Android Security for Enterprise App Developers Jon Preedy

Size: px
Start display at page:

Download "Android Security for Enterprise App Developers Jon Preedy"

Transcription

1 Android Security for Enterprise App Developers Jon Preedy Sr. Sales Engineer

2 Agenda for Lightning Talk Developer View Android Security Model Security and Enterprise-Scale Device Configuration Encryption Options for Data-at-Rest Enterprise Reset: Return to Known Good State

3 Application Sandboxing Sandbox Setup (at install time) As each new App is installed from an APK it gets assigned a new, automatically generated UID and a folder is created in /data, the files from the APK are unpacked there. This folder is Owned by that UID With closed file permissions So only processes owned by the application s UID can access files in the application s private folder in /data

4 Sandboxing Continued Launching an App in a Sandbox The master Dalvik process, zygote *, creates a new Dalvik Instance in a new Process.. Loads the app into the DVM within the new Process, and Sets the Owner of the Process to the UID associated with the App Note: this is a fast, efficient process. Read more at: So now the App is running as a process owned by it s own UID, so it (and only it) has complete access within it s private folder! * - from biology: the first cell of a multi-celled animal

5 Sandbox = Isolation Bottom line whenever it runs, each App gets An inviolate memory space for execution Access to its own, inviolate storage area for files and folders Access to public storage, like /scard and /enterprise/usr This protection / isolation is provided by the Linux Kernel and File Sytem Memory isolation is provided by the Process boundary, not the Virtual Machine boundary File storage isolation is provided by file permissions and ownership, which must match the process owner.

6 the Android Permissions System NOT Linux/Unix unique to Android Google defines permissions in groups the groups are evolving Developers can create their own custom permissions groups (and we do) When an app is installed by a user, Android lists all the permissions groups it is requesting. it s grant all or don t install * * changing

7 Permissions Introduction Apps can only communicate via Components Any component can be assigned a permission label Others will need that permission to access this component Same for certain OS components and API calls to them (Phone, WLAN ) Each application explicitly requests permissions via manifest Cannot be changed after install Allows very granular control Only some of it exposed to user List of all Android permissions: rmission.html New custom permissions can be defined. Potential for Enterprise use (software suites, management)

8 List of Permissions Permissions defined on a device will depend on.. Version of Android Apps Installed Let s look at a listing from an empty MC40, output by adb shell pm list permissions g

9 Levels of Permissions Permissions must belong to one of the Protection Levels Normal (default) Lower-risk permission that gives requesting applications access to isolated application-level features, with minimal risk to other applications, the system, or the user. Granted automatically w/o explicit user's approval (still displayed during installation, of course). Dangerous (introduces potential risk) A higher-risk permission that would give a requesting application access to private user data or control over the device that can negatively impact the user. Not granted automatically. Will require some form of user consent (popup dialog, etc). Signature Granted only if the requesting application is signed with the same certificate as the application that declared the permission. Then granted automatically. Useful for software suites (several apps from the same developer working together). SignatureOrSystem As before, but also allow access to apps that are part of the system image Many OS APIs are protected with this reason for MDM not working unless agent is part of the firmware (or MDM certificate is part of firmware) ADB shell: pm list permissions -f display permissions with full information pm list permissions -g display permissions in groups :0)

10 Android Security and Enterprise Device Configuration

11 The Settings App OK for One Device, but.. There is a Settings app, for configuring the device but.. and it does not lend itself to manual, identical configuration of multiple devices It allows the end user too much control over settings for enterprise deployments It does not allow configuration of Zebra Value Add features Settings made with the Settings App do NOT persist over Enterprise Reset Your app may need certain Settings in order to work well or your customer may ask for some tweaks to device behavior Your app(s) may be unable to get the permission needed

12 Controlled Access to Settings Access to Settings is Controlled by Android Permissions Some settings, an ordinary app can reach, it it asks for and is granted WRITE_SETTINGS For some settings, permission is only granted to Privileged Applications (aka signed or system apps) that ask for WRITE_SECURE_SETTINGS Then of course, if you want to be able to return a unit to a known good condition, those apps must persist across an Enterprise Reset, and Must persist their data reapply the settings after Enterprise Reset

13 Remember This? Permissions must belong to one of the Protection Levels Normal (default) Lower-risk permission that gives requesting applications access to isolated application-level features, with minimal risk to other applications, the system, or the user. Granted automatically w/o explicit user's approval (still displayed during installation, of course). Dangerous (introduces potential risk) A higher-risk permission that would give a requesting application access to private user data or control over the device that can negatively impact the user. Not granted automatically. Will require some form of user consent (popup dialog, etc). Signature Granted only if the requesting application is signed with the same certificate as the application that declared the permission. Then granted automatically. Useful for software suites (several apps from the same developer working together). SignatureOrSystem As before, but also allow access to apps that are part of the system image Many OS APIs are protected with this reason for MDM not working unless agent is part of the firmware (or MDM certificate is part of firmware)

14

15 Application Access to Device Settings

16 Data at Rest Encryption Options

17 Encryption Options Encryption How does it work? What does it protect against it? Is it worth the trouble? Three kinds Full Device Encryption (only encrypts /data) External Storage Encryption (only encrypt /sdcard) Folder Level Encryption (one or more folders)

18 Encrypt Full Device Well not full device, really only encrypts /data Requires entry of passcode on bootup to unlock. Key stored in system (needs passcode on boot) Protects /data until passode is entered After that, transparent access for any running app.. Like it s not even there!! No protection against any process running on the machine So what does it protect against? Forensic analysis of device chips Process that might run before /data is unlocked.

19 Encrypt External Storage External Storage Volumes only Reformat from FAT32 to IM-CRYPT Key not stored on card Automatically reconnected (opened) on boot After that, transparent access for any running app.. Like it s not even there!! No protection against any process running on the machine If you move the SD card to another device Secure File System Must know that password

20 Encrypt Folder(s) - Zebra MX Feature Choose folder(s) to encrypt with named passcodes Internal or External storage Transparent, normal access when open Opened at boot with no user interaction, if passcode is available.. But.. Using MX an admin can revoke a passcode blocks any access by any internal application Protects folders against forensic analysis and on removable drives Data stays on device, but encrypted (no key on device) And later restore a passcode for one or more folders Restores no-hassle access again - no need to reload data

21 Encryption & Recovery Mode yes, you CAN have too much encryption Can Recovery Mode Read.zip from /data/tmp.. and write to system partitions.. if Full Device Encryption is enabled? Read.zip from /sdcard.. and write to system partitions.. if External Storage Encryption is enabled? Read.zip from /sdcard.. and write to system partitions.. if Folder Level Encryption is enabled on one or more folders on the sdcard? If you encrypt both full device and all external storage.. There will be no place to put a.zip file that can be used in Recovery mode so no possibility of remote OS update. Using MX folder level encryption may provide enough encryption and still leave space for OS update zips.

22 Encryption Summary - 3 kinds of Encryption Full Device Encryption (only encrypts /data) High cost (enter passode, no zips in /data/tmp), limited protection External Storage Encryption (only encrypt /sdcard) Medium cost (no zips on sdcard), protects storage when removed Folder Level Encryption (one or more folders) -- Zebra MX feature Low cost, protects the parts you want to protect, switch access on and off Internal Storage revocation provides the only protection against internal attack External storage also protects when removed Folder encryption protects against forensic analysis when revoked, and protects folders on removable external storage volume

23 Enterprise Reset: Return to Known Good State

24 Enterprise Reset the Concept Cold boot in Windows CE and Clean Boot in WM were what we now call.. Enterprise Resets Return unit to known good state, Possibly at the expense of losing some app data Apps CAN but don t have to store their data in a persistent location The idea being, of course.. Delete any changes made since original setup to apps or settings Exception for properly persisted data Restart Clean Restart empty and put back what you put in, in the first place But in CE / WM, any process could modify \Application Add apps or.reg files that would persist over Clean/Cold boot Remove apps or.reg files that should persist Copy anything (like WLAN settings in.reg files)

25 Enterprise Reset in Android So what happens at Enterprise Reset? /data is cleared all applications and their sandboxes are GONE All the UID s that were created by installing APKs are GONE All Settings revert to Factory Defaults External storage volumes are are not affected unless emulated from /data File and folders under /enterprise/usr are still there, data intact so as long as they were written with permissions wide open as recommended they can be still be accessed by your app after it s UID has changed.. because As device boots up from Enterprise Reset Properly persisted SETTINGS are re-applied. Properly persisted APKs are re-installed Each gets a NEW UID assigned and a NEW private folder created in /data, belonging to the new UID Each new app may need to access data it stored previously in /enterprise/usr

26 Programming for Enterprise Reset Persistence Protect any files which may lose content if your app is re-installed Identify which files that need to persist over the ER Have your app put them in a location that will persist over ER (put then in a subfolder of /enterprise/usr) Be sure you will be able to regain access when your Linux UserID has changed ( always set permissions to 777) Be sure your app will not write over them on install or first run. Use EMDK and MX Persist Manager to restore your app Add yourself to the list of applications that will be re-installed after an Enterprise Reset If your app needs to be always-running, add yourself to list of apps to be launched automatically.

27 Questions?

28 THANK YOU

Developing for MSI Android Devices

Developing for MSI Android Devices Android Application Development Enterprise Features October 2013 Developing for MSI Android Devices Majority is the same as developing for any Android device Fully compatible with Android SDK We test using

More information

Windows 8 Backup, Restore & Recovery By John Allen

Windows 8 Backup, Restore & Recovery By John Allen Windows 8 Backup, Restore & Recovery By John Allen Restore and recovery options for Windows 8 are different to earlier versions of Windows, and, of course, the terminology has changed. These are a lot

More information

Windows 7 Hard Disk Recovery

Windows 7 Hard Disk Recovery In order to restore your hard drive back to the original factory settings you will need to do the following: 1) Press the start button and in the search area type Recovery 2) From the search results, launch

More information

Using Mac OS X 10.7 Filevault with Centrify DirectControl

Using Mac OS X 10.7 Filevault with Centrify DirectControl Using Mac OS X 10.7 Filevault with Centrify DirectControl August 2011, Revision 2 OS X 10.7's Filevault has the ability to encrypt the entire disk. Full Disk Encryption is compatible with Centrify Active

More information

Cautions When Using BitLocker Drive Encryption on PRIMERGY

Cautions When Using BitLocker Drive Encryption on PRIMERGY Cautions When Using BitLocker Drive Encryption on PRIMERGY July 2008 Fujitsu Limited Table of Contents Preface...3 1 Recovery mode...4 2 Changes in hardware configurations...5 3 Prior to hardware maintenance

More information

Running a Program on an AVD

Running a Program on an AVD Running a Program on an AVD Now that you have a project that builds an application, and an AVD with a system image compatible with the application s build target and API level requirements, you can run

More information

How to downgrade Samsung Galaxy Tab 2 back to original V4.1.1 Android OS

How to downgrade Samsung Galaxy Tab 2 back to original V4.1.1 Android OS How to downgrade Samsung Galaxy Tab 2 back to original V4.1.1 Android OS Important information: This procedure restores the Samsung Galaxy tablet, used with the 1750 Fluke Power Recorder product back to

More information

Super Manager User Manual. English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net

Super Manager User Manual. English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net Super Manager User Manual English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net How to launch Super Manager? Click the Super Manager in Launcher or add a widget into your Launcher (Home

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly

More information

ViPNet ThinClient 3.3. Quick Start

ViPNet ThinClient 3.3. Quick Start ViPNet ThinClient 3.3 Quick Start 1991 2014 Infotecs Americas. All rights reserved. Version: 00060-07 34 02 ENU This document is included in the software distribution kit and is subject to the same terms

More information

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management

More information

Analysis of advanced issues in mobile security in android operating system

Analysis of advanced issues in mobile security in android operating system Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of

More information

How to Install Applications (APK Files) on Your Android Phone

How to Install Applications (APK Files) on Your Android Phone How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android

More information

SysAid MDM User Guide for Android

SysAid MDM User Guide for Android SysAid MDM User Guide for Android Table of Contents Introduction Enrolling Your Android Mobile Device in SysAid MDM Unenrolling Your Android Mobile Device from SysAid MDM Have Any Questions? Introduction

More information

SwannEye HD Security Camera Wi-Fi Connections Quick Setup Guide. Welcome! Lets get started.

SwannEye HD Security Camera Wi-Fi Connections Quick Setup Guide. Welcome! Lets get started. EN SwannEye HD Security Camera Wi-Fi Connections Quick Setup Guide Welcome! Lets get started. 1 1 Introduction 1 2 3 4 Congratulations on your purchase of this SwannEye HD Wi-Fi Security Camera from Swann!

More information

Using your ios device, open the App Store, Search for, download and install the WeMo App.

Using your ios device, open the App Store, Search for, download and install the WeMo App. Setting up WeMo is incredibly simple. All you need is: Your WeMo Switch and WeMo Motion An appliance you'd like to control iphone, ipod Touch or ipad Wi-Fi Router Using your ios device, open the App Store,

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend

More information

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting

More information

Prof. Christos Xenakis, Dr. Christoforos Ntantogian Department of Digital Systems University of Piraeus, Greece

Prof. Christos Xenakis, Dr. Christoforos Ntantogian Department of Digital Systems University of Piraeus, Greece Prof. Christos Xenakis, Dr. Christoforos Ntantogian Department of Digital Systems University of Piraeus, Greece University of Piraeus, Greece Department of Digital Systems System Security Laboratory founded

More information

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The 1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...

More information

Samsung Drive Manager User Manual

Samsung Drive Manager User Manual Samsung Drive Manager User Manual The contents of this manual are subject to change without notice. Companies, names and data used in examples are not actual companies, names or data unless otherwise noted.

More information

IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)

IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) User s Reference Guide Internal IBM Use Only This document only applies to the software version listed above and information provided may not

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

SAS-IPCAM115 MANUAL IP CAMERA

SAS-IPCAM115 MANUAL IP CAMERA SAS-IPCAM115 MANUAL IP CAMERA Table of contents Introduction: Safety precautions: Packaging content: System requirements: Product description: User instructions: Maintenance: Warranty: Disclaimer: Disposal:

More information

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7 Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3

More information

Integrating Mac OS X 10.6 with Active Directory. 1 April 2010

Integrating Mac OS X 10.6 with Active Directory. 1 April 2010 Integrating Mac OS X 10.6 with Active Directory 1 April 2010 Introduction Apple Macintosh Computers running Mac OS X 10.6 can be integrated with the Boston University Active Directory to allow use of Active

More information

Hosting Users Guide 2011

Hosting Users Guide 2011 Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Share Drive Frequently Asked Questions Table of Contents How do I change my password?... How do I reset my password if I forgot it?... How do I share files/folders with Groups

More information

VMware/Hyper-V Backup Plug-in User Guide

VMware/Hyper-V Backup Plug-in User Guide VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

HP ProtectTools Embedded Security Guide

HP ProtectTools Embedded Security Guide HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded

More information

ReadyNAS OS 6 Desktop Storage Systems

ReadyNAS OS 6 Desktop Storage Systems ReadyNAS OS 6 Desktop Storage Systems Hardware Manual Models: ReadyNAS 102 ReadyNAS 104 ReadyNAS 312 ReadyNAS 314 ReadyNAS 316 ReadyNAS 516 ReadyNAS 716X EDA 500 October 2013 202-11206-04 350 East Plumeria

More information

4 Backing Up and Restoring System Software

4 Backing Up and Restoring System Software 4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring

More information

Administrator User Instructions- Master PIN Usage

Administrator User Instructions- Master PIN Usage Administrator User Instructions- Master PIN Usage LOK-IT USB Drives are supplied by the University as a method to safely transport data. They are not intended to be used for primary data storage. The LOK-IT

More information

Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold

Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold Android Security Device Management and Security by Stephan Linzner & Benjamin Reimold Introducing Stephan Linzner Benjamin Reimold Consultant, Software Engineer Mobile Developer Founder of Stuttgart GTUG

More information

ReadyNAS OS 6.1 Software Manual

ReadyNAS OS 6.1 Software Manual Software Manual Models: ReadyNAS 102 ReadyNAS 104 ReadyNAS 312 ReadyNAS 314 ReadyNAS 316 ReadyNAS 516 ReadyNAS 2120 ReadyNAS 3220 ReadyNAS 4220 EDA 500 September 2013 202-11207-04 350 East Plumeria Drive

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for

More information

Mobile Pay. for Android TM. *Android Version 4.0 or higher required

Mobile Pay. for Android TM. *Android Version 4.0 or higher required Mobile Pay TM for Android TM *Android Version 4.0 or higher required 2014 First Data Corporation. All Rights Reserved. All trademarks, service marks and trade names referenced in this material are the

More information

Android Programming and Security

Android Programming and Security Android Programming and Security Dependable and Secure Systems Andrea Saracino andrea.saracino@iet.unipi.it Outlook (1) The Android Open Source Project Philosophy Players Outlook (2) Part I: Android System

More information

Lab 2-2: Exploring Threads

Lab 2-2: Exploring Threads Lab 2-2: Exploring Threads Objectives Prerequisites After completing this lab, you will be able to: Add profiling support to a Windows CE OS Design Locate files associated with Windows CE profiling Operate

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Using GIGABYTE Notebook for the First Time

Using GIGABYTE Notebook for the First Time P34 V6.0 Congratulations on your purchase of the GIGABYTE Notebook. This manual will help you to get started with setting up your notebook. The final product configuration depends on the model at the point

More information

Acer erecovery Management

Acer erecovery Management Acer erecovery Management The Acer erecovery Management provides fast, reliable and safe method of restoring your computer to its factory default settings or user-defined system configuration from an image

More information

Office of Information Technology Connecting to Microsoft Exchange User Guide

Office of Information Technology Connecting to Microsoft Exchange User Guide OVERVIEW The Office of Information Technology is migrating its messaging infrastructure from Microsoft Exchange 2003 to Microsoft Exchange 2010. Moving to the latest technology will provide many enhancements

More information

Operating Systems: Microsoft Windows XP, Windows Vista or Windows 7 RAM: 2GB

Operating Systems: Microsoft Windows XP, Windows Vista or Windows 7 RAM: 2GB MRS Absolute security minimum System Requirements Operating Systems: Microsoft Windows XP, Windows Vista or Windows 7 RAM: 2GB Hard Drive: 1 primary partition for O/S and applications. (C:) 1 primary partition

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

Remote Desktop Services User's Guide

Remote Desktop Services User's Guide Contents Remote Desktop Services Document Revision Control Revision Description Author DATE 1.0 Initial Release Karen M. Hess 3/24/2015 1.1 Added section for viewing mapped drives Karen M. Hess 4/15/2015

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide for Use With Your FreeAgent Drive 1

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide for Use With Your FreeAgent Drive 1 Seagate Manager User Guide For Use With Your FreeAgent TM Drive Seagate Manager User Guide for Use With Your FreeAgent Drive 1 Seagate Manager User Guide for Use With Your FreeAgent Drive Revision 1 2008

More information

Operating Instructions - Recovery, Backup and Troubleshooting Guide

Operating Instructions - Recovery, Backup and Troubleshooting Guide Personal Computer Operating Instructions - Recovery, Backup and Troubleshooting Guide Please create your recovery discs immediately after setup. Please read this manual carefully before using your product.

More information

MANUAL IP Baby and Child Monitor

MANUAL IP Baby and Child Monitor KN-BM60 MANUAL IP Baby and Child Monitor Table of contents Introduction 2 Safety precautions 2 Packaging content 2 System requirements 2 Product description 3 User instructions 3 Maintenance 23 Warranty

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Comodo Disk Encryption

Comodo Disk Encryption Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3

More information

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

How To Install An Aneka Cloud On A Windows 7 Computer (For Free) MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

GCM for Android Setup Guide

GCM for Android Setup Guide GCM for Android Setup Guide This guide provides information on...... Prerequisites for using Google Cloud Messaging service... Instructions for setting up GCM service via the Google API console... Configuring

More information

Automation Engine 14.1. AE Server management

Automation Engine 14.1. AE Server management 14.1 AE Server management 06-2015 Contents 1. The Server Web Page... 3 2. Status Overview...4 2.1 FAQs on Restarting and Reactivating the Server...5 3. Server Activity... 6 4. Server Setup... 7 4.1 Server

More information

Salesforce-Wrike Integration Setup Manual

Salesforce-Wrike Integration Setup Manual Salesforce-Wrike Integration Setup Manual This document has been designed for Salesforce administrators. It will guide you through the setup process for the integration between your Salesforce instance

More information

IceWarp to IceWarp Server Migration

IceWarp to IceWarp Server Migration IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone

More information

Offsite Control - Android Quick Start Guide

Offsite Control - Android Quick Start Guide - Android Quick Start Guide Configuring the URC Mobile app is simple. Follow the instructions below to ensure that the app is configured properly to control the system from within (local) the LAN and from

More information

NHSmail mobile configuration guide Android mobile devices

NHSmail mobile configuration guide Android mobile devices NHSmail mobile configuration guide Android mobile devices Version: V.6 Date: September 2011 THIS INFORMATION IS FOR NHS STAFF AND IS NOT TO BE DISTRIBUTED OR COPIED OUTSIDE OF THE NHS Version 6.0 Crown

More information

FileMaker Server 15. Getting Started Guide

FileMaker Server 15. Getting Started Guide FileMaker Server 15 Getting Started Guide 2007 2016 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks

More information

Silk Test 17.0. Testing Mobile Applications

Silk Test 17.0. Testing Mobile Applications Silk Test 17.0 Testing Mobile Applications Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 1992-2016. All rights reserved. MICRO

More information

How to enable Disk Encryption on a laptop

How to enable Disk Encryption on a laptop How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data

More information

Using GIGABYTE Notebook for the First Time

Using GIGABYTE Notebook for the First Time Congratulations on your purchase of the GIGABYTE Notebook. This manual will help you to get started with setting up your notebook. The final product configuration depends on the model at the point of your

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%

More information

Kingston KC300 Security Toolbox

Kingston KC300 Security Toolbox Intended for: SKC300S37A/60G SKC300S37A/120G SKC300S37A/180G SKC300S37A/240G SKC300S37A/480G Firmware Rev. 600ABBF0 The PSID Revert and the Enable/Disable IEEE1667 (or Microsoft edrive) operations described

More information

Apple Server Diagnostics User Guide. For Version 3X106

Apple Server Diagnostics User Guide. For Version 3X106 Apple Server Diagnostics User Guide For Version 3X106 KKApple Inc. 2009 Apple Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written

More information

Android Environment SDK

Android Environment SDK Part 2-a Android Environment SDK Victor Matos Cleveland State University Notes are based on: Android Developers http://developer.android.com/index.html 1 2A. Android Environment: Eclipse & ADT The Android

More information

VPN: Virtual Private Network Setup Instructions

VPN: Virtual Private Network Setup Instructions VPN: Virtual Private Network Setup Instructions Virtual Private Network (VPN): For e-journals and web-based databases, plus applications like EndNote's Online Search (formerly "Connect") and business systems.

More information

Acer erecovery Management

Acer erecovery Management 1 Acer erecovery Management Acer erecovery Management provides a fast and reliable method to restore your computer to its factory default settings or user-defined system configuration, from images stored

More information

Using GIGABYTE Notebook for the First Time

Using GIGABYTE Notebook for the First Time Congratulations on your purchase of the GIGABYTE Notebook. This manual will help you to get started with setting up your notebook. The final product configuration depends on the model at the point of your

More information

User Guide Vodafone Pocket WiFi Pro. Designed by Vodafone

User Guide Vodafone Pocket WiFi Pro. Designed by Vodafone User Guide Vodafone Pocket WiFi Pro Designed by Vodafone Welcome to the world of mobile communications 1 Welcome 2 Device overview 3 Getting started: setup 4 Getting started: use 5 Pocket WiFi online dashboard

More information

User Manual. Copyright Rogev LTD

User Manual. Copyright Rogev LTD User Manual Copyright Rogev LTD Introduction Thank you for choosing FIXER1. This User's Guide is provided to you to familiar yourself with the program. You can find a complete list of all the program's

More information

Image Backup and Recovery Procedures

Image Backup and Recovery Procedures Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Using GIGABYTE Notebook for the First Time

Using GIGABYTE Notebook for the First Time Congratulations on your purchase of the GIGABYTE Notebook. This manual will help you to get started with setting up your notebook. The final product configuration depends on the model at the point of your

More information

Recover Data Like a Forensics Expert Using an Ubuntu Live CD

Recover Data Like a Forensics Expert Using an Ubuntu Live CD Recover Data Like a Forensics Expert Using an Ubuntu Live CD There are lots of utilities to recover deleted files, but what if you can t boot up your computer, or the whole drive has been formatted? We

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

Hi-Speed USB Flash Disk User s Manual Guide

Hi-Speed USB Flash Disk User s Manual Guide Hi-Speed USB Flash Disk User s Manual Guide System Requirements Windows 98, ME, 2000, XP, Mac OS 10.1, Linux 2.4 or above AMD or Intel Pentium 133MHz or better based computer USB 1.1, USB 2.0 or higher

More information

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are

More information

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12 USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...

More information

Installing Windows XP Professional

Installing Windows XP Professional CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows

More information

To use your Brother machine in an ad hoc network, complete the steps listed below:

To use your Brother machine in an ad hoc network, complete the steps listed below: Description of Problem 100000028554 How do I join the Brother machine to an Adhoc Wireless Network? Description of Solution 200000036605 An Ad-hoc network allows each wireless device to communicate directly

More information

NetSuite OpenAir Mobile for Android User Guide Version 1.3

NetSuite OpenAir Mobile for Android User Guide Version 1.3 NetSuite OpenAir Mobile for Android User Guide Version 3 General Notices Attributions NetSuite OpenAir includes functionality provided by HighCharts JS software, which is owned by and licensed through

More information

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Overview. Timeline Cloud Features and Technology

Overview. Timeline Cloud Features and Technology Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

More information

Hardware Information Managing your server, adapters, and devices ESCALA POWER5 REFERENCE 86 A1 00EW 00

Hardware Information Managing your server, adapters, and devices ESCALA POWER5 REFERENCE 86 A1 00EW 00 86 A1 00EW 00 86 A1 00EW 00 Table of Contents Managing your server, adapters, and devices...1 Managing your server using the Hardware Management Console...1 What's new...1 Printable PDFs...2 HMC concepts

More information

Introducing Windows 8

Introducing Windows 8 Introducing Windows 8 Introduction Very Aggressive Change Building block for the future and future of devices Biggest Obstacle: Where is!?!? The New User Experience Start Screen Full screen Start Menu

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

Thank you for choosing Huwei E589 4G Mobile WiFi

Thank you for choosing Huwei E589 4G Mobile WiFi Thank you for choosing Huwei E589 4G Mobile WiFi This guide briefly describes the functions of your Huawei E589 4G Mobile WiFi. For more details, see help on the web management page. See Accessing the

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Introduction to the MISD Web FTP Client

Introduction to the MISD Web FTP Client Introduction to the MISD Web FTP Client What is FTP? FTP stands for File Transfer Protocol. It is an Internet service that allows users to copy files to or from computers which hold collections of files.

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

Colorfly Tablet Upgrade Guide

Colorfly Tablet Upgrade Guide Colorfly Tablet Upgrade Guide (PhoenixSuit) 1. Downloading the Firmware and Upgrade Tool 1. Visit the official website http://www.colorful.cn/, choose 产 品 > 数 码 类 > 平 板 电 脑, and click the product to be

More information

How to Back Up and Restore an ACT! Database Answer ID 19211

How to Back Up and Restore an ACT! Database Answer ID 19211 How to Back Up and Restore an ACT! Database Answer ID 19211 Please note: Answer ID documents referenced in this article can be located at: http://www.act.com/support/index.cfm (Knowledge base link). The

More information

SeaSmart Firmware Update via FTP

SeaSmart Firmware Update via FTP SeaSmart.net Firmware can be updated by FTP file transfer. This App Note describes how to use built-in Windows FTP client (XP/Vista/7) to upload new firmware files to target SeaSmart.net adapters. Modification

More information

1. Scope of Service. 1.1 About Boxcryptor Classic

1. Scope of Service. 1.1 About Boxcryptor Classic Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic

More information