 365 days a year

CompuServe      GO MCAFEE

Internet        customer_service@brightwork.com

If you are a customer located outside the U.S. or Canada, you can
contact a McAfee authorized agent. Agents are located in more than
50 countries around the world and provide local sales and support
for our software. Please refer to the AGENTS.TXT file for a complete
list of McAfee agents.


Table of Contents
-----------------
1.0 Introduction to NetRemote
1.1 About NetRemote for Windows
1.2 Why Remote Support?
	1.2.1 The Problem
	1.2.2 The Answer
	1.2.3 The NetRemote Solution
1.3 How NetRemote Works
1.4 NetRemote Applications
	1.4.1 Supporting Local LANs
	1.4.2 Supporting Remote LANs
	1.4.3 Supporting WANS
	1.4.4 Sharing Modems
	1.4.5 Sharing FAX Cards
	1.4.6 Teaching and Training
1.5 Environment
1.6 Technical Support
1.7 Manual Organization
2.0 NetRemote Installation
2.1 Before Installation
	2.1.1 Recommended Versions
	2.1.2 Determining Version Numbers
2.2 NetRemote for Windows Installation
	2.2.1 Administrator Install
	2.2.2 Basic Install
	2.2.3 Custom Install
2.3 User Install
2.4 NetRemote for DOS Installation
2.5 Uninstalling NetRemote
2.6 Troubleshooting
3.0 Getting Started
3.1 Before You Begin
3.2 What's in this Chapter
3.3 NetRemote Icon and Conventions
	3.3.1 The Icon
	3.3.2 Conventions
3.4 The Ribbon and Menu Bar
	3.4.1 The Tool Bar Buttons
	3.4.2 The Menu Bar
3.3 NetRemote's Main Screen
3.4 Tutorial
	3.4.1 Setting Up Two PCs for Use with NetRemote for Windows
	3.4.2 Using Remote Control
	3.4.3 Viewing Diagnostics
	3.4.4 Transferring Files
	3.4.5 Exiting NetRemote
4.0 NetRemote Windows Reference
4.1 Supporting Users with NetRemote for Windows
4.2 What's in this Chapter
4.3 Contacting a User
	4.3.1 Calling a User
	4.3.2 Updating Your User List
	4.3.3 Contacting Users on Different File Servers
	4.3.4 Finding a Specific User
4.4 Taking Control of a User's PC
	4.4.1 Loading Windows "Listen"
	4.4.2 Using Remote Control
4.5 Viewing PC and Network Information
	4.5.1 Node Configuration Window
	4.5.2 Memory Information Window
	4.5.3 Diagnostics Window
	4.5.4 The Server Connections Window
4.6 Using NetWare Utilities
	4.6.1 Accessing NetWare Utilities
	4.6.2 Using NetWare Utilities
4.7 Transferring Files between PCs
	4.7.1 File Transfer Steps
	4.7.2 The Transferring Dialog Box
4.8 Using the Low System Resources Indicator
5.0 NetRemote DOS Reference
5.1 Supporting Users with DOS NetRemote
	5.1.1 What's in this Chapter
5.2 Contacting a User
	5.2.1 Updating Your User List
	5.2.2 Contacting Users on Different File Servers
	5.2.3 Finding a Specific User
	5.2.4 Contacting a User from the Command Line
	5.2.5 NRCALL Program Parameters
	5.2.6 NRCALL Options Summarized
	5.2.7 Contacting a User with a Hot-Key
5.3 Taking Control of a User's PC
	5.3.1 Loading NRLISTEN
	5.3.2 Setting a Password
	5.3.3 NRLISTEN Command Line Parameters
	5.3.4 NRLISTEN Options Summarized
	5.3.5 Loading NRLISTEN Automatically
	5.3.6 Using Remote Control
	5.3.7 Sending the <F1> Key
5.4 Viewing PC and Network Information
	5.4.1 Configuration Summary
	5.4.2 View Configuration
	5.4.3 Server Connections
	5.4.4 Network Configuration
	5.4.5 Machine Configuration
	5.4.6 Programs in Memory
5.5 Run Diagnostics
	5.5.1 Exercise Server Connections
	5.5.2 Analyze Network Traffic
	5.5.3 LAN Adapter Statistics
	5.5.4 IPX Statistics
5.6 Ending a Call
	5.6.1 From the Calling-PC
	5.6.2 From the Listening-PC
5.7 Security Features
	5.7.1 Passwords
	5.7.2 User Notification
	5.7.3 Group Restrictions
	5.7.4 Disable Access
6.0 Introduction to CO/Session
6.1 What Is CO/Session?
6.2 Windows Remote Control
6.3 Terms and Concepts
	6.3.1 Remote Control Mode vs. Terminal Mode
	6.3.2 CO/Session Host and Remote Software
6.4 System Requirements
7.0 Installing CO/Session
7.1 Before You Start
7.2 Running the INSTALL Program
	7.2.1 Windows Support (Host Only)
8.0 Gneral Procedures
8.1 Introduction
	8.1.1 Importance of the Phone Book
8.2 Typical Remote Control Session
	8.2.1 Summary of Connection Steps
	8.2.2 The Remote Takes Control
	8.2.3 Mouse Control
	8.2.4 File Transfers
8.3 About CO/Session Menus
	8.3.1 Status Box
	8.3.2 Help Box
	8.3.3 Selecting
8.4 Special Situations
	8.4.1 CGA Monitor
	8.4.2 Slow Screen Updates or Scrolling Problems on Remote PC
	8.4.3 Remote Has No Keyboard Control
	8.4.4 Remote Control Possibilities
8.5 Terminal Mode Procedures
9.0 Using CO/Session Remote
9.1 Starting CO/Session Remote
	9.1.1 Basic Command
	9.1.2 Command-Line Options
9.2 Operation with Windows
9.3 If Problems Occur
9.4 Changing Host Settings
9.5 Ending Remote Control Session
9.6 Freeing Memory
10.0 Remote Main Menu
10.1 Accessing this Menu
10.2 Summary of Menu Items
10.3 Quick Connect
10.4 Keyboard Chat
10.5 Hang Up
10.6 Voice Switch
	10.6.1 Voice First
	10.6.2 Data-to- Voice Switch
	10.6.3 Voice-to-Data Switch
11.0 Remote Call Menu
11.1 Summary of Menu Items
11.2 Summary of Menu Operation
11.3 Speed Search
11.4 Call
11.5 Wait for Call
11.6 Phone Book Menu
	11.6.1 About Phone Entry Contents
	11.6.2 Add Non-COM Port Fields
	11.6.3 Non-COM Port Fields
	11.6.4 Using a Master Password
	11.6.5 COM Port Field Summary
	11.6.6 Delete
	11.6.7 Change
	11.6.8 Sort
11.7 Open COM Window
	11.7.1 Testing Modem Strings
11.8 Hang Up
12.0 Remote File Menu
12.1 Introduction
	12.1.1 About the Directory Windows
	12.1.2 Summary of File Menu Items
12.2 Important Rules and Concepts
	12.2.1 File Name Rules
	12.2.2 Background Operation
	12.2.3 File Security: Transfer Rights
	12.2.4 File Security: Directory Access
12.3 General Procedures
	12.3.1 Changing Active (Source) Windows
	12.3.2 Scrolling and Scroll Bars
	12.3.3 An Overview of Tagging and Untagging Files
	12.3.4 Changing Directories
	12.3.5 Updating the Host Directory
	12.3.6 Speed Search
12.4 File Main Menu Functions
	12.4.1 Transfer Files
	12.4.2 Transfer Status Screen
	12.4.3 Menu
12.5 File Expanded Menu Functions
	12.5.1 Shortcut Keys
	12.5.2 Tag File(s)
	12.5.3 Untag File(s)
	12.5.4 Change Drive or Directory
	12.5.5 Make Directory
	12.5.6 View File(s)
	12.5.7 Delete File(s)
	12.5.8 Local Copy
	12.5.9 Host Directory Update (<ALT><H>)
	12.5.10 Host Directory Update
13.0 Remote Print Menu
13.1 Introduction
13.2 Remote Print Options
	13.2.1 Reset Printing
	13.2.2 Printing On
	13.2.3 Spooling On
	13.2.4 Output Spool File
13.3 Host Print Options
14.0 Support Menu Reference
14.1 Summary of Menu Items
14.2 Suspend/Resume
14.3 Billing Log
	14.3.1 Enable Logging
	14.3.2 Disable Logging
	14.3.3 Record Structure
14.4 Reboot Host
14.5 Record/Playback Menu
	14.5.1 Record Session
	14.5.2 Play Back Session
	14.5.3 Save Screen Image
	14.5.4 View Screen Images
	14.5.5 Slide Shows
14.6 Keyboard/Screen Menu
	14.6.1 Unlock Host Keyboard
	14.6.2 Lock Host Keyboard
	14.6.3 Restore Host Screen
	14.6.4 Blank Host Screen
15.0 Remote Options Menu
15.1 Summary of Menu Items
	15.1.1 General Procedures
15.2 Changing or Viewing Host Options
16.0 Remote and Host Options
16.1 Remote Options
	16.1.1 Remote Hardware Option
	16.1.2 Remote Security Options
	16.1.3 Remote Performance Options
	16.1.4 Remote Connect Options
16.2 Remote User Options
16.3 Host Options
	16.3.1 Host Hardware Options
	16.3.2 Host Security Options
	16.3.2 Host Performance Options
16.4 Host Connect Options
16.5 Host User Options
17.0 Terminal Mode
17.1 Introduction
17.2 Start a Terminal Mode Session
	17.2.1 Using the Terminal Screen
	17.2.2 CO/Session Special Keys
	17.2.3 VT100/102 Special Keys
17.3 Terminal Menu
	17.3.1 Send Xmodem
	17.3.2 Receive Xmodem
	17.3.3 Clear Screen
	17.3.4 Insert Line Feed Toggle
	17.3.5 Local Echo Toggle
	17.3.6 Hang Up
	17.3.7 Transmit Break
	17.3.8 Disk Capture
	17.3.9 Exit
17.4 Common Terminal Mode Problems and Solutions
17.5 Changing Terminal Emulation Options
17.6 Hardware/Software Flow Control
17.7 Default VT100/102 Substitute Keys
18.0 Using CO/Session Host
18.1 Using the Host Software
	18.1.1 Choosing Between Command Line or Menu Operation
	18.1.2 Using Extended Memory
	18.1.3 Other Programs Included in the Host Software
	18.1.4 About Mouse Control
	18.1.5 Operation with Windows
18.2 Starting CO/Session Host (Command Line Mode)
	18.2.1 The Basic Command Line
	18.2.2 Command Line Options
	18.2.3 Controlling Memory Use
	18.2.4 Making a Call
	18.2.5 Waiting for a Call
	18.2.6 Disconnecting
	18.2.7 Combining Arguments
18.3 Ending a Remote Control Session
	18.3.1 Freeing Memory
18.4 Terminal Mode Procedures
19.0 HOSTMENU Main Menu
19.1 Introduction
19.2 Basic Program Loading
	19.2.1 Loading Options
19.3 Accessing the Main Menu
19.4 Summary of Menu Items
19.5 Quick Connect
19.6 Lock Keyboard
19.7 Keyboard Chat
19.8 Hang Up
19.9 Voice Switch
20.0 Host Call Menu
20.1 Special Issues
	20.1.1 Passwords
	20.1.2 Dial Back
	20.1.3 Direct Cable Connections
21.0 Host Phone Book Menu
21.1 Introduction
21.2 Special Issues
	21.2.1 Passwords
	21.2.2 Dial Back
22.0 Host Print Menu
22.1 Introduction
22.2 Print Selections
	22.2.1 Ignore Printing
	22.2.2 Host Only Printing
	22.2.3 Remote Only Printing
	22.2.4 Both Host/Remote Printing
23.0 Host Options Menu
23.1 Summary of Menu Items
23.2 General Procedures
24.0 Error Messages
24.1 Windows Error Messages
24.2 Windows File Transfer Errors
24.3 NRLISTEN Error Messages
24.4 NRCALL Error Messages
25.0 Using CONFIG
25.1 NRCALL Parameters
25.2 NRLISTEN Parameters
26.0 CO/Session Utilities
26.1 Removing CO/Session from Memory
	26.1.1 Unloading CO/Session Remotely
26.2 Unloading Windows Driver Only (Remote Only)
26.3 DOS Level Security (Host Only)
27.0 Advanced Topics
27.1 Introduction
27.2 Command Line Options
	27.2.1 Directory Options (Host and Remote Use)
	27.2.2 Networks
	27.2.3 Floppy Drive
	27.2.4 Automatic Access to Call Menu (REMOTE or HOSTMENU)
	27.2.5 Special Operation Options
	27.2.6 Auto-Dial and Foreground Operation Option (REMOTE Only)
27.3 Shortcut Keys (REMOTE Only)
27.4 Remote Mouse Operation
27.5 Host Program Versions and Available Memory
27.6 Using Extended Memory (HOST and HOSTMENU)
27.7 Host Expanded Memory Version - EMSHOST (HOST Only)
	27.7.1 Limitations
	27.7.2 Requirements
	27.7.3 Operation
27.8 Automatic Batch Execution (Host Only)
27.9 43/50 Line Extended Text Modes
27.10 3270/5250 Terminal Emulation Software
27.11 DESQview Multiuser Support
27.12 COM Port Addresses
28.0 Modems and Cables
28.1 Cabling Pin Arrangements (Modem & Direct)
28.2 Modem Selection
28.3 Customized Modem Control Strings
	28.3.1 Special Characters
	28.3.2 String Descriptions
28.4 Debugging Modem Strings
28.5 Modem Switch Settings
28.6 Verifying that Your Modem is Installed Correctly
29.0 Troubleshooting
29.1 Keyboard Problems
29.2 Modem Problems
29.3 Problems With Direct Connect
29.4 Slow Scrolling and Slow Screen Updates
29.5 File Transfers
30.0 Post Connect Scripting
30.1 Introduction
	30.1.1 CXL Job Files
	30.1.2 Command Summary
	30.1.3 Comments
	30.1.4 Labels
	30.1.5 Variables
30.2 Command Descriptions
	30.2.1 DISCONNECT
	30.2.2 ENDIF
	30.2.3 EXIT
	30.2.4 GOTO
	30.2.5 IF [NOT]
	30.2.6 ON_ESC:
	30.2.7 PAUSE
	30.2.8 SBREAK
	30.2.9 SEND
	30.2.10 WAITFOR
30.3 Debugging CXL Scripts
31.0 Miscellaneous Reference Information
31.1 CO/Session Data Files
	31.1.1 Host and Remote
	31.1.2 Remote Only
31.2 Video Mode Compatibility



=========================
Part One: Using NetRemote
=========================


1.0 Introduction to NetRemote
  
Welcome to NetRemote for Windows--the complete remote support 
solution for your local area network (LAN)!

NetRemote is a member of McAfee's family of common sense LAN support 
tools, all designed to reduce the cost of LAN ownership.


1.1 About NetRemote for Windows

NetRemote simplifies LAN administration. Using NetRemote, you can 
provide instant support to your network users by solving their 
problems from your PC.

NetRemote gives you complete control over another PC--without leaving 
your desk. Using your own keyboard and mouse, you can execute commands 
at the remote PC. Plus you can view the other PC's screen from your own 
screen!

In addition to these interactive support capabilities, NetRemote 
increases your support potential by providing the tools you need to 
view PC configurations and to run diagnostics on networked PCs. With 
NetRemote, you don't have to run around to support your users 
effectively.


1.2 Why Remote Support?

Remote support puts control over your networked PCs at your fingertips.
Extensive remote capabilities cure one of network administrators' 
biggest headaches--wasting time running around from user to user to fix 
problems.

1.2.1 The Problem

Studies indicate that user support consumes over 70% of the total 
support staff time. Much of this time is spent running around to each 
user workstation. This in turn:

  o  Creates aggravation  
  o  Consumes too much time for each individual support call  
  o  Keeps support personnel from being available for other support 
     calls
  o  Increases distractions for personnel who must visit each department 
     experiencing network difficulties

Running around may not even be possible if you operate a wide area 
network!

1.2.2 The Answer

Remote support is the answer. Studies indicate that a full 80% of all 
LAN problems can be solved remotely. This results in a 60% savings in 
the total LAN support cost.

With remote support, you also get these benefits:

  o  Support a network in less time  
  o  Reduce burden on overworked support staff by increasing 
     productivity
  o  Use fewer people to support a larger network effectively and 
     without burnout

The cost savings and benefits your support staff enjoys with remote 
capabilities are significant. The following example demonstrates the 
potential savings for a typical network:

Company ABC has a network with 50 users, who are spread over two floors. 
Peter, the network administrator, spends about 75% of his time dealing 
with users' questions and problems. His annual compensation is $40,000 
per year.

Company ABC's user support cost before NetRemote is as follows:

$40,000 per year for Peter x 75% of his time spent solving 
problems = $30,000 annual cost to support the network.

1.2.3 The NetRemote Solution

NetRemote centralizes user support functions, so you spend less time 
running around.

If Company ABC's support staff installed NetRemote on their network, the 
company would experience significant savings in both dollars and time. 
For example:

COST SAVINGS:

$40,000 per year for Peter x 75% of his time spent supporting users x 
40% savings with NetRemote = $12,000 annual cost savings.

TIME SAVINGS:

40 hours per week for Peter x 75% time spent supporting users x 40% 
savings with NetRemote = 12 hours or 1.5 days per week.

You can see how NetRemote reduces Peter's support burden. Now Peter can 
support his users without climbing up and down stairs, and he has an 
extra 12 hours to devote to other important network issues!


1.3 How NetRemote Works

With NetRemote, you can contact another networked user, execute commands 
at his or her PC, view diagnostic and configuration information, and 
transfer files--all without leaving your desk.

Network users set themselves up to receive a call by enabling the 
"listen" module. The network administrator then uses NetRemote to call 
the user experiencing problems. Upon connection, the administrator's PC 
displays the user's screen. At this point, the keystrokes executed at 
the administrator's PC (the Calling-PC) are interpreted by the user's PC 
(the Listening-PC), giving the Calling-PC control over the Listening-PC. 
(The Calling-PC's mouse works in the same manner.)

With this level of interaction, the administrator can solve problems on 
the spot, providing instant support to network users.


1.4 NetRemote Applications

1.4.1 Supporting Local LANs

Use NetRemote to support your LAN users and to access other PCs 
connected to your LAN without leaving your desk.

When a user calls with a problem, simply use NetRemote to take control 
of his or her PC via the keyboard and/or mouse, view his or her screen, 
and solve the problem immediately. You can also pinpoint problems 
quickly using NetRemote's integrated diagnostics.

1.4.2 Supporting Remote LANs

NetRemote includes CO/Session, an asynchronous communication program 
that lets you dial out through a modem and into a remote LAN. Using 
NetRemote with CO/Session, you can support LANs in other buildings from 
your own desk. Part Two of this manual provides instructions on 
installing and using CO/Session.

1.4.3 Supporting WANS

NetRemote minimizes network traffic so it can even operate across your 
WAN (wide area network). Now you can support users in other buildings 
too!

1.4.4 Sharing Modems

Do you have under-utilized modems located in other areas of your company 
offices?

If so, use NetRemote to seize control of a PC with a modem. Use your 
favorite communications package to download information from bulletin 
boards without leaving your desk.

1.4.5 Sharing FAX Cards

Does your network environment have only one PC-FAX card?

With NetRemote you can gain access to the PC with the FAX card to send 
and receive faxes from your PC.

1.4.6 Teaching and Training

NetRemote is also a great classroom aid. Use NetRemote to view the 
screen of any student without leaving your desk.

Combine NetRemote with a projector to show your screen or any student's 
screen to the entire class.

1.5 Environment

The following must be installed on your network to install and run 
NetRemote for Windows:

  o  Microsoft Windows version 3.1 (enhanced mode)
  o  Minimum 386SX (16)
  o  CGA Monitor or better
  o  4 Meg of memory
  o  NetWare version 2.2 or greater
  o  DOS version 5.0 or greater

Installing a mouse is optional.

NOTE: The READ.ME file on the distribution diskette contains a complete 
up-to-date listing of all the various drivers needed to run NetRemote.

The following must be installed on your network to install and run 
NetRemote for DOS:

  o  Minimum 386SX (16)
  o  CGA Monitor or better
  o  2 Meg of memory
  o  NetWare version 2.2 or greater
  o  DOS version 5.0 or greater


1.6 Technical Support

First, please mail in your Product Registration Card. Registering your 
copy of NetRemote enables us to notify you about upgrades, fixes, 
enhancements, and new products.  
  
If you have a problem with NetRemote, call the McAfee Technical Support 
number found in the front of this manual.
  
Before calling us, carefully consult this manual, the READ.ME file, and 
any product update information included in your NetRemote package.  
  
When requesting support be prepared with:  
  o  The version and serial number of your NetRemote product from the 
     distribution diskette label or the NetRemote About dialog box
  o  The contents of CONFIG.SYS, AUTOEXEC.BAT and printout of NVER on 
     both the Calling-PC and the Listening-PC  
  o  The type of network hardware and operating system software you are 
     using  
  o  The version of DOS you are using  
  o  Any TSRs loaded  
  o  A clear and concise statement of your problem  
  
NOTE: If you have not mailed in your Product Registration Card, you will 
      be required to answer some questions over the telephone so our 
      Technical Support Staff can register your product.  
  
Support is not provided for problems related to the installation or 
operation of your network or for the installation of Windows.
  
  
1.7 Manual Organization  
  
This manual is divided into the following parts:  
  
  o  Part One: Using NetRemote  
  o  Part Two: Using CO/Session  
  o  Part Three: Reference Materials   
  
The following charts describe the contents of each part of this manual.
  
Part One: Using NetRemote  
CHAPTER                         TOPICS  
1.0 Introduction to NetRemote   Provides background information about 
				NetRemote, technical support 
				information, and hardware and software 
				requirements.  
  
2.0 Installation                Provides complete installation 
				instructions.  
  
3.0 Getting Started             Describes navigation conventions and 
				provides a tutorial for the first-time 
				NetRemote user (Windows only).
  
4.0 NetRemote Windows           Provides complete instructions on using 
    Reference                   NetRemote for Windows.  
  
5.0 NetRemote DOS Reference     Provides complete instructions on using 
				NetRemote for DOS.  
  
Part Two: Using CO/Session  
CHAPTER                         TOPICS  
6.0 Introduction to CO/Session  Describes CO/Session and its system 
				requirements.  
  
7.0 Installing CO/Session       Provides complete installation 
				instructions for CO/Session.  

8.0 General Procedure           Describes a typical remote control 
				session, special situations and 
				CO/Session's menus.  
  
9.0 Using CO/Session Remote     Explains how to start CO/Session, use 
				its command line options, change host 
				settings, end a remote session and free 
				up memory.  
  
10.0 Remote Main Menu           Describes CO/Session's menu items, 
				keyboard chat, and voice switching.  
  
11.0 Remote Call Menu           Describes the functions of all the items 
				on CO/Session's Call menu.  
  
12.0 Remote File Menu-File      Describes the File menu, procedures for 
     Transfer                   using the menu items, and the file 
				transfer option.  
  
13.0 Remote Print Menu          Describes the functions of all the items 
				on CO/Session's Print menu.  
  
14.0 Support Menu Reference     Describes the functions of all the items 
				on CO/Session's Support menu.  
  
15.0 Remote Options Menu        Describes the functions of all the items 
				on CO/Session's Options menu.  
  
16.0 Remote and Host Options    Describes the Remote and Host functions 
				that are available from the Remote and 
				Host Option menus.  
  
17.0 Terminal Mode              Provides complete instructions on 
				emulating an asynchronous terminal.  
  
18.0 Using CO/Session Host      Provides procedures for starting 
				CO/Session Host as well as managing and 
				ending a session.  
  
19.0 HOSTMENU Main Menu         Describes the CO/Session HOSTMENU Main 
				Menu, which is a menu-based alternative 
				to the Host command line method (Chapter 
				18).  
  
20.0 Host Call Menu             Provides functions for making calls, 
				waiting for calls, and defining Phone 
				Book Entries.  
  
21.0 Host Phone Book Menu       Describes the functions for viewing and 
				defining Phone Book Entries.  
  
22.0 Host Print Menu            Describes printing from the Host PC.  
  
23.0 Host Options Menu          Describes using the Option menu to set 
				default settings used by CO/Session 
				Host.  
  
  
Part Three: Reference Material  
CHAPTER                         TOPICS  
24.0 Error Messages             Provides a complete listing of all error 
				messages and their explanations for 
				NetRemote.  
  
25.0 Using CONFIG               Describes how to use the CONFIG.EXE 
				program to permanently change the 
				options of the NRCALL and NRLISTEN 
				programs.  
  
  
26.0 CO/Session Utilities       Describes the following CO/Session 
				programs:  SUNLOAD, RWUNLOAD, and 
				SAFEGUARD.  
  
27.0 Advanced Topics            Describes ways to adapt CO/Session to 
				varying needs in different environments.
  
28.0 Modems and Cables          Provides complete instructions on using 
				modems and cables with CO/Session to 
				avoid errors.  
  
29.0 Troubleshooting            Describes error messages for CO/Session.
  
30.0 Post Connect Scripting     Describes the CXL job files.  
  
31.0 Miscellaneous Reference    Describes CO/Session data files and 
				Video Information Mode capability.
  
  
  
2.0 NetRemote Installation  
  
Chapter 1 introduced NetRemote for Windows. This chapter provides 
complete instructions for installing NetRemote for Windows.  
  
NOTE: Before continuing, use the DOS DISKCOPY command to make a working
copy of the NetRemote distribution diskettes.  
  
  
2.1 Before Installation  
  
To install NetRemote, you must:  
  
  o  Be logged in to the network as a SUPERVISOR or equivalent  
  o  Run Windows in enhanced mode  
  o  Have the following line in the [386Enh] section of your SYSTEM.INI 
     file:  network=*vnetbios, vnetware.386, vipx.386  
  
2.1.1 Recommended Versions  
  
The following file versions are recommended for NetRemote's installation 
and use:  
  
  o  IPX version 3.10  
  o  NETX version 3.26 or greater  
  o  Windows version 3.1  
  o  VIPX version 1.13  
  o  NETWARE.DRV version 2.02  
  o  VNETWARE.386 version 1.06  
  
If you are using ODI drivers instead of IPX, the recommended versions 
are:    
  o  LSL version 1.2   
  o  IPXODI.COM version 1.2 or 2.10 (version 2.0 is not supported).  
  
The latest versions of these files can be found on Compuserve in Library 
5 of the Novell Libraries (GO NOVLIB; Lib 5). As of this writing, the 
current IPX, NETX, and IPXODI are contained within the file DOSUP7.ZIP.
  
The current versions of the Novell support drivers for Windows 
(VIPX.386, VNETWARE.386, NETWARE.DRV, etc.) can be found in the file 
WINUP7.ZIP.  
  
NOTE: As these drivers are updated and added to the Compuserve file, the 
number within the Compuserve filename will increment. For example, if 
Novell were to release a new IPX version and add it to DOSUP7.ZIP, the 
name would change to DOSUP8.ZIP.  
  
2.1.2 Determining Version Numbers  
  
You can determine the versions of the above software by using the 
following methods:  
  
  o  IPX and NETX shells - use Novell's NVER command.  
  o  Windows - run Windows and choose the About command from the Program 
     Manager Help menu.  
  o  Novell Windows support drivers - use the Novell VERSION command. 
     For example, type the path where the file resides followed by:  
	 VERSION VNETWARE.386 <ENTER>  
  o  IPXODI.COM - use the Novell VERSION command. For example, type:  
	 VERSION IPXODI.COM <ENTER>  
  
  
2.2 NetRemote for Windows Installation  
  
This section provides the step-by-step instructions necessary to install 
NetRemote for Windows on your network.   
  
NOTE: Refer to section 2.4 for instructions on installing NetRemote for 
DOS.  
  
After installing NetRemote for Windows on the desired file server (using 
the Administrator, Basic or Custom Install), you must execute the User 
Install at each user's workstation on the network. You cannot perform 
any of NetRemote's functions without installing NetRemote on user 
workstations.
(Refer to section 2.3 for User Install instructions.)  
  
NOTE: You can exit the installation at any time by choosing the Exit 
button in the lower right corner of the installation screen.  
  
Use the following procedure to install NetRemote for Windows on your 
network:  
  
1.  Run Windows.  
  
2.  Place distribution diskette #1 in your floppy drive.  
  
3.  Choose the Run command from the Program Manager File menu.  
  
4.  At the prompt, enter the drive letter of the floppy drive where you 
    inserted the distribution diskette and then type SETUP.
  
    For example, type:  
  
	A:\SETUP <ENTER>  
  
NOTE: Instead of Steps 3 & 4, you can run File Manager, click on the 
drive icon that contains the NetRemote diskette, and then double click 
on SETUP.EXE in the files list.  
  
    At this point a Log File is created. A Log File is an ASCII file 
    listing the date, time and location of the NetRemote installation.
  
    The Log File also lists any errors that occurred during the 
    installation. If an error which prevents completion of the 
    installation process occurs, the Log File displays.  
  
    If NetRemote finds an existing Log File, you are asked if you wish 
    to overwrite the old file. If you do not wish to overwrite the old 
    Log File, you are prompted to enter a new Log File name.
  
5.  Select an install option from the Enter Install Options dialog box.
  
    Select one of the following options, and then choose the OK button.
  
	o  Administrator Install - Runs the install process with minimal 
	   input, copies the files to the file server, and installs the 
	   NetRemote license. (Refer to section 2.2.1 for instructions.)
  
	o  Basic Install - Runs the install process with minimal user 
	   input. It automatically creates the Program Manager group 
	   MCAFEE (if not found) and a NetRemote icon, configures Windows 
	   for NetRemote use, and creates a READ.ME file icon once the 
	   install process has completed. (Refer to section 2.2.2 for 
	   instructions.)
  
	o  Custom Install - Allows you to choose whether or not to perform 
	any of the following operations: copy program files on the file 
	server, install the license to the file server, create the program 
	group/icon, configure Windows for NetRemote use, and/or display 
	the     READ.ME file. (Refer to section 2.2.3 for instructions.)
  
NOTE: The Basic Install is recommended.  
  
6.  Proceed to the appropriate section in this chapter for further   
    instructions about the install option you chose in the previous step.  
  
2.2.1 Administrator Install  
  
The Administrator Install performs the following operations:  
  
o  Copies the DOS and Windows program files to the file server   
o  Installs the NetRemote license  
  
Continue with the following steps to complete the Administrator Install.
  
7.  Choose the file server where you wish to install NetRemote, and then 
    choose the OK button.  
  
    NetRemote verifies that you have SUPERVISOR rights on the selected 
    file server and also checks to see that your \WINDOWS\SYSTEM 
    directory contains the appropriate files:  
  
	o  VNETWARE.386  
	o  VIPX.386  
	o  NETWARE.DRV  
  
    Once the above information is verified, the Enter Install Options 
    window displays.  
  
    If the above information is not correct or cannot be verified, the 
    installation process is aborted and the Log File displays.  
  
8.  Enter the path (i.e., drive and full directory) where you want 
    NetRemote installed.  
  
    The full path must coincide with the file server you selected in the 
    previous step. If the directory you selected does not exist, 
    NetRemote creates one. The default directory is NREMOTE.  
  
    If NetRemote already exists in this directory, an option box 
    displays asking whether or not you wish to overwrite this copy 
    of NetRemote.
  
9.  Enter the last seven (7) digits of the serial number as printed on 
    your distribution diskette, and choose the OK button.  
  
10. Enter the eight (8) character password as printed on your 
    distribution diskette, and choose the OK button.  
  
11. Verify the serial number and password.  
  
    Confirm the information you have just entered. If the information 
    displayed is correct, choose the YES button.  
  
    If the information is incorrect, choose the NO button. Then repeat 
    steps 9-11 as prompted.
  
NOTE: If a previous copy of NetRemote is found, an option box displays 
offering to upgrade to the current version you are installing. Choose 
the YES button to upgrade. Otherwise, choose the NO button; the install 
is aborted.  
  
12. Enter your company name, and choose the OK button.  
  
    Your company name must be between 8 and 20 alphanumeric characters.  
  
13. Select an option from the Enter Install Options dialog box to make   
    changes to your SYSTEM.INI, and choose the OK button.  
  
    The options are:  
  
	o  Have NetRemote make changes now to your existing SYSTEM.INI 
	   file and backup the old file as SYSTEM.BDI.  
  
	o  Have NetRemote make changes to the SYSTEM.BDI file and leave 
	   your existing SYSTEM.INI file alone for you to change at a 
	   later date.  
  
14. An information box displays telling you to restart Windows after   
    completing the installation process to ensure that the changes made 
    to the SYSTEM.INI file take effect. Choose the OK button to 
    continue.  
  
    An information box displays telling you that the installation was 
    successful.  
  
15. From the dialog box which displays, choose whether or not you want 
    to restart Windows at this point.  
  
    Choose the YES or NO button as desired.  
  
    If you choose NO, you will have to restart Windows before using 
    NetRemote.  
  
The installation process is complete.  
  
If any errors occurred during the installation process, the Log File   
displays automatically after exiting the installation.  
  
If you receive an error and need to contact McAfee Technical Support, 
please make a note of the information displayed in the Status Box and 
have the Log File available before calling.  
  
2.2.2 Basic Install  
  
The Basic Install automatically performs the following operations:  
  
o  Copies NetRemote files to the network  
o  Installs the NetRemote license  
o  Configures Windows for NetRemote  
o  Creates the Program Manager group MCAFEE and the NetRemote icon  
o  Creates a READ.ME icon  
  
Continue with the following steps to complete the Basic Install.  
  
7.  Choose the file server where you wish to install NetRemote, and 
    choose the OK button.  
  
    NetRemote verifies that you have SUPERVISOR rights on the selected 
    file server and also checks to see that your \WINDOWS\SYSTEM 
    directory contains the appropriate files:  
  
	o  VNETWARE.386  
	o  VIPX.386  
	o  NETWARE.DRV  
	  
    Once the above information is verified, the Enter Install Options 
    window displays.  
  
    If the above information is not correct or cannot be verified, the 
    installation process is aborted and the Log File displays.  
  
8.  Enter the path (i.e., drive and full directory) where you want 
    NetRemote installed.  
  
    The full path must coincide with the file server you selected in the 
    previous step. If the directory you selected does not exist, 
    NetRemote creates one. The default directory is NREMOTE.  
  
    If NetRemote already exists in this directory, an option box 
    displays asking whether or not you wish to overwrite this copy of 
    NetRemote.  
  
9.  Enter the last seven (7) digits of the serial number as printed on 
    your distribution diskette, and choose the OK button.  
  
10. Enter the eight (8) character password as printed on your 
    distribution diskette, and choose the OK button.  
  
11. Verify the serial number and password.  
  
    Confirm the information you have just entered. If the information   
    displayed is correct, choose the YES button.  
  
    If the information is incorrect, choose the NO button.   
    Then repeat steps 9-11 as prompted.  
  
NOTE: If a previous copy of NetRemote is found, an option box displays   
offering to upgrade to the current version you are installing. Choose 
the YES button to upgrade. Otherwise, choose the NO button; the install 
is aborted.  
  
12. Enter your company name, and choose the OK button.  
  
    Your company name must be between 8 and 20 alphanumeric characters.  
  
13. Select an option from the Enter Install Options dialog box to make   
    changes to your SYSTEM.INI, and choose the OK button.  
  
    The options are:  
  
	o  Have NetRemote make changes now to your existing SYSTEM.INI 
	 file and backup the old file as SYSTEM.BDI.  
  
	o  Have NetRemote make changes to the SYSTEM.BDI file and leave 
	 your existing SYSTEM.INI file alone for you to change at a 
	 later date.  
  
14. An information box displays telling you to restart Windows after 
    completing the installation process to ensure that the changes made 
.   to the SYSTEM.INI file take effect. Choose the OK button to 
    continue.  
  
    An information box displays telling you that the installation was   
    successful.  
  
15. From the dialog box which displays, choose whether or not you want 
    to restart Windows at this point.  
  
    Choose the YES or NO button as desired.  
  
    If you choose NO, you will have to restart Windows before using 
    NetRemote.  
  
The installation process is complete.  
  
If any errors occurred during the installation process, the Log File   
displays automatically after exiting the installation.  
  
If you receive an error and need to contact McAfee Technical Support, 
please make a note of the information displayed in the Status Box and 
have the Log File available before calling.  
  
2.2.3 Custom Install  
  
The Custom Install lets you choose from the following operations:  
  
o  Copy NetRemote files to the network  
o  Install the NetRemote license  
o  Configure Windows for NetRemote  
o  Create the Program Manager group MCAFEE and the NetRemote icon  
o  Display the READ.ME file automatically at the end of installation  
  
Continue with the following steps to complete the Custom Install.  
  
7.  Select the desired options from the Enter Install Options dialog 
    box, and choose the OK button.  
  
8.  Choose the file server where you wish to install NetRemote, and 
    choose the OK button.  
  
    NetRemote verifies that you have SUPERVISOR rights on the selected 
    file server and also checks to see that your \WINDOWS\SYSTEM 
    directory contains the appropriate files:  
  
	o  VNETWARE.386  
	o  VIPX.386  
	o  NETWARE.DRV  
  
    Once the above information is verified, the Enter Install Options 
    window displays.  
  
    If the above information is not correct or cannot be verified, the 
    installation process is aborted and the Log File displays.  
  
9.  Enter the path (i.e., drive and full directory) where you want 
    NetRemote installed. (If you did not select the option to copy 
    NetRemote files to     the network, skip this step.)  
  
    The full path must coincide with the file server you selected in the 
    previous step. If the directory you selected does not exist, 
    NetRemote creates one. The default directory is NREMOTE.  
  
    If NetRemote already exists in this directory, an option box 
    displays asking whether or not you wish to overwrite this copy of 
    NetRemote.  
  
10. Enter the last seven (7) digits of the serial number as printed on 
    your distribution diskette, and choose the OK button. (If you did 
    not select the option to install the license, skip to step 13.)  
  
11. Enter the eight (8) character password as printed on your 
    distribution diskette, and choose the OK button.  
  
12. Verify the serial number and password.  
  
    Confirm the information you have just entered. If the information 
    displayed is correct, choose the YES button.  
  
    If the information is incorrect, choose the NO button.   
    Then repeat steps 9-11 as prompted.  
  
NOTE: If a previous copy of NetRemote is found, an option box displays   
offering to upgrade to the version you are installing. Choose the YES 
button to upgrade. Otherwise, choose the NO button; the install is 
aborted.  
  
13. Enter your company name, and choose the OK button. (If you did not   
    select the option to install the license, skip this step.)  
  
    Your company name must be between 8 and 20 alphanumeric characters.  
  
14. Select an option from the Enter Install Options dialog box to make   
    changes to your SYSTEM.INI, and choose the OK button.  
  
    The options are:  
  
	o  Have NetRemote make changes now to your existing SYSTEM.INI 
	   file and backup the old file as SYSTEM.BDI.  
  
	o  Have NetRemote make changes to the SYSTEM.BDI file and leave 
	   your existing SYSTEM.INI file alone for you to change at a 
	   later date.  
  
15. An information box displays telling you to restart Windows after   
    completing the installation process to ensure that the changes made 
    to the SYSTEM.INI file take effect. Choose the OK button to 
    continue.  
  
    An information box displays telling you that the installation was   
    successful.  
  
16. From the dialog box which displays, choose whether or not you want 
    to restart Windows at this point.  
  
    Choose the YES or NO button as desired.  
  
    If you choose NO, you will have to restart Windows before using 
    NetRemote.  
  
NOTE: If you chose the option to display the READ.ME file and you choose 
      to restart Windows at this point, the READ.ME file will not 
      display immediately after the install completes. Instead, you must 
      choose the READ.ME icon from the group MCAFEE to read the file.  
  
The installation process is complete.  
  
If any errors occurred during the installation process, the Log File 
displays automatically after exiting the installation.  
  
If you receive an error and need to contact McAfee Technical Support, 
please make a note of the information displayed in the Status Box and 
have the Log File available before calling.  
  
  
2.3 User Install  
  
The User Install configures a user's workstation for NetRemote. This 
program must be run at each user's workstation using the copy of 
SETUP.EXE that resides on the file server where you installed NetRemote.
  
You must have completed the Administrator, Basic or Custom Install 
before running the User Install.  
  
Running this process makes the necessary changes in the user's 
SYSTEM.INI files and creates a MCAFEE group and the NetRemote and 
READ.ME icons.  
  
You need to know where NetRemote is installed on your file server to   
complete the User Install.  
  
1.  Choose the Run command from the Program Manager File menu.  
  
    At the prompt, type both the drive letter/directory where NetRemote 
    is installed and the executable name SETUP.EXE. For example, type:  
  
	F:\NREMOTE\SETUP.EXE  
  
NOTE: You can also run SETUP.EXE from File Manager.   
  
2.  The Install Options screen displays listing all four install 
    options.  
  
    The default is User Install, but you can also perform the 
    Administrator, Basic and Custom Installs from this dialog box.  
  
    Choose the User Install option; then choose the OK button.  
  
  
3.  Select an option from the Enter Install Options dialog box to make   
    changes to your SYSTEM.INI, and choose the OK button.  
  
    The options are:  
  
	o  Have NetRemote make changes now to your existing SYSTEM.INI 
	   file and backup the old file as SYSTEM.BDI.  
  
	o  Have NetRemote make changes to the SYSTEM.BDI file and leave 
	   your existing SYSTEM.INI file alone for you to change at a 
	   later date.  
  
4.  An information box displays giving you the option to restart Windows 
    now or later. Choose the OK button to continue.  
  
The user installation process is complete.  
  
NOTE: The Listen Automatically option is set as a default during the 
User Install. Refer to Chapter 4 for information about changing the 
default setting.  
  
  
2.4 NetRemote for DOS Installation  
  
Before you can install NetRemote for DOS, you must be in the directory   
where you want the NetRemote files NRCALL and NRLISTEN to reside.  
  
Use the following procedure to run the install process.  
  
1.  Insert Diskette #2 into the disk drive.  
  
2.  Make a NetRemote directory on a file server (if one does not already 
    exist). Type:  
  
	MD NREMOTE <ENTER>  
  
    Switch into that directory; your current prompt then should be the   
    directory on the network where the NetRemote files will reside after 
    the install is complete.  
  
3.  From the NREMOTE directory, type:  
  
	A:DOSINST A: <ENTER>  
  
    where A:DOSINST is the command to execute and A: is the source 
    drive.  
  
4.  At the prompt, press any key to continue.  
  
5.  At the prompt, enter the last 7 digits of the serial number as 
    printed     on the distribution diskette.  
  
6.  At the prompt, enter your company name (which must be at least 8   
    characters).  
  
7.  At the prompt, enter the full serial number as printed on the   
    distribution diskette.  
  
8.  At the prompt, enter the 8 character password as printed on the   
    distribution diskette.  
  
The installation process is complete.  
  
  
2.5 Uninstalling NetRemote  
  
You can uninstall the NetRemote license. To do this, issue the COUT 
command as follows:  
  
	COUT REM <ENTER>  
  
You may now install this NetRemote license on another file server.  
  
NOTE: If your current path is F:\NREMOTE and F: is mapped to FS1\SYS, 
the license is removed from FS1.  
  
If you wish to remove the license from a different file server, your 
current path must be mapped to the appropriate file server.  
  
  
2.6 Troubleshooting  
  
If you receive any errors while installing or upgrading NetRemote, 
display the Log File to view the errors and possible solutions.  
  
Validate IPX/NETX versions, encountered NetWare Error #.  
	The install process was unable to determine if your IPX and/or 
	NETX versions meet the installation requirements. If your versions 
	do meet the requirements, you may continue. If not, you must 
	upgrade these files.  
  
The Serial Number not Valid.  
	Please enter the last 7 digits of the serial number as it displays 
	on your distribution diskette.  
  
There is already a License on Server xxx. Install will continue 
normally.  
	This is a non-fatal error and the installation process will 
	continue.  
  
Install found a license for NetRemote Version # on Server xxx. Would you 
like to upgrade the license?  
	The NetRemote installation found an older version of NetRemote on 
	the selected file server. You can either upgrade the existing 
	files or install this version of NetRemote on a different file 
	server.  
  
The License you are attempting to install has already been installed on 
another server.  
	You are trying to install a license that has already been 
	installed on another file server. You can either run the COUT 
	program on the first file server or contact McAfee Associates, 
	Inc. for another copy of NetRemote.  
  
You have not configured Windows to load VIPX.386. Please consult manual 
for further information.  
	The following line must be included in the SYSTEM.INI file in the 
	[386Enh] section:  
		network=*vnetbios, vnetware.386, vipx.386  
  
	Consult your Windows manual for complete instructions on loading 
	VIPX.386.  
  
Install detected problems with your configuration. Click on OK to exit 
and view Log File.  
	View the Log File for information to correct your configuration in 
	accordance with the NetRemote installation requirements. Once you 
	have corrected your configuration, re-run the installation 
	process.  
  
Error calling DLL function.   
	This indicates that install was unable to find PROGLIB.DLL or 
	NETWARE.DRV, NWMISC.DLL, NWMSG.DLL, NWNETAPI.DLL, NWIPXSPX.DLL 
	didn't load or wasn't configured in your SYSTEM.INI file.  
  
	Make sure:  
	o The IPX and shell drivers are loaded.  
	o The following line is included in your SYSTEM.INI file in the   
	[386Enh] section:  
		network=*vnetbios, vnetware.386, vipx.386  
	o You have Write and Modify rights to your Windows directory.  
  
Unrecoverable Error  
	Verify that you meet the NetRemote configuration requirements; 
	then contact McAfee Technical Support with the Error #.  
  
Fatal Error  
	Verify that you meet the NetRemote configuration requirements; 
	then contact McAfee Technical Support with the Error #.  
  
Unable to copy or decompress file [BDIKBD.DRV, XKBD.DLL, VNRLD.386].  
	These files must be flagged as Read and Write. If any one of these 
	files is not flagged Read and Write, the installation will abort. 
	If this error displays for one of these files, check the flagging 
	on all three before resuming installation to avoid receiving this 
	error on the other files. Once the installation is complete, you 
	can restore the Read Only flag.  
  
The server you are attempting to install on is licensed for more users 
than this NetRemote license allows you to have. Please call McAfee to 
upgrade to the correct license.  
	If the NetWare license on your network does not match the 
	NetRemote license (i.e., the network is licensed for more users 
	than the copy of NetRemote you purchased), the installation 
	process aborts. Call McAfee to get the correct license.  
  
  
  
3.0 Getting Started  
  
Chapter 2 provided step-by-step instructions for installing NetRemote. 
This chapter provides a tutorial on the Windows portion of NetRemote for 
the first-time NetRemote user.
  
  
3.1 Before You Begin  
  
If you have not already installed NetRemote for Windows on your network, 
please refer to Chapter 2. You must install the product before 
continuing.  
  
  
3.2 What's in this Chapter  
  
The following table describes the sections in this chapter.  
  
SECTION                         DESCRIPTION  
NetRemote Icon and Conventions  Shows the NetRemote icon and describes 
				the navigation conventions used 
				throughout this manual.  
  
The Ribbon and Menu Bar         Describes the tool bar buttons and the 
				menus included on the menu bar.  
  
NetRemote Main Screen           Describes the Current Connections Screen 
				and the function of its buttons.  
  
Tutorial                        Provides brief instructions for taking 
				control of a remote PC, viewing its 
				diagnostics and transferring files.  
  
  
3.3 NetRemote Icon and Conventions  
  
3.3.1 The Icon  
  
To run NetRemote, you must first access Windows and then double click on 
the NetRemote icon.   
  
3.3.2 Conventions  
  
The following conventions are used in this manual to indicate how to   
navigate through NetRemote's windows and execute commands. You should 
take   
some time to become familiar with them before continuing with this manual.  
  
TERM            DESCRIPTION  
Choose          Use a mouse or key combination to choose an item that   
		initiates an action.   
  
Click           Press the left mouse button once.  
  
Double click    Press the left mouse button twice quickly.  
  
<ENTER>         Press the Enter key to complete an action.  
  
<ESC>           Press the Esc key to exit to the previous window.  
  
Icon            A graphic representation of an element in Windows.  
  
Point           Position the mouse until the tip of the pointer rests on the   
		desired item.  
  
Select          Mark an item by clicking on it or highlighting it with   
		either key combinations or the mouse.  
  
  
3.4 The Ribbon and Menu Bar  
  
When you double click on the NetRemote application icon, the main window   
displays. This screen has both a ribbon of tool bar buttons and a menu bar   
of options; you can access most of NetRemote's features from either the tool   
bar buttons or the menus (Listen Off and Hang-Up can only be accessed from   
the menu bar).  
  
3.4.1 The Tool Bar Buttons  
  
The ribbon contains a graphic depiction of each of the twelve (12) NetRemote   
windows. Buttons that are grayed are not currently enabled.  
  
The tool bar buttons and the functions they represent are as follows:  
  
o  User List - Displays the Current Connections window.  
o  Remote Control - Takes control of another PC.  
o  Listen On - Turns on "listen" at that PC.  
o  File Transfer - Transfers files from one networked PC to another.  
o  Reboot PC - Resets the Listening-PC.  
o  Configuration Summary - Details the PC and network configurations for   
the Listening-PC.  
o  Diagnostics - Provides information about the number of packets sent and   
received at the Listening-PC.  
o  Server Connections - Indicates to which file servers the Listening-PC is   
attached.  
o  Memory Information - Provides information about the amount of memory both   
used and available at the Listening-PC.  
o  Caller Options - Sets the keyboard and mouse options at the Calling-PC.  
o  Listener Options - Sets a number of options for the Listening-PC.  
o  NetWare Utilities - Executes a number of NetWare programs.  
  
All of these functions are described fully throughout this chapter.  
  
3.4.2 The Menu Bar  
  
The Menu Bar is displayed near the top of the screen and contains the names   
of the pull-down menus available for this application. NetRemote's available   
menus are:  
  
o  File  
o  Call  
o  Listen  
o  Window  
o  Help  
  
Each of these menu items is explained fully in the following sections. If   
any of the options listed in these menus are not available, they will appear   
grayed.  
  
File  
This menu displays the following options:  
o  Ribbon - Toggles the Ribbon display on and off.  
o  NetWare Menu Utilities - Displays the NetWare Utilities screen.  
o  Exit - Exits NetRemote.  
  
Call  
The Call menu displays the following options:  
o  Current Connections  - Displays the Current Connections window.  
o  Control PC - Takes control of a remote PC.  
o  File Transfer - Displays the File Transfer window.  
o  Reboot the Listening-PC - Reboots the Listening-PC.   
o  Node Configuration - Displays the PC Configuration window.  
o  Memory Information - Displays the Memory Information window.  
o  Diagnostics - Displays the Diagnostics window.  
o  Server Connections - Displays the Server Connections window.  
o  Options - Displays the Caller Options window  
	The following options are available in this window:  
	o  Listen Mouse On/Off  
	o  Listen Keyboard On/Off  
  
	If you do not want the user to be able to enter commands, you can   
	turn off the ListeningPC's keyboard and/or mouse. The default   
	settings are mouse and keyboard ON.  
  
	NOTE: If any of the Caller Options have been changed and then saved,   
	these changes are only in effect during this session of NetRemote.   
	Once the user exits NetRemote, the changes are lost.  
  
Listen  
The Listen menu displays the following options:  
o  Listen On - Turns on Windows "listen."  
o  Listen Off - Turns off Windows "listen."  
o  Hang Up - Allows the user at the Listening-PC to disconnect an active call.  
o  Options - Displays the Listener Options window.  
	The following list describes each of the above settings and buttons   
	and their functions when enabled.  
	o  Allow Remote Reboot - Permits the Calling-PC to reboot the   
	Listening-PC.  
	o  Enable Remote Access - Allows remote connections.  
	o  Require Password - Requires the Calling-PC user to supply a   
	password before a connection can be established with the Listening-PC.  
	o  Tone on Call - Instructs NetRemote to emit a tone upon connecting   
	to and disconnecting from the Listening-PC.  
	o  Pop-Up Accept Call Box - Prompts the Listening-PC user to accept   
	or refuse connections with a Calling-PC.  
	o  Show Connected Indication - Displays a NetRemote icon while a   
	call is in progress.  
	o  Enable Huge Bitmap - Shows large bitmaps on both the Listening-PC   
	and the Calling-PC while a call is in progress. Enabling this option   
	can slow NetRemote's processing time. Disabling this option can   
	prevent users from getting a complete screen update.  
	o  Compress Huge Bitmap - Allows the compression of large bitmaps.   
	This option reduces network traffic, but it also slows your PC's   
	performance.  
	o  Enable Fast Graphic Mode - Allows graphics compression. This   
	option speeds the transmission of information between the Calling   
	and ListeningPCs, but it requires more memory.  
	o  Reboot on Disconnect - Resets the ListeningPC when a call is   
	disconnected.  
	o  Listen Automatically - Places the workstation in Windows Listen   
	mode when starting NetRemote.  
  
	NOTE: For the Listen Automatically option to work, it must be   
	enabled in each of the users' individual NetRemote for Windows setup.   
	The User Install sets this by default.  
  
	If you wish to run NetRemote upon starting up Windows, add WNR.EXE   
	to the WIN.INI load line, or copy the NetRemote icon into the   
	Start-Up group for the Listening-PC. For example,   
  
		LOAD=F:\NREMOTE\WNR.EXE.  
  
	o  Enable File Transfer - Sends files from one networked PC to   
	another. You can also specify if you want Read Only or Read and   
	Write rights for the file transfer.  
  
  
	The options window displays the following buttons to the right:  
  
	o  Apply & Save - Saves the current information to WNR.INI in the   
	user's local Windows directory and exits this window. These changes   
	only affect the current user actually making the changes.  
  
	o  Password - Allows you to change the password supplied by the   
	Calling-PC before a connection can be made. The Require Password   
	option must be selected to enable this button.  
  
	o  Cancel - Exits this window without saving the information.  
  
Window  
The Window menu allows the following:  
o  Cascade - Arranges all open NetRemote windows (i.e., those windows with   
information about the Listening-PC as selected in the Current Connections   
window) so that they overlap each other, with only the title bar of each   
window visible.   
o  Tile - Arranges all open NetRemote windows so that all windows are   
visible without any overlap.  
  
Help  
Selecting this option allows you to access NetRemote's on-line help system.   
The menu offers the following:  
o  Index - Provides a complete listing of all NetRemote topics covered in   
the Help screens.  
o  Using Help - Provides information on how to use NetRemote's help screens.  
o  About NetRemote - Displays the NetRemote About box with NetRemote's   
version number, serial number, number of users for which the product is   
licensed, phone numbers for product information and technical support, and   
the company to whom the software is registered.  
  
  
3.3 NetRemote's Main Screen  
  
Much of the tutorial presented in the next section takes place from   
NetRemote's main screen.  
  
Double click on the NetRemote icon to launch the program. The NetRemote   
About box displays with the product version number, serial number and the   
company to whom the software is registered.  
  
After the About box automatically closes, NetRemote's main screen (i.e., the   
Current Connections window or User List) displays. The Current Connections   
window lists all of the users who are logged in to your default file server.   
(This list will be referred to in this manual as the User List.) Any user   
who has "listen" loaded (either Windows or DOS) will have a small icon   
displayed to the left of the user name. The icon for Windows is a rising sun;   
for DOS, a miniature diskette.  
  
This screen also displays a list of Available Windows. You can choose any of   
these windows when you are selecting a user to contact.   
  
You may select one or more of the following windows:  
  
o  Remote Control - Gives you control of the PC you are contacting if that   
PC has either DOS or Windows "listen" loaded.  
  
o  Node Configuration - Lists information about both the network and   
Listening-PC configurations.  
  
o  Memory Information - Displays the Listening-PC's Base, Expanded, Extended   
and Total Memory, indicating how much is installed and if there is memory   
available.   
  
o  Diagnostics - Displays the number of packets that are transmitted and   
received at that workstation.  
  
o  Server Connections - Lists the file servers and the file server addresses   
to which the Listening-PC is attached.  
  
NOTE: Chapter 4 describes all of these options in detail.  
  
This screen also contains the following buttons:  
  
o  Set Default - Allows you to specify which NetRemote windows will be   
selected automatically when the Current Connections window displays.   
  
o  Change Servers -Allows you to change to a different file server on your   
network.  
  
o  Next Server - Changes the User List in the Current Connections window to   
reflect the users attached to the next file server on the file server list   
that has NetRemote installed and to which you are attached.  
  
o  Call - Initiates a call to the selected user, enabling the currently set   
options.  
  
o  Refresh List - Updates the Current Connections list to reflect any   
additional users who have loaded "listen."  
  
o  Find - Searches the network for a particular server/user,   
server/connection number, or network address which you specify and then   
opens the windows selected in the Available Windows section of the Current   
Connections window.  
  
o  Close - Closes the Current Connections window.  
  
  
3.4 Tutorial  
  
This tutorial is divided into five sections. It walks you through the   
following NetRemote operations:  
  
o  Setting up two PCs for use with NetRemote for Windows  
o  Using remote control  
o  Viewing diagnostics  
o  Transferring files  
o  Exiting NetRemote  
  
NOTE: The tutorial is for NetRemote for Windows only.  
  
3.4.1 Setting Up Two PCs for Use with NetRemote for Windows  
  
For the tutorial, you need two PCs situated closely together and logged in   
to the same file server.  
  
NOTE: This exercise works best if the PCs are situated side-by-side and have   
obvious differences between their files.  
  
Designate one PC as the Listening-PC and the other as the Calling-PC. This   
terminology is used throughout this tutorial and the manual as described   
below:  
  
o  Listening-PC - the PC that will be contacted (the user)  
o  Calling-PC - the PC that initiates the contact (usually a network   
administrator or a support person)  
  
Use the following procedure to set up your PCs for the NetRemote tutorial.  
  
1.  Run Windows at the Listening-PC.  
  
2.  Double click on the NetRemote icon.  
  
    The Current Connections window displays listing all the users who are   
    logged in to your default file server. (Refer to section 3.3 entitled   
    "NetRemote's Main Screen" for more information about this screen.)  
  
3.  Press <ESC> or choose the Close button to exit this window.  
  
4.  Choose the Options command from the Listen menu.  
  
    A dialog box displays listing all of the default settings for the   
    Listening-PC.   
  
5.  Select the options "Pop-Up Accept Call Box" and "Tone on Call."  
  
    Choose the Apply & Save button.  
  
6.  Choose the Listen On command from the Listen menu.  
  
7.  Minimize NetRemote and enter another Windows application (such as   
    Notepad).  
  
8.  Run NetRemote at the Calling-PC.  
  
    The Current Connections window displays.  
  
You have just completed using NetRemote to set up both the Calling-PC and   
the Listening-PC to make a call. Continue the tutorial to take actual   
control of the Listening-PC from the Calling-PC.  
  
Once you have set up the two PCs as Listening and Calling, continue the   
tutorial to control the remote PC.   
  
3.4.2 Using Remote Control  
  
The Current Connections window lists the users connected to your default   
file server. A rising sun icon displays next to the login you used on the   
Listening-PC.  
  
9.  From the Current Connections window, select the Listening-PC.  
  
10. In the Available Windows section of the screen, select the Remote   
    Control option and deselect the Node Configuration option.  
  
11. Choose the Call button.  
  
    The Caller Query box displays waiting for the Listening-PC to accept or   
    reject the call.  
  
    The screen of the Listening-PC displays a window indicating who is   
    calling.  
  
12. At the Listening-PC, choose the Accept call button.  
  
    Doing this allows NetRemote to make a connection between the two PCs.  
  
    The Calling-PC's screen is now updated to display the Listening-PC's   
    screen.  
  
    The characters you type at the keyboard can be seen on both screens. You   
    can also control the Listening-PC with the mouse at the Calling-PC.  
  
13. Perform various functions to verify that you are operating the   
    Listening-PC.  
  
    Perform these functions from both PCs. Using a "paint" program is a good   
    means of demonstrating control over a PC.  
  
14. Hang-up the call by pressing <CTRL><F1> at the Calling-PC.  
  
    The Calling-PC's screen is returned to a blank screen with the fileserver   
    name and the listener's name.  
  
NOTE: Refer to section 4.4 entitled "Taking Control of a User's PC" for more   
detailed information about using NetRemote's remote control capability.  
  
You have just completed taking control of the Listening-PC. Continue the   
tutorial to use NetRemote to view the Listening-PC's diagnostic information.  
  
3.4.3 Viewing Diagnostics  
  
NetRemote lets you view the diagnostics of a network PC that has "listen"   
loaded.   
  
Use the following procedure to view the Listening-PC's diagnostics.  
  
1.  Select Current Connections from the Call menu.  
  
2.  Select the ListeningPC in the user list.  
  
3.  Select the Diagnostics option in the Available Windows section of the   
    screen.  
  
4.  Choose the Call button.  
  
    The Diagnostics window displays indicating the number of packets   
    transmitted and received. The information is updated in real time; you   
    can halt the updating by choosing the Stop Statistics button.   
    Choosing the Start Statistics button restarts the updating.  
  
5.  Choose the Close button to close this window.  
  
    This returns you to the Configuration Summary window for the Listening-PC.  
  
NOTE: Refer to section 4.4 "Viewing PC and Network Information" for more   
detailed information about NetRemote's diagnostic capabilities.  
  
You have just completed viewing the Listening-PC's diagnostics. Continue the   
tutorial to transfer files from the Listening-PC to the Calling-PC.  
  
3.4.4 Transferring Files  
  
The next part of the tutorial describes how to transfer files from one   
network PC to another. Although you can transfer files in either direction,   
during this tutorial you will transfer the files from the Listening-PC to   
the Calling-PC.  
  
Before continuing, follow these preliminary steps:  
  
1.  At the Calling-PC, minimize NetRemote.  
  
2.  From the Program Manager, access DOS.  
  
3.  Create a test directory to which you will transfer the Listening-PC's   
    AUTOEXEC.BAT, COMMAND.COM and NETX.COM files.  
  
    For example, type:  
	MD TEST <ENTER>  
  
4.  At the DOS prompt, type EXIT to return to Windows.  
  
5.  Maximize NetRemote.  
  
NOTE: If you do not complete these initial steps, the Calling-PC's   
AUTOEXEC.BAT, COMMAND.COM and NETX.COM files will be overwritten.  
  
Use the following procedure to transfer files from the Listening-PC to the   
Calling-PC's test directory:  
  
1.  From the Configuration Summary window at the Calling-PC, choose the File   
    Transfer button from the ribbon or choose File Transfer from the Call   
    menu.  
  
    The Transfer File dialog box displays.  
  
2.  Select Download as the transfer mode.  
  
    This specifies that the files will be copied from the Listening-PC to   
    the Calling-PC.  
  
3.  Choose the Select Files button.  
  
    The Select Files from Listening-PC dialog box displays.  
  
4.  From the Drives list box, choose the drive where the Listening-PC's   
    AUTOEXEC.BAT, COMMAND.COM and NETX.COM files reside (usually A: or C:).  
  
5.  From the files list box to the left, select AUTOEXEC.BAT, COMMAND.COM   
    and NETX.COM. Then choose the OK button.  
  
6.  Choose the Select Path button.  
  
7.  From the dialog box called Select Path for Calling-PC, select the path   
    with the test directory you created for use in this part of the tutorial.  
  
8.  Choose the OK button when you are ready to transfer files.  
  
    The Transferring dialog box displays. As the files are transferred, they   
    are removed from the From: list box and are placed in the To: list box.  
  
    The bottom portion of the screen tracks the progress of each individual   
    file as it is transferred.  
  
9.  Once the transfer is complete, choose the Done button to return to the   
    Configuration Summary window.  
  
NOTE: Refer to section 4.6 entitled "Transferring Files Between PCs" for   
more detailed information.  
  
3.4.5 Exiting NetRemote  
  
To exit NetRemote, the main window must be displayed on the Calling-PC.   
Choose Exit from the File menu to exit NetRemote.  
  
NOTE: You cannot exit NetRemote while a remote control call is taking place.   
You must hang up the connection before exiting (using either <CTRL><F1> or   
the Hang Up option from the Listen menu). You also MUST hang up a call prior   
to exiting Windows.   
  
That completes the NetRemote tutorial. The following chapters provide more   
detailed information on how to use the NetRemote features introduced in this   
tutorial.  
  
  
  
4.0  NetRemote Windows Reference  
  
Chapter 3 guided you through a brief tutorial, introducing NetRemote's key   
features. This chapter provides detailed explanations about all of   
NetRemote's options and features for use with Windows.  
  
  
4.1  Supporting Users with NetRemote for Windows  
  
NetRemote for Windows provides the tools you need to support network users   
from a centralized location. Once you contact another user's PC, you can use   
your mouse and keyboard to execute commands at his or her PC, view diagnostic   
and configuration information, execute NetWare utilities and transfer files.  
  
  
4.2 What's in this Chapter  
  
The following table describes the sections in this chapter:  
  
SECTION                 DESCRIPTION  
Contacting a User       Describes the various ways a Calling-PC can contact   
			a network user's PC.  
  
Taking Control of a     Describes NetRemote's remote control capability.  
User's PC  
  
Viewing PC and Network  Describes procedures for viewing a PC's node   
Information             configuration, memory information, diagnostics, and   
			server connections.  
  
Using NetWare Utilities Describes how to execute NetWare utilities while   
			using NetRemote.  
  
Transferring Files      Provides complete instructions for transferring   
between PCs             files between the Calling-PC and the Listening-PC.  
  
Using the Low System    Describes NetRemote's warning signal which alerts   
Resource Indicator      you of low memory situations.  
  
  
4.3 Contacting a User  
  
You can contact a network user from the Current Connections window (i.e.,   
the User List). Access this window by choosing either the first icon on the   
ribbon or the Current Connections command from the Call menu.  
  
This window displays every time you open NetRemote (unless the Listen   
Automatically option is set). This window also displays when the last user   
window is closed.  
  
This window is divided into three sections:  
o  List of user connections - Indicates all of the users who are connected   
to your default file server.  
o  Available Windows - Lists all the windows you may open through NetRemote   
(Remote Control, Node Configuration, Memory Information, Diagnostics, and   
Server Connections).   
o  Buttons - Execute commands, including Change Servers, Next Server, Call,   
Refresh List, Find, Close, Set Default.   
  
You can call any of the users listed in the User List. This list shows all   
of the users attached to your default file server. The number of connections   
on your default file server is indicated beneath this list.  
  
4.3.1 Calling a User  
  
Each user that has "listen" enabled will have one of the following tool bar   
buttons:  
  
o  Windows "listen" - a rising sun  
o  DOS NRLISTEN - a miniature diskette  
  
A user can load Windows "listen", DOS NRLISTEN, or both.  
NOTE: DOS NRLISTEN must be loaded in conventional memory in order to load   
Windows. Refer to section 5.3.1 entitled "Loading NRLISTEN" more information   
about this topic.  
  
Use the following procedure to contact a user.  
  
1.  Choose the desired user from the User List.  
  
2.  Select the desired options from the Available Windows section.  
  
    For users who do not have "listen" enabled or the NRLISTEN TSR loaded,   
    Remote Control and Memory Information will be grayed and cannot be used   
    when the users are connected.   
  
    Each of the windows available here is described later in this chapter.  
  
3.  Choose the Call button.  
  
    The Configuration Summary window displays.   
  
    At this point, the Diagnostics, Memory Information and Server   
    Connections tool bar buttons in the ribbon bar become enabled.  
  
    From this point you can take control of the user, view his or her PC   
    information or transfer files. Each of these features is described later   
    in this chapter.  
  
4.  Close this screen to return to the Current Connections window.  
  
  
The Current Connections window offers flexibility in locating a user on the   
network. The following sections describe how to find users that are not   
listed in the user list.  
  
4.3.2 Updating Your User List  
  
You can keep your User List current to reflect those network users who have   
attached to and detached from ant of the file servers while you are viewing   
this window.   
  
To do this, simply choose the Refresh List button to re-display the user   
list with the current information.  
  
4.3.3 Contacting Users on Different File Servers  
  
You can also find users on file servers other than the default file server   
listed.  
  
Use the following procedure to contact users on different file servers.  
  
1.  Choose the Change Servers button from the Current Connections window.  
  
    A list of all file servers on your network displays.  
  
2.  Select the desired file server.  
  
    The file server is highlighted.  
  
3.  Choose the OK button.  
  
    The Login window displays if you are not already attached to the   
    selected file server. Enter the appropriate login name and password.  
  
    You are returned to the Current Connections window; the User List   
    reflects those users on the new file server.  
  
    You can also use the Next Server button in the Current Connections   
    window (i.e., Fast Select File Server) to scroll through the list of   
    those servers to which you are attached and on which NetRemote is   
    installed. As you choose this button, the Current Connections list   
    updates to show those users connected to each file server.  
  
    NOTE: If you are only attached to one file server, you will receive an   
    error indicating that there is only one Fast Select File Server available.  
  
4.3.4 Finding a Specific User  
  
You can also search for a particular network user without scrolling through   
the User List or using the Next Server button.   
  
To use this feature, you must be attached to all file servers on which you   
want to search for the desired user. If you are not attached, you can use   
the Change Servers button to log in to additional file servers.  
  
You can search for a particular PC or user to contact using the following   
formats:  
  
o  User: Entering a user's login name without specifying a file server   
prompts NetRemote to search all file servers (that have NetRemote installed,   
but not necessarily running) for the first user with that name. The   
connection will be established with the first matching name.  
  
o  {server/}user: Specifying a server name with the user's login name   
prompts NetRemote to search that server for the first user with that name.  
  
o  [connection]: Entering a connection number without specifying a server   
prompts NetRemote to try to contact the user with that connection number on   
the current server.  
  
o  {server/}[connection]: Specifying the server name with the connection   
number prompts NetRemote to call the user with that connection number.  
  
o  [@{net:}node]: Entering a network address and node address prompts   
NetRemote to call the PC that has a network adapter card with that   
inter-network address.  
  
Use the following procedure to find a specific user.  
  
1.  Choose the Find button.  
  
    A secondary window displays.   
  
2.  Enter the format by which you want to search for the desired user.  
  
3.  Choose the OK button.  
  
    The windows (corresponding to those options you specified in the   
    Current Connections window) appear providing information about the   
    selected user. For example, if you selected Node Configuration in the   
    Current Connections window, the Configuration Summary Screen displays.  
  
    If you selected Remote Control from the Available Windows options, once   
    you choose the OK button, you will be in control of the Listening-PC.  
  
  
4.4 Taking Control of a User's PC  
  
Once you have called a user, you can also take control of his or her PC to   
solve any problems interactively. To do this, the user must have DOS and/or   
Windows "listen" loaded on his or her PC.  
  
NOTE: DOS NRLISTEN must be loaded in conventional memory. Refer to section   
5.3.1 for more information.  
  
4.4.1 Loading Windows "Listen"  
  
Users can load Windows "listen" using either the menu bar or the ribbon icon   
from NetRemote's main screen. From the menu bar, select Listen and then   
Listen ON. From the ribbon, select the icon with the telephone.  
  
The Listening-PC also can specify a number of options. Users can access the   
Listening Options dialog box from either the Listen menu or the ribbon icon.   
  
The options are listed and described in Chapter 3.  
  
Once a user has loaded or enabled "listen" and specified the desired options,   
he or she is ready to receive a call.  
  
4.4.2 Using Remote Control  
  
Use the following procedure to take control of the PC of a user who has   
"listen" enabled or loaded.  
  
1.  From the User List, select the desired user.  
  
    Users with "listen" enabled will have a rising sun, indicating Windows   
    "listen"; users with NRLISTEN loaded will have a miniature diskette,   
    indicating DOS "listen."  
  
    If you do not want the user to have control over the keyboard during the   
    call, you can turn off the keyboard and/or mouse from the Caller Options   
    dialog box. Access this box either from the ribbon or the Call menu.  
  
NOTE: These options must be set before the call is made; they cannot be   
changed during the call.  
  
2.  Choose the Call button.  
  
    The Configuration Summary window displays.  
  
3.  Choose either the Control PC command from the Call menu or the   
    appropriate tool bar button.  
  
    You can take control of the user's keyboard and mouse to solve his or   
    her problems.  
  
    At this point, you can also perform any number of NetRemote functions,   
    such as viewing diagnostics, viewing configurations or transferring files.   
  
    All of these are described in the next sections.  
  
4.  To hang-up the call, press <CTRL><F1>.  
  
  
4.5 Viewing PC and Network Information  
  
NetRemote has four windows that provide detailed information about a network   
user's PC and network connections. The information is presented in a number   
of ways to give you the flexibility you need to support your users.  
  
This section describes the following windows:  
  
o  Node Configuration  
o  Memory Information  
o  Diagnostics  
o  Server Connections  
  
Use the following procedure to access any of these windows.  
  
1.  From the user list in the Current Connections window, select the desired   
    user.  
  
2.  Select the desired window from the Available Windows options.  
  
3.  Choose the Call button.  
  
    The window(s) you selected appear cascaded on NetRemote's main screen.   
    For example, if you chose Node Configuration and Memory Information,   
    then the Configuration Summary and Memory Information windows would   
    appear.  
  
NOTE: If you want to view a window that you have not selected after already   
calling a user, you can access the desired window using either the Call menu   
or the ribbon tool bar buttons.  
  
If you want these windows to always appear when contacting a user, choose   
the Set Default button after selecting the desired options from the   
Available Windows options.  
  
4.5.1 Node Configuration Window  
 
The Node Configuration window displays two types of configuration   
information: network and PC.  
  
The Network Configuration section of this window contains the following   
fields. Each field contains information for the PC you are contacting:  
  
o  Network Address - Inter-network address of the adapter card in the PC  
o  IPX/SPX - Version numbers of IPX/SPX  
o  Shell Driver - Name of the current driver loaded on the PC  
o  Settings - Current IRQ settings for the PC  
o  Active - Length of time that this PC has been logged in to the network  
o  Shell Version - Current version of the NetWare shell loaded on the PC   
(NETX/VLM)  
  
The PC Configuration section of this window contains various information   
regarding the PC you are contacting. If the PC you are contacting does not   
have "listen" enabled, some of the information in this section cannot be   
obtained.  
  
o  PC Type - Type of workstation  
o  CPU - Type of processor  
o  Video - Type of Video Adapter  
o  Mode - Type of Video Mode of the monitor  
o  DOS - Version of DOS loaded on the PC as reported by the network shell  
o  Micro Channel - Status of Micro Channel Bus Architecture  
o  Math Chip - Status of a math co-processor  
o  Serial/Parallel - Number of serial and parallel ports attached to this PC  
o  Keyboard - Type of keyboard.  
  
The Refresh button in this window updates all of the above information to   
reflect any changes in the user's network or PC configurations.  
  
Choose the Close button to exit this window.  
  
NOTE: If the PC you have contacted does not have Windows "listen" enabled or   
the DOS TSR loaded (i.e., NRLISTEN), you will only see the DOS version of   
the PC configuration.  
  
4.5.2 Memory Information Window  
  
The Memory Information window displays the amount of Base, Extended,   
Expanded, and Total Memory installed on the selected PC. It also indicates   
if there is memory available for use.  
  
Choose the Refresh button to update these statistics. Choose the Close   
button to exit this window.  
  
4.5.3 Diagnostics Window  
  
NetRemote's Diagnostics feature allows you to investigate the status and   
activity of the selected PC. All of these options are available even if   
"listen" is not loaded on the selected PC.  
  
The Diagnostics window is divided into two sections: Transmitted and Received.  
  
You can halt the updating by choosing the Stop Statistics button. Choosing   
the Start Statistics button resumes the updating. Choose the Close button to   
exit this window.  
  
The following sections describe the information provided in this window.  
  
The Transmitted section contains information about the number of packets   
sent per second (to the selected PC from the file server), the actual number   
of packets transmitted, and the percent of the total number of packets sent   
(for each field).  
  
The following fields are displayed in this section:  
o  Total OK - Total number of packets that were successfully transmitted.  
o  Packet Too Big - Number of packets too large to be transmitted.  
o  Packet Too Small - Number of packets too small to be transmitted.  
o  Miscellaneous Error - Number of packets not transmitted due to   
miscellaneous errors.  
o  Retry - Number of times that a packet was re-transmitted.  
o  Total Errors - Total number of packet transmission errors.  
o  Total - Summary of the above information.  
  
The Received section contains information about the number of packets   
received by the PC (per second) and the percentage of received packets to   
the total transmitted (for each field).   
  
The following fields are displayed in this section:  
o  Total OK - Total number of packets that were successfully received.  
o  Packet Too Big - Number of packets too large to be received.  
o  Packet Too Small - Number of packets too small to be received.  
o  Miscellaneous Error - Number of packets not received due to   
miscellaneous errors.  
o  No ECB Available - Number of packets received, but did not have Event   
Control Block available. (These packets are usually ignored or thrown away.)  
o  Packet Overflow - Number of packets received that were larger than the   
size allocated by the buffer.  
o  Checksum Error - Number of checksum errors that occurred while receiving   
packets.  
o  Hardware Mismatch - Number of times the hardware received packets that   
had a different number of bytes than were expected.  
o  Total Errors - Total number of errors for packets received.  
o  Total - Summary of the above information.  
  
4.5.4 The Server Connections Window  
  
The Server Connections window lists the file servers to which the selected   
PC is attached, the file server connection number and file server address.   
  
Choose the Refresh button to update the information. Choose the Close button   
to exit this window.  
  
The fields on this screen are:  
o  Server Name - File server's logical network name.  
o  Connection Number - Selected PC's connection number.  
o  Sequence Number - Server's packet sequence number for the server specified   
(the value assigned to the latest packet issued to the server in the range   
from 0 to 255).  
o  Transport Time Cur/Max - Number of seconds a network packet requires to   
travel from the selected PC to the file server. This field displays both the   
current time and the maximum time a packet requires to travel given   
the relative performance of the available network connections.  
o  Order Number - Priority which the entries are given in the server name   
table.  
o  Server Address - Inter-network address of the file server consisting of   
the network number and the physical network address.  
  
  
4.6 Using NetWare Utilities  
  
NetRemote's NetWare Utilities option allows you to perform various NetWare   
operations while you are supporting users with NetRemote.  
  
4.6.1 Accessing NetWare Utilities  
  
You can access this option from either the File menu or the ribbon tool bar   
button.  
  
Once you have accessed NetWare Utilities, the NetWare Utilities window   
displays.  
  
The functionality of each utility is described in the following list.  
  
o  ACONSOLE -  (Available for NetWare 3.11) Allows control of a modem and   
transfers the keystroke and screen information to and from the remote file   
server.  
  
o  AUDITCON -  (Available for NetWare 4.0) Audits directory services   
transactions as well as those pertaining to a volume, file system or server.  
  
o  BCONSOLE -  (Available for NetWare 3.11) Monitors the activity of any   
Btrieve NLM or VAP on the network from your workstation. It monitors file   
server activity one server at a time in a read-only mode.  
  
o  COLORPAL -  (Available for NetWare 2.2, 3.11 and 4.0) Changes the color   
scheme of all the NetWare Menu Utilities.  
  
o  DSPACE -  (Available for NetWare 3.11) Views and changes file server   
attachment and limits a user's disk space either on a volume or in a   
directory.  
  
o  FCONSOLE - (Available for NetWare 2.2 and 3.11) Broadcasts messages,   
views current user connections, shuts down the file server, changes file   
servers, and views the NetWare version.  
  
o  FILER -  (Available for NetWare 2.2, 3.11 and 4.0) Manages directory,   
volume, and file information.  
  
o  MAKEUSER - (Available for NetWare 2.2 and 3.11) Creates and deletes users.  
  
o  NBACKUP -  (Available for NetWare 3.11) Backs up and restores data.  
  
o  NETADMIN -  (Available for NetWare 4.0) Manages Directory Services   
objects.  
  
o  NETUSER -  (Available for NetWare 4.0) Administers NetWare users.  
  
o  NWTOOLS -  (Available for NetWare 4.0) Offers a suite of utilities for   
Windows.  
  
o  PARTMGR -  (Available for NetWare 4.0) Manages Directory Service   
partitions.  
  
o  PCONSOLE -  (Available for NetWare 2.2, 3.11 and 4.0) Controls network   
printing. You can change file servers, view print queues and print server   
information, and manipulate the jobs waiting in a print queue(s).  
  
o  PRINTCON -  (Available for NetWare 2.2, 3.11 and 4.0) Configures print   
jobs and sets up print job parameters, such as tab sizes, form names,   
banners, auto endcap, and time-outs.  
  
o  PRINTDEF -  (Available for NetWare 2.2, 3.11 and 4.0) Defines printers.   
You can define the print device, forms, and mode of operation for network   
printers.  
  
o  RCONSOLE - (Available for NetWare 3.11 and 4.0) Turns a workstation into   
a remote console. You can also control the transfer of keystroke and screen   
information to and from the remote file server.  
  
o  RPRINTER -  (Available for NetWare 3.11) Connects or disconnects a remote   
printer from a print server.  
  
o  SALVAGE -  (Available for NetWare 3.11) Allows you to view deleted files,   
recover or purge files that have been erased, restore files to their   
original directories.  
  
o  SESSION -  (Available for NetWare 2.2 and 3.11) Manages your network   
sessions. You can use SESSION to set up temporary network and search drive   
mappings.  
  
o  SYSCON -  (Available for NetWare 2.2 and 3.11) Configures your system.   
You can use SYSCON to set up users, define their rights, and set up their   
login script.  
  
o  USERDEF -  (Available for NetWare 3.11) Defines multiple users, provides   
login scripts, sets up home directories, assigns account and disk space   
restrictions, and sets up print job configurations.  
  
o  VOLINFO -  (Available for NetWare 2.2 and 3.11) Allows you to view   
information about the directories and storage space on each volume/volumes   
of your network.  
  
4.6.2 Using NetWare Utilities  
  
Use the following procedure to use any of the NetWare Utilities.  
  
1.  Use either the ribbon or the menu bar to access NetWare Utilities.  
  
    The NetWare Utilities window displays with all the NetWare utilities.   
    The numbers to the left of the utility indicate the NetWare versions   
    (2 is NetWare 2.2; 3, NetWare 3.11; 4, NetWare 4.0). If this number   
    is green, the utility is available for that version; if it is red, the   
    utility is not available for that version.   
  
    For example, next to the RCONSOLE utility, the 2 is red and the 3 and 4   
    are green. This indicates that RCONSOLE cannot be used with NetWare   
    version 2.2, but is available with NetWare versions 3.11 and 4.0.  
  
    If the name of the utility itself is grayed, it is not available on the   
    file server to which you are attached. If it is blue, it is available.   
    In the example above, if you are running NetWare version 2.2, RCONSOLE   
    will be grayed. If you are running NetWare version 3.11 or 4.0, RCONSOLE   
    will be blue.  
  
    As you highlight a utility, a description of this utility displays in   
    the description box at the bottom of the window.  
  
2.  Select the desired utility and choose the OK button.  
  
    You are placed in the NetWare utility you chose. For example, if you   
    chose the SYSCON utility, you are placed in NetWare's SYSCON utility.   
  
3.  Once you are finished using the utility, exit the utility.  
  
    You are returned to NetRemote's main screen.  
  
  
4.7 Transferring Files between PCs  
  
The File Transfer utility allows network users to transfer files between   
Calling-PCs and Listening-PCs.   
  
4.7.1 File Transfer Steps  
  
Use the following procedure to transfer files.  
  
1.  At the Listening-PC, choose Listening Options command from the Listen   
    menu or choose the tool bar button from the ribbon.  
  
2.  Enable the File Transfer options.  
  
    You also have the option to specify Read Only or Read and Write Only   
    for files to be transferred.  
  
NOTE: Read and Write allow you to both upload and download files. Read Only   
allows you to download files only. Any files that are being uploaded but   
currently exist cannot be overwritten. The files must be deleted from the   
Listening-PC before being transferred.  
  
3.  Choose the Listen icon to set up the Listening-PC.  
  
4.  At the Calling-PC, make sure the remote control option is not enabled.   
    Choose the Call button.  
  
5.  Choose the File Transfer button from the ribbon or choose File Transfer   
    from the Call menu.  
  
    The Transfer File dialog box displays.  
  
6.  Select the Mode for the transfer.  
  
    Downloading transfers files from the Listener to the Caller.   
    Uploading transfers files from the Caller to the Listener.  
  
7.  Choose the Select Files button.  
  
    A dialog box displays listing files from which to choose.  
  
8.  Select the files to transfer.  
  
    If you are downloading files, select the desired files from the box   
    called Select Files From Listening-PC.  
  
    If you are uploading files, select the desired files from the box called   
    Select Files From Calling-PC.  
  
    You can also use the Select All and Deselect All buttons.  
  
9.  Choose the Select Path button.  
  
10. Specify destination for files.  
  
    If you are downloading files, select the path from the dialog box called   
    Select Path for Calling-PC.  
  
    If you are uploading files, select the path from the dialog box called   
    Select Path for Listening-PC.  
  
11. Choose the OK button when you are ready to transfer files.  
  
NOTE: If this file already exists at the destination you have specified and   
if Read and Write were enabled under the listening options, a dialog box   
displays asking if you wish to overwrite the file. Read Only does not allow   
you to overwrite existing files. Also, if you are uploading files, you   
cannot overwrite files.  
  
    The Transferring dialog box displays.  
  
The next section describes this dialog box in detail.  
  
4.7.2 The Transferring Dialog Box  
  
The title bar of the Transferring dialog box reflects the source and   
destination of the file transfer. (For example, if you are downloading files,   
the title bar would read "Transferring Files from Listening-PC to   
Calling-PC.")  
  
The top part of this dialog box provides the following information:  
  
o  Mode of transfer - Indicates if you are uploading or downloading files.  
o  From: - Indicates the source of the files (i.e., Listening-PC or   
Calling-PC).  
o  To: - Indicates the destination of the files (i.e., Listening-PC or   
Calling-PC).  
NOTE: As each file is being transferred, it is removed from the FROM: list   
box and is placed in the TO: list box.  
o  File Count - Indicates the number of files transferred.  
o  Error Count - Indicates the number of errors that occurred in file   
transfer.  
o  Files Complete - Indicates the number of files successfully transferred.  
o  Percent Complete - Tracks the progress of the file transfer in real time.   
Any errors are reflected with a red bar.  
  
The Current Transfer portion of the dialog box provides information about   
the transfer of each individual file. The following information is updated   
and changed constantly during the file transfer process to reflect the file   
currently being transferred:  
  
o  File Name  
o  Size   
o  Bytes Complete  
o  Percent Complete  
  
The Transferring dialog box also has three buttons at the bottom. During the   
transfer process, the first button is Cancel. If you choose this button, a   
dialog box displays asking you to confirm your choice to cancel the file   
transfer process.  
  
Once the file transfer is complete, the first button changes to Done.   
Choosing this button exits to NetRemote's main screen.  
  
The remaining two buttons are enabled only if an error occurred during the   
file transfer:  
o  View Error - Allows you to view the error report.  
o  Retry - Attempts to transfer only those files that were not transferred   
due to an error(s).  
  
NOTE: The Retry button is particularly useful when an error occurs during a   
transfer of many files. After viewing the error report and fixing the   
problem, you can use this button to resend only those files that had   
problems instead of repeating the entire file transfer.  
  
If an error does occur during a transfer, the Transferring dialog box alerts   
you.  
  
The Error Count lists the number of files with errors. The Percent Complete   
bar indicates the percentage of files not transferred due to errors. The   
View Error and Retry buttons become enabled when an error occurs.  
  
The next section describes the error report that you can view to decide how   
to solve the problems that occurred during the file transfer.  
  
The error report provides information about any errors that may have   
occurred during the file transfer to help you solve the problem.  
  
The Error Log in the left side of the screen is a scroll box listing all the   
files that had transfer problems. Beneath this scroll box, the total number   
of errors is listed. By selecting a file from this scroll box, you can view   
detailed information to help you solve the problem that occurred with   
that particular file.  
  
The portion of the screen labeled Description provides the following   
information for any file you select from the Error Log scroll box:  
  
o  Location - Indicates at which PC the problem occurred.  
o  File Path - Indicates the path where the file with the problem is located.  
o  File Name - Indicates the name of the file with the problem.  
o  Problem - Describes the error.  
  
NOTE: Refer to section 24.0 for a list of problem descriptions.  
  
Choosing the OK button exits to the Transferring dialog box. Once you solve   
the problem, you can use the Retry button located on this screen to resend   
only those files where the error occurred.  
  
  
4.8 Using the Low System Resources Indicator  
  
The Low System Resources indicator alerts the Calling-PC and the Listening-PC   
users of low memory conditions. This is done through the Active Call icon.  
  
While an active call is taking place, the NetRemote icon blinks normally. If   
your memory is low, the icon blinks red. The red blinking icon is displayed   
on both the Calling-PC and the Listening-PC. With this warning, you can   
avoid problems that could occur when a PC runs out of memory.  
  
This option is only available when the Listen Setting "Show Connection   
Indicator" is set to ON.  
  
That concludes this chapter. The next chapter gives complete details on   
using NetRemote with DOS.  
  
  
  
5.0  NetRemote DOS Reference  
  
Chapter 4 provided you with a Windows NetRemote reference guide. This chapter   
explains the use of NRLISTEN and NRCALL, the DOS programs of NetRemote.  
  
5.1 Supporting Users with DOS NetRemote  
  
With NetRemote for DOS, you can provide instant help to your network users   
with NetRemote's centralized user support capabilities. Once you contact   
another PC, you can perform the following operations:  
  
o  View the PC's screen and use your keyboard to execute commands on the   
remote PC, if the user has loaded NRLISTEN.  
o  View the PC's configuration and the programs that are loaded in memory.  
o  Perform network diagnostics.  
  
With these functions, you can troubleshoot problems without leaving your desk.  
  
The Active Call menu gives you even more support options. This menu can be   
accessed at anytime while you are in contact with a PC by pressing <F1>.  
  
Select the desired option by positioning the highlight bar on the option and   
pressing <ENTER>.  
  
The available options are:  
o  Hang Up the Call  
o  Select Control Options  
o  View Configuration  
o  Run Diagnostics  
o  Send F1 Key  
  
These options are described throughout this chapter.  
  
5.1.1 What's in this Chapter  
  
The following table describes the sections in this chapter:  
  
SECTION                         DESCRIPTION  
Contacting a User               Describes the various ways a Calling-PC   
				can contact a network user.  
  
Taking Control of a User's PC   Describes NetRemote's remote control   
				capability.  
  
Viewing PC and Network          Describes procedures for viewing a PC's   
Information                     node configuration, memory information,   
				diagnostics, and server connections.  
  
Ending a Call                   Describes how to terminate a call between   
				the Calling-PC and the Listening-PC.  
  
Security Features               Describes NetRemote's security measures,   
				including passwords, group restrictions, etc.  
  
  
5.2 Contacting a User  
  
To contact or call a PC, you need the following information:  
  
o  The LOGIN ID, connection ID, or the inter-network address of the   
Listening-PC you wish to contact (if you do not want to use the Current   
Connections list).  
  
o  A password, if the Listening-PC has been set to require one.  
  
You can place calls using a number of methods, including prompts and menus,   
a hot-key combination, or the command line.  
  
The NetRemote prompts and menus provide convenience and ease of use. Using a   
hot-key combination allows you to access NetRemote while in another   
application. Using the command line and its options allow you to incorporate   
NetRemote into batch options.   
  
All of these methods are explained on the following pages.  
  
To initiate a call to a user from NetRemote's menus, follow these steps:  
  
1.  At the DOS prompt, type:  
  
    Calling a User from the Menus  
  
	NRCALL <ENTER>  
  
    The Current Connections list displays. This is a list of all users   
    logged in to your default file server. The figure listed next to each   
    user represents the current file server connection number of that user.  
  
    If a user's name is highlighted, NRLISTEN has been loaded on that user's   
    PC. If a user's name is not highlighted, NRLISTEN has not been loaded on   
    that user's PC.  
  
2.  Position the cursor on the name you wish to contact and press <ENTER>.  
  
  
If NRLISTEN is not loaded on the user's PC, you can:  
  
o  View the network configuration and server connections  
o  Exercise server connections  
o  Analyze network traffic  
o  Run LAN adapter and IPX statistics  
  
If NRLISTEN is loaded on the user's PC, you can perform the above functions,   
plus the following:  
  
o  Contact the PC to view the screen and control their keyboard  
o  View the machine configuration  
o  View the programs loaded into memory  
  
5.2.1 Updating Your User List  
  
You can keep your user list up-to-date by using the Refresh option. While   
at the Current Connections list, press <F2>. The list is updated to reflect   
any new users who have logged in and any users who logged out.  
  
5.2.2 Contacting Users on Different File Servers  
  
If you are logged in to multiple file servers, you can view/contact the   
users logged in on these file servers.   
  
1.  From the Current Connections list, highlight <SERVERS> and press <ENTER>.  
  
    The File Servers menu displays listing all of the file servers on your   
    network.  
      
2.  Highlight the desired file server and press <ENTER>.  
  
    If you are already attached to the selected file server, the Current   
    Connections list displays with the users logged in to that file server.  
  
    If you are not already attached to the selected file server, continue   
    with steps 3 and 4.  
  
3.  At the prompt, enter your login name for the selected file server and   
    press <ENTER>.  
  
4.  At the prompt, enter the appropriate password for the selected file   
    server and press <ENTER>.  
  
    The Current Connections list displays with the users logged in to that   
    file server.  
  
  
You can also use the space bar to use the fast select server option. This   
allows you to view those users on the other servers to which you are   
attached and on which NetRemote is installed.  
  
NOTE: These options is only valid when NetRemote is loaded on one or more   
file servers.  
  
5.2.3 Finding a Specific User  
  
In addition to being able to highlight a listed user, you can also enter a   
Login ID, Connection ID, or inter-network address of a user you wish to   
contact.  
  
Use the following procedure to find a specific user.  
  
1.  From the Current Connections list, press <INS>.  
  
    You are presented with the Destination to Call prompt.  
  
2.  At the prompt, enter the appropriate information to call a user.  
  
    The Selected Node screen displays with the Configuration Summary for the   
    contacted user and the Commands menu.  
  
    The possible formats for entering information at this prompt are:  
  
	o  User Name  
	o  Server Name/User Name  
	o  [connection number]  
	o  Server Name/[connection number]  
	o  [@{NET:}NODE]  
  
    Each format is described in detail below.  
  
User Name: If you specify a user's login name without specifying a server,   
NRCALL searches all file servers (that have NetRemote loaded) for the first   
user with that name who has NRLISTEN ready to accept a call.  If you specify   
a file server name and user name, NRCALL searches only that file server for   
the first user that matches the server/user name and has NRLISTEN loaded.  
  
Connection Number: If you specify a connection number without specifying a   
file server, NRCALL tries to call the user with that connection number on   
the current file server. If you specify a file server name with a connection   
number, NRCALL tries to call the user with that connection number on the   
specified file server. In either case, the entire connection entry should be   
included within brackets. Examples of valid connection entries are [3] and   
SERVER1/[3].   
  
Network Address: Entering a network address prompts NRCALL to try calling   
the PC with that inter-network address. This is particularly helpful for   
contacting PCs that are not logged in to a file server. The address entry   
should begin with a left bracket followed by an @, followed by the   
hexadecimal inter-network address, followed by a right bracket. If you wish   
to specify the network number, enter it first, separating it from the node   
address with a colon. If you do not specify a network number, NRCALL tries   
to call the PC with that node address on the same network as the Calling-PC.  
  
Examples of valid inter-network address entries are: [@CE] and [@3:CE].  
  
NOTE: Leading zeroes are not required and spaces are not permitted.  
  
5.2.4 Contacting a User from the Command Line  
  
You can contact a PC by issuing the NRCALL command at the DOS prompt. The   
syntax for the NRCALL command is:  
	NRCALL {name}[/param=value]  
  
The parameters (described in the next section) may be typed in either upper   
or lowercase and in any order; parameter values, however, are case   
sensitive. You may string as many parameters together as necessary.  
  
NOTE: Braces and parenthesis should not be typed. They indicate optional   
information on the command line.  
  
The {name} can be specified in one of the following ways:  
  
o  User Name  
o  Server Name/User Name  
o  [connection number]  
o  Server Name/[connection number]  
o  [@{NET:}NODE]  
  
5.2.5 NRCALL Program Parameters  
  
When NRCALL is loaded, it automatically sets default program parameters. You   
can modify these default parameters temporarily using command line options   
or permanently via the CONFIG program.  
  
For information on using the CONFIG program, refer to Chapter 25.  
  
The syntax for NRCALL is:  
  
	NRCALL {name}[/param=value]  
  
The table below lists all NRCALL command line options and indicates whether   
the option can be changed via the CONFIG program.  
  
The lowercase characters in the OPTION column indicate user- specified values.  
OPTION                          CMD LINE        CONFIG  
No Options                      *                 
server/listen-name              *  
[@{NET:}NODE]                   *  
server/[connect no]             *  
/LPASSWORD=pass                 *               *  
/LKEYBOARD=on/off               *               *  
/LKEYSTUFF=xxxx                 *               *  
/LOGNAME=name                   *               *  
/LOGPASSWORD=pswd               *               *  
/ELSFLAG=yes/no                 *               *  
/DISPLAY=xxxx                   *               *  
/MENUKEY=xxxx                   *               *  
/HIGHLIGHT=xxxx                 *               *  
/DIAGS=yes/no                   *               *  
/MAX_CONNS=xxx                  *               *  
/PP_TIMEOUT=x                   *               *  
/CKEYGET=xxxxx                  *               *  
/ALLOBJS=yes/no                 *               *  
/SILENTEXIT=yes/no              *               *  
/HELP or /? or /h               *  
  
5.2.6 NRCALL Options Summarized  
  
The following section summarizes the NRCALL options:  
  
o  server/listen name - Tells NRCALL which user to contact.  
  
o  [@{NET:}NODE] - Indicates the network address of the user you are calling.  
  
o  Server/[connection number] - Indicates the server and connection number   
of the user you are calling.  
  
o  /LPASSWORD=pass - Indicates whether the Listening-PC requires a password.  
  
o  /KEYBOARD=on/off - Indicates whether the Listening-PC has use of the   
keyboard.  
  
o  /LKEYSTUFF=special, bios - Determines the method for placing characters   
in the Listening-PC's buffer. NetRemote will automatically select the method   
with the greatest degree of compatibility, based on the PC's hardware. You   
can override NetRemote's selection by selecting SPECIAL mode.  
  
o  /LOGNAME=remotelogin - Sets the login name used to access remote file   
servers (to get lists of users). Set this name to a valid user name if you   
do not have guest logins on all file servers.  
  
o  /LOGPASSWORD=remotepass - Defines the password necessary to access a   
remote file server. Set this value if you have assigned a password to your   
guest logins.  
  
o  /ELSFLAG=yes, no - Changes NetRemote's compatibility with NetWare ELS.  
  
o  /DISPLAY= mono, color, default, auto  
	- mono - displays everything in black and white.  
	- color - tells NetRemote to set up using the NetWare color palette.   
	If not specified, NetRemote uses standard colors.  
	- default - checks your monitor type and sets the display type.  
	- auto - displays the NetWare palette if possible; otherwise,   
	NetRemote uses the default palette setting.  
  
o  /MENUKEY=keycode - Changes the Active Call menu default key from <F1> to   
the value specified. The format for the keycode is the hexadecimal value of   
the key. For example, F1=3b00.   
  
o  /HIGHLIGHT=off, WAN, LAN, man - Sets the performance accuracy of the   
Current Connections list.  
	- off - no users will be highlighted on the list.  
	- WAN - needs to be set if you are using NetRemote across a wide   
	area network.  
	- LAN - as the default value, all users with NRLISTEN loaded are   
	highlighted.  
	- man - (manual) permits you to configure NRCALL for use with slower   
	bridges.  
  
o  /DIAGS=yes, no - Allows you to decide whether or not to allow SPX   
diagnostics.  
  
o  /MAX_CONNS=value - Allows you to determine the number of users supported   
in the NRCALL Userlist. The default is 100. Memory overhead per 100 users is   
an additional 5K.  
  
o  /PP_TIMEOUT=value - Sets the maximum time to wait for an SPX diagnostic   
request.  
  
o  /CKEYGET=xxxxx - Avoids problems with Closeup/Asynch where keyboard   
control is lost when CUSTOMER.COM is used with NRCALL and when NRCALL   
controls another PC. The possible values are: CHINT9 or NCHINT9.  
  
o  /ALLOBJS=yes, no - Allows all dynamic bindery objects to be listed in the   
NRCALL User List.  
  
o  /SILENTEXIT=yes/no - Allows you to hang-up the call without displaying   
the Active Call menu.  
  
5.2.7 Contacting a User with a Hot-Key  
  
In addition to placing calls from the command line and full screen   
interface, you also have the option of using the HOTCALL module to pop-up   
NetRemote from within any application.  
  
Use the following procedure to contact a user with a hot-key:  
  
1.  At the DOS prompt, load HOTCALL by typing:  
  
	HOTCALL <ENTER>  
  
    This loads a small memory resident module that activates NetRemote.   
  
2.  Access NetRemote from within another application by pressing <CTRL><ALT>.   
  
    This default hot-key sequence can be changed to any sequence you choose.  
  
HOTCALL takes advantage of any memory management drivers you have loaded.   
HOTCALL's performance will be greatly improved if you have either an   
expanded (EMS) memory driver or an extended (XMS) memory driver loaded.   
Neither of these drivers, however, is required.  
  
To unload HOTCALL from memory, type:  
  
	HOTCALL /UNLOAD <ENTER>  
  
For a complete listing of HOTCALL's options, type:  
	  
	HOTCALL /HELP <ENTER>  
  
NOTE: You can also use /u instead of /unload and /h or /? instead of /help.  
  
The following options are available for HOTCALL:  
  
o  /H - Displays the HOTCALL help screen.  
o  /U - Unloads HOTCALL from memory when HOTCALL was the last item installed.  
o  /B - Burns the HOTCALL options, permanently changing the settings to   
match the current options.  
o  ?/D=path - Indicates the full path name of where you wish HOTCALL to   
store its swapped files.  
o  /S=x - Sets the Swapping Type. The possible values are:  
	-  0=Auto  
	-  1=EMM  
	-  2=XMS  
	-  3=DISK  
o  /M=size - Indicates the size of memory (in hex) allotted to the NRCALL   
program. When using HOTCALL with NetRemote 5.20, this parameter must be set   
to at least 6100.  
o  /K=xx - Sets HOTCALL hot-key combination. You must specify two of the   
following values:  
	-  A=<ALT>  
	-  C=<CTRL>  
	-  L=<Left Shift>  
	-  R=<Right Shift>  
o  /T - Displays the current settings of the HOTCALL program.  
  
  
5.3 Taking Control of a User's PC  
  
With NetRemote, you can take control of another user's PC to help solve his   
or her network problems. This is done with both the NRCALL and NRLISTEN   
programs. NetRemote offers limited functionality with users who do not have   
NRLISTEN loaded. If users do have NRLISTEN loaded, you can take complete   
control of their PCs.  
  
5.3.1 Loading NRLISTEN  
  
To receive calls, you need to load NRLISTEN. To load NRLISTEN, type:  
  
	NRLISTEN <ENTER>  
  
You can limit access to your PC by setting certain program parameters. The   
general form for setting all NRLISTEN parameters is:  
  
	NRLISTEN {name}{/param(=value)}  
  
NOTE: The braces and parenthesis should not be typed. The information within   
the brackets in the example above indicates optional information on the   
command line. The parameters may be typed in any order.  
  
5.3.2 Setting a Password  
  
To give yourself a password, reissue the NRLISTEN command and set the   
password parameter as follows:  
  
	NRLISTEN /lpassword=anyword <ENTER>  
  
The password you enter (e.g., anyword) will be required from all Calling-PC   
users who request a connection to your PC. You can also set a system wide   
password using the CONFIG program.  
  
5.3.3 NRLISTEN Command Line Parameters  
  
The following table lists the NRLISTEN program options. Lowercase characters   
in the table indicate user-specified values. The table also indicates those   
options that can be set at the command line and those that can be changed   
via the CONFIG program.  
  
For more information about the CONFIG program, refer to Chapter 25.  
  
OPTION                  CMD LINE        CONFIG  
  
No Options              *  
/LPASSWORD=pass         *               *  
/TONE=xxxx              *               *  
/ACCESS=on/off          *               *  
/REBOOT=on/off          *               *  
/UNLOAD                 *  
/HERC=on/off            *               *  
/HANGUP                 *                 
/STATUS                 *  
/AUTOBOOT=on/off        *               *  
/MEMORY=xxx             *               *  
/RING=x                 *               *  
/HELP or HELP or /?     *  
  
5.3.4 NRLISTEN Options Summarized  
  
The following is a summary of NRLISTEN's options:  
  
o  /LPASSWORD=password - Allows the user to set one of the two passwords a   
Listening-PC may have. The network administrator sets the second password   
using the CONFIG program. If both are specified, the password supplied on   
the command line must be unique. If only one password is specified, all   
callers must provide it to gain access to the Listening-PC.  
  
o  /TONE=off, access - Enables or disables the tone when a call is made.  
  
o  /ACCESS=off, on - Accepts calls when set to ON (the default setting). If   
you set ACCESS OFF, no new calls are accepted. If a call is in progress when   
you issue the command, it will not be disconnected.  
  
o  /REBOOT=on, off  - Enables or disables the caller's ability to reboot   
your PC while a call is in progress. The default is ON.  
  
o  /UNLOAD - Unloads NRLISTEN from memory when specified. This will only   
occur if NRLISTEN was the last item installed into memory; this option has   
no effect if NRLISTEN was not the last item installed into memory.  
  
o  /HERC=on, off - Enables or disables the Hercules Graphics Support. If set   
to OFF, NRLISTEN will not transmit Hercules graphics screens. Due to the   
architecture of Hercules video adapters, setting HERC to ON can sometimes   
cause conflicts when running NRLISTEN on the same machine as the   
communication programs.  
  
o  /HANGUP - Terminates an active call. When this command is issued, the   
NRLISTEN program disconnects the active call and begins listening for new   
calls.  
  
o  /STATUS - Indicates whether the NRLISTEN, Reboot, Access and Password   
options are enabled.  
  
o  /AUTOBOOT=on, off - Configures the Listening-PC to automatically reboot   
itself when a Calling-PC ends a call if this option is set to ON. The   
default setting is OFF.  
  
o  /MEMORY=AUTO, CONV, XMS, EMS - Allows you to load NRLISTEN into expanded   
or extended memory.  
	- auto - loads NRLISTEN into any available memory automatically.  
	- conv - loads NRLISTEN into conventional memory (NRLISTEN loads in   
	conventional memory by default).  
	- xms - loads NRLISTEN into extended memory.  
	- ems - loads NRLISTEN into expanded memory.  
  
o  /RING=on, off - Sets NRLISTEN to "ring" the Listening-PC, allowing the   
user to decide whether to accept the call. When the option is set ON, the   
Listening-PC rings like a telephone. The user can accept the call by holding   
the <Left Shift> and <Right Shift> keys until it accepts the call. The   
following three options are available when this option is set ON:  
	- /RINGTONE=1, 2, 3 - determines the type of tone the listener will   
	hear.  
	- /RINGNUM=n - determines the number of times the Listening-PC will   
	ring before the call is canceled.  
	- /RINGHOT or /RINGACCEPT=3, 4, 5, 6, 7, 8, 9, 12 - determines which   
	keystrokes will accept a call. The default is 3. The keystrokes are:  
		 - 3=<Right Shift><Left Shift>  
		 - 4=<CTRL>  
		 - 5=<CTRL><Right Shift>  
		 - 6=<CTRL><Left Shift>  
		 - 7=<CTRL><Right Shift><Left Shift>  
		 - 8=<ALT>  
		 - 9=<ALT><Right Shift>  
		 - 12=<CTRL><ALT>  
  
o  /HELP - Displays a list of all NRLISTEN command line options.  
  
The NRLISTEN program is memory-resident. It must be loaded on a PC for the   
NRCALL program to take control of the PC.  
  
5.3.5 Loading NRLISTEN Automatically  
  
Each PC you wish to take control of should be configured to load the NRLISTEN   
program automatically during its start-up procedure so that the PC is always   
ready to answer calls. The following sections outline the various ways to do   
this.  
  
From your AUTOEXEC.BAT File:  
  
The best way to load the NRLISTEN program automatically is to include an   
NRLISTEN command line in each PC's AUTOEXEC.BAT file. The NRLISTEN program   
then is executed automatically each time users turn on or reboot their PCs.  
  
From your Login Script:  
  
Alternatively, you can load the NRLISTEN program via your file server login   
script. If you plan to load NRLISTEN from your NetWare login script, use the   
EXIT command as the last line in the login script. Create a batch file   
called LISTEN.BAT which loads NRLISTEN. Place the batch file in the login   
directory. For example:  
	  
	EXIT "LISTEN"  
  
This ensures that NRLISTEN does not load the login program into memory. If   
you are already using EXIT with another command, you can create a batch file   
that contains all the programs to be executed which then runs the batch file   
with the EXIT command.  
  
NOTE: The EXIT command allows a maximum of 14 characters between the   
quotation marks.  
  
5.3.6 Using Remote Control  
  
Once you have contacted a user using any of the methods outlined in the   
section "Contacting a User," you can take control of that user's PC if   
he or she has loaded NRLISTEN.  
  
From the Commands menu, choose the Control PC command. A tone sounding at   
the Listening-PC indicates that the user has been called. Now you can   
control that user's keyboard to help him or her solve a problem.  
  
While controlling a user's PC, you have certain calling options and use of   
the <F1> key as described below.  
  
To set the control options, choose the Select Control Options command from   
the Commands menu.  
  
The Control Options menu displays, giving you the following options:  
  
o  Turn LISTEN Keyboard On/Off - Toggles the Listening-PC's keyboard on and   
off. With this option, you can prevent the user at the Listening-PC from   
interfering with the keystrokes you type.  
  
o  Send Special/Bios keys to Listen - Changes the method of sending   
keystrokes across the network. The default is "BIOS."  You should change the   
mode to "SPECIAL" if the Listening-PC is not interpreting your keystrokes.   
Use this option when using CO/Session.  
  
o  Reboot the ListeningPC - Allows the caller to reboot the Listening-PC and   
terminate the current connection, returning to the Call menu. The   
Listening-PC can be set to ignore this request (as is explained later in   
this chapter).  
  
5.3.7 Sending the <F1> Key  
  
Selecting the Send <F1> Key option allows you to send the <F1> key to the   
Listening-PC. This option acts as if you had actually pressed the <F1> key   
at the Listening-PC.  
  
You can also press the <F1> key twice while in a call. This preserves the   
functionality the <F1> key has in other applications.   
  
For example, in WordPerfect, the <F1> key cancels your most recent   
keystrokes. If you are controlling another PC that is using WordPerfect, you   
can still use the <F1> key to cancel your last keystrokes without hanging up   
the call. Pressing the <F1> key twice in this instance will briefly display   
the Active Call menu and then cancel your last keystrokes as desired.  
  
  
5.4 Viewing PC and Network Information  
  
This section provides detailed information on how to view the configurations   
and diagnostics of other PCs.  
  
NetRemote allows you to view the screen and control the keyboard of any   
network user who has NRLISTEN loaded. In addition, NetRemote provides   
information and diagnostics for network PCs.  
  
Much of this information is available even if NRLISTEN is not loaded,   
including data to help in investigating network difficulties and resolving   
problems.  
  
The following information is retrieved dynamically across the LAN or WAN at   
the very instant you request it, so it is always accurate.  
  
There are nine NetRemote configuration and diagnostic screens:  
  
o  Configuration Summary  
o  Network Configurations  
o  Server Connections  
o  Machine Configuration  
o  Programs in Memory  
o  Exercise Server Connections  
o  LAN Adapter Statistics  
o  IPX Statistics  
o  Analyze Network Traffic  
  
Each screen is fully described in the following sections.  
  
5.4.1 Configuration Summary  
  
The Configuration Summary screen displays the basic configuration of the   
PC you have selected. The Configuration Summary screen automatically   
displays whenever you select a PC from the current connections list. Memory   
information is only displayed if the PC has NRLISTEN loaded.  
  
o  Net Address - Physical node address and network number of the selected PC.  
o  Active - Length of time the selected PC has had its network shell loaded   
(e.g., if the time is short, the user just turned on their PC).  
o  IPX/SPX - Version of driver loaded on the selected PC.  
o  NRLISTEN - Status of whether NRLISTEN is loaded (available) or not   
loaded (not available) on the selected PC.  
o  PC Data - Availability of PC information. (Only available if NRLISTEN is   
loaded on the selected PC.)  
o  Shell Driver -Type of driver running on the selected PC.  
o  Settings - IRQ, I/O Base, and RAM Buffer settings of the shell driver on   
the selected PC.  
o  CPU - Type of processor on the selected PC, such as 8086, 80286. (Only   
available if NRLISTEN is loaded.)  
o  DOS - Version of DOS loaded on the selected PC.  
o  Video Adapter - Type of video adapter installed in the selected PC.   
(Only available when NRLISTEN is loaded.)  
o  Mode - Video mode of the selected PC's monitor. (Only available when   
NRLISTEN is loaded.) This field will change whenever the screen is refreshed   
and is based on the current mode of the selected PC.  
o  MEMORY Installed & Available - Amount of memory installed in the selected   
PC as well as the amount currently available (free). (Only available if   
NRLISTEN is loaded.) Expanded memory will only be detected if an LIM   
compatible driver is loaded on the selected PC. Available memory is updated   
each time the screen is refreshed and reflects new programs loaded or   
removed from memory on the selected PC.  
  
5.4.2 View Configuration  
  
The View Configuration option allows you to view the network and server   
configurations of a specific PC. If NRLISTEN is loaded, you will also be   
able to view the machine and network configurations and the programs that   
reside in memory on a PC.  
  
Use the following procedure to view the configuration of a selected PC.  
  
1.  Choose the View Configuration option from the Commands menu.  
  
2.  Highlight View Configuration and press <ENTER>.  
  
3.  Choose the configuration you want to view.  
  
    The possible configuration screens (when NRLISTEN is loaded) are:  
  
	o  Server Connections  
	o  Network Configuration  
	o  Machine Configuration  
	o  Programs in Memory  
  
    Each is described in the next sections.  
  
4.  When finished viewing the information, press <ESC> to return to the   
    Selected Node screen.  
  
5.4.3 Server Connections  
  
The Server Connection option displays the file servers to which the   
selected PC is currently attached. Eight items always display even if the   
PC is attached to fewer file servers. An asterisk denotes the primary file   
server. The fields in this screen are:  
  
o  SERVER NAME - Logical network name of the file server.  
o  CON NBR - Connection number of the selected PC.  
o  SEQ NBR - Packet sequence number for the file server indicating the   
value assigned to the latest packet issued to the file server. The value   
ranges from 2 to 255.  
o  XPORT TIME - (Transport Time) Current length of time and maximum length   
of time (time-out value) a network packet requires to travel from the   
selected PC to the file server. These values provide a basis for the   
relative performance of the available network connections.  
o  SERVER ADDRESS - Inter-network address of the file server. This address   
consists of two parts:  the network number and the physical network address.  
o  ORDER NUMBER - Priority of the entries in the file server name table.  
  
5.4.4 Network Configuration  
  
The Network Configuration information complements the information found on   
the Configuration Summary screen. Use this option to obtain additional   
information about the selected PC's network configuration.  
  
o  Shell Version - Version of the network shell (e.g., NETX) used by the   
selected PC. The accuracy of this information depends on the shell   
implementation.  
  
o  Primary Server - Name of the file server to which the selected PC   
originally logged in to when it attached to the network.  
  
o  Max Pkt Data Size - Maximum amount of data that the driver can send or   
receive in a packet.  
  
5.4.5 Machine Configuration  
  
The Machine Configuration option displays information about the hardware   
installed in the selected PC. This option is only available when the   
selected PC has NRLISTEN loaded. The information displayed complements the   
information found on the Configuration Summary screen.  
  
o  PC Type - Workstation type, for example, AT, XT, or IBM Model 70.  
o  Micro Chan - Availability of a Micro Channel Bus Architecture on the   
selected PC. Possible values are NO, YES, and UNKNOWN.  
o  Math Chip - Presence of a math co-processor chip in the selected PC.  
o  Serial - Number of physical serial ports in the selected PC.  
o  Parallel - Number of physical parallel ports in the selected PC.  
o  Keyboard - Type of keyboard attached to the selected PC, for example,   
83 Key or 101 Ext Key.  
  
5.4.6 Programs in Memory  
  
The Programs in Memory option displays information about memory resident   
programs and applications currently loaded in the selected PC's memory. This   
option is only available when the selected PC has the DOS NRLISTEN loaded.  
  
o  PSP - (Program Segment Prefix) Location of the program listed in the PC's   
memory.  
o  BYTES- Amount of RAM the program occupies on the selected PC.  
o  PROGRAM - Name of the file loaded into memory on the selected PC.  
o  HOOKED VECTORS - PC interrupts which have been enabled to transfer   
control to the specified program.  
  
5.5 Run Diagnostics  
  
The Run Diagnostics option allows you to proactively investigate the status   
and activity of the selected PC, regardless of whether or not NRLISTEN is   
loaded.  
  
Use the following procedure to run the diagnostics of a PC:  
  
1.  Display the Current Connections list.  
  
2.  Select a listener and press <ENTER>.  
  
    The Commands menu displays.  
  
3.  Choose the Run Diagnostics option.  
  
    The Diagnostics menu displays, allowing you to select the following   
    diagnostics:  
  
	o  Exercise Server Connections  
	o  Analyze Network Traffic  
	o  LAN Adapter Statistics  
	o  IPX Statistics  
  
5.5.1 Exercise Server Connections  
  
The Exercise Server Connections option verifies each server connection to   
the selected PC and reports the connection's statistics and performance. An   
asterisk denotes the primary file server. The fields in this screen are:  
  
o  SERVER NAME - File server name.  
o  SERVER ADDRESS - Network number and physical address of the connection   
to be verified.  
o  RESULT - Value before the slash represents the packets sent to each file   
server. The value after the slash is the number of packets actually received   
by the file server. For example, 10/10 means 10 packets were sent and all   
10 were received, indicating a good connection. 10/7 indicates that the   
connection is faulty or a network overload condition is occurring, thereby   
preventing the file server from receiving all packets.  
o  DELAY - Time (in seconds) required to send all 10 packets. This indicates   
the relative performance of each file server connection.  
  
5.5.2 Analyze Network Traffic  
  
The Analyze Network Traffic option summarizes much of the information found   
on the LAN Adapter Statistics screen. If errors are occurring, view the   
LAN Adapter Statistics screen for more details.  
  
The LAN Adapter Statistics screen is divided into two sections: Transmitted   
and Received. Each section contains the following information:  
  
o  Pkts/sec - Number of packets sent or received per second.  
o  Packets - Total number of packets sent or received.  
o  Percent of Total - Percent of the total that was OK, in Error or Ignored.  
NOTE: If the NetWare count of Packets, Errors, or Ignored Packets has   
exceeded 64,000, then the percentage will be incorrect. This occurs when the   
count exceeds the maximum value, and the counter resets to zero.  
o  OK - Percentage of packets sent or received without error.  
o  Errors - Number of packets sent or received in error.  
o  Ignored - History of packets that were received or ignored. Typically   
packets are ignored if the PC is not expecting a packet.  
o  Total - Summarizes the above information for each field.  
  
5.5.3 LAN Adapter Statistics  
  
The LAN Adapter Statistics screen is divided into two sections: Transmit   
and Receive Statistics. This screen provides statistics regarding the   
sending and receiving of packets across the LAN. Values designated as N/A   
are not supported on the selected PC.  
  
The fields for the Transmit Statistics are:  
o  Total OK Packets - Total number of packets successfully sent.  
o  Packet Too Big Count - Number of packets that exceeded the maximum   
allowable transmission size.  
o  Packet Too Small Count - Number of packets too small to be sent.  
o  Misc. Error Count - Number of packets not sent due to miscellaneous errors.  
o  Retry Count - Number of times a packet was resent.  
  
The fields for the Receive Statistics are:  
o  Total OK Packets - Total number of packets successfully received.  
o  Packet Too Big Count - Number of packets too large to be received.  
oo  Packet Too Small Count - Number of packets too small to be received.  
oo  Misc. Error Count - Number of packets not received due to miscellaneous   
errors.  
o  No ECB Available Count - Number of packets that were received, but had no   
ECB (i.e., Event Control Block) available. These packets are usually ignored   
or thrown away. This typically represents broadcast packets for which no   
software package is listening.  
o  Packet Overflow Count - Number of packets received but were larger than   
the size allocated by the buffer.  
o  Checksum Error Count - Number of checksum errors that occurred while   
receiving packets.  
o  Hardware Mismatch Count - Number of times the hardware received packets   
that contained a different byte size than was expected.  
  
5.5.4 IPX Statistics  
  
The IPX Statistics screen provides information about version errors that   
can occur at the networked PC. Some number of errors are a normal part of   
network operation. Generally, this information will only be helpful if you   
have a solid understanding of low-level network protocol and application   
interfaces.  
  
The fields on the IPX Statistics screen are:  
o  Send Packet Count - Total number of packets transmitted.  
o  Malformed Packet Count - Number of packets sent containing a first   
fragment size of less than 30 bytes or a count of 0.  
o  Get ECB Request Count - Number of times a receive Event Control Block was   
requested from IPX.  
o  Get ECB Failure Count - Number of times the ECB buffer was requested by   
IPX and not supplied.  
o  AES Event Count  - Number of times IPX was asked to keep the Asynchronous   
Event Schedule timer ECB.  
o  Postponed AES Event Count - Number of times IPX did not serve an event   
because IPX was in a critical state.  
o  Max Configured Sockets Count - Maximum number of configured sockets that   
were allowed to be opened simultaneously.  
o  Max Open Sockets Count - Maximum number of sockets that were allowed to   
be opened simultaneously.  
o  Open Socket Failure Count - Number of times an Open IPX Socket request   
failed.  
o  Listen ECB Count - Number of times IPX was called with a Listen ECB.  
o  ECB Cancel Failure Count - Number of times an ECB was not canceled by   
IPX because the selected PC was in a critical state.  
o  Find Route Failure Count - Number of times IPX did not find a requested   
network address.  
  
5.6 Ending a Call  
  
This section explains the different methods of ending a call.  
  
5.6.1 From the Calling-PC  
  
To hang up an active call from the Calling-PC, press <F1> to bring up the   
NRCALL Active Call menu. Select the Hang Up the Call option. If the Active   
Call menu does not appear:  
  
o  There is no active call  
o  You are not at the Calling-PC  
o  Another key has been configured for the Active Call menu  
o  The Silentexit = yes parameter was used  
  
5.6.2 From the Listening-PC  
  
To hang up an active call from the Listening-PC, at the DOS prompt type:  
  
	NRLISTEN /HANGUP <ENTER>  
  
  
5.7 Security Features  
  
This section explains the security features available with NetRemote.  
  
NetRemote provides full access to networked PCs. If you do not wish to permit   
full access to PCs, you can use any of the following security features:  
  
o  User and Administrator Passwords  
o  User Notification  
o  Group Restrictions  
o  Disable Access  
  
5.7.1 Passwords  
  
NRLISTEN supports two passwords: User and Administrative. If only one   
password is set, then all callers must provide that password to obtain access.  
  
If both passwords are set, the User password needs to be supplied to obtain   
access. We recommend that NRLISTEN always be loaded with a password.  
  
Administrative Password: The Network Administrator sets this password using   
the CONFIG program; refer to Chapter 25 for details.  
  
User Password: The user of the Listening-PC sets this password by using the   
/LPASSWORD option of NRLISTEN. If this password is specified, it takes   
precedence over the administrative password.  
  
5.7.2 User Notification  
  
When the /TONE option is set to ACCESS, the Listening-PC produces an audible   
signal when an incoming call arrives. This tone alerts the user to the call.   
The tone also sounds on disconnects.  
  
5.7.3 Group Restrictions  
  
You can limit access to the NRCALL program by creating a NetWare group   
called NRCALLERS, using the NetWare SYSCON program.  
  
NOTE: Refer to your Novell NetWare reference manuals for more information   
about SYSCON.  
  
With the creation of the NRCALLERS group, only members of the group will be   
permitted to run the NRCALL program. If you do not create the group   
NRCALLERS, the NRCALL program will be available for use by all network users.  
  
5.7.4 Disable Access  
  
Users can prevent others from accessing their PCs via the NRCALL program. To   
turn off NRLISTEN, type:  
  
	NRLISTEN /ACCESS=off <ENTER>  
  
This command prevents establishing calls to this PC. If a call is already   
active, issuing this command will not hang up the call.  
  
  
That concludes this chapter. The remaining chapters in this manual describe   
the use of CO/Session with NetRemote.  
  

