Effect Of Downloads On Existing Files And Data - VeriFone VX 675 Reference Manual

Hide thumbs Also See for VX 675:
Table of Contents

Advertisement

Effect of
When downloading application files and data to a VX 675 terminal, an important
Downloads on
consideration is the effect of download procedure on existing application files, files
Existing Files
used in the file authentication process, and terminal configuration settings stored
and Data
in CONFIG.SYS files in the receiving terminal. Here are some important points:
NOTE
Always modify the Verix Terminal Manager password in a separate, securely-
controlled operation. Ensure that this password is retained in a secure place.
If a file already exists in the target file group, the existing file is replaced with
the new file of the same name. (Files in separate file groups can have identical
names.)
Always download executable files (and any other files to logically protect
under VeriShield file authentication) with the certificates and signature files
required to authenticate them.
In full or partial application downloads, all CONFIG.SYS records on the
receiving terminal, both protected and non-protected (that is, beginning with *
or #), are retained. New CONFIG.SYS variables included in the download
package, including the *GO variable, selectively replace existing variables with
the same key name in the CONFIG.SYS file of the target group.
All current passwords are retained on the receiving terminal during an
application or operating system download (direct and back-to-back). This
includes the Verix Terminal Manager password and file group passwords. If
required, you can replace existing file group passwords with new values as
part of the data transfer operation.
For back-to-back application downloads, it is recommended to clear the
memory of the receiving terminal before initiating the download. All application
files stored on the receiving terminal, including CONFIG.SYS settings, are
replaced by those of the sending terminal. Verix Terminal Manager and file
group passwords are retained on the receiving terminal.
For full operating system downloads, Group 1 I: drive is cleared as part of the
operation and any application files stored in GID1 are erased. In this case,
previously downloaded and authenticated applications must be downloaded in
a subsequent operation, together with the certificates and signature files
required to authenticate them.
P
ERFORMING

Effect of Downloads on Existing Files and Data

VX 675 R
EFERENCE
D
OWNLOADS
117
G
UIDE

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents