HIGHSEC eid App Administration User Manual

Size: px
Start display at page:

Download "HIGHSEC eid App Administration User Manual"

Transcription

1 HIGHSEC eid App Administration User Manual

2 Contents 1 Introduction Application overview Managing HIGHSEC eid App Deleting card pairings Inspecting smart card contents Operations on smart card Changing display message PIN operations ID-PIN ID-PIN Unblocking ESIGN-PIN ESIGN-PIN Unblocking Certificate operations Import Certificate Update Certificate Remove Certificate Additional features Third Party Software OpenSSL Toolkit OpenSSL License Original SSLeay License BouncyCastle Crypto APIs License Page 2 of 22

3 1 Introduction HIGHSEC eid App Administration application (in the rest of the text called Admin app or the application) is used to manage and control the functionality of the rest of eid App system. It is also used to inspect the contents of the smart card, as well as manage certificates stored in the smart card. The application requires.net Framework v3.5, and is using functionality provided by third party cryptography library Bouncy Castle, which is part of the installation. 2 Application overview The application has only one main window. Window is divided to two main parts, a tree view on the left and a free window space on the right. When user selects an item in tree view a corresponding form will be displayed in free window space. In the menu on the top the user can change the language of the application. 3 Managing HIGHSEC eid App Several options control the behavior of the rest of eid App system. All of them can be found and changed from the tree item Global settings. Here is the brief explanation of those options: Page 3 of 22

4 Allow more than one application to access the card: When this option is set several Windows applications can use the smart card. If the option is not set only one application is allowed to access smart card at any given time. Allow applications to cache PIN: PIN caching is only meaningful if more than one application can access the card. When this option is set the user will be asked for PIN only once per application, when the application accesses the smart card for the first time. If the option is not set user will be prompted for PIN each time an application request accesses to the smart card. Duration of OCSP stored information Time interval during which a certificate is deemed valid after it is verified through OCSP (Online Certificate check Status Protocol). Enable low level logging: When this option is set all communication between the smart card and eid App will be saved in a special log file. The communication is encrypted, so the user will only be able to see the communication in encrypted form. Enable verbose logging: When this option is set eid App will write additional and more detailed log in the log file. This option is useful when trying to diagnose a problem. If the user changes one or more options the Update button will become enabled. When the user clicks the Update button new options are saved. If user clicks on Cancel all options are reset to their previous state. 3.1 Deleting card pairings To use the smart card it must be paired to the computer. To remove all card pairings from the computer select tree item Delete pairings. In new page click Delete. Page 4 of 22

5 When the pairings are deleted to use a card you would have to pair it again to this computer. 4 Inspecting smart card contents When a smart card is inserted into a reader a new item named after the reader is added to the tree view and expanded with several sub-items. Browsing through sub-item Virtual tokens user may inspect the contents of the smart card. Various functionalities of smart card are employed through certificates. Certificates and corresponding keys are associated with entities called modules, which are contained within smart card applications, which reside in virtual tokens. Virtual tokens guard their access with PINs. The structure that binds all these elements is transformed into tree items. Ending tree items show the certificates assigned to each module. In most cases there is only one certificate per module, but for cases when there is more than one the user can select a certificate from drop down list where they are listed by their subjects. 5 Operations on smart card When smart card is inserted into reader the user may perform several operations that involve smart cards. All of them require for the user to enter PIN. 5.1 Changing display message Display message is a kind of security feature. This feature is enabled only for contactless smart card. Display message resides on smart card, and user should know its contents. Each time a smart card requires user s authentication this display message will be shown to the user for verification. Page 5 of 22

6 User can change this display message with the following procedure: Select tree item Display message. This tree item is not available if the smart card is not contactless. The page titled Change smart card display message will appear, and on the page current display message will be displayed. Replace the text of current display message with new display message. Enter ID-PIN in field PIN. Click on Update. A message will appear, confirming the success of the operation. 5.2 PIN operations SCeID contains two tokens used for different purposes: ID and ESIGN. Page 6 of 22

7 5.2.1 ID-PIN The only permitted operation on ID-PIN (except for unblocking) is to change the PIN. Use the following procedure to change ID PIN: Select tree item ID-PIN. The page titled Change smart card PIN will appear. In case of contactless card verify that display message is valid. If smart card is not contactless display message is not available. Enter current PIN in field Current PIN. Enter the same new PIN in fields New PIN and Repeat new PIN. If contents of fields New PIN and Repeat new PIN is identical, and field Current PIN is not empty button Update will be enabled. Click on Update. A message will appear, confirming the success of the operation ID-PIN Unblocking If a user enters ID-PIN incorrectly three times in a row as part of any operation requiring the PIN the smart card will block further attempts to use the PIN. In that case PIN must be unblocked using PUK (PIN Unlock Key). Use the following procedure to unblock ID-PIN if entering a new PIN is not required: Select tree item ID-PIN Unblocking. The page titled Unblock smart card PIN will appear. Enter valid PUK in field PUK. Page 7 of 22

8 Click on Update. A message will appear, confirming the success of the operation. Use the following procedure to unblock ID-PIN if entering a new PIN is required: Select tree item ID-PIN Unblocking. The page titled Unblock smart card PIN will appear. Enter valid PUK in field PUK. Enter new PIN in fields New PIN and Repeat new PIN. If contents of fields New PIN and Repeat new PIN is identical, and field PUK is not empty button Update will be enabled. Page 8 of 22

9 Click on Update. A message will appear, confirming the success of the operation ESIGN-PIN The only permitted operation on ESIGN-PIN (except for unblocking) is to change the PIN. Use the following procedure to change ESIGN-PIN: Select tree item ESIGN-PIN. The page titled Change ESIGN PIN will appear. In case of contactless card verify that display message is valid. If smart card is not contactless display message is not available. Enter current valid ESIGN-PIN in field Current PIN. Enter the same new PIN in fields New PIN and Repeat new PIN. If contents of fields New PIN and Repeat new PIN is identical, and field Current PIN is not empty button Update will be enabled. Click on Update. A message will appear, confirming the success of the operation. Page 9 of 22

10 5.2.4 ESIGN-PIN Unblocking If user enters ESIGN-PIN incorrectly three times in a row as part of any operation requiring the PIN the smart card will block further attempts to use the PIN. In that case PIN must be unblocked using PUK (PIN Unlock Key). Use the following procedure to unblock ESIGN-PIN: Select tree item ESIGN-PIN Unblocking. The page titled Unblock ESIGN PIN will appear. Enter valid PUK in field PUK. Click on Update. A message will appear, confirming the success of the operation. Page 10 of 22

11 5.3 Certificate operations Certificates are used to guarantee someone s identity. Owner of a certificate is a person that owns a private key paired with this certificate. Smart card can contain several certificates, each having a different purpose. If a certificate does not yet exist on smart card one must be imported first. If there already is certificate on smart card it can be updated with another one. A certificate can also be removed from the smart card Import Certificate Importing a certificate to a smart card is a process that is performed in several steps, some of which may be omitted depending on the situation. Use the following procedure to import a certificate: Precondition: type of the certificate to be imported must not already exist on smart card. Select tree item Import Certificate. The page titled Load Certificate will appear. This is the first page of the importing wizard. In the first field enter full path to the certificate. You may click on Open to easily find the certificate file. If importing certificate requires a password enter the password in the second field. Page 11 of 22

12 Click on Next. If there was a root certificate in importing certificate chain a page titled Verify Fingerprint will appear. If there is no root certificate skip to the next page. Click on Next. Page titled View Certificate will appear. Verify that this is the certificate you want imported. You may click on View Details to see all information related to certificate. In read only field Certificate Type a type of the certificate will be shown, if such information exist in the certificate. Page 12 of 22

13 Click on Next. If certificate type is not found in the certificate a page titled Select Certificate Type will appear. If type is already found skip to the next page. User must manually select a certificate type. First choice is to select one of predefined types not already found on card. Second choice is to introduce a new type name. New type name must begin with letter U followed by symbol _ (underscore), followed by new name. Click on Next. Page titled Import Certificate will appear. This is the ending page upon which the certificate is to be imported to smart card. Click on Update. Page titled Operation Status will appear, showing the result of the import. User may click now on Restart to import another certificate. Page 13 of 22

14 5.3.2 Update Certificate Updating a certificate to smart card is a process that is performed in several steps, some of which may be omitted depending on the situation. Use the following procedure to update a certificate: Precondition: type of the certificate to be updated must already exist on smart card. Select tree item Update Certificate. The page titled Load Certificate will appear. This is the first page of the updating wizard. Enter full path to the certificate in the field. You may click on Open to easily find the certificate file. Page 14 of 22

15 Click on Next. Page titled View Certificate will appear. Verify that this is the certificate you want updated. You may click on View Details to see all information related to certificate. In read only field Certificate Type a type of the certificate will be shown, if such information exist in the certificate. Click on Next. If certificate type is not found on a certificate a page titled Select Certificate Type will appear. If type is already found skip to the next page. User must manually select a certificate type. Only user defined certificate types already found on smart card can be given as an option. Page 15 of 22

16 Click on Next. Page titled Update Certificate will appear. This is the ending page upon which the certificate is to be updated to smart card. Click on Update. Page titled Operation Status will appear, showing the result of the update. User may click now on Restart to update another certificate Remove Certificate Removing a certificate from smart card is a process that is performed in two steps. Use the following procedure to remove a certificate: Precondition: type of the certificate to be removed must already exist on smart card. Page 16 of 22

17 Select tree item Remove Certificate. The page titled Select Certificate will appear. This is the first page of the removing wizard. User must manually select a certificate type. Only the types of deletable certificates already found on smart card can be given as an option. Click on Next. Page titled Remove Certificate will appear. Click on Remove. Page titled Operation Status will appear, showing the result of the removal. User may click now on Restart to remove another certificate. Page 17 of 22

18 6 Additional features In the page titled About user can find several pieces of information about this application, and some about the computer environment. In the page titled Support user can find additional information, such as card applications that eid App is currently supporting, paths to several log files, and direct access to three main certificate stores. Page 18 of 22

19 For all log files corresponding Open button will open the most recent and most appropriate file, but other log files of the same type are available if user selects button s down arrow and then selects the option Open Containing Folder. Usage log file contains actions taken from using CSP and PKCS#11 libraries. If no such actions have been performed log file will not exist. Installation log file is created during the installation process. Open button will display the most recent log file, but other log files are available in containing folder. Low level log file contains direct communication between a smart card and eid App service. This communication is protected with encryption, and messages in log file are also encrypted. Service log file contains actions performed by eid App service. Three buttons at the bottom of the page show the contents of corresponding certificate stores. When the list of certificates is displayed user can examine the details of each by selecting one, and following the link in the last line. Personal store contains certificates that belong to the user. Root store contains trusted root certificates. Root certificates are self signed and issuers of intermediate CA certificates. Intermediate store contains intermediate certification authority (CA) certificates. User certificates are signed by them, and they in turn are signed by root certificates. 7 Third Party Software The HIGHSEC eid App installation package contains software developed by third parties: 7.1 OpenSSL Toolkit This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). The usage of the OpenSSL Toolkit is provided under the license conditions as stated here: OpenSSL License Copyright (c) The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Page 19 of 22

20 3. All advertising materials mentioning features or use of this software must display the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. ( 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact 5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com) Original SSLeay License Copyright (C) Eric Young (eay@cryptsoft.com) All rights reserved. This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com). Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Page 20 of 22

21 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes cryptographic software written by Eric Young The word 'cryptographic' can be left out if the routines from the library being used are not cryptographic related :-). 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.] 7.2 BouncyCastle Crypto APIs This product includes software developed by the Legon of Bouncy Castle The usage of the BouncyCastle Crypto API is provided under the license terms as stated here: Please note this should be read in the same way as the MIT license License Copyright (c) The Legion of the Bouncy Castle Inc. ( Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, Page 21 of 22

22 and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Page 22 of 22

Apache Software Foundation This product includes software developed by the Apache Software Foundation (http://www.apache.org)

Apache Software Foundation This product includes software developed by the Apache Software Foundation (http://www.apache.org) Apache Software Foundation This product includes software developed by the Apache Software Foundation (http://www.apache.org) FutureScale, Inc. PureMVC PureMVC AS3 Utility Startup Manager Copyright (c)

More information

Open Source Used In Meeting integration for Jabber 9.6

Open Source Used In Meeting integration for Jabber 9.6 Open Source Used In Meeting integration for Jabber 9.6 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website

More information

Release Notes for CounterPath X-Lite 4 for Windows Version 4.8

Release Notes for CounterPath X-Lite 4 for Windows Version 4.8 CounterPath Corporation Suite 300, Bentall One Centre 505 Burrard Street Box 95 Vancouver BC V7X 1M3 Canada Telephone: +1.604.320.3344 www.counterpath.com Release Notes for CounterPath X-Lite 4 for Windows

More information

Release Notes for. CounterPath Bria iphone Edition CounterPath Bria ipad Edition Version 3.1.0

Release Notes for. CounterPath Bria iphone Edition CounterPath Bria ipad Edition Version 3.1.0 CounterPath Corporation Suite 300, Bentall One Centre 505 Burrard Street Box 95 Vancouver BC V7X 1M3 Canada V6B1R8 Telephone: +1.604.320.3344 www.counterpath.com Release Notes for CounterPath Bria iphone

More information

NetVault : SmartDisk v1.0.1 Release Notes Contents

NetVault : SmartDisk v1.0.1 Release Notes Contents NetVault : SmartDisk v1.0.1 Release Notes Contents Release Information Documentation for NetVault: SmartDisk New Features Known Issues Faults Fixed Third-Party Licenses Release Information Release Version:

More information

CA DLP. Release Notes for Advanced Encryption. r12.0

CA DLP. Release Notes for Advanced Encryption. r12.0 CA DLP Release Notes for Advanced Encryption r12.0 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes

More information

Enterprise Manager to Enterprise Console upgrade guide. Sophos Enterprise Manager version 4.7 Sophos Enterprise Console version 4.7.

Enterprise Manager to Enterprise Console upgrade guide. Sophos Enterprise Manager version 4.7 Sophos Enterprise Console version 4.7. Enterprise Manager to Enterprise Console upgrade guide Sophos Enterprise Manager version 4.7 Sophos Enterprise Console version 4.7.1 Document date: July 2011 Contents 1 About this guide...3 2 What are

More information

Sophos Enterprise Console quick startup guide. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console quick startup guide. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console quick startup guide Product version: 5.1 Document date: June 2012 Contents 1 About this guide...3 2 What do I install?...3 3 What are the key steps?...3 4 Check the system requirements...4

More information

R&S TSMW Radio Network Analyzer Open Source Acknowledgment

R&S TSMW Radio Network Analyzer Open Source Acknowledgment Radio Network Analyzer Open Source Acknowledgment (;Úà@2) 1176.8216.02 03 Test & Measurement Open Source Acknowledgment Contents Contents 1 Introduction... 3 1.1 Disclaimer... 3 1.2 How to obtain the source

More information

Installation and Configuration Guide Simba Technologies Inc.

Installation and Configuration Guide Simba Technologies Inc. Simba Microsoft SQL Server ODBC Installation and Configuration Guide Simba Technologies Inc. September 10, 2015 Copyright 2015 Simba Technologies Inc. All Rights Reserved. Information in this document

More information

SimbaEngine SDK 9.5. OLE DB Implementation Guide. Simba Technologies Inc.

SimbaEngine SDK 9.5. OLE DB Implementation Guide. Simba Technologies Inc. 9.5 Simba Technologies Inc. May 2015 Copyright 2015 Simba Technologies Inc. All Rights Reserved. Information in this document is subject to change without notice. Companies, names and data used in examples

More information

Open Source Licenses and Notices for Polycom HDX Systems

Open Source Licenses and Notices for Polycom HDX Systems for Polycom HDX Systems The software on which Polycom HDX operates includes the open source software listed below. BinUtils BinUtils is distributed under the GNU General Public License. A copy of the GNU

More information

Adobe Connect Add-in for Microsoft Outlook Third Party Software Notices and/or Additional Terms and Conditions

Adobe Connect Add-in for Microsoft Outlook Third Party Software Notices and/or Additional Terms and Conditions Adobe Connect Add-in for Microsoft Outlook Third Party Software Notices and/or Additional Terms and Conditions Massachusetts Institute of Technology (MIT) Copyright 1991, 1998 by the Massachusetts Institute

More information

Release Notes for CounterPath Bria 3 for Windows Version 3.1.2

Release Notes for CounterPath Bria 3 for Windows Version 3.1.2 CounterPath Corporation Suite 300, Bentall One Centre 505 Burrard Street Box 95 Vancouver BC V7X 1M3 Canada V6B1R8 Telephone: +1.604.320.3344 www.counterpath.com Release Notes for CounterPath Bria 3 for

More information

Adobe Connect Collaboration SDK Third Party Notices and/or Additional Terms and Conditions

Adobe Connect Collaboration SDK Third Party Notices and/or Additional Terms and Conditions Adobe Connect Collaboration SDK Third Party Notices and/or Additional Terms and Conditions The contents of this file are subject to the Netscape Public License Version 1.1 (the "License"); you may not

More information

How To Use The Programs Of Ancient.Org

How To Use The Programs Of Ancient.Org Oracle s PeopleSoft Enterprise Campus Solutions 9.0 Feature Pack 2: Electronic Payment Integration November 2009 Campus Solutions 9.0 Feature Pack 2: Electronic Payment Integration Copyright 2009, Oracle.

More information

NetSuite End User License Agreement for Mobile Applications

NetSuite End User License Agreement for Mobile Applications Last Revision: August 24, 2015 NetSuite End User License Agreement for Mobile Applications This NetSuite End User License Agreement for Mobile Applications, including without limitation, all attachments

More information

Simba ODBC Driver with SQL Connector for Apache Cassandra

Simba ODBC Driver with SQL Connector for Apache Cassandra Simba ODBC Driver with SQL Connector for Apache Cassandra Installation and Configuration Guide May 7, 2013 Simba Technologies Inc. Copyright 2012-2013 Simba Technologies Inc. All Rights Reserved. Information

More information

RSA Two Factor Authentication

RSA Two Factor Authentication RSA Two Factor Authentication VERSION: 1.0 UPDATED: MARCH 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 16 Copyright Notices Copyright 2002-2014 KEMP Technologies, Inc..

More information

List of open source components used by Intel System Management Software

List of open source components used by Intel System Management Software List of open source components used by Intel System Management Software Sl # Components License Link for additional info 1. AES/HMAC/SHA1 Brian Gladman http://www.gladman.me.uk/ 2. MD2/MD5 Message Digest

More information

Open Source Used In Cisco Instant Connect for ios Devices 4.9(1)

Open Source Used In Cisco Instant Connect for ios Devices 4.9(1) Open Source Used In Cisco Instant Connect for ios Devices 4.9(1) Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the

More information

Sophos Anti-Virus for Linux startup guide. Product version: 9

Sophos Anti-Virus for Linux startup guide. Product version: 9 Sophos Anti-Virus for Linux startup guide Product version: 9 Document date: December 2013 Contents 1 About this guide...3 2 System requirements...3 3 About Sophos Anti-Virus for Linux...3 4 Installing

More information

JP1/Automatic Job Management System 3 - Definition Assistant Description, Operator's Guide and Reference

JP1/Automatic Job Management System 3 - Definition Assistant Description, Operator's Guide and Reference JP1 Version 11 JP1/Automatic Job Management System 3 - Definition Assistant Description, Operator's Guide and Reference 3021-3-B25(E) Notices Relevant program products For details about the applicable

More information

Backup Exec Third-Party Information. Third-Party License Agreements

Backup Exec Third-Party Information. Third-Party License Agreements Backup Exec Third-Party Information Third-Party License Agreements Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation makes no warranty of

More information

Minor corrective content service pack to address customer and software issues. * This release is no longer available.

Minor corrective content service pack to address customer and software issues. * This release is no longer available. Avaya VPN Client Software Release 10.06_301 1. Release Summary Release Date July 10 th, 2013 Release Version 10.06_301 Prior Release 10.06_300 (Jun 14 th, 2013) Minor corrective content service pack to

More information

System Center Virtual Machine Manager 2012 R2 Plug-In. Feature Description

System Center Virtual Machine Manager 2012 R2 Plug-In. Feature Description System Center Virtual Machine Manager 2012 R2 Plug-In Feature Description VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

Avaya VPN Client Software Release 10.06 (build 022)

Avaya VPN Client Software Release 10.06 (build 022) Avaya VPN Client Software Release 10.06 (build 022) 1. Release Summary Release Date: June 22 nd, 2012 Purpose: Software major release to include new features and address customer requests and software

More information

AAI - Authentication and Authorization Infrastructure Exhibit 4 Software Licenses

AAI - Authentication and Authorization Infrastructure Exhibit 4 Software Licenses AAI - Authentication and Authorization Infrastructure Exhibit 4 Software Licenses 2004 SWITCH Document management Version/status: final 1.0 / final Date: 13. 2. 2004 7. July 2004 Author(s): Nicole Beranek

More information

RSA Two Factor Authentication. Feature Description

RSA Two Factor Authentication. Feature Description RSA Two Factor Authentication Feature Description VERSION: 3.0 UPDATED: SEPTEMBER 2015 Copyright Notices Copyright 2002 2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP

More information

Sophos Enterprise Console upgrade guide

Sophos Enterprise Console upgrade guide Sophos Enterprise Console upgrade guide Product version: 5.2.0 Document date: January 2013 Contents 1 About this guide...3 2 Which versions can I upgrade from?...4 3 How do I add Sophos Disk Encryption?...5

More information

Oracle s PeopleSoft 9.0 Recruiting and Admissions Changes and Updates for CS Bundle #14

Oracle s PeopleSoft 9.0 Recruiting and Admissions Changes and Updates for CS Bundle #14 Oracle s PeopleSoft 9.0 Recruiting and Admissions Changes and Updates for CS Bundle #14 August 2009 Changes and Updates for CS Bundle #14 Copyright 2009, Oracle. All rights reserved. The Programs (which

More information

Oracle s PeopleSoft 9.0 Recruiting and Admissions Changes and Updates for CS Bundle #38

Oracle s PeopleSoft 9.0 Recruiting and Admissions Changes and Updates for CS Bundle #38 Oracle s PeopleSoft 9.0 Recruiting and Admissions Changes and Updates for CS Bundle #38 July 2015 Changes and Updates for CS Bundle #38 Copyright 2015, Oracle. All rights reserved. The Programs (which

More information

Sophos Anti-Virus for VMware vshield upgrade guide. Product version: 1.1

Sophos Anti-Virus for VMware vshield upgrade guide. Product version: 1.1 Sophos Anti-Virus for VMware vshield upgrade guide Product version: 1.1 Document date: February 2014 Contents 1 About this guide...3 2 Key steps in upgrading...3 3 Set up the new update share...3 4 Check

More information

Using SNMP with OnGuard

Using SNMP with OnGuard Advanced Installation Topics Chapter 8: Using SNMP with OnGuard SNMP (Simple Network Management Protocol) is used primarily for managing and monitoring devices on a network. This is achieved through the

More information

Novell Nsure Audit 1.0.3. Novell Nsure Audit 1.0.3 Administration Guide. novdocx (ENU) 01 February 2006. www.novell.com ADMINISTRATION GUIDE

Novell Nsure Audit 1.0.3. Novell Nsure Audit 1.0.3 Administration Guide. novdocx (ENU) 01 February 2006. www.novell.com ADMINISTRATION GUIDE Novell Nsure Audit 1.0.3 Administration Guide Novell Nsure Audit 1.0.3 July 18, 2006 ADMINISTRATION GUIDE www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to

More information

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

Oracle s PeopleSoft 9.0 Recruiting and Admissions Changes and Updates for CS Bundle #31

Oracle s PeopleSoft 9.0 Recruiting and Admissions Changes and Updates for CS Bundle #31 Oracle s PeopleSoft 9.0 Recruiting and Admissions Changes and Updates for CS Bundle #31 October 2013 Changes and Updates for CS Bundle #31 Copyright 2013, Oracle. All rights reserved. The Programs (which

More information

ANZ TRANSACTIVE MOBILE for ipad

ANZ TRANSACTIVE MOBILE for ipad ANZ TRANSACTIVE MOBILE for ipad SIMPLIFYING AND CONNECTING YOUR TRANSACTION BANKING ACROSS AUSTRALIA AND NEW ZEALAND QUICK REFERENCE GUIDE May 2014 GETTING STARTED Please ensure your ANZ Transactive Administrator

More information

Adobe DNG Flat Field Plug-in (1.0) Software Notices and/or Additional Terms and Conditions

Adobe DNG Flat Field Plug-in (1.0) Software Notices and/or Additional Terms and Conditions Adobe DNG Flat Field Plug-in (1.0) Software Notices and/or Additional Terms and Conditions This page and/or pages linked from this page contain Third Party Software Notices and/or Additional Terms and

More information

openssl egg Bindings to the OpenSSL SSL/TLS library Extension for Chicken Scheme Version 1.1.1 Thomas Chust

openssl egg Bindings to the OpenSSL SSL/TLS library Extension for Chicken Scheme Version 1.1.1 Thomas Chust openssl egg Bindings to the OpenSSL SSL/TLS library Extension for Chicken Scheme Version 1.1.1 Thomas Chust i Table of Contents 1 About this egg............................ 1 1.1 Version history..............................................

More information

Activelock Customer Management 1.0

Activelock Customer Management 1.0 Activelock Customer Management 1.0 Mark Bastian January 19, 2009 Contents Overview... 3 Activelock EULA... 3 Activelock Customer Management Forms... 4 Main Menu... 4 Customer Management... 5 New Software

More information

How To Use Cybersafe Top Secret

How To Use Cybersafe Top Secret CyberSafe for Windows User s Manual Table of Contents General information about CyberSafe Top Secret 1 What's new in CyberSafe Top Secret 2.0 5 Notation Conventions used in this Manual 7 Who should read

More information

Open source texts and acknowledgements

Open source texts and acknowledgements Open source texts and acknowledgements 1 Licence text and acknowledgements License Texts and Acknowledgements for open source software used in Tilgin products. Tilgin is grateful to the groups and individuals

More information

Microsoft SharePoint

Microsoft SharePoint Microsoft SharePoint VERSION: 1.1 UPDATED: JULY 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 13 Copyright Notices Copyright 2002-2014 KEMP Technologies, Inc.. All rights

More information

Administrator Help. Websense Email Security. v7.2

Administrator Help. Websense Email Security. v7.2 Administrator Help Websense Email Security v7.2 Copyright 2004-2009 Websense, Inc. All rights reserved. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published September 9, 2009

More information

Version 6.0 SurfControl E-mail Filter for SMTP

Version 6.0 SurfControl E-mail Filter for SMTP Version 6.0 SurfControl E-mail Filter for SMTP Administrator's Guide Notices NOTICES Copyright 2007 SurfControl plc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval

More information

Fuse MQ Enterprise Broker Administration Tutorials

Fuse MQ Enterprise Broker Administration Tutorials Fuse MQ Enterprise Broker Administration Tutorials Version 7.0 April 2012 Integration Everywhere Broker Administration Tutorials Version 7.0 Updated: 14 Sep 2012 Copyright 2011 FuseSource Corp. All rights

More information

HERE ios SDK. Release Notes. Starter Edition Version 3.1

HERE ios SDK. Release Notes. Starter Edition Version 3.1 HERE ios SDK Release Notes Starter Edition Version 3.1 HERE ios SDK Release Notes 2 Contents Contents Legal Notices...3 Document Information... 4 Overview...5 Target Audience...6 Release Content...7 Package

More information

FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide

FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide February 5, 2015 Revision 1 Copyright 2015 Fortinet, Inc. All rights reserved.

More information

Reference Guide NPD4211-00 EN

Reference Guide NPD4211-00 EN NPD4211-00 EN Copyright Notice No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying, recording, or otherwise,

More information

Transaction Vault Credit Card Driver for 3700 POS

Transaction Vault Credit Card Driver for 3700 POS Restaurant Enterprise Series Transaction Vault Credit Card Driver for 3700 POS April 3, 2013 *******************Important******************* When upgrading the Transaction Vault Credit Card Driver from

More information

Open Source Used In Cisco IronPort Email Encryption SDK 6.9.2 014

Open Source Used In Cisco IronPort Email Encryption SDK 6.9.2 014 Open Source Used In Cisco IronPort Email Encryption SDK 6.9.2 014 This document contains the licenses and notices for open source software used in this product. With respect to the free/open source software

More information

Hyper V Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide

Hyper V Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8 Installation Guide VERSION: 3.0 UPDATED: SEPTEMBER 2015 Copyright Notices Copyright 2002 2015 KEMP Technologies, Inc..

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

Sentinel HASP v.5.0 Installation Guide

Sentinel HASP v.5.0 Installation Guide Software Rights Management Sentinel HASP v.5.0 Installation Guide www.safenet-inc.com Copyrights and Trademarks Patents Disclaimer The Sentinel HASP system and its accompanying documentation are copyrighted

More information

Log Insight Manager. Deployment Guide

Log Insight Manager. Deployment Guide Log Insight Manager Deployment Guide VERSION: 3.0 UPDATED: OCTOBER 2015 Copyright Notices Copyright 2002-2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

GEO Sticky DNS. GEO Sticky DNS. Feature Description

GEO Sticky DNS. GEO Sticky DNS. Feature Description GEO Sticky DNS Feature Description VERSION: 5.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo

More information

AGILE RISK MANAGEMENT LLC MASTER SOFTWARE LICENSE AGREEMENT

AGILE RISK MANAGEMENT LLC MASTER SOFTWARE LICENSE AGREEMENT AGILE RISK MANAGEMENT LLC MASTER SOFTWARE LICENSE AGREEMENT TERMS AND CONDITIONS 1. Scope of Agreement; Definitions. This Agreement covers the license and permitted use of the Agile Risk Management LLC

More information

Port Following. Port Following. Feature Description

Port Following. Port Following. Feature Description Feature Description VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered

More information

RSA Data Security, Inc. Portions derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm.

RSA Data Security, Inc. Portions derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm. Adobe Reader for ios, Android, and Adobe Reader Touch for Windows may contain one or more of the following Third Party Software Notices and/or Additional Terms and Conditions RSA Data Security, Inc. Portions

More information

Installing the Shrew Soft VPN Client

Installing the Shrew Soft VPN Client Windows Install Installing the Shrew Soft VPN Client ShrewVPNWindows201003-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:

More information

Release Notes for CounterPath Bria Android Edition CounterPath Bria Android Tablet Edition Version 3.2.0

Release Notes for CounterPath Bria Android Edition CounterPath Bria Android Tablet Edition Version 3.2.0 CounterPath Corporation Suite 300, Bentall One Centre 505 Burrard Street Box 95 Vancouver BC V7X 1M3 Canada Telephone: +1.604.320.3344 www.counterpath.com Release Notes for CounterPath Bria Android Edition

More information

PeopleSoft Enterprise 8.9 MP1 Financial Aid Updates to Financial Aid for CS Bundle 4 Regulatory Release 3 2006-2007

PeopleSoft Enterprise 8.9 MP1 Financial Aid Updates to Financial Aid for CS Bundle 4 Regulatory Release 3 2006-2007 PeopleSoft Enterprise 8.9 MP1 Financial Aid Updates to Financial Aid for CS Bundle 4 Regulatory Release 3 2006-2007 May 2006 Updates to Financial Aid for CS Bundle 4 Regulatory Release 3 2006-2007 Copyright

More information

PeopleSoft Red Paper Series. E-Learning. By: Gregory Sandford, Benjamin Harr, Leo Popov May 2006

PeopleSoft Red Paper Series. E-Learning. By: Gregory Sandford, Benjamin Harr, Leo Popov May 2006 PeopleSoft Red Paper Series E-Learning By: Gregory Sandford, Benjamin Harr, Leo Popov May 2006 E-Learning Copyright 2006, Oracle. All rights reserved. The Programs (which include both the software and

More information

Third Party Software Used In PLEK500 (Utility for Win) v1.x.xx.xxx

Third Party Software Used In PLEK500 (Utility for Win) v1.x.xx.xxx Third Party Software Used In PLEK500 (Utility for Win) v1.x.xx.xxx March 2013 This document contains the licenses and notices for open source software used in this product. With respect to the free/open

More information

BAE SYSTEMS INFORMATION SOLUTIONS INC. SOCET SERVICES -- DATA REFORMATING SERVICE SOFTWARE LICENSE AGREEMENT

BAE SYSTEMS INFORMATION SOLUTIONS INC. SOCET SERVICES -- DATA REFORMATING SERVICE SOFTWARE LICENSE AGREEMENT BAE SYSTEMS INFORMATION SOLUTIONS INC. SOCET SERVICES -- DATA REFORMATING SERVICE SOFTWARE LICENSE AGREEMENT THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) APPLIES TO SOCET SERVICES -- DATA REFORMATTING

More information

Virtual LoadMaster for Microsoft Hyper-V

Virtual LoadMaster for Microsoft Hyper-V Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8 VERSION: 1.3 UPDATED: MARCH 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 20 Copyright

More information

[MD5 Message Digests] derived from the RSA Data Security, Inc. MD5 Message Digest Algorithm

[MD5 Message Digests] derived from the RSA Data Security, Inc. MD5 Message Digest Algorithm [MD5 Message Digests] derived from the RSA Data Security, Inc. MD5 Message Digest Algorithm [RegExp] Copyright (c) 1986, 1993, 1995 by University of Toronto. Written by Henry Spencer. THIS IS AN ALTERED

More information

WatchGuard SpamScreen Guide. SpamScreen for WFS 6.0

WatchGuard SpamScreen Guide. SpamScreen for WFS 6.0 WatchGuard SpamScreen Guide SpamScreen for WFS 6.0 Notice to Users Information in this guide is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless

More information

Open Source Used In Cisco D9865 Satellite Receiver Software Version 2.20

Open Source Used In Cisco D9865 Satellite Receiver Software Version 2.20 Open Source Used In Cisco D9865 Satellite Receiver Software Version 2.20 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed

More information

OPEN SOURCE SOFTWARE NOTICE

OPEN SOURCE SOFTWARE NOTICE OPEN SOURCE SOFTWARE NOTICE This product incorporates various open source software packages that are distributed under license terms as described further below. 1. Linux Kernel, kmod, Busybox, uboot, libksba

More information

Norton Online Backup Third Party Attribution

Norton Online Backup Third Party Attribution Norton Online Backup Third Party Attribution Norton Online Backup Third Party Attribution Document This document includes the following topics: This Symantec product may contain third party software for

More information

Fundamentals and Implementation

Fundamentals and Implementation Fundamentals and Implementation StoneGate Course Handbook StoneGate Version 2.0 Revision: SGCH1-201260902 Copyright 2001 2002 Stonesoft Corp. All rights reserved. No part of this book may be reproduced

More information

Software Package Document exchange (SPDX ) Tools. Version 1.2. Copyright 2011-2014 The Linux Foundation. All other rights are expressly reserved.

Software Package Document exchange (SPDX ) Tools. Version 1.2. Copyright 2011-2014 The Linux Foundation. All other rights are expressly reserved. Software Package Document exchange (SPDX ) Tools Version 1.2 This document last updated March 18, 2014. Please send your comments and suggestions for this document to: spdx-tech@fossbazzar.org Copyright

More information

Architecting the Future of Big Data

Architecting the Future of Big Data Hive ODBC Driver User Guide Revised: October 1, 2012 2012 Hortonworks Inc. All Rights Reserved. Parts of this Program and Documentation include proprietary software and content that is copyrighted and

More information

8.7. Resource Kit User Guide

8.7. Resource Kit User Guide 8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under

More information

En accord avec les différentes licences Open Source, celles si sont rappelées dans les Release Notes de chacun des produits Olfeo.

En accord avec les différentes licences Open Source, celles si sont rappelées dans les Release Notes de chacun des produits Olfeo. Sécuriser / Optimiser / Analyser l utilisation d Internet Licences open-source ARTICLE 1 - DÉFINITIONS Olfeo utilise les technologies Open Source suivantes. Les licences d utilisation sont indiquées aux

More information

JP1/Base Function Reference

JP1/Base Function Reference JP1 Version 11 JP1/Base Function Reference 3021-3-A03(E) Notices Relevant program products For details about the supported operating systems and the service packs or patches that are required by JP1/Base,

More information

Portions derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm.

Portions derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm. Portions derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm. The Apache Software License, Version 1.1 Copyright (c) 1999-2001 The Apache Software Foundation. All rights reserved. 3.

More information

Z O T PA D U S E R M A N U A L

Z O T PA D U S E R M A N U A L ZOTPAD USER MANUAL Contents Introduction 3 Getting started 4 User interface 6 Settings 15 Troubleshooting 19 Technical information 21 Acknowledgements 23 Introduction ZotPad is an ipad/iphone client for

More information

Open Source Used In Cisco TelePresence TC Console TC7.1

Open Source Used In Cisco TelePresence TC Console TC7.1 Open Source Used In Cisco TelePresence TC Console TC7.1 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website

More information

IDGo 800 Minidriver for Windows. User Guide

IDGo 800 Minidriver for Windows. User Guide IDGo 800 Minidriver for Windows User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the

More information

Oracle Secure Backup. Licensing Information Release 10.4 E21478-04

Oracle Secure Backup. Licensing Information Release 10.4 E21478-04 Oracle Secure Backup Licensing Information Release 10.4 E21478-04 May 2015 Oracle Secure Backup Licensing Information, Release 10.4 E21478-04 Copyright 2006, 2015, Oracle and/or its affiliates. All rights

More information

Pulse Redundancy. User Guide

Pulse Redundancy. User Guide Pulse Redundancy User Guide August 2014 Copyright The information in this document is subject to change without prior notice and does not represent a commitment on the part of AFCON Control and Automation

More information

IMX Mobile Proxy Administration

IMX Mobile Proxy Administration IMX Mobile Proxy Administration System Manual (v1.0.0 11.07.2013) Copyright This document is Copyright 2013 by etellicom Pty. Ltd. IMX Mobile Proxy Administration Guide Commercial in Confidence Page 1

More information

HP OpenView Adapter for SSL Using Radia

HP OpenView Adapter for SSL Using Radia HP OpenView Adapter for SSL Using Radia Radia SSL Adapter Guide Software Version: 2.0 for the UNIX and Windows operating systems Manufacturing Part Number: T3424-90064 August 2004 Copyright 2004 Hewlett-Packard

More information

Technical notes for HIGHSEC eid App Middleware

Technical notes for HIGHSEC eid App Middleware Technical notes for HIGHSEC eid App Middleware Version 2.1 February 2014. 1 Contents 1 Technical Notes... 3 1.1 All Operating Systems... 3 1.1.1 Slowing down of the cards while pairing... 3 1.1.2 Load

More information

DATA CENTER ACCESS POLICY AND GUIDELINES

DATA CENTER ACCESS POLICY AND GUIDELINES DATA CENTER ACCESS POLICY AND GUIDELINES Information Security Team DePaul University 1 East Jackson Boulevard Chicago, Illinois 60604 https:/infosec.depaul.edu/ 13th December 2002 Copyright Notice Copyright

More information

Sophos Anti-Virus for Mac OS X standalone startup guide. Product version: 8

Sophos Anti-Virus for Mac OS X standalone startup guide. Product version: 8 Sophos Anti-Virus for Mac OS X standalone startup guide Product version: 8 Document date: August 2012 Contents 1 Before you begin...3 2 Install Sophos Anti-Virus...4 3 Configure Sophos Anti-Virus to update...5

More information

SDN Adaptive Load Balancing. Feature Description

SDN Adaptive Load Balancing. Feature Description SDN Adaptive Load Balancing Feature Description VERSION: 4.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

RICOH Smart Device Print&Scan User Manual for Android

RICOH Smart Device Print&Scan User Manual for Android RICOH Smart Device Print&Scan User Manual for Android Read this manual carefully before you use this machine. TABLE OF CONTENTS How to Read the Manuals... 3 Symbols Used in the Manuals...3 Disclaimer...3

More information

Shrew Soft VPN Client Configuration for GTA Firewalls

Shrew Soft VPN Client Configuration for GTA Firewalls Shrew Soft VPN Client Configuration for GTA Firewalls ShrewVPN201003-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com

More information

RED HAT SECURE WEB SERVER 3.0 DEVELOPER EDITION FOR COBALT NETWORKS SERVERS

RED HAT SECURE WEB SERVER 3.0 DEVELOPER EDITION FOR COBALT NETWORKS SERVERS RED HAT SECURE WEB SERVER 3.0 DEVELOPER EDITION FOR COBALT NETWORKS SERVERS Cobalt Secure Web Server (SSL) Cobalt Networks, Inc Features: 128 bit Encryption* Based on Redhat's Secure Server Apache 1.3.6

More information

Digger Solutions. Intranet Open Source. Administrator s Guide

Digger Solutions. Intranet Open Source. Administrator s Guide Digger Solutions Intranet Open Source Administrator s Guide Hello and welcome to your new Intranet! Welcome to Digger Solutions Intranet Open Source. If you have any questions please review the product

More information

Open Source Announcement

Open Source Announcement Open Source Announcement The software included in this product contains copyrighted software that is licensed under the GNU Lesser General License (LGPL), BSD and GNU GENERAL PUBLIC LICENSE (GPL). Below

More information

User Guide. WatchGuard System Manager

User Guide. WatchGuard System Manager WatchGuard System Manager User Guide WatchGuard System Manager Notice to Users Information in this guide is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

[The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net

[The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net Software used by portions of this application require the following license statement: [The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net All rights reserved. Redistribution

More information

epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website: www.ftsafe.com

epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website: www.ftsafe.com epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Revision History: Date Revision Description June 2013 V1.0 Release of the first version i Software Developer s Agreement All Products of Feitian

More information

Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista

Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista nicolas.bataille@gemalto.com hassen.frikha@gemalto.com November 2007 www.gemalto.com All information herein

More information

JD Edwards World Invoice Formatting Guide. Version A9.2

JD Edwards World Invoice Formatting Guide. Version A9.2 JD Edwards World Invoice Formatting Guide Version A9.2 Revised May 4, 2011 Copyright Notice Copyright 2010, Oracle. All rights reserved. Trademark Notice Oracle is a registered trademark of Oracle Corporation

More information