6. First run – Settings

While the first run of the System Tools you will be prompted to set initial settings. This settings are needed to be able to control remote computers by using System Tools and also needed to fine-tune the behavior of the software.

“Settings” dialog will be popped up automatically. If it was closed by mistake, it can be always found in the main “File -> Settings” menu.

6.1. Settings: General.

The first tab of the “Settings” dialog contains several sections with the general parameters of the System Tools.

6.1.1. Interface.

In this section you can select “Language” and “Theme” (Skin) of the System Tools. The initial version consist of only “English” language and “Default” Theme.

6.1.2. Remote Execution Credentials.

This block of settings is needed to identify the authorization parameters, which will be used for operations. There are two options available:

[Use Current User]

  • Yes – To use the account of the current windows user of local PC.
  • No – To use the special user account defined below.

You can fill “Domain”, “User” and “Password” fields manually, or to fill only “Domain” field and to import user from Active Directory by pressing “Select from domain” button nearby the input fields.

 
You must have Administrator rights on remote host to perform most of the actions executed by the System Tools software.
 

 

6.1.3. Remote Process Execution.

This section is needed to define shared folder on remote host, which will be temporary used for “Registry Backup”, “Registry Export”, “ODBC Copying of additional driver files” operations. Next to it, you can customize time to wait for an answer from remote command in seconds. In case of no answer from a process the command will be interrupted after this time.

6.1.4. Refresh Online Status.

System Tools can execute “Ping“ command on many hosts in multithread mode. This section can fine-tune the performance of the ping command by changing the amount of a ping threads to be executed in parallel, when “Refresh Online Status” process is initiated. “Ping Timeout” is time to wait for an answer in seconds from the ping thread and interrupt the thread in case of no response.

6.2. Settings: File Copy.

The second tab of the “Settings” dialog is related to the “File Copy” action behavior, were you can adjust the which attributes will be copied to destination file and the performance of copy operation.

6.2.1. Copy source file attributes to destination file(s).

Several attributes can be copied from source to destination file using “File” copy tab of the settings dialog. These settings can customize the behavior.

[File Attributes]

  • “Copy source file attributes” – copy source file attributes (Read-only, Hidden, Archive) to destination file at the end of the copy operation.
  • “Copy source file Creation Time” – Copy source file Creation Time to destination file at the end of the copy operation.
  • “Copy source file Last Accessed Time” – Copy source file Last Accessed Time to destination file at the end of the copy operation.
  • “Copy source file Modified Time” – Copy source file Modified Time to destination file at the end of the copy operation.
  • “Copy source file Security Descriptors and Ownership” – Copy source file Security Descriptors and Ownership to destination file at the end of the copy operation.
  • “Copy source file Compression State” – Copy source file Compression State to destination file at the end of the copy operation.
  • “Copy source file Encryption State” – Copy source file Encryption State to destination file at the end of the copy operation.

6.2.2. Algorithm to use for file verification of destination file.

Set of algorithms to compare source and destination file after the copy operation is completed to exclude the possibility of losing data.

[Available algorithms]

  • File Size – Only comparison of the source and destination file size
  • Bit by Bit – Comparison of copied bits between source and destination file (slow)
  • Checksum (MD2) – Using of MD2 (Message-Digest) algorithm to compare source and destination file
  • Checksum (MD4) – Using of MD4 (Message-Digest) algorithm to compare source and destination file
  • Checksum (MD5) – Using of MD5 (Message-Digest) algorithm to compare source and destination file
  • Checksum (SHA1) – Using of SHA-1 (Secure Hash Algorithm) algorithm to compare source and destination file

6.2.3. Size of the read/write buffer.

Size of the I/O buffer to try to minimize the number of access to the disk an expensive operation in terms of performance. The optimal buffer size is depending on the storage/disk model or network configuration.

6.3. Settings: MISC.

6.3.1. Default Behavior.

All actions, which can be performed from the System Tool can be separated into “Read” operations (safe operation, to only receive information from remote host), “Write” operations, which could change the remote host file system, registry and i.e. and mix of “Read and Write” operations. This setting is needed to select the default program mode:

 
Please be very careful to use “Write” actions as many of these actions cannot be undone. Please read “2 Read This First.” section for more details.
 

6.3.2. History.

In this section user can define the number of Recent Scenarios to be displayed in the (Main Menu -> File -> Open Recent Scenarios) point of menu and life circle of log files, produced by System Tools.

6.3.3. Check Updates on Startup.

This option is enabling check available updates on startup process of System Tools.

The option available only in the Licensed (not Trial) version of System Tools. You will have warning message if option is enabled in the Trial version of the software:

0
Posted in User Manual Tagged with: ,
Share ›