www.superitysoft.co.uk                                            Navigate

Installing The Software

The first thing to do is to download the latest release of the software. You can download the software once you have created an account and logged in. Please visit the download area.

The next thing that needs to be done is to prepare the target computer for installation. First of all log in to the target computer as an administrator. If you are running under windows vista or windows 7 you might want to turn off the UAC ( user account control ) during the installation process as it can be very annoying. Once you have finished installing software don’t forget to turn the UAC back on.

 

First of all create a restore point! If everything goes wrong then you can put it right by being able to restore your computer to an earlier time.

    If you are planning to deploy a lot of devices, there is a considerable overhead in time in installing software and configuring each installation. The best thing to do in these situations is to create an new installation from scratch, don’t register any software until the machine is configured and then use a drive cloning software and hardware to create copies of the machines hard disk. When you want to make a new machine all you have to the do is create a copy of the drive, and then apply fresh licences to any installed software ( esp windows ).

 

For all computers I would alter the way windows downloads and installs automatic updates. I would set automatic updates to notify the user of any pending updates, but not to download and install them. This is because we don’t want to risk downloading huge amounts of data over a 3G connection without permission. Don’t download windows updates over a 3G connection, wait until the machine is connected to a hardwired network before granting permission to windows to do this.

 

If you are planning on using the modem to create a native windows internet connection you will have to make sure that all the usual security precautions have been taken to help make your machine secure from attack on the internet.

 

Next make sure you have installed some personal firewall software. Windows 7 and windows vista have a built in firewall, but you might find it more manageable to use an additional 3rd party firewall.

 

For windows XP I use Sunbelt personal firewall however this is quite a complicated piece of software, but when it blocks a request it generally brings up a count down timer, that defaults to block after 30 seconds this can be very useful.

 

For Vista and Windows 7 Firewall control this is a very simple, but effective firewall, there is also a free edition.

 

All personal firewalls require training and configuring - you should open ports 20510 - 20520 for local LAN access IP address ranges 192.168.1.xxx, you will also want to enable ports for the loop back adapter 127.0.0.1

 

Don’t forget to re-enable the UAC before you do this on Vista and Windows 7.

 

You will also need to make sure you have installed some anti virus software - AVG Free is my personal favourite as it seems to run very quickly.

 

There is another useful program which can monitor the amount of traffic your machine might be sending to and from the internet is DU Meter DU meter can be setup to send an email when you are likely to exceed a specified limit. Note DU meter can only monitor native windows connections. In the future I am planning on adding this capability into the Ezee3G software.

 

You can install other anti-virus software, but you must take into consideration whether the software user interface will stop an unattended computer in its tracks.

 

After you have installed firewall software and anti-virus software you computer is ready to connect to the internet. Initially connect the machine to the internet using a wired broadband connection. Apply all windows updates and anti-virus updates to the machine.

 

You should now install the Ezee3G software. Instructions for the actual installation and configuration of the Ezee3G software can be found in the users area on the secure web site.