Android Security for Enterprise App Developers Jon Preedy
|
|
- Janice Bridges
- 8 years ago
- Views:
Transcription
1 Android Security for Enterprise App Developers Jon Preedy Sr. Sales Engineer
2 Agenda for Lightning Talk Developer View Android Security Model Security and Enterprise-Scale Device Configuration Encryption Options for Data-at-Rest Enterprise Reset: Return to Known Good State
3 Application Sandboxing Sandbox Setup (at install time) As each new App is installed from an APK it gets assigned a new, automatically generated UID and a folder is created in /data, the files from the APK are unpacked there. This folder is Owned by that UID With closed file permissions So only processes owned by the application s UID can access files in the application s private folder in /data
4 Sandboxing Continued Launching an App in a Sandbox The master Dalvik process, zygote *, creates a new Dalvik Instance in a new Process.. Loads the app into the DVM within the new Process, and Sets the Owner of the Process to the UID associated with the App Note: this is a fast, efficient process. Read more at: So now the App is running as a process owned by it s own UID, so it (and only it) has complete access within it s private folder! * - from biology: the first cell of a multi-celled animal
5 Sandbox = Isolation Bottom line whenever it runs, each App gets An inviolate memory space for execution Access to its own, inviolate storage area for files and folders Access to public storage, like /scard and /enterprise/usr This protection / isolation is provided by the Linux Kernel and File Sytem Memory isolation is provided by the Process boundary, not the Virtual Machine boundary File storage isolation is provided by file permissions and ownership, which must match the process owner.
6 the Android Permissions System NOT Linux/Unix unique to Android Google defines permissions in groups the groups are evolving Developers can create their own custom permissions groups (and we do) When an app is installed by a user, Android lists all the permissions groups it is requesting. it s grant all or don t install * * changing
7 Permissions Introduction Apps can only communicate via Components Any component can be assigned a permission label Others will need that permission to access this component Same for certain OS components and API calls to them (Phone, WLAN ) Each application explicitly requests permissions via manifest Cannot be changed after install Allows very granular control Only some of it exposed to user List of all Android permissions: rmission.html New custom permissions can be defined. Potential for Enterprise use (software suites, management)
8 List of Permissions Permissions defined on a device will depend on.. Version of Android Apps Installed Let s look at a listing from an empty MC40, output by adb shell pm list permissions g
9 Levels of Permissions Permissions must belong to one of the Protection Levels Normal (default) Lower-risk permission that gives requesting applications access to isolated application-level features, with minimal risk to other applications, the system, or the user. Granted automatically w/o explicit user's approval (still displayed during installation, of course). Dangerous (introduces potential risk) A higher-risk permission that would give a requesting application access to private user data or control over the device that can negatively impact the user. Not granted automatically. Will require some form of user consent (popup dialog, etc). Signature Granted only if the requesting application is signed with the same certificate as the application that declared the permission. Then granted automatically. Useful for software suites (several apps from the same developer working together). SignatureOrSystem As before, but also allow access to apps that are part of the system image Many OS APIs are protected with this reason for MDM not working unless agent is part of the firmware (or MDM certificate is part of firmware) ADB shell: pm list permissions -f display permissions with full information pm list permissions -g display permissions in groups :0)
10 Android Security and Enterprise Device Configuration
11 The Settings App OK for One Device, but.. There is a Settings app, for configuring the device but.. and it does not lend itself to manual, identical configuration of multiple devices It allows the end user too much control over settings for enterprise deployments It does not allow configuration of Zebra Value Add features Settings made with the Settings App do NOT persist over Enterprise Reset Your app may need certain Settings in order to work well or your customer may ask for some tweaks to device behavior Your app(s) may be unable to get the permission needed
12 Controlled Access to Settings Access to Settings is Controlled by Android Permissions Some settings, an ordinary app can reach, it it asks for and is granted WRITE_SETTINGS For some settings, permission is only granted to Privileged Applications (aka signed or system apps) that ask for WRITE_SECURE_SETTINGS Then of course, if you want to be able to return a unit to a known good condition, those apps must persist across an Enterprise Reset, and Must persist their data reapply the settings after Enterprise Reset
13 Remember This? Permissions must belong to one of the Protection Levels Normal (default) Lower-risk permission that gives requesting applications access to isolated application-level features, with minimal risk to other applications, the system, or the user. Granted automatically w/o explicit user's approval (still displayed during installation, of course). Dangerous (introduces potential risk) A higher-risk permission that would give a requesting application access to private user data or control over the device that can negatively impact the user. Not granted automatically. Will require some form of user consent (popup dialog, etc). Signature Granted only if the requesting application is signed with the same certificate as the application that declared the permission. Then granted automatically. Useful for software suites (several apps from the same developer working together). SignatureOrSystem As before, but also allow access to apps that are part of the system image Many OS APIs are protected with this reason for MDM not working unless agent is part of the firmware (or MDM certificate is part of firmware)
14
15 Application Access to Device Settings
16 Data at Rest Encryption Options
17 Encryption Options Encryption How does it work? What does it protect against it? Is it worth the trouble? Three kinds Full Device Encryption (only encrypts /data) External Storage Encryption (only encrypt /sdcard) Folder Level Encryption (one or more folders)
18 Encrypt Full Device Well not full device, really only encrypts /data Requires entry of passcode on bootup to unlock. Key stored in system (needs passcode on boot) Protects /data until passode is entered After that, transparent access for any running app.. Like it s not even there!! No protection against any process running on the machine So what does it protect against? Forensic analysis of device chips Process that might run before /data is unlocked.
19 Encrypt External Storage External Storage Volumes only Reformat from FAT32 to IM-CRYPT Key not stored on card Automatically reconnected (opened) on boot After that, transparent access for any running app.. Like it s not even there!! No protection against any process running on the machine If you move the SD card to another device Secure File System Must know that password
20 Encrypt Folder(s) - Zebra MX Feature Choose folder(s) to encrypt with named passcodes Internal or External storage Transparent, normal access when open Opened at boot with no user interaction, if passcode is available.. But.. Using MX an admin can revoke a passcode blocks any access by any internal application Protects folders against forensic analysis and on removable drives Data stays on device, but encrypted (no key on device) And later restore a passcode for one or more folders Restores no-hassle access again - no need to reload data
21 Encryption & Recovery Mode yes, you CAN have too much encryption Can Recovery Mode Read.zip from /data/tmp.. and write to system partitions.. if Full Device Encryption is enabled? Read.zip from /sdcard.. and write to system partitions.. if External Storage Encryption is enabled? Read.zip from /sdcard.. and write to system partitions.. if Folder Level Encryption is enabled on one or more folders on the sdcard? If you encrypt both full device and all external storage.. There will be no place to put a.zip file that can be used in Recovery mode so no possibility of remote OS update. Using MX folder level encryption may provide enough encryption and still leave space for OS update zips.
22 Encryption Summary - 3 kinds of Encryption Full Device Encryption (only encrypts /data) High cost (enter passode, no zips in /data/tmp), limited protection External Storage Encryption (only encrypt /sdcard) Medium cost (no zips on sdcard), protects storage when removed Folder Level Encryption (one or more folders) -- Zebra MX feature Low cost, protects the parts you want to protect, switch access on and off Internal Storage revocation provides the only protection against internal attack External storage also protects when removed Folder encryption protects against forensic analysis when revoked, and protects folders on removable external storage volume
23 Enterprise Reset: Return to Known Good State
24 Enterprise Reset the Concept Cold boot in Windows CE and Clean Boot in WM were what we now call.. Enterprise Resets Return unit to known good state, Possibly at the expense of losing some app data Apps CAN but don t have to store their data in a persistent location The idea being, of course.. Delete any changes made since original setup to apps or settings Exception for properly persisted data Restart Clean Restart empty and put back what you put in, in the first place But in CE / WM, any process could modify \Application Add apps or.reg files that would persist over Clean/Cold boot Remove apps or.reg files that should persist Copy anything (like WLAN settings in.reg files)
25 Enterprise Reset in Android So what happens at Enterprise Reset? /data is cleared all applications and their sandboxes are GONE All the UID s that were created by installing APKs are GONE All Settings revert to Factory Defaults External storage volumes are are not affected unless emulated from /data File and folders under /enterprise/usr are still there, data intact so as long as they were written with permissions wide open as recommended they can be still be accessed by your app after it s UID has changed.. because As device boots up from Enterprise Reset Properly persisted SETTINGS are re-applied. Properly persisted APKs are re-installed Each gets a NEW UID assigned and a NEW private folder created in /data, belonging to the new UID Each new app may need to access data it stored previously in /enterprise/usr
26 Programming for Enterprise Reset Persistence Protect any files which may lose content if your app is re-installed Identify which files that need to persist over the ER Have your app put them in a location that will persist over ER (put then in a subfolder of /enterprise/usr) Be sure you will be able to regain access when your Linux UserID has changed ( always set permissions to 777) Be sure your app will not write over them on install or first run. Use EMDK and MX Persist Manager to restore your app Add yourself to the list of applications that will be re-installed after an Enterprise Reset If your app needs to be always-running, add yourself to list of apps to be launched automatically.
27 Questions?
28 THANK YOU
Developing for MSI Android Devices
Android Application Development Enterprise Features October 2013 Developing for MSI Android Devices Majority is the same as developing for any Android device Fully compatible with Android SDK We test using
More informationWindows 8 Backup, Restore & Recovery By John Allen
Windows 8 Backup, Restore & Recovery By John Allen Restore and recovery options for Windows 8 are different to earlier versions of Windows, and, of course, the terminology has changed. These are a lot
More informationWindows 7 Hard Disk Recovery
In order to restore your hard drive back to the original factory settings you will need to do the following: 1) Press the start button and in the search area type Recovery 2) From the search results, launch
More informationUsing Mac OS X 10.7 Filevault with Centrify DirectControl
Using Mac OS X 10.7 Filevault with Centrify DirectControl August 2011, Revision 2 OS X 10.7's Filevault has the ability to encrypt the entire disk. Full Disk Encryption is compatible with Centrify Active
More informationCautions When Using BitLocker Drive Encryption on PRIMERGY
Cautions When Using BitLocker Drive Encryption on PRIMERGY July 2008 Fujitsu Limited Table of Contents Preface...3 1 Recovery mode...4 2 Changes in hardware configurations...5 3 Prior to hardware maintenance
More informationRunning a Program on an AVD
Running a Program on an AVD Now that you have a project that builds an application, and an AVD with a system image compatible with the application s build target and API level requirements, you can run
More informationHow to downgrade Samsung Galaxy Tab 2 back to original V4.1.1 Android OS
How to downgrade Samsung Galaxy Tab 2 back to original V4.1.1 Android OS Important information: This procedure restores the Samsung Galaxy tablet, used with the 1750 Fluke Power Recorder product back to
More informationSuper Manager User Manual. English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net
Super Manager User Manual English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net How to launch Super Manager? Click the Super Manager in Launcher or add a widget into your Launcher (Home
More informationInstructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
More informationViPNet ThinClient 3.3. Quick Start
ViPNet ThinClient 3.3 Quick Start 1991 2014 Infotecs Americas. All rights reserved. Version: 00060-07 34 02 ENU This document is included in the software distribution kit and is subject to the same terms
More informationUP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
More informationAnalysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
More informationHow to Install Applications (APK Files) on Your Android Phone
How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android
More informationSysAid MDM User Guide for Android
SysAid MDM User Guide for Android Table of Contents Introduction Enrolling Your Android Mobile Device in SysAid MDM Unenrolling Your Android Mobile Device from SysAid MDM Have Any Questions? Introduction
More informationSwannEye HD Security Camera Wi-Fi Connections Quick Setup Guide. Welcome! Lets get started.
EN SwannEye HD Security Camera Wi-Fi Connections Quick Setup Guide Welcome! Lets get started. 1 1 Introduction 1 2 3 4 Congratulations on your purchase of this SwannEye HD Wi-Fi Security Camera from Swann!
More informationUsing your ios device, open the App Store, Search for, download and install the WeMo App.
Setting up WeMo is incredibly simple. All you need is: Your WeMo Switch and WeMo Motion An appliance you'd like to control iphone, ipod Touch or ipad Wi-Fi Router Using your ios device, open the App Store,
More informationScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
More informationReboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting
More informationProf. Christos Xenakis, Dr. Christoforos Ntantogian Department of Digital Systems University of Piraeus, Greece
Prof. Christos Xenakis, Dr. Christoforos Ntantogian Department of Digital Systems University of Piraeus, Greece University of Piraeus, Greece Department of Digital Systems System Security Laboratory founded
More informationHow To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
More informationSamsung Drive Manager User Manual
Samsung Drive Manager User Manual The contents of this manual are subject to change without notice. Companies, names and data used in examples are not actual companies, names or data unless otherwise noted.
More informationIBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) User s Reference Guide Internal IBM Use Only This document only applies to the software version listed above and information provided may not
More informationSharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
More informationSAS-IPCAM115 MANUAL IP CAMERA
SAS-IPCAM115 MANUAL IP CAMERA Table of contents Introduction: Safety precautions: Packaging content: System requirements: Product description: User instructions: Maintenance: Warranty: Disclaimer: Disposal:
More informationSophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3
More informationIntegrating Mac OS X 10.6 with Active Directory. 1 April 2010
Integrating Mac OS X 10.6 with Active Directory 1 April 2010 Introduction Apple Macintosh Computers running Mac OS X 10.6 can be integrated with the Boston University Active Directory to allow use of Active
More informationHosting Users Guide 2011
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
More informationFrequently Asked Questions
Frequently Asked Questions Share Drive Frequently Asked Questions Table of Contents How do I change my password?... How do I reset my password if I forgot it?... How do I share files/folders with Groups
More informationVMware/Hyper-V Backup Plug-in User Guide
VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,
More informationTSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
More informationHP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
More informationReadyNAS OS 6 Desktop Storage Systems
ReadyNAS OS 6 Desktop Storage Systems Hardware Manual Models: ReadyNAS 102 ReadyNAS 104 ReadyNAS 312 ReadyNAS 314 ReadyNAS 316 ReadyNAS 516 ReadyNAS 716X EDA 500 October 2013 202-11206-04 350 East Plumeria
More information4 Backing Up and Restoring System Software
4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring
More informationAdministrator User Instructions- Master PIN Usage
Administrator User Instructions- Master PIN Usage LOK-IT USB Drives are supplied by the University as a method to safely transport data. They are not intended to be used for primary data storage. The LOK-IT
More informationAndroid Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold
Android Security Device Management and Security by Stephan Linzner & Benjamin Reimold Introducing Stephan Linzner Benjamin Reimold Consultant, Software Engineer Mobile Developer Founder of Stuttgart GTUG
More informationReadyNAS OS 6.1 Software Manual
Software Manual Models: ReadyNAS 102 ReadyNAS 104 ReadyNAS 312 ReadyNAS 314 ReadyNAS 316 ReadyNAS 516 ReadyNAS 2120 ReadyNAS 3220 ReadyNAS 4220 EDA 500 September 2013 202-11207-04 350 East Plumeria Drive
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry
GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for
More informationMobile Pay. for Android TM. *Android Version 4.0 or higher required
Mobile Pay TM for Android TM *Android Version 4.0 or higher required 2014 First Data Corporation. All Rights Reserved. All trademarks, service marks and trade names referenced in this material are the
More informationAndroid Programming and Security
Android Programming and Security Dependable and Secure Systems Andrea Saracino andrea.saracino@iet.unipi.it Outlook (1) The Android Open Source Project Philosophy Players Outlook (2) Part I: Android System
More informationLab 2-2: Exploring Threads
Lab 2-2: Exploring Threads Objectives Prerequisites After completing this lab, you will be able to: Add profiling support to a Windows CE OS Design Locate files associated with Windows CE profiling Operate
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationUsing GIGABYTE Notebook for the First Time
P34 V6.0 Congratulations on your purchase of the GIGABYTE Notebook. This manual will help you to get started with setting up your notebook. The final product configuration depends on the model at the point
More informationAcer erecovery Management
Acer erecovery Management The Acer erecovery Management provides fast, reliable and safe method of restoring your computer to its factory default settings or user-defined system configuration from an image
More informationOffice of Information Technology Connecting to Microsoft Exchange User Guide
OVERVIEW The Office of Information Technology is migrating its messaging infrastructure from Microsoft Exchange 2003 to Microsoft Exchange 2010. Moving to the latest technology will provide many enhancements
More informationOperating Systems: Microsoft Windows XP, Windows Vista or Windows 7 RAM: 2GB
MRS Absolute security minimum System Requirements Operating Systems: Microsoft Windows XP, Windows Vista or Windows 7 RAM: 2GB Hard Drive: 1 primary partition for O/S and applications. (C:) 1 primary partition
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
More informationRemote Desktop Services User's Guide
Contents Remote Desktop Services Document Revision Control Revision Description Author DATE 1.0 Initial Release Karen M. Hess 3/24/2015 1.1 Added section for viewing mapped drives Karen M. Hess 4/15/2015
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
More informationSeagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide for Use With Your FreeAgent Drive 1
Seagate Manager User Guide For Use With Your FreeAgent TM Drive Seagate Manager User Guide for Use With Your FreeAgent Drive 1 Seagate Manager User Guide for Use With Your FreeAgent Drive Revision 1 2008
More informationOperating Instructions - Recovery, Backup and Troubleshooting Guide
Personal Computer Operating Instructions - Recovery, Backup and Troubleshooting Guide Please create your recovery discs immediately after setup. Please read this manual carefully before using your product.
More informationMANUAL IP Baby and Child Monitor
KN-BM60 MANUAL IP Baby and Child Monitor Table of contents Introduction 2 Safety precautions 2 Packaging content 2 System requirements 2 Product description 3 User instructions 3 Maintenance 23 Warranty
More informationCTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without
More informationComodo Disk Encryption
Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3
More informationHow To Install An Aneka Cloud On A Windows 7 Computer (For Free)
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
More informationGCM for Android Setup Guide
GCM for Android Setup Guide This guide provides information on...... Prerequisites for using Google Cloud Messaging service... Instructions for setting up GCM service via the Google API console... Configuring
More informationAutomation Engine 14.1. AE Server management
14.1 AE Server management 06-2015 Contents 1. The Server Web Page... 3 2. Status Overview...4 2.1 FAQs on Restarting and Reactivating the Server...5 3. Server Activity... 6 4. Server Setup... 7 4.1 Server
More informationSalesforce-Wrike Integration Setup Manual
Salesforce-Wrike Integration Setup Manual This document has been designed for Salesforce administrators. It will guide you through the setup process for the integration between your Salesforce instance
More informationIceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
More informationOffsite Control - Android Quick Start Guide
- Android Quick Start Guide Configuring the URC Mobile app is simple. Follow the instructions below to ensure that the app is configured properly to control the system from within (local) the LAN and from
More informationNHSmail mobile configuration guide Android mobile devices
NHSmail mobile configuration guide Android mobile devices Version: V.6 Date: September 2011 THIS INFORMATION IS FOR NHS STAFF AND IS NOT TO BE DISTRIBUTED OR COPIED OUTSIDE OF THE NHS Version 6.0 Crown
More informationFileMaker Server 15. Getting Started Guide
FileMaker Server 15 Getting Started Guide 2007 2016 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
More informationSilk Test 17.0. Testing Mobile Applications
Silk Test 17.0 Testing Mobile Applications Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 1992-2016. All rights reserved. MICRO
More informationHow to enable Disk Encryption on a laptop
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
More informationUsing GIGABYTE Notebook for the First Time
Congratulations on your purchase of the GIGABYTE Notebook. This manual will help you to get started with setting up your notebook. The final product configuration depends on the model at the point of your
More information1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
More informationOnline Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
More informationios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
More informationKingston KC300 Security Toolbox
Intended for: SKC300S37A/60G SKC300S37A/120G SKC300S37A/180G SKC300S37A/240G SKC300S37A/480G Firmware Rev. 600ABBF0 The PSID Revert and the Enable/Disable IEEE1667 (or Microsoft edrive) operations described
More informationApple Server Diagnostics User Guide. For Version 3X106
Apple Server Diagnostics User Guide For Version 3X106 KKApple Inc. 2009 Apple Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written
More informationAndroid Environment SDK
Part 2-a Android Environment SDK Victor Matos Cleveland State University Notes are based on: Android Developers http://developer.android.com/index.html 1 2A. Android Environment: Eclipse & ADT The Android
More informationVPN: Virtual Private Network Setup Instructions
VPN: Virtual Private Network Setup Instructions Virtual Private Network (VPN): For e-journals and web-based databases, plus applications like EndNote's Online Search (formerly "Connect") and business systems.
More informationAcer erecovery Management
1 Acer erecovery Management Acer erecovery Management provides a fast and reliable method to restore your computer to its factory default settings or user-defined system configuration, from images stored
More informationUsing GIGABYTE Notebook for the First Time
Congratulations on your purchase of the GIGABYTE Notebook. This manual will help you to get started with setting up your notebook. The final product configuration depends on the model at the point of your
More informationUser Guide Vodafone Pocket WiFi Pro. Designed by Vodafone
User Guide Vodafone Pocket WiFi Pro Designed by Vodafone Welcome to the world of mobile communications 1 Welcome 2 Device overview 3 Getting started: setup 4 Getting started: use 5 Pocket WiFi online dashboard
More informationUser Manual. Copyright Rogev LTD
User Manual Copyright Rogev LTD Introduction Thank you for choosing FIXER1. This User's Guide is provided to you to familiar yourself with the program. You can find a complete list of all the program's
More informationImage Backup and Recovery Procedures
Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you
More informationJunos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
More informationUsing GIGABYTE Notebook for the First Time
Congratulations on your purchase of the GIGABYTE Notebook. This manual will help you to get started with setting up your notebook. The final product configuration depends on the model at the point of your
More informationRecover Data Like a Forensics Expert Using an Ubuntu Live CD
Recover Data Like a Forensics Expert Using an Ubuntu Live CD There are lots of utilities to recover deleted files, but what if you can t boot up your computer, or the whole drive has been formatted? We
More informationXythos on Demand Quick Start Guide For Xythos Drive
Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document
More informationHi-Speed USB Flash Disk User s Manual Guide
Hi-Speed USB Flash Disk User s Manual Guide System Requirements Windows 98, ME, 2000, XP, Mac OS 10.1, Linux 2.4 or above AMD or Intel Pentium 133MHz or better based computer USB 1.1, USB 2.0 or higher
More informationFrequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are
More information2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
More informationInstalling Windows XP Professional
CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows
More informationTo use your Brother machine in an ad hoc network, complete the steps listed below:
Description of Problem 100000028554 How do I join the Brother machine to an Adhoc Wireless Network? Description of Solution 200000036605 An Ad-hoc network allows each wireless device to communicate directly
More informationNetSuite OpenAir Mobile for Android User Guide Version 1.3
NetSuite OpenAir Mobile for Android User Guide Version 3 General Notices Attributions NetSuite OpenAir includes functionality provided by HighCharts JS software, which is owned by and licensed through
More informationLast modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216
Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First
More informationRecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationOverview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
More informationHardware Information Managing your server, adapters, and devices ESCALA POWER5 REFERENCE 86 A1 00EW 00
86 A1 00EW 00 86 A1 00EW 00 Table of Contents Managing your server, adapters, and devices...1 Managing your server using the Hardware Management Console...1 What's new...1 Printable PDFs...2 HMC concepts
More informationIntroducing Windows 8
Introducing Windows 8 Introduction Very Aggressive Change Building block for the future and future of devices Biggest Obstacle: Where is!?!? The New User Experience Start Screen Full screen Start Menu
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationThank you for choosing Huwei E589 4G Mobile WiFi
Thank you for choosing Huwei E589 4G Mobile WiFi This guide briefly describes the functions of your Huawei E589 4G Mobile WiFi. For more details, see help on the web management page. See Accessing the
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationIntroduction to the MISD Web FTP Client
Introduction to the MISD Web FTP Client What is FTP? FTP stands for File Transfer Protocol. It is an Internet service that allows users to copy files to or from computers which hold collections of files.
More informationNovaBACKUP. Storage Server. NovaStor / May 2011
NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
More informationColorfly Tablet Upgrade Guide
Colorfly Tablet Upgrade Guide (PhoenixSuit) 1. Downloading the Firmware and Upgrade Tool 1. Visit the official website http://www.colorful.cn/, choose 产 品 > 数 码 类 > 平 板 电 脑, and click the product to be
More informationHow to Back Up and Restore an ACT! Database Answer ID 19211
How to Back Up and Restore an ACT! Database Answer ID 19211 Please note: Answer ID documents referenced in this article can be located at: http://www.act.com/support/index.cfm (Knowledge base link). The
More informationSeaSmart Firmware Update via FTP
SeaSmart.net Firmware can be updated by FTP file transfer. This App Note describes how to use built-in Windows FTP client (XP/Vista/7) to upload new firmware files to target SeaSmart.net adapters. Modification
More information1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
More information