Fall CRM Server Software Design TEAM MEMBERS: Project Owner: Herve Ntareme Champion: Bjorn Pehrson. MAHSA TABATABAEI ( mahsat@kth.
|
|
- Isaac Weaver
- 8 years ago
- Views:
Transcription
1 Fall 2011 CRM Server Software Design TEAM MEMBERS: MAHSA TABATABAEI ( mahsat@kth.se, 15 ECTS) AMIR ROOZBEH(amirrsk@kth.se, 15 ECTS) ERICSON FERDINAND PASARIBU(pasaribu@kth.se, 24 ECTS) RENE PAVEZFLORES(rene.pavezflores@gmail.com, 18 ECTS) JUNG CHANGSU(changsu@kth.se, 30 ECTS) EKAMBAR SELVAKUMAR(ekambar@kth.se, 30 ECTS) Project Owner: Herve Ntareme Champion: Bjorn Pehrson
2 Contents Revision history Introduction Software architecture and components Database structure Tables created by Gammu authenticating logged_in whitelist blacklist Software algorithm condroid-serv condroid-mysqlcron References
3 Revision history Revision Release date Remarks Authors number 1.0 December 23, 2011 Initial version Ericson F. Pasaribu 3
4 1. Introduction This document describes the design of the Condroid Remote Management (CRM) server software. The document describes the architecture of the software and the components that build the software. The document also describes the algorithm of processes in the software program. 2. Software architecture and components The structure of CRM server software is depicted in the following diagram. The description of functionality of each component can be read at CRM system architecture design document [1]. CRM server gammu-smsd gammu cron call read/ write call condroid-serv read/write mysql read/write condroid-mysqlcron Figure 2: Condroid Remote Management System server software In the next section of this document, the structure of database used in the CRM server, the condroid-serv algorithm s flowchart, as well as condroid-mysqlcron algorithm s flowchart will be explained. 4
5 3. Database structure There are 13 tables used in the CRM server. From these 13 tables, 9 are tables that are created and used by Gammu. The other 4 tables are authenticating, logged_in, whitelist, blacklist. These tables are used by condroid-serv and condroid-mysqlcron. 3.1 Tables created by Gammu There are 9 tables that are created by Gammu software: daemons, gammu, inbox, outbox, outbox_multipart, phones, sentitems, pbk, and pbk_groups. The functionality of these tables and their structure can be found online at [GW]ammu project s website [2]. 3.2 authenticating This table is used to hold the information of users that have sent login request to the server and are currently in authenticating state. Fields description: 1. id (INT NOT NULL PRIMARY KEY AUTO_INCREMENT) Unique ID of a user in the table. 2. phonenum (VARCHAR(20)) Phone number of the user from which the login request SMS message is received. 3. randomnum (SMALLINT) The random number generated by the server as response to the login request SMS message from user. The number is used by both server and user to set up a pass code to be used to authenticate messages from user/server. The process of generating this pass code can be found in the 4. timestamp (TIMESTAMP DEFAULT NOW()) Records the timestamp when the a record is inserted into authenticating table. This timestamp is evaluated by condroid-mysqlcron when deleting old records from database. 3.3 logged_in This table is used to hold the information of user that has been authenticated by the server and granted access to manage devices over the server. Fields description: 1. phonenum (VARCHAR(20) NOT NULL PRIMARY KEY) Phone number of the authenticated user. 5
6 2. passcode (SMALLINT NOT NULL) The pass code calculated by the server and user. 3. lastactive (TIMESTAMP DEFAULT NOW()) Records the latest timestamp when the authenticated user does an activity to the server. This timestamp is evaluated by condroid-mysqlcron when checking idle user. An idle user will be automatically logged out from the server. 3.3 whitelist This table is used to hold the list of users that are allowed to access the server. Fields description: 1. phonenum (VARCHAR(20) NOT NULL PRIMARY KEY) Phone number of the user that is allowed to s SMS to the server. 2. admin (enum('false','true') NOT NULL default 'false') Indicates whether the user is an admin user of a normal user. 3. pin (SMALLINT NOT NULL default 123) Records the PIN code for the user. This PIN code is used to generate pass code during authentication process to the server. 3.4 blacklist This table is used to hold the information of users that have blacklisted by the server. The server blacklist a user if the user has been trying to login to the server but failed the authentication process multiple times consecutively. SMS message from blacklisted user will be ignored by the server. Fields description: [1] phonenum (VARCHAR(20) NOT NULL PRIMARY KEY) Phone number of a user. A user is inserted into this table once they have failed a login attempt. [2] nrattp (SMALLINT NOT NULL) Records the number of consecutive failed login attempt by the user. [3] blacklisted (enum('false','true') NOT NULL default 'false') Indicates whether the user is currently blacklisted by the server or not. [4] lastactive (TIMESTAMP DEFAULT NOW()) Records the timestamp when a user is blacklisted by the server. This timestamp is evaluated by condroid-mysql when clearing old blacklist record. 6
7 4. Software algorithm 4.1 condroid-serv condroid-serv is called by gammu-smsd when there is a received SMS message. The main function will check for the content of the message and process it accordingly. The algorithm of condroid-serv program is depicted in the following flow charts. 7
8 Retrieve unprocessed message from inbox table Check whether the message contains CRM keyword Contains CRM? Check for the message ser number Number is blacklisted? Check for the message type LOGIN request? Process LOGIN request LOGIN with pass code? Process LOGIN with pass code MESSAGE? Process MESSAGE MESSAGE with no reply? Process MESSAGE with no reply ADMINISTRAT ION? Process ADMINISTRA TION CHANGE PIN CODE? Process CHANGE PIN CODE LOGOUT request? Process LOGOUT reques It is unknown message type. Do nothing, set message status to processed Figure 2: condroid-serv algorithm 8
9 Check the ser number The number is in whitelist? Check whether there is user that is currently logged in to the server There is logged in user? S login failed reply message: OTHER USER IS LOGGED IN Generate a random number and s it as challenge to the user Insert the user to authenticating table Figure 3: condroid-serv LOGIN request message processing 9
10 Check the ser number in authenticating table The user is in authenticating table? Get the random code previously generated for the user in authenticating table Calculate pass code value: (random number XOR PIN code), and compare the result with pass code in the message from user The values are equal? S login failed reply message: BAD PIN CODE Insert the user into logged_in table S login success reply message to the user Figure 4: condroid-serv LOGIN with pass code message processing 10
11 Check the ser number and the pass code value in the message, compare them with user number and pass code in logged_in table The values are identical? Retrieve command content and target device from the message, s the command to the target device through serial port Wait for response from device There is response from device before wait timeout? S message to user: NO RESPONSE FROM DEVICE S the device response message to the user Figure 5: condroid-serv MESSAGE message processing 11
12 Check the ser number and the pass code value in the message, compare them with user number and pass code in logged_in table The values are identical? Retrieve command content and target device from the message, s the command to the target device through serial port S the ACK message to user Figure 6: condroid-serv MESSAGE with no reply message processing 12
13 Check the ser number and the pass code value in the message, compare them with user number and pass code in logged_in table The values are identical? Check wether the user has admin privilege in the server The user is admin? S message to user: YOU ARE NOT ADMIN Perform the command from user on the server S ACK reply message to the user Figure 7: condroid-serv ADMINISTRATION message processing 13
14 Check the ser number and the pass code value in the message, compare them with user number and pass code in logged_in table The values are identical? Change the PIN code for the user in whitelist table S ACK reply message to the user Figure 8: condroid-serv CHANGE PIN CODE message processing 14
15 Check the ser number and the pass code value in the message, compare them with user number and pass code in logged_in table The values are identical? Delete user record from logged_in table Figure 9: condroid-serv LOGOUT request message processing 15
16 4.2 condroid-mysqlcron condroid-mysqlcron is called regularly by cron. The program accepts 1 input parameter which has 3 possible values: 0, 1 or 2. The algorithm of condroid-mysqlcron is depicted in the following flow chart. Check input parameter value 0 Clear old records from authenticating table, inbox table, and sentitems table. 1 Clear idle user record from logged_in table and s log out notification message to the user 2 Clear old records from blacklist table Figure 10: condroid-mysqlcron algorithm 16
17 5. References [1] Condroid Remote Management System Requirement Specification, ver. 2.1, The 2011 Fall CSD Remote Management System project team, Stockholm, 2011, pp. 8-9 [2] [GW]ammu project (2011, December 22). SMSD Database Structure [Online]. Available 17
Fall 2011 SYSTEM ARCHITECTURE DESIGN TEAM MEMBERS: PROJECT OWNERS: AMIR ROOZBEH(amirrsk@kth.se, 15 ECTS) EKAMBAR SELVAKUMAR(ekambar@kth.
Fall 2011 SYSTEM ARCHITECTURE DESIGN TEAM MEMBERS: AMIR ROOZBEH(amirrsk@kth.se, 15 ECTS) EKAMBAR SELVAKUMAR(ekambar@kth.se, 30 ECTS) ERICSON FERDINAND PASARIBU(pasaribu@kth.se, 24 ECTS) JUNG CHANGSU(changsu@kth.se,
More informationTwo-Factor Authentication
Two-Factor Authentication This document describes SonicWALL s implementation of two-factor authentication for SonicWALL SSL-VPN appliances. This document contains the following sections: Feature Overview
More informationODBC Client Driver Help. 2015 Kepware, Inc.
2015 Kepware, Inc. 2 Table of Contents Table of Contents 2 4 Overview 4 External Dependencies 4 Driver Setup 5 Data Source Settings 5 Data Source Setup 6 Data Source Access Methods 13 Fixed Table 14 Table
More informationThis is to certify that
This is to certify that Mr./Ms: Dinh Huy Toan, Vu Van Thang, Nguyen Duc Duy Has successfully Designed & Developed: Inventory Management System Submitted by: Vu Tran Lam Date of Issue: Aug 9, 2010 Authorized
More informationBarracuda Spam Control System
Barracuda Spam Control System 1. General Information The Barracuda anti-spam server inspects all email coming into campus from the Internet for spam and either delivers the message to your email inbox,
More informationCustomer Bank Account Management System Technical Specification Document
Customer Bank Account Management System Technical Specification Document Technical Specification Document Page 1 of 15 Table of Contents Contents 1 Introduction 3 2 Design Overview 4 3 Topology Diagram.6
More informationTSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
More informationYale Secure File Transfer User Guide
Yale Secure File Transfer For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Yale Secure File Transfer User Guide This document provides information and detailed steps for using Yale's
More informationPremium Server Client Software
Premium Server Client Software Server / Client SMSPro & GSMS TH series Get the tools on hand Premium Server is designed to cover most of the applications in the market. It gives a hassle free management
More informationUser Manual. Version 1.0.0.0. Yeastar Technology Co., Ltd.
User Manual Version 1.0.0.0 Yeastar Technology Co., Ltd. Table of Contents 1 Introduction 3 2 Installing MySMS Software 4 3 Managing MySMS 9 3.1 Accessing MySMS 9 3.2 Multi-User Accounts 10 3.3 Managing
More informationTriCore Secure Web Email Gateway User Guide 1
TriCore Secure Web Email Gateway User Guide This document provides information about TriCore Secure Web Email Gateway. This document is for users who are authorized to send and receive encrypted email
More informationEvent Center (rev b) EVENT CENTER. VPI 160 Camino Ruiz, Camarillo, CA 93012-6700 (Voice) 800-200-5430 805-389-5200 (Fax) 805-389-5202 www.vpi-corp.
EVENT CENTER 1 VPI 160 Camino Ruiz, Camarillo, CA 93012-6700 (Voice) 800-200-5430 805-389-5200 (Fax) 805-389-5202 www.vpi-corp.com All information in this manual is Copyright protected material by Voice
More informationNetwork DK2 DESkey Installation Guide
VenturiOne Getting Started Network DK2 DESkey Installation Guide PD-056-306 DESkey Network Server Manual Applied Cytometry CONTENTS 1 DK2 Network Server Overview... 2 2 DK2 Network Server Installation...
More informationUsing MailStore to Archive MDaemon Email
Using MailStore to Archive MDaemon Email This guide details how to archive all inbound and outbound email using MailStore, as well as archiving any emails currently found in the users accounts in MDaemon.
More information9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
More informationSalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy
SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House
More informationCloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
More informationExternal authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy
External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010
More informationCompiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1
Compiled By: Chris Presland v1.0 Date 29 th September Revision History Phil Underwood v1.1 This document describes how to integrate Checkpoint VPN with SecurEnvoy twofactor Authentication solution called
More informationEmail Migration Manual (For Outlook 2010)
Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change
More informationExternal Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
More informationExternal authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy
External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
More informationPalo Alto Networks GlobalProtect VPN configuration for SMS PASSCODE SMS PASSCODE 2015
SMS PASSCODE 2015 Guide for implementing SMS PASSCODE protection with Palo Alto Networks. This document outlines the process of configuring a Palo Alto Networks GlobalProtect VPN with SMS PASSCODE RADIUS
More informationVantage Report. Quick Start Guide
Vantage Report Quick Start Guide Version 2.2 7/2005 Overview Vantage Report is an application that collects and analyzes logs sent by ZyXEL devices to the Vantage Report syslog server. See the User s Guide
More informationQuick Start : i-fax User Guide
Quick Start : i-fax User Guide Introduction Welcome to the i-fax System User Guide! This manual will help new users navigate i-fax System and perform common tasks. This manual is task-oriented. You will
More informationExternal Authentication with CiscoSecure ACS. Authenticating Users Using. SecurAccess Server. by SecurEnvoy
External Authentication with CiscoSecure ACS Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business
More informationDOSarrest Security Services (DSS) Version 4.0
DOSarrest Security Services (DSS) Version 4.0 DOSarrest DSS User Guide The DSS is the main customer portal where customers can view and manipulate traffic statistics from a wide variety of variables that
More informationBarracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Managing your Quarantine Inbox This chapter describes how you can check your quarantined messages, classify messages as spam and not spam, and modify your user preferences
More informationBackground Information
User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system
More informationPORTLANDDIOCESE.ORG Email - How to Connect Table of Contents
1 PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents Email Access via a Web Browser... 2 Email Client Setup... 3 Outlook 2007, 2010 & 2013 for Windows... 3 Outlook for Mac 2011... 5 Mac OS X
More informationHow To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F
External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business Park
More informationSafewhere*Identify 3.4. Release Notes
Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.
More informationThe Development of a FTP Bandwidth Monitoring Tool for the ENABLE Project. A Project Funded by DOE
The Development of a FTP Bandwidth Monitoring Tool for the ENABLE Project A Project Funded by DOE What is ENABLE? Enhancing of Network-aware Applications and Bottleneck Elimination Provide services to
More informationWeb Authentication Application Note
What is Web Authentication? Web Authentication Application Note Web authentication is a Layer 3 security feature that causes the router to not allow IP traffic (except DHCP-related packets) from a particular
More informationExternal Authentication with Checkpoint R75.40 Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Checkpoint R75.40 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale
More informationRPM Utility Software. User s Manual
RPM Utility Software User s Manual Table of Contents 1. Introduction...1 2. Installation...2 3. RPM Utility Interface...4 1. Introduction General RPM Utility program is an RPM monitoring, and management
More informationEmail Helpdesk for JIRA
Email Helpdesk for JIRA User Manual Authors Marco Galluzzi, Natalio Sacerdote; Version 1.0 Date: 02.09.2014 1. User Manual............................................................................................
More informationPIKA µfirewall Cloud Management Guide
Version 1.0 April 2015 Introduction... 2 Installation... 2 Configuring the Unit... 10 Changing Parameters... 10 Adding Blacklists and White lists... 12 Upgrading Firmware... 15 Disclaimer... 18 Frequently
More informationKittys School Management System
Management Module: Login Module: In this module site admin can be able to login by using their unique username and password. Add Section and Standard: Subject: Syllabus: Inbox: i. Admin can add the Standard
More informationEmail Migration Manual (For Outlook Express 6)
Email Migration Manual (For Outlook Express 6) By SYSCOM (USA) May 13, 2013 Version 1.0 1 Contents 1. How to Change POP3/SMTP Setup for Outlook Express... 3 2. How to Login to Webmail... 7 3. How to Change
More informationGigabyte Content Management System Console User s Guide. Version: 0.1
Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...
More informationipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
More informationVoxStack GSM Gateway API. Version: 1.0.0. Author: Joe.Yung
VoxStack GSM Gateway API Version: 1.0.0 Author: Joe.Yung Change Notes Date Versions Description Author 2013.2.6 1.0.0 GSM Gateway Joe.Yung SMS API 1. Configuring AMI in VoxStack GSM Gateway. 1.1 How to
More informationThick Client Application Security
Thick Client Application Security Arindam Mandal (arindam.mandal@paladion.net) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
More informationEasy Data Centralization with Webster. User Guide
Easy Data Centralization with Webster User Guide CONTENTS 3-4 1 Introducing Webster Webster - An Introduction 5-14 2 Installing & Configuring Webster Installing the System Configuring Webster 15-18 3 Managing
More informationTechnical White Paper BlackBerry Security
Technical White Paper BlackBerry Security For Microsoft Exchange Version 2.1 Research In Motion Limited 2002 Research In Motion Limited. All Rights Reserved Table of Contents 1. INTRODUCTION... 1 2. ARCHITECTURE...
More informationExternal Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
More informationSY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
More informationSecurEnvoy Security Server. SecurMail Solutions Guide
SecurEnvoy Security Server SecurMail Solutions Guide SecurMail Solutions Guide 2009 SecurEnvoy Printed: 2009 in United Kingdom Publisher SecurEnvoy Publishing Managing Editor SecurEnvoy Training Dept Technical
More informationSecurity White Paper The Goverlan Solution
Security White Paper The Goverlan Solution The Goverlan Administration Suite (which includes the following modules: Administration & Diagnostics, Remote Control, Scope Actions, and WMIX) is a powerful
More informationDataLogger. 2015 Kepware, Inc.
2015 Kepware, Inc. 2 DataLogger Table of Contents Table of Contents 2 DataLogger Help 4 Overview 4 Initial Setup Considerations 5 System Requirements 5 External Dependencies 5 SQL Authentication 6 Windows
More informationPORTLANDDIOCESE.ORG Email - How to Connect Table of Contents
1 PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents Email Access via a Web Browser... 2 Email Client Setup... 3 Outlook 2013 for Windows... 3 Outlook for Mac 2011... 4 Mac OS X 10.6+... 4 iphone
More informationBarracuda Spam Firewall Users Guide. Greeting Message Obtaining a new password Summary report Quarantine Inbox Preferences
Barracuda Spam Firewall Users Guide Greeting Message Obtaining a new password Summary report Quarantine Inbox Preferences Greeting Message The first time the Barracuda Spam Firewall quarantines an email
More informationDOSarrest Security Services (DSS) Version 4.0
DOSarrest Security Services (DSS) Version 4.0 DOSarrest DSS User Guide The DSS is the main customer portal where customers can view and manipulate traffic statistics from a wide variety of variables that
More informationSystem Administrator Training Guide. Reliance Communications, Inc. 603 Mission Street Santa Cruz, CA 95060 888-527-5225 www.schoolmessenger.
System Administrator Training Guide Reliance Communications, Inc. 603 Mission Street Santa Cruz, CA 95060 888-527-5225 www.schoolmessenger.com Contents Contents... 2 Before You Begin... 4 Overview... 4
More informationASULPUNTO Magento unicenta opos integration extension Version 1.0.0
ASULPUNTO Magento unicenta opos integration extension Version 1.0.0 Magento unicenta opos Integration Extension Version 1.0.0 Page 1 Table of Contents Requirements...3 A working copy of unicenta opos on
More informationSmart Call Home Quick Start Configuration Guide
. Quick Start Guide Smart Call Home Quick Start Configuration Guide Cisco Unified Computing System Cisco Smart Call Home is an automated support capability that provides continuous monitoring, proactive
More informationF-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
More informationUsing SQL Server Management Studio
Using SQL Server Management Studio Microsoft SQL Server Management Studio 2005 is a graphical tool for database designer or programmer. With SQL Server Management Studio 2005 you can: Create databases
More informationintertrax Suite intertrax exchange intertrax monitor intertrax connect intertrax PIV manager User Guide Version 3 2011
intertrax Suite intertrax exchange intertrax monitor intertrax connect intertrax PIV manager User Guide Version 3 2011 Copyright 2003-2011 by Salamander Technologies, Inc. Protected by US Patents 5,573,278;
More informationSecure E-Mail Management Guide. June 2008
Secure E-Mail Management Guide June 2008 What are Paychex Secure Messages? To enhance the security of client and vendor data, Paychex created the Paychex Secure E-mail Message Center, a Web site hosted
More informationSophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
More informationThe SkySQL Administration Console
www.skysql.com The SkySQL Administration Console Version 1.1 Draft Documentation Overview The SkySQL Administration Console is a web based application for the administration and monitoring of MySQL 1 databases.
More informationConfiguring Your Gateman Email Server
Configuring Your Gateman Email Server Your Gateman Lifestyle Server includes an Email Server that provides users access to email via an email client and via your web browser using your laptop and mobile
More informationBarracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Managing your Quarantine Inbox This chapter describes how you can check your quarantine messages, classify messages as spam and not spam, and modify your user preferences
More informationKaseya 2. Quick Start Guide. for Network Monitor 4.1
Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private
More informationAras Innovator Authentication Setup
Aras Innovator Authentication Setup Aras Innovator 9.1 Document #: 9.1.009032008 Last Modified: 3/12/2009 Copyright 2009 Aras Corporation ARAS CORPORATION Copyright 2009 All rights reserved Aras Corporation
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationMoodleMobile Block. Adding MoodleMobile to your course
MoodleMobile Block This document describes how to add a MoodleMobile block to your course and use it to send text messages and emails to your students. Adding MoodleMobile to your course 1) Navigate to
More informationProliphix. Installer. Remote Management. Guide
Proliphix Installer Remote Management Guide Rev 2.0 Page 2 of 21 Table of Contents 1. Intended Audience...3 2. Remote Management Overview...4 3. Installer Profile Modification...5 4. Remote Management
More informationKaseya 2. User Guide. Version 1.0
Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
More informationFastNetSecurity SpamGuard Email Spam Filter How-To
FastNetSecurity SpamGuard Email Spam Filter How-To Using your web browser, log on to https://spamguard.fastnetsecurity.com Tip: Add a bookmark to this page for easy access! Login credentials will incorporate
More informationTACACS+ Authentication
4 TACACS+ Authentication Contents Overview...................................................... 4-2 Terminology Used in TACACS Applications:........................ 4-3 General System Requirements....................................
More informationGrandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
More informationTutorial: How to Use SQL Server Management Studio from Home
Tutorial: How to Use SQL Server Management Studio from Home Steps: 1. Assess the Environment 2. Set up the Environment 3. Download Microsoft SQL Server Express Edition 4. Install Microsoft SQL Server Express
More informationSMS banking using Cell phone
International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 3 No. 2 June 2013, pp. 463-469 2013 Innovative Space of Scientific Research Journals http://www.issr-journals.org/ijias/ SMS
More informationUSER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces
More informationDashboard Admin Guide
MadCap Software Dashboard Admin Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document
More informationInfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x
InfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x Active Innovations, Inc. Copyright 1998 2015 www.inforouter.com Installing the LDAP Authentication Web Service
More information1 Accessing E-mail accounts on the Axxess Mail Server
1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server
More informationKFKI Unified Messaging Server (UMS) User manual
KFKI Unified Messaging Server (UMS) User manual Introduction UMS Unified Messaging Server is suitable for receiving voicemail and fax messages and sending fax messages. User webpage Availability The user
More informationSupported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access
Configuring Timeout, Retransmission, and Key Values per RADIUS Server The Configuring Timeout, Retransmission, and Key Values per RADIUS Server feature extends the functionality of the existing radius-server
More informationKUMC Spam Firewall: Barracuda Instructions
KUMC Spam Firewall: Barracuda Instructions Receiving Messages from the KUMC Spam Firewall Greeting Message The first time the KUMC Spam Firewall quarantines an email intended for you, the system sends
More informationSpectrum Technology Platform. Version 9.0. Administration Guide
Spectrum Technology Platform Version 9.0 Administration Guide Contents Chapter 1: Getting Started...7 Starting and Stopping the Server...8 Installing the Client Tools...8 Starting the Client Tools...9
More informationNGASI AppServer Manager SaaS/ASP Hosting Automation for Cloud Computing Administrator and User Guide
NGASI AppServer Manager SaaS/ASP Hosting Automation for Cloud Computing Administrator and User Guide NGASI SaaS Hosting Automation is a JAVA SaaS Enablement infrastructure that enables web hosting services
More informationDatabase Management Systems [COP5725] Project Deliverable 2. SaferDC. Submitted By: Group 1
Database Management Systems [COP5725] Project Deliverable 2 SaferDC Submitted By: Group 1 Armando Leon [UF ID: 43568722] Nitin Agrahara [UF ID: 73714398] Neeraj Rao [UF ID: 37737151] Rahul Bhoopalam [UF
More informationi-mobile Multi-Factor Authentication
i-mobile Multi-Factor Authentication Introduction... 1 i-mobile Multi-Factor Authentication... 1 i-mobile WAP MFA Enrollment... 2 i-mobile Application MFA Enrollment... 4 Error Conditions and Resolutions...
More informationADO and SQL Server Security
ADO and SQL Server Security Security is a growing concern in the Internet/intranet development community. It is a constant trade off between access to services and data, and protection of those services
More informationManageEngine Desktop Central. Mobile Device Management User Guide
ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...
More informationHosted Fax Mail. Hosted Fax Mail. User Guide
Hosted Fax Mail Hosted Fax Mail User Guide Contents 1 About this Guide... 2 2 Hosted Fax Mail... 3 3 Getting Started... 4 3.1 Logging On to the Web Portal... 4 4 Web Portal Mailbox... 6 4.1 Checking Messages
More informationIRF2000 IWL3000 SRC1000 Application Note - Apps with OSGi - Condition Monitoring with WWH push
Version 2.0 Original-Application Note ads-tec GmbH IRF2000 IWL3000 SRC1000 Application Note - Apps with OSGi - Condition Monitoring with WWH push Stand: 28.10.2014 ads-tec GmbH 2014 IRF2000 IWL3000 SRC1000
More informationINUVIKA OVD SUPPORT SUPPORT SYSTEM GUIDE. Mathieu Schires Version 1.1 Published 28/04/2015
INUVIKA OVD SUPPORT SUPPORT SYSTEM GUIDE Mathieu Schires Version 1.1 Published 28/04/2015 This document describes how to use the Inuvika Support System for reporting support incidents related to Inuvika
More informationMultimedia im Netz Online Multimedia Winter semester 2015/16
Multimedia im Netz Online Multimedia Winter semester 2015/16 Tutorial 04 Minor Subject Ludwig-Maximilians-Universität München Online Multimedia WS 2015/16 - Tutorial 04 (NF) - 1 Today s Agenda Repetition:
More informationSystem Area Manager. Remote Management
System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for
More informationESET Mobile Security Business Edition for Windows Mobile
ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security
More informationWelcome to EMP Monitor (Employee monitoring system):
Welcome to EMP Monitor (Employee monitoring system): Overview: Admin End. User End. 1.0 Admin End: Introduction to Admin panel. Admin panel log in. Introduction to UI. Adding an Employee. Getting and editing
More informationExternal Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845
More informationConfiguring Timeout, Retransmission, and Key Values Per RADIUS Server
Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Feature Summary The radius-server host command functions have been extended to include timeout, retransmission, and encryption key
More informationNokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia for Business Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E50 Legal Notice Copyright Nokia 2006. All rights reserved. Reproduction, transfer, distribution
More informationNTTCT Mail Hosting Service Account Management
NTTCT Mail Hosting Service Account Management (Mail Hosting: NTT Communications (Thailand) Co., Ltd.) About This Document This document is intended to be a quick reference guide to follow for administrator
More information