Skip to Search

diagonal spacer

Liaisons - Confidential!

This page is designed to allow for quick reference to topics discussed on the Liaison List. It offers tips for solving computer-related problems that may crop up under the Liaison domain.

Click here for the Directions for Finding MAC Addresses.
The Cataloging and Metadata Systems Liaison Page provides some helpful tips, procedures & contacts for Library Liaisons.
The Trouble Ticket Viewer is now available online, allowing liaisons to track the status of SYSHELP Trouble Tickets.
The Proxy Server - Mail Filter Page lists the email sites that are currently blocked at public web access work stations. For Liaisons only, MSN password required.
The UF Software Copyright Policy Home Page provides information on UF's software copyright issues.

Liaison Topics
Table of Contents

- IDE vs. SCSI HDs
- Office 2000
- Hummingbird/Luis
- Hummingbird/Mouse
- McAfee
- Proxy Server/Mail Filtering
- WINS Configuration
- Calendar Display
- Email Profile
- Barcode Scanner Setup
- Hard Drive Upgrades
- Walk-ups in Smathers
- Picture.exe Virus
- VirusScan
- Mail Filtering & Staff Machines
- Server Visibility
- Passwords
- More on Passwords
- Setting Up Mulitiple MSE Mail Profiles
- Defective Disk Drives
- NERDC Computer ID Note - Fall 1998
- Xerox Popup Problem on Public Workstations

  1. IDE vs. SCSI HD:
    Question: What is the import of an IDE hard drive vs. a SCSI hard drive -- I know that SCSI means that peripherals can be connected, but, isn't that basically a reference to a motherboard -- not a hard drive? If a PC has an IDE hard drive, how would that affect attaching peripherals to the rest of the PC?
    Answer: There are a lot of issues here. IDE and SCSI are two radically different ways of providing data communication between peripherals and the CPU. The IDE interface is 1) much cheaper; 2) built-in to most motherboards of recent vintage, although it also can be added via interface cards; 3) slower for large data transfers; and 4) used almost exclusively for disk drives, although it rarely has been used for some other (niche) applications. SCSI is pretty much the opposite: more expensive; usually not built-in; faster for large transfers; and to date has been the high-end way to attach any peripheral which needs to move large amounts of data quickly. The main thing it is used for other than disk drives has been scanners. SCSI is actually a (very) short range local area network for peripherals.
    The basic IDE interface can connect two devices per channel, and it generally has two channels. Basic SCSI connects up to seven devices per channel, and you can have as many channels as you have free slots. Both have been extended to double their original capacity in some cases. The two things that make SCSI a better way to go are its sustained high speed throughput, and its intelligent devices: everything on a SCSI bus, interface card included, has a dedicated CPU that can handle data transfers independently of the computer itself. The reason SCSI is more convenient for loaded machines is that it only requires a single interrupt (IRQ) for up to seven devices, and interrupts are frequently scarce on today's heavily accessorized machines. This can mean that a SCSI machine will have IRQs available for new devices when an IDE machine with otherwise the same configuration will not be able to add anything new.
    IDE is cheap because it uses the CPU on the motherboard for its processing. This is slower than dedicated data controllers, and it slows the entire machine down for long data transfers. It is typical to see an IDE interface consuming 30-50% of available CPU on a long file copy, whereas a SCSI drive will use only a few percent. This can be especially important if the data transfer is time-critical, such as burning a CD. You also see a big difference on anything that is both compute-intensive and spends a lot of time accessing a CD (e.g., games, GIS databases, etc.).
    Of course, all of this SCSI intelligence costs money. Where the IDE interface included on a typical machine lets you hook up four hard drives or CDs, SCSI is usually an add-on option, and the drives themselves cost 50-100% more for a given capacity. The general recommendation is that if you need more than one hard drive or need to do a lot of CD access (as opposed to just using it to load software), SCSI is the preferred way to go. It also is historically the only way to get fast fault tolerance through RAID, or Rapid Array of Inexpensive Disks. This technology, widely used in servers, is a way to both increase speed and provide for data backup even if one (or more) of the drives physically fails. RAID 5, the most commonly used type, requires at least three drives to work at all, and works much more efficiently with four or more. This exceeds both the speed and connection capability of traditional IDE.
    And as usual, things are changing. The two upcoming challengers on the hardware level are Firewire and FibreChannel, which are also fast (faster than SCSI to date), expensive ways to attach a lot of devices (many more than SCSI, 100+) to a single interface. Another possibility with the advent of ever faster networks is using IP to attach storage servers. Finally, we are starting to see IDE interface cards which can handle RAID and lots of drives. It isn't yet clear whether this development offers competition to SCSI or the other technologies on anything except price.

  2. Office 2000 Problems:
    If you are experiencing problems with Office 2000 and you need to reinstall the program and start again from scratch, there is an uninstall program that will completely remove all of Office 2000 from your computer. Located at \\SMATHERSNT2\ReadOnly\eraser2k, you need to copy the two eraser folders to your desktop and run the programs from there.

  3. Hummingbird/LUIS problem:
    Question: We are all enjoying using the tech side of LUIS through Hummingbird but we have encountered one problem. The numbers pad does not respond even when on Number Lock. How does one go about remapping the keyboard so that we can use this? There are several Circulation tasks and Binding tasks (as well as searching by call number or Luis number) that go quicker using the numbers pad rather than the digits at the top of the traditional keyboard.
    Answer: You need to open a LUIS session,
    go to Options on the menu bar,
    and choose Edit Session Profile from the drop-down menu.
    Click on + (plus sign) next to Terminal.
    Click on Keyboard.
    Uncheck box next to Ignore NumLock state.
    Click OK.

  4. Hummingbird/mouse problem:
    Question: When using a 3270 session in Hummingbird, the Mouse pointer cannot be "left-clicked once" at the beginning of an Item ID number field in an Item Record screen to move the cursor from any other on-screen position to the Item ID field. Oddly, however, the cursor can be moved into the 2nd character position of the Item ID field by "left-clicking once" on that position. As well, the cursor doesn't seem to have any problem being left-clicked into any position other than the initial position of an Item ID field. Is there a solution for either the Mouse or Hummingbird to be enabled to left-click & moved to initial character position of an Item ID field?
    Under Options in the menu bar, go to Hotspots.
    Unclick the three boxes under Default Hotspots.
    Click on Close.
    When you leave the default Hotspots enabled, if you click on certain spots on the screen to make a change, Hummingbird tries to execute a command and won't let you type in the change.
    Note: Bill Covey strongly advises against using the mouse (or the cursor keys) to move from field to field in any 3270 emulator; use the Tab key instead. It is very difficult to be precise enough about the beginning of a field in a GUI to access it visually. As a compromise, you might click someplace far enough to the left to be out of the field, then hit the Tab key to move to its first position. This is quicker than multiple Tabs, and more likely to work than going direct with the mouse.

  5. McAfee Updates: we have put a copy of the latest McAfee virus update file in smathersnt2\ReadOnly\Mcafee. To update your McAfee Anti-virus, just copy the file to your desktop and double-click it. After installation, you may trash your copy of the file.
    We will try to keep the latest versions available in this folder. However, we suggest that going directly to the McAfee site is preferable: they will always have the latest versions available, and their site will also have news bulletins about current virus activity. In some cases, you will need to load a combination of files to be current, and the McAfee site will have explanations of what is needed in each case.

  6. Proxy server/Mail Filtering: (4/22/99) The Web proxy server seems to be stable enough to start using it for all public workstations. The purpose of the proxy is to provide filtering which supresses email access through Web browsers. It also should speed up access to frequently visited sites. Each Library building will use a different proxy address as follows:

    West -
    East -
    Ed -
    AFA -
    Music -
    MSL -
    JRR -

    If you wish to have access to Web email filtered from a public workstation, set the proxy address according to your building per above, & set the port to 3128.
    Proxies are set in IE via Tools/Internet Options [tab]/Connections/Lan Settings... [button].
    Netscape uses Edit/Preferences.../Advanced [click +]/Manual proxy configuration [radio button]/View... (HTTP only).
    Setting this up is local option; only do it for workstations on which you want to disable Web-based email. If you see a mail site leaking through, get the URL and inform Systems. Systems will try to determine what is involved in adding it to the blocked list.

  7. WINS Configuration:
    Question: Are we supposed to have our WINS Resolution enabled?
    Answer: Yes.
    Question: It is my understanding that we use different IP's and sometimes different gateways, but that DNS and WINS configurations (as well as the subnet mask) are the same for all buildings within our domain. Is this correct?
    Answer: That is substantially correct for the Libraries networks as currently configured: you will get good results by copying the DNS, WINS, and subnet mask settings from any Library workstation which is operating properly to any other. You should use the same gateway address as all other correctly configured Library workstations in the same room, and it will be of the form 128.27.x.1, where the x is the same as the corresponding number in your workstation IP address. Thus, an IP address of would have gateway All of our locations at the moment should have subnet masks.
    There is a possible variation on the WINS addresses: is also permissible. There are several possible DNS addresses, but the one everyone should have is, and it is a good idea to also have The WINS and DNS servers act as the phonebooks for making connections to Library NT servers and the Internet, respectively, so every workstation needs to have appropriate addresses configured for these services.

  8. Question: Is there a way to get more than the current week of your calendar to display within the Web interface of Outlook? It will only display the current day, or the current week--which runs Monday-Sunday---so if you are home on the weekend and want to access the next week's calendar, you can't.
    Answer: Once you've logged in and you click the Calendar button on the Outlook bar on the left, do monthly calendars not appear on the right side of the screen? Click here to see a sample page from the calendar. This is the "daily" view, but you can view any day in the future (or past) by clicking on that day in the monthly calendar on the right.

  9. Email Profile (not reading the userid and domain values) -
    A staff member is using Outlook 98. The client is set to bring up the email profile when opened. The profile looks fine by all recognizable standards. However, when Outlook is opened , the logon window appears with no preset values. It does not remember the username from the last log in, nor does it even know the domain name. All other users open Outlook and the profile remembers who logged in last and what the domain name is. Why is the email profile not reading the userid and domain values?
    Solution: When her email is open, go to Tools, then Options and then Mail Services and make sure that 'Prompt for a Profile' is checked.

  10. Barcode Scanner Setup (courtesy of Ann Lindell)
    Here's the clue on how to set up the new barcode scanners to "enter" after the code has been scanned:
    • Connect the scanner/decoder using the "keyboard wedge" instructions (page 5-6 of manual)
    • Power Down/Power Up. (for good measure.)
    • Open Wordpad or Notepad
    • Enter setup mode by either:
      1. scanning the "setup" bar on page 8 of the manual
      2. pressing the following combination of keystrokes:
      left CTRL + capslock + right-shift + backspace
    • You should then see this phrase (a help prompt):
      :F1-F10=options, use Arrow keys to toggle/move, ESC=Exit
    • Press F5 for "strings"
    • Select String #: 1
    • :String #1: Type: arrow through to TERMINATION
    • :String #1: Active for ALL BARCODE TYPES
    • :String #1: Scan direction = ANY
    • Termination Screen: $0D
    • Decoder/Scanner will Beep, screen does not change
    • press CTRL + ESC
    • Decoder/Scanner will beep 3 times and return response of "setup complete--changes saved"
    • press ESC until you get and EXIT prompt and then .

  11. Hard Drive Upgrades - When your disk drive is upgraded, the new drive becomes C: and the old one becomes D:, with the new C: theoretically being a perfect copy of the old C: only bigger. However, just in case something doesn't seem to have worked, we leave the new D: drive just like we found it, which is to say at the conclusion of the upgrade, they should have identical contents. As time passes and you become sure you have everything you expect to see on the new C:, the idea is that you wipe the D: drive and use it as extra storage. If you haven't wiped D:, it probably is a slightly out of date image of the same files that are in C: . Unless you've been randomly saving on first one drive and then the other, C: should have the most recent versions of everything.

  12. Walk-ups in Smathers - We have had an incident with a student who was frustrated with trying to use the walkup Ethernet connections in Smathers. The particular technical problem isn't all that important (be advised that those ports work much better with an Ethernet card than they do with a modem). The main point here is that the Libraries do not provide support for those connections: people who have trouble need to go to CIRCA. We don't control any aspect of that network, and we certainly don't want to get mired in trying to figure out whatever strange combination of hardware and software that may be carried in.

  13. Picture.exe Virus - The word on PICTURE.EXE is that
    1) it does exist;
    2) it does perform more or less as advertised.
    When run, it makes a file called NOTE.EXE in your Windows subdirectory, and puts a line at the top of your computer's WIN.INI file ("run=note.exe"). It then creates (on subsequent reboots) files that are slightly coded lists of your text, html, and temporary internet files. Finally, it tries to email the collected lists to China. If it can find an AOL account and password on the machine, it sends that also.After PICTURE.EXE is executed, its icon becomes a blank, although Explorer can still display the file name in the Windows subdirectory window.
    This is not a new kind of virus. In a previous incarnation, it was called URLSnoop. The McAfee software will detect and remove it, although you can do the same thing by searching for and deleting the NOTE.EXE file. It would also be a good idea to remove the run=note.exe line from your WIN.INI file, although deleting NOTE.EXE is enough to kill the virus.
    Bottom line: although this one isn't particularly dangerous (we think), it is not a good idea to run software when you aren't sure of its sender or purpose, especially if it is unsolicited software that appears through the INTERNET. The next such program may eat the computer.

  14. VirusScan - We seem to be encountering more and more cases where macro viruses are being passed around in the Library. Much of this (maybe all of it) is due to older versions of the VirusScan software on different machines. The most common virus that we have seen is the WAZZU.X virus. The newest version of the McAfee software is 3.2, and it will definitely find and clean this virus. Please take some time to upgrade your users to this version of VirusScan. You can obtain the zipped installation file from CIRCA or at:
    Unzip and then Install the Setup file. It will probably tell you that it has to uninstall the previous version of the McAfee software. Go ahead and do that. Once the installation is complete, there will be a new icon (resembling a computer) in your system tray (usually the lower right-hand corner of the screen). Double-clicking on this icon will take you to the new VirusScan Console. The console gives you several common setups for running VirusScan. I recommend that you run the one that says "Scan All Drives". If any viruses are reported by the program, choose the option to CLEAN them (or DELETE).
    ***For the liaisons that don't have access to PKUNZIP or an equivalent program, there is a self-extracting zip file on the server in the same location. Its name is "v95i320l.exe" This program contains the zip file mentioned below plus the mechanism required to unpack it. To use it, create a new, empty folder on your machine (anywhere. the desktop would be fine since the folder is only temporary), and copy v95i320l.exe to the new folder. Double-click on this file and it will unzip itself into your folder. A status window may appear showing you what is happening. When the process is finished, close the status window, and then follow the instructions below starting with "Install the setup file."
    When the install is finished and you have rebooted your machine, you can throw away the temporary folder you created that contains the install files.

  15. Mail Filtering and Staff Machines - To set up the routing which enables the filtering, we had to make up two IP groups: one to be filtered, and one not. We added a second block of IP addresses (called private IP, since they can't be seen outside of the campus) to our existing IPs (called public, but note this doesn't mean public as in non-library, but rather public as in can be seen across the Internet). We made the private IP unfiltered and the public filtered. We could have done it the other way around, but the goal was to minimize the number of workstation changes required. If we had made the private IP filtered, almost all of our existing workstations would have needed to change their IPs. The way we did it, we only had to change the IPs on the few public email stations. However, this also meant that all of our private IP was filtered, which includes staff computers.
    There is one other complication: you can't have both filtered and unfiltered computers on the same circuit at the same time (this may change in the future, but it is a real constraint at the moment). This means that we couldn't just change staff workstations to private IP so they could go unfiltered without changing everyone else on your circuit. Again, this would mean a lot of workstation reconfiguration.
    The other side of the issue is need: when UF/the Libraries give away two different mail systems for staff use, why does anyone need to use commercial Web-based mail at work? None of the managers offered any reasons, and the filtering of everything in MSL doesn't seem to have caused any problems yet. Between the lack of known problems on the one hand, and the much greater ease of implementation on the other, filtering everything but the public email seems like the best way to go.

  16. Server Visibility - We are continuing to have problems making all of the servers visible to all workstations in the Network Neighborhoods. Here is a workaround that will provide equivalent access until the WINS failure is diagnosed:
    Make a new Shortcut on the Desktop: right-click/New/Shortcut. In the Command line space of the dialog box that appears, type \\X, where X is the name of the server you wish to access. For example, if you can't see SmathersNT2 in the Network Neighborhood, type \\smathersnt2 in the box. Click Next and Finish. An icon should appear on your desk that can be opened to the equivalent view of the Network Neighborhood object of the same name. Do this for as many servers as are needed. Microsoft has suggested several ways to fix things, none of which have worked. This has left them a bit confused, but they are still working on it.

  17. Passwords - We have another bunch of passwords expiring now, so here's a quick reminder about the arcane messages that Windows 95/NT generate as you make your changes. If you accept the invitation to change your NT password ("Your password expires in X days; do you want to change it now?"), you get a standard box for old/new/confirm. As soon as you fill these in and press the button, you will probably get an error message about how your Windows password is invalid. Ignore this until you finish the boot process (just press escape). When your desktop settles down, go to the Password Control Panel and use it to change you Windows password (not your password for Microsoft Networking, which is the other choice). I suggest that you change the Windows password to be the same as the new one you just entered for NT; this will keep the machine from asking you separately for the NT password and the Windows password every time you signon. If you don't change the Windows password, it will stay whatever it was before you changed the one for NT, and you'll need to enter it separately everytime you sign on.

  18. More on Passwords - Passwords on the Smathers NT server expire in 90 days. The first time you log on after it has expired, the server tells you and gives you the option to change it right then. Do so. Remember, the password must be at least 6 characters long and can not be one you have used before. Most people are able to change their password successfully, but some then get confused by a message that says their Windows password was not correct. They then think the change failed and try again, which of course fails because they now have a new password! After six such reattempts, the server thinks it is being hacked and locks them out. The correct thing to do if you get this Windows password failure message is just hit ESCape. Then try opening email (Inbox or Outlook). If you get in, then your NT server password has been successfully changed. Worry about your Windows password (if you want one) after your desktop comes up, using the password control panel. You can determine the difference in the dialog boxes by reading them: if the bottom has a line about Smatherslib it is for the NT server password. If the dialog box says Windows has failed, it has nothing to do with the NT server password.
    One final note: If you get a message saying your password has expired but you have some number of "courtesy logons" before you must change it, this is a completely different thing: that is the Novell server, which some people use to access the CD-ROM network.

  19. Setting Up Multiple MSE Mail Profiles
    A. Disabling Network Security
    1. Right click on the "Inbox" icon on the desktop. Click Properties button
    2. Microsoft Exchange will be selected. Click Show Profiles button
    3. Select the one that is the default. Click Properties button
    4. Click Advanced tab at top. If "Use network security when logging on" is checked, Uncheck it.
    5. Click OK buttons until you are back to the "Mail -- General" window that lists profiles.
    B. Creating a New Profile
    1. From the "Mail - General" window (see steps A.1-2 above) click Add button.
    2. Note that all services are checked. UNcheck all except "Microsoft Exchange" Click NEXT
    3. Fill in field labeled "Profile Name" with something meaningful, but short. Click NEXT
    4. Fill in field labeled "Server" with smathersnt2 Click NEXT
    5. Fill in box labeled "Mailbox" with the userid of the account to be accessed for mail. Click NEXT
    6. Leave "No" selected next to question "Do you travel with this computer?" Click NEXT
    7. Give the user a personal Addressbook by changing the word "mailbox" to the userid. Click NEXT
    8. Leave "Do not add." selected, unless you wish the user to have his own icon for mail on the computer's "Start" menu. Click NEXT
    9. DONE! Select Finish button
    10. With the name of the new profile selected, click Properties button.
    11. With "Microsoft Exchange" selected, click on Properites button.
    12. Click Check Name button and be sure it is underlined. If not, you have made an error in the userid.
    13. Click Advanced tab at top. If the "Use network security when logging on" is checked, Uncheck it.
    14. Keep clicking OK buttons until all windows are closed.

  20. Defective Zip Drives - After many thousands of complaints, Iomega has admitted to a problem known as the Click of Death, named for the clicking symptom of a miswrite and the harbinger of complete data loss on a Zip disk. An independent concerned soul, Steve Gibson, has developed a tiny freeware utility that tests your Zip Drive for this problem:
    David Hellier of Iomega agreed on ZDTV to REPLACE all defective Zip Drives, even if the drive's one-year warranty has expired. Iomega had earned a reputation for quality drives but apparently ran into problems after ramping up manufacturing to meet increased demand. That's one theory, anyway. Plan ahead for the test: Although Gibson's program is a snap to download (it's only about 64k), the test itself took 42 minutes on one liaison's drive.
    Another quick note on this: Another liaison had this exact problem with his Zip ATAPI drive at home. Supposedly, the problem arises when the head of the drive becomes misaligned and damages the first few tracks on a ZIP cartridge. As a results, the drive will make a "click, click, click" noise. Fortunately, the drive was under warranty, and he had the drive replaced. According to Iomega, most cartridges can be salvaged by running a simple reformat application found in the ZIP toolbox software. Of course, one should back-up any data beforehand. Out of the 10 ten cartridges he had been using with the drive, 2 needed to be replaced, which Iomega happily exchanged.

  21. NERDC Computer ID Note - Fall 1998 -
    There has been some confusion about what constitutes an ID/Password combination for accessing the Northeast Regional Data Center (NERDC, which serves as our campus computing center). This note will distinguish between NERDC services and NERDC IDs, and explain the relevance of all this for current Smathers Library functions. None of this discussion applies to ID/passwords used for accessing services outside of NERDC, such as local server passwords.
    NERDC offers several different computer software systems through their mainfame (IBM 9672) and Unix (IBM SP) computers. NERDC access security software maintains an ID/password combination for an individual user, which may then be authorized for one or more services. For example, this means that the same ID may be used for both Unix mail and mainframe Deans' Menu access if it is properly authorized. The authority to create IDs for a campus unit is usually delegated to a local unit manger. In the Smathers Libraries, this delegate is the Systems Department.
    Once the ID has been created, it must be authorized for each service it is to access. Some sevices can be assigned directly from Systems. Others may require one or more other units to approve service access. In some cases additional IDs may be required. The service which was most commonly used in the Libraries until recently was NERVM/CMS, which was the service under which our old mail system (Ricemail) ran. At one time, all Library staff had a NERDC ID, which was primarily used to signon to NERVM/CMS for mail. Another NERDC service used by all Library staff is the Customer Information Control Systems (CICS), which is the host system for the LUIS software managed by the Florida Center for Library Automation (FCLA). The access to CICS service for LUIS is controlled through IDs managed by FCLA. Library staff members perform non-public functions like circulation or cataloging with individual IDs obtained from FCLA; public LUIS users access the system through public terminals or hidden signon sequences that keep the FCLA-issued ID out of sight.
    Some Library staff have IDs for accessing a different CICS service called the Deans' Menu. This is a gateway service, that provides access to other individual services which are controlled by a variety of different campus units. Originally, these gateway IDs were identical to individual Social Security numbers, and were issued by Academic or Administrative Affairs. This has been changed: IDs for Deans' Menu access are now issued by Library Systems after a request has been made by Library Personnel (see below). Once access is granted to the Deans' Menu, individual services (such as UF property record information, the ACCESS personnel hiring system, grant accounting system, etc.) can be added to the individual menu that appears after a successful gateway signon. Each of these services requires getting permission to see/use it from the campus unit that controls its database. In the Libraries, permission to access Deans' Menu services is obtained through the Library Personnel Office, which both requests a general NERDC user ID from Library Systems and which also seeks the necessary permissions for each menu item. Old Social Security-based Deans' Menu IDs used in the Libraries are being cancelled and replaced by the Library-issued ID. If a member of Library staff already has a NERDC ID for some previous purpose (such as Ricemail), Deans' Menu access is added to it; otherwise, a new ID is generated.
    NERDC IDs that are issued by the Libraries are maintained by Library Systems. Systems can reset lost passwords or account lockouts, and Library Personnel can make modifications in access privileges. Systems can also initiate conversion from the old Social Security number-based IDs, or password resets for FCLA-managed LUIS IDs. In general, requests for new NERDC IDs should be directed to Library Personnel, and requests for assistance with existing IDs should be sent to Systems. Requests for staff FCLA LUIS IDs should be directed to the local department chair, who maintains a supply of IDs with permissions appropriate to department work. Department chairs who need additional FCLA LUIS IDs for distribution or who need to have ID permission modifications should contact Systems.

  22. Xerox Popup Problem on Public Work Stations
    Submitted by Marvin Crabb
    After start up two consecutive dialog boxes were displayed. The first, an Ipopup16.exe dialog box which stated "Cannot find the file ipopup16.exe, etc.". Clicked OK. The second, a Desktop dialog box which stated "Could not load or run ipopup16.exe specified in WIN.INI file, etc.". Clicked OK. No Print ID appeared on the Task Bar and Xerox printing was not possible.
    This file, ipopup16.exe, is in a folder named Popup98 that resides on the Xerox Server Smathers_PS. In checking the drives displayed in Explorer, the Smathers_PS was mapped to J:\ according to the desires of Xerox. But, in checking the contents of this drive through Explorer it was noted that the Popup98 folder was missing. This was not true for 66 nearby healthy computers.
    By going to the Network Neighborhood, right clicking on Smathers_PS and then clicking on "Who am I", it was found that this computer was logged into the Server Smathers_PS with the User Name "GUEST". The healthy computers were logged in as "COWS1".
    Eliminating passwords from the PWL file (GUEST was one) and the System.ini did not solve the problem. Going to Explorer | Tools and Disconnecting the Smathers_PS drive and reconnecting after a restart did not solve the problem.
    (1) Go to Start | Settings | Printers and delete the Xerox Printers.
    (2) Go to Explorer, highlight Smathers_PS drive (J:\), go to Tools on Menu and select Disconnect Network Drive.
    (3) Restart the computer making sure it is logged into Smathers.
    (4) Go to Explorer, go to Tools in Menu, Map Network Drive, Drive J:\, Path = \\Smathers_PS\Sys.
    (5) Restart the computer making sure it is logged into Smathers.
    (6) Reload the Printer driver and configure. This is another whole process. Dan Mason with Xerox can do this. Certain computer liaisons can also.
    (7) Go to the Network Neighborhood, right click on Smathers_PS and click on "Who am I". The computer should now be logged into Smathers_PS as "COWS1.
    (8) Restart the computer making sure it logs on to Smathers. The error dialog boxes should not display. The Print ID icon should appear on the Task Bar. Test it by sending a print to the printer. You should be prompted for a "Name". Your print job should be listed at the Print Release Station Computer and you should receive your print at the appropriate printer when you print your job.


University of Florida Home Page