Thor VM2 with with Microsoft Windows Embedded CE 6.0 User Guide
165
This option allows the administrator to configure applications that consume system
resources to be terminated if an error condition occurs or at the end-user’s request.
Error conditions may generate a topmost popup requiring an end-user response, mem-
ory resource issues requiring an end-user response, etc. Also at the administrator’s dis-
cretion, these types of applications can be started manually (see Manual [Launch]) by
the end-user.
End User Internet Explorer (EUIE)
AppLock supports applications that utilize Internet Explorer, such as .HTML pages and
JAVA applications. The end user can run an application by entering the application
name and path in Internet Explorer’s address bar.
To prevent the end user from executing an application using this method, the address
bar and Options settings dialog are restricted in Internet Explorer. This is accomplished
by creating an Internet Explorer that is used in end user mode: End-user Internet
Explorer (EUIE.EXE). The EUIE executes the Internet Explorer application in full screen
mode which removes the address bar and status bar. The Options Dialog is also
removed so the end user cannot re-enable the address bar.
The administrator specifies the EUIE by checking the Internet checkbox in the Applica-
tion tab of the Administrator applet. The Internet application should then be entered in
the Application text box.
When the Internet checkbox is enabled, the Menu and Status check boxes are available.
Enabling the Menu checkbox displays the EUIE menu which contains navigation func-
tions like Back, Forward, Home, Refresh, etc., functions that are familiar to most Internet
Explorer users. When the Menu checkbox is blank, the EUIE menu is not displayed and
Navigation functions are unavailable.
When the Status checkbox is enabled, the status bar displayed by EUIE gives feedback
to the end-user when they are navigating the Internet.
If the standard Internet Explorer that is shipped with the mobile device is desired, it
should be treated like any other application. This means that IEXPLORER.EXE should
be specified in the Application text box and the Internet application should be entered
in the command line. In this case, do not check the Internet checkbox.
Security
Summary of Contents for Thor VM2
Page 1: ...User Guide Thor VM2 Vehicle Mounted Computer with Microsoft Windows Embedded CE 6 0 ...
Page 16: ...4 Thor VM2 with with Microsoft Windows Embedded CE 6 0 User Guide ...
Page 63: ...Thor VM2 with with Microsoft Windows Embedded CE 6 0 User Guide 51 ...
Page 64: ...52 Thor VM2 with with Microsoft Windows Embedded CE 6 0 User Guide ...
Page 288: ...276 Thor VM2 with with Microsoft Windows Embedded CE 6 0 User Guide ...
Page 310: ...298 Thor VM2 with with Microsoft Windows Embedded CE 6 0 User Guide ...
Page 352: ...340 Thor VM2 with with Microsoft Windows Embedded CE 6 0 User Guide ...
Page 385: ...Thor VM2 with with Microsoft Windows Embedded CE 6 0 User Guide 373 Hat Encoding ...
Page 398: ... Honeywell 9680 Old Bailes Road Fort Mill SC 29707 www honeywellaidc com VM2 CE UG Rev D 9 17 ...