Difference between revisions of "esesen"

From Cliquesoft
Jump to: navigation, search
Line 1: Line 1:
With all the daily activities that users have their computers go through, one could expect that over time the software on these devices usually becomes cluttered with unused and/or unwanted files and data as well as some kind of problem just waiting for the opportunity to halt your progress when you have to get something done yesterday!  And what is the normal fix?  Call your support staff and wait for them to work you into their schedule for the repairs.  What if there was a way for '''you''' to fix the problem easily?  Introducing Esesen.  This software can return your computer to a out-of-the-box state so that your productivity is as high as it was on the first day you started working on your computer!  Not to be confused with the Windows restore feature, this software replaces your entire system with one that you choose to restore instead of a couple of files that Windows restore will replace, but that often times does not actually resolve the problem and occasionally creates new problems.
+
With all the daily activities that users have their computers go through, one could expect that over time the software on these devices usually becomes cluttered with unused and/or unwanted files, settings, and data as well as some kind of problem just waiting for the opportunity to halt your progress when you have to get something done yesterday!  And what is the normal fix?  Call your support staff and wait for them to work you into their schedule for the repairs.  What if there was a way for <u>'''you'''</u> to fix the problem easily?  Introducing Esesen.  This software can return the device to an out-of-the-box state so that your productivity is as high as it was on the first day it was unpackaged!  Not to be confused with the Windows restore feature, this software replaces your entire system with one that you choose to restore instead of a couple of files that Windows restore will replace (but often times does not actually resolve the problem and occasionally creates new problems).
  
Administrators will enjoy the variety of configuration options that pertain to this software including local and/or remote storage of images, optional WAN connectivity, and the ability to schedule automated restores (in an upcoming version) to keep your network in a constant pristine state.  And for those admins that are familiar with ssh, this software provides a way to remotely gain access into a workable system to perform any detailed modifications to the device.
+
Administrators will enjoy the variety of configuration options that pertain to this software including local and/or remote storage of images, optional WAN connectivity, and the ability to schedule automated restores in order to keep your home or business network in a constantly pristine state.  And for those admins that are familiar with ssh, this software provides a way to remotely gain access into a workable system to perform any detailed modifications to the device that may be required.
  
  
 
==License==
 
==License==
 
This project's codebase is licensed under the CPLv2 unless a valid CPLv1 license has been purchased.  More information about both of these licenses can be found under the "[http://www.cliquesoft.org/index.php?page=our_licenses Our Licenses]" link of our [http://www.cliquesoft.org/ homepage].
 
This project's codebase is licensed under the CPLv2 unless a valid CPLv1 license has been purchased.  More information about both of these licenses can be found under the "[http://www.cliquesoft.org/index.php?page=our_licenses Our Licenses]" link of our [http://www.cliquesoft.org/ homepage].
 +
 +
 +
 +
 +
==Overview==
 +
Esesen was designed to keep a device working at its optimal performance at all times by ...  With the use of this software, you should end up with a self sustaining network (SSN)
 +
 +
good defense against malware as the device can be restored to complete working functionality within minutes - even if you were attacked by [https://en.wikipedia.org/wiki/Ransomware Ransomware] where your computers contents are completely encrypted by a malicious attacker.
 +
 +
===<u>Caveats</u>===
 +
As of the 2018.12.x.x version of the software, there are a couple of caveats that should be brought to your attention.
  
  
Line 11: Line 22:
  
 
==Installation==
 
==Installation==
Just like the rest of our software, we have engineered our installation process to be as simple as possible.  After downloading the desired version from [http://www.cliquesoft.org/#Projects our website], you can begin the installation process by following these steps:
+
Just like the rest of our software, we have engineered our installation process to be as simple as possible.  After downloading the desired version from [http://www.cliquesoft.org/#Projects our website], you can begin the installation process.  Currently this process only has a text-based installer, but we will be adding graphical capabilities in a future version.  Below we will cover the steps necessary to get the software installed.
 +
 
 +
===<u>File Types</u>===
 +
: Before we continue with the individual steps, it is important to define what the various file types are and the intended application for them.  Currently there are four different downloads that are available for this software with each containing advantages and disadvantages.
 +
 
 +
windows only (easy to get going [additional step to get into software and configure], no LSB, have to update the software and reimage)
 +
linux only
 +
generic/live (can do LSB, depending on install method you do not have to reimage upon updating)
 +
standalone application (just the shell script itself)
 +
 
 +
 
  
 
* '''Extract''' This step is accomplished by right-clicking the downloaded file (Esesen_x.x.x.x.x.zip) and selecting the "Select All..." menu option.  Clicking the "Extract" button on the follow-up prompt will extract the software into a folder name Esesen_x.x.x.x.x in your current location.
 
* '''Extract''' This step is accomplished by right-clicking the downloaded file (Esesen_x.x.x.x.x.zip) and selecting the "Select All..." menu option.  Clicking the "Extract" button on the follow-up prompt will extract the software into a folder name Esesen_x.x.x.x.x in your current location.

Revision as of 09:04, 15 December 2018

With all the daily activities that users have their computers go through, one could expect that over time the software on these devices usually becomes cluttered with unused and/or unwanted files, settings, and data as well as some kind of problem just waiting for the opportunity to halt your progress when you have to get something done yesterday! And what is the normal fix? Call your support staff and wait for them to work you into their schedule for the repairs. What if there was a way for you to fix the problem easily? Introducing Esesen. This software can return the device to an out-of-the-box state so that your productivity is as high as it was on the first day it was unpackaged! Not to be confused with the Windows restore feature, this software replaces your entire system with one that you choose to restore instead of a couple of files that Windows restore will replace (but often times does not actually resolve the problem and occasionally creates new problems).

Administrators will enjoy the variety of configuration options that pertain to this software including local and/or remote storage of images, optional WAN connectivity, and the ability to schedule automated restores in order to keep your home or business network in a constantly pristine state. And for those admins that are familiar with ssh, this software provides a way to remotely gain access into a workable system to perform any detailed modifications to the device that may be required.


License

This project's codebase is licensed under the CPLv2 unless a valid CPLv1 license has been purchased. More information about both of these licenses can be found under the "Our Licenses" link of our homepage.



Overview

Esesen was designed to keep a device working at its optimal performance at all times by ... With the use of this software, you should end up with a self sustaining network (SSN)

good defense against malware as the device can be restored to complete working functionality within minutes - even if you were attacked by Ransomware where your computers contents are completely encrypted by a malicious attacker.

Caveats

As of the 2018.12.x.x version of the software, there are a couple of caveats that should be brought to your attention.



Installation

Just like the rest of our software, we have engineered our installation process to be as simple as possible. After downloading the desired version from our website, you can begin the installation process. Currently this process only has a text-based installer, but we will be adding graphical capabilities in a future version. Below we will cover the steps necessary to get the software installed.

File Types

Before we continue with the individual steps, it is important to define what the various file types are and the intended application for them. Currently there are four different downloads that are available for this software with each containing advantages and disadvantages.

windows only (easy to get going [additional step to get into software and configure], no LSB, have to update the software and reimage) linux only generic/live (can do LSB, depending on install method you do not have to reimage upon updating) standalone application (just the shell script itself)


  • Extract This step is accomplished by right-clicking the downloaded file (Esesen_x.x.x.x.x.zip) and selecting the "Select All..." menu option. Clicking the "Extract" button on the follow-up prompt will extract the software into a folder name Esesen_x.x.x.x.x in your current location.
  • Install Double-clicking the 'install' file (or typing 'install.bat' and pressing the ENTER key at the command line) will show a popup with all the current processes taking place. Any final message other than "Esesen has been installed successfully! Press any key to continue . . .", indicates a failure and you will need to consult your support staff or visit our forums.

NOTES:

  • we are currently working on a graphical installer
  • the a default administrators password will be the word 'password' (without quotes)



Uninstallation

Hopefully your choice to uninstall the software isn't a permanent one, but in the event that you do need to perform this function, simply go into your 'Control Panel' and click the "Add/Remove Programs"/"Programs and Features" icon or the "Uninstall a program" link. This will bring up a screen showing all the currently installed software. Scroll through the list until you find the 'Esesen' entry and click it. You should then see an "Uninstall" or "Uninstall/Change" button in the window to which you should click. This will open another popup showing you all the uninstallation tasks taking place. For any final message other than "Esesen has been uninstalled successfully! Press any key to continue . . .", then you should contact your support staff or visit our forums.


Network Designs

If your office consist of a room in your house, or actually is an office but only houses a handful of employees, then most of the time any servers in use are mainly for authentication and file sharing. While it is irrelevant whether the server is configured as a domain controller (DC) or a simple workgroup server, we do recommend having the clients of the network NOT be connected to a domain. Currently there are instances after a restoration where the client will need to be dropped and then re-joined to the DC. Not only will this step be prevented if the clients are never joined to a domain, but in the event that the server has to be replaced, the clients do not have to go through the process of migrating to the new server.