Logging In; The Desktop;
Workstations; Disk Drives; Software Applciations; Software Application
Documentation; Printing; Operating System; Passwords; Computer Support;
General Guidance; Templates; Frequently Asked Questions - Pegasus Mail
environment has been pre-configuerd for you to what was hoped to be the
most usable whilst keeping to constraints imposed by a need for
and efficient administration. In some regards you can tailor your
environment to your own liking but in other regards you are not able.
When you come to
a workstation, before anything is available to you you have to login to
the domain using a valid username and password. Thats three options
have to be satisfied: username, password and domain. The domain name is
the name of the organisation; there is an option to login to the
workstation instead of the domain - but you should think of this as a
dead-end. The settings you see chosen will depend on what was chosen by
the person using the workstation before you.
finished using a workstation, log off. If you come to an unattended
workstation and someone else is already logged in, logoff before
in with your own account details. If you leave a workstation unattended
for 15(?) minutes it will be locked and only you or the
Administarotr/someone with administrative priviliges(?) can unlock it.
Login only once
concurrently. If you are logged in more than once you will not be able
to logout and the workstation will need to be re-booted and any changes
made to your environment (not your data files) will be lost.
The shortcuts on
desktop are layed out such that sundry applications are in a line along
the top; main applications in the most obvious position in the middle;
various file management programs along the bottom.
See our desktop screen shot for an
impression of what your initial desktop will look similar to. If your
desktop shortcuts suddenly revert to being lumped together in lines
left hand side of the desktop then something has gone wrong. You can
move your shortcuts around however you wish, change their icons, delete
them or create new ones.
We advise you use Windows Explorer as your file management program;
we'd have removed the rest from the desktop if it were possible to do
without unsightly side effects.
are labelled by their functionality, as much as is practicable (given
that some applications are so well known by their product name), so
applications can be changed and people retain their understanding of
their desktop. Hover over desktop shortcuts to discover the name of the
application to be used to provide that functionality.
Some applications are workstation-specific and some of those
applications have a shortcut on the desktop (i.e. CD writing software)
(some that are of less value to less people are only available
from the Start Menu, if you want to copy them to your desktop then you
can); if those applications aren't installed on the workstation you're
using then they won't show that application's icon, instead they'll have Microsoft's blank icon.
Don't save data
on your desktop. Save shortcuts on the desktop instead. The desktop has
to be copied from the server every time you login and copied back again
when you logout, so saving data there makes logging in and out take
longer. Besides, its easy to delete shortcuts from the desktop by
and so safer if those shortcuts represent a
shortcut rather than actual
The Recycle Bin shortcut doesn't appear on
the desktop as it being there would imply that a
Recycle Bin was available when it isn't when using files over a
Having the Recycle Bin available on the desktop is not considered a
useful desktop function anyway.
workstation is equipped with a consistant suite of software
applications. There should be enough applications on each for you to do
most things that you need, such as word processor, email client, web
browser, image viewer and small-time image editing. See the 'Software
Applications' section for information on the specific applications
Every workstation has its own name, it should be labelled with it on
its monitor. Referring to workstations by this name will keep things
Workstations may be asleep when you come to them. This saves energy.
When sleeping they may be quiet and so appear to be switched off. Try
moving the mouse of pressing a [Shift] key to wake them up. Some
workstations need you to press the on/off button to wake them (we may be able to stop these being so
The monitor is
switched off after 10 minutes of inactivity, the hard disk after 15
minutes and the whole system goes to standby after 20 minutes. If the
workstation is sleeping and you cannot wake it using these methods then
it could be broken.
needs re-writing less technically)... Different
workstations available to you will likely be made up of different
hardware. Some workstations will operate faster than others. Some
monitors will have higher specifications than others; as far as
we have tried to operate each computer with the same monitor
but there may be some that differ. If there are any that differ greatly
your desktop may not look the same one one workstation as it does on
another but we should have minimised this likelihood. Likewise
they should all monitors should be running at the same refresh
and it should be high enough that you don't see flicker, but if you do
see excessive flicker the settings may have reverted to a lower one and
you should get someone to fix it.
have access to the following network drives:
for your personal data. only you have access to files stored here
M: for group-specific data. Data stored here is available to other
people in your group, but not to those who aren't in your group
S: for shared data. Data stored here is available to everyone in your
Each workstation has local drives C:, D:, E: and F: but they are hidden
to make the interface less cluttered with worthless items for you. You
should use the networked drives to save your data to - they are
available from any workstation and a backup is taken of them each
You are strongly advised not to use the local drives - they are only
available from that particular workstation and a backup is never made
them. If you really need to use the hidden drives then you can access
them by typing the drive letter (i.e. F:) and pressing [Enter] in the
location bar of Windows Explorer or in the relevant place in the file
picker of other applications and that drive should appear. If something
goes wrong with the file server and the network drives aren't available
then you can use F: to save data to but remember to copy it to the
relevant network drive when available again.
If there is an
optical drive (i.e. CD-ROM, CD-R, CD-RW, DVD) on a workstation then its
drive letter will be Z:. If there is more than one optical drive then
the second of them will be Y:.
Word processor -
Similar to: Microsoft Word
Licence: Free Software
Spreadsheet - OpenOffice Calc
Presentation - OpenOffice Impress
Similar to: ?
produce everything from simple diagrams
to dynamic 3D illustrations and special effects"
Email - Pegasus Mail
Microsoft Outlook Express, Qualcomm Eudora
Web browser -
Microsoft Internet Explorer, Netscape Communicator, Opera
Page layout -
Similar to: Quark's Quark Express, Microsoft Publisher
Image Editor -
Similar to: ?
This is a small
program for working with existing images. mainly intended for an
efficient means of viewing them but also a small-time image editor, it
will crop, change brightness, contrast, resolution, etcetera. it isn't
for full image editing like The GIMP or Photoshop
editor - NoteTab Light
Web editor -
Similar to: but
not as qualified as Microsoft FrontPage and Macromedia Dreamweaver
CD writing - Nero
Adaptec Easy CD Creator
In each room there is a single copy
of Microsot Office 2000 (Word, Excel and Access) available for
emergencies only. Microsoft Office version 2000 is used in particular
administrative simplicity we are only going to have one version
available and this is the first version compatible with Windows 2000
and, in lowest common denominator terms, more licences will already
exist for it that came bundled with computers; it also consumes less
memory than later versions.
You can't and shouldn't try to install software yourself. This is a
tightly managed computing environment in which all software is
for and carefully justified. If you require further functionality you
should speak about it with your computer support liason person, it may
be possible to provide this functionality if it is not available
If new software
were to be installed without prior analysis and testing it could break
part of the system or lessen its security; there is too much at steak
take this risk. Also, the more software there is, the more there is to
go wrong; and the more there is to spend time on administrating.
There should be
printed documentation available in one place in your organisation.
no printed book available yet.
is worth printing out.
Some of Mozilla's most useful features you may not be aware of are
word processor, spreadsheet,
- search from the location bar
into the location bar your search terms and an option should appear
below the location bar to search Google for them, you can select this
by pressing the up arrow once and pressing [Enter] or by using the
(if Google is not set as your preferred search engine for this feature
then its possible your preferences have been lost, or have been
changed; you can change this preference using Edit -> Preferences
-> Navigator -> Internet Search -> Default Search Engine ->
Search using -> Google. Google is by far the most useful search
engine but if you prefer another, or want to use a specialist one, this
feature can be so customised)
- tabbed browsing - [notes: good example of their use is when
researching using a search engine, they close from left to right so you
end up back at the search engine, you can have one browser window open
per group of tabs. can bookmark a group of tabs. beware there isn't yet
a mechanism for stopping you closing a window and losing tabs, though
you can use History to find where you were. tabs can be most
efficiently closed with a middle mouse click]
- pop-up blocking - pop-up
windows are predominantly used for commercial advertising, where they
annoyingly get in your way of fluidly using the web. In your copy of
Mozilla they are suppressed by default. However, some sites use them
for features you may actually need, so if a web page doesn't work as
expected, try using Tools -> Popup Manager -> Allow Popups From
This Site. An icon displayed in the status bar indicates that the
current page had a suppressed pop-up window.
- middle click a link to open a
tab in the background -
- text and graphics zooming
- Ctrl++ to zoom in and Ctrl+- to zoom out
If your organisation has paid the author of Pegasus Mail and Mercury
for a support contract then a manual should be available which can be
System-wide address books and
When you've created an address book, if you move it from your own
mailbox (they have the extension .pmr and .pm! and live at
\\MAIL-SERVER\mail\%USERNAME%) to \\MAIL-SERVER\mail\address-books then
they'll be available for everyone else on the system. You can do
the same with distribution lists, which have a file extension of .pml
and should be moved to \\MAIL-SERVER\mail\distribution-lists.
CD writing (Nero)
Print off the 'Brief Instructions' that come with the software
Plain text editor
Print off the manual
image editor (The GIMP)
Get a printed book (there are a few available) or 'GIMP - The Official
Handbook' is available on the
as well as in print.
Right click on a zip or other compressed file,
choose '7-Zip', then 'Extract'
The RealTime Protector should be running at all times; you can see its
icon in the system tray (beside the clock). This scans files as they're
used. If you want to do a complete scan of a selected disk you can run
the OnDemand Scanner or other scanning options from the 'security'
section of the Start Menu's Programs section.
If the anti-virus program reports it has found a virus, and reports
which virus in particular it is, and the virus is not in email (all of
which can be deduced from the on-screen report), then by the time it
has informed you of it the virus will have almost certainly already
The operating system
If your printing
needs differ to the default settings chosen then you can change some of
them as and when you like.
By default a resolution of 300 dpi has been chosen for you to print at
so as to save ink. If you want to print at the higher quality of 600
then you can choose to do so.
Those printers that are able to are configured to print duplex (both
sides of the page). If you're printing onto ***** types of paper then
disable duplex printing whilst you do so as this paper will break the
system you're using is called Windows 2000 Professional. Windows 2000
Professional is more robust and better equipped for operating in an
organisation than the 'consumer' grade Windows 95/98/Millenium
systems you may have used elsewhere. Windows 2000 Professional is
similar to Windows NT4 Workstation and Windows XP Professional.
(Windows 2000 is being used here because we consider it a better option
than the more recently released Windows XP).
The silent, unseen, 'file server' that you connect to, which makes
possible the domain you log into, that allows you to wander from
workstation to workstation always seeing the same environment and
is running an entirely different operating system called Debian GNU/Linux (The phrase is an amalgamation
of three projects - try the links to find out more). Debian GNU/Linux
similar to an operating system called Unix that has been around and
developing for more than thirty years and is thus very mature, except
that Debian GNU/Linux is Free Software.
The system needs
to remain secure. Security depends on the system having been originally
setup securely and that security maintained as part of the process of
ongoing support but also upon you maintaining your end of things
regarding security. One aspect of this is using secure passwords.
Eventually you will be required to change your password to something
more secure than it is now, but only when the system is completely
running smoothly - you will be informed when this is so. When you are
asked to change your password, be sure to use a secure password,
guidelines will be provided as to what constitutes a secure password -
it certainly won't be an English language word that could be guessed by
a piece of software trying to break in with the aid of a dictionary.
will need to change your password every ? days and you cannot use the
same password again.
The first thing
to try before asking for computer support, is to switch the thing off
(in the usual manner), if appropriate in the circumstances, and back on
again then give it another try. This method can fix a lot of problems.
If after a couple of tries this way the problem isn't resolved then you
should seek further help.
You have a member of staff to whom you can report issues with the
computing system and they will communicate with those providing
support. When reporting an issue please be as clear as you can in
describing the nature of the issue; for example, what exactly is taking
place as far as you can see? with which software application, if any,
are you experiencing the issue? when did you first notice the issue? is
the issue happening to just you or to others aswell? is the issue with
particular workstation or others aswell?; you may have to do a little
investigation before you are able to describe the issue this
descriptively but it will ensure your request gets the appropriate
attention from the computer support staff.
Don't continue living with problems; if you're experiencing them it is
likely others are too or could do; or it may be that others haven't
noticed; you will help everyone by reporting issues quickly; a log will
be kept of all issues and work to resolve them scheduled accordingly.
you have any requests for hand or anything else relating to computing
then get in touch with the computer support liason person.
Don't save files
on the desktop, save shortcuts to files/directories there instead.
saving to the desktop increases the time to login; and files saved
there are saved on the file server's in a different place to where your
data in your My Documents data is saved, the system wasn't designed to
have a lot of data saved where the desktop is saved.
The time it
takes to load Pegasus Mail is largely proportional to how many messages
you have in your New Mail folder, so move them out of there into other
suite templates to S:\templates
and they will be available to everyone;
save them to H:\templates
for those you want available only to yourself.
Asked Questions (FAQ)
Why does it take ages to start or
close Pegasus Mail?
the time it takes to load Pegasus Mail is directly proportional to the
number of mail messages in Pegasus Mail's 'New mail' folder
anti-virus' 'Realtime Protection' running whilst loading and
closing Pegasus Mail significantly slows down Pegasus Mail.
you can choose
to disable F-Prot Realtime Proection before running Pegasus Mail so
that it runs quicker, but you must remember in those instances not to
save and run potentially malicious email attachments (as you must
always remember to not do. don't worry, they won't run of their own
from accord within Pegasus Mail, like they could in Microsoft Outlook /
Outlook Express, and Pegasus will warn you before you can do anything
with them anyway)
(There can be other reasons too, such as a slow network connection,
when running it from a file server)
Sometimes I get email in the 'New
mail' folder that can't be deleted, how do I remove it?
- move the
message to your New Mail folder
on it and choose 'Message properties...'
- note where
this dialog says 'Filename (only for new mail):' it will say something
Windows Explorer, go to your mail directory on the mail server (i.e.
\\mail-server\mail\%USERNAME%) and find this filename (i.e.
'PC5LOJF1.CNM') and delete the file matching the name similar to above
- (or, for
the last step you should instead be able to type this at the