Reference Guide
Page 4
... Corporation Lincolnshire, IL U.S.A. ii MK4000 MicroKiosk for equipment, circuits, and subsystems contained in Zebra products. The user agrees to maintain Zebra's copyright notice on the licensed programs delivered hereunder, and to include the same on a licensed basis. No part of this manual is granted, either expressly or by the user without written permission from...
... Corporation Lincolnshire, IL U.S.A. ii MK4000 MicroKiosk for equipment, circuits, and subsystems contained in Zebra products. The user agrees to maintain Zebra's copyright notice on the licensed programs delivered hereunder, and to include the same on a licensed basis. No part of this manual is granted, either expressly or by the user without written permission from...
Reference Guide
Page 37
... settings are saved in the configuration registry file (mkconfig.reg) in an XML file that occur when manually editing registry settings. The configurable options for the MK4000 are XML files that define the configurable parameters for a device. • Registry Configuration Service Provider XML... For information on a host computer and creates/edits an MK4000 configuration file (mkconfig.reg). SCM eliminates the potential user errors that is downloaded to the Microsoft Applications for Mobile and Win CE 5.0 User Guide. CHAPTER 3 CONFIGURATION Overview This chapter describes how to...
... settings are saved in the configuration registry file (mkconfig.reg) in an XML file that occur when manually editing registry settings. The configurable options for the MK4000 are XML files that define the configurable parameters for a device. • Registry Configuration Service Provider XML... For information on a host computer and creates/edits an MK4000 configuration file (mkconfig.reg). SCM eliminates the potential user errors that is downloaded to the Microsoft Applications for Mobile and Win CE 5.0 User Guide. CHAPTER 3 CONFIGURATION Overview This chapter describes how to...
Reference Guide
Page 72
To open the Find WLANs application, tap the Signal Strength icon - Manually enter valid ESSIDs not displayed in Table B-2 and Table B-3. • Network Type - See Figure B-4 on which the AP is an infrastructure network. The Find WLANs... NOTE Find WLAN display is encrypted and requires a password. Channel on page B-5. WLAN is transmitting. • Signal Strength - Type of the user and MK4000. WLAN is an Ad-Hoc network. B - 4 MK4000 MicroKiosk for CE .NET 5.0 Product Reference Guide Find WLANs Application Use the Find WLANs application to 32 ESSIDs/APs may be displayed.
To open the Find WLANs application, tap the Signal Strength icon - Manually enter valid ESSIDs not displayed in Table B-2 and Table B-3. • Network Type - See Figure B-4 on which the AP is an infrastructure network. The Find WLANs... NOTE Find WLAN display is encrypted and requires a password. Channel on page B-5. WLAN is transmitting. • Signal Strength - Type of the user and MK4000. WLAN is an Ad-Hoc network. B - 4 MK4000 MicroKiosk for CE .NET 5.0 Product Reference Guide Find WLANs Application Use the Find WLANs application to 32 ESSIDs/APs may be displayed.
Reference Guide
Page 78
... pass-phrase/hex key configuration. User input required with pass-phrase/hex key configuration. validating the server certificate is currently not supported. This type establishes a tunnel and, based on the network. B - 10 MK4000 MicroKiosk for encryption key. TTLS Select...ensure that only valid users and sometimes servers can , depending on the tunnel type, require a user certificate and the validation of tunnels, username/passwords, user certificates, server certificates, and Protected Access Credentials (PACs). Manual PAC provisioning is optional. No user input required for ...
... pass-phrase/hex key configuration. User input required with pass-phrase/hex key configuration. validating the server certificate is currently not supported. This type establishes a tunnel and, based on the network. B - 10 MK4000 MicroKiosk for encryption key. TTLS Select...ensure that only valid users and sometimes servers can , depending on the tunnel type, require a user certificate and the validation of tunnels, username/passwords, user certificates, server certificates, and Protected Access Credentials (PACs). Manual PAC provisioning is optional. No user input required for ...