Certification Manual
- 70 -
incoming emails and downloaded files. The anti-virus software will
quarantine any suspicious files and remove them from the computer.
Internet activity is not the only way that malicious software can find its
way onto the network. Infected computers that are connected to the
network can easily introduce them. Even USB flash drives and portable
hard drives can expose the network to this type of software.
The third and final level of security that we will discuss is WLAN
security. This level of security has to do with who and what you allow onto
your WLAN. Most business’ wireless networks are secured by WPA or
WPA2 security with either AED or TKIP encryption. This requires that a
secure password be typed known before the user can access the network.
The router can also be setup to only allow certain IP addresses to have
access.
Other Computer Information
Performing a System Reboot
There are times when the Server Computer must be rebooted in
order to clear an error, vacuum it out, or simply reset the system. There are
several important steps that should be followed by the installer or servicing
technician.
Step 1 – If at all possible, perform the re-boot when there are no calls
on the system, and at a low call volume time, such as
over lunch.
Step 2 – Inform the staff that the call system will be down temporarily
and that they should perform room checks.
Step 3 – It is always a good idea to perform a system backup before
shutting the computer down.
Step 4 – Close the AllCall© Software down in backwards order.
(Client Solution, Server Solution, Database Solution)
Comentários a estes Manuais