Anatomy of SIP Attacks

Size: px
Start display at page:

Download "Anatomy of SIP Attacks"

Transcription

1 Anatomy of SIP Attacks João M. Ceron, Klas Steding-Jessen, and Cristine Hoepers João Marcelo Ceron is a Secrity Analyst at CERT.br/NIC.br. He holds a master s degree from Federal University of Rio Grande do Sl, Brazil, where he worked with honeypots for botnet detection. He crrently works with incident handling, and his research interests inclde honeypot data analysis. ceron@cert.br Klas Steding-Jessen is CERT. br/nic.br Technical Manager. He holds a PhD in applied compting from the Brazilian National Institte for Space Research, where he worked with honeypots for spam detection. His research area is the se of honeypots for detecting Internet infrastrctre abse by attackers and spammers. He is also one of the athors of the chkrootkit tool. jessen@cert.br Cristine Hoepers is CERT. br/nic.br General Manager. She holds a PhD in applied compting from the Brazilian National Institte for Space Research in the area of honeypot data analysis. Her research interests inclde the se of honeypots for incident detection and trend analysis. She has spoken at several secrity conferences, inclding FIRST, APWG, MAAWG, LACNIC, and AsCERT. cristine@cert.br In the past few years we have seen a steady increase in the poplarity of VoIP (Voice over IP) services. Scans for SIP (Session Initiation Protocol [4]) servers have been reported for many years, and to gather more details abot these activities we emlated SIP servers in a network of 50 low-interaction honeypots, and collected data abot these attacks for 358 days. What will follow is a description of or observations and advice on how to prevent these attacks from being sccessfl. Tracking SIP Servers Abse For qite some time, the secrity commnity has been reporting an increase in scans for the SIP defalt port 5060/UDP, as well as some anecdotal evidence of other types of abse. Similarly, at the CERT.br honeytarg Honeynet Project [3] (a chapter of The Honeynet Project), port 5060/UDP was consistently among the top-10 targeted ports. Bearing that in mind, we have been tracking the abse of SIP servers more closely since last year. This project consists of 50 low-interaction honeypots, based on Honeyd [7], deployed in the Brazilian Internet space. In order to enable Honeyd to collect SIP attack information, we implemented a listener that emlates Asterisk Server [2] and allows the definition of which extensions are available, as well as their defalt responses and passwords. This software allows s to collect the initial stages of a SIP session, logging information sch as attack origins and the phone nmbers the attackers attempted to call. For privacy reasons, we chose not to record adio sessions, limiting the implementation only to the SIP signaling. Figre 1 presents a SIP conversation fragment logged by or listener. There are two SIP methods: REGISTER and INVITE. The first part is a REGISTER reqest. This is sed by a ser agent (UA) for registering contact information, sch as its crrent IP address. The second part illstrates the INVITE method, which is sed to establish a media session between UAs. In this log, a UA places a call from the extension 100 to the external phone nmber 201*****274 (sanitized nmber). Additionally, the ser-agent field shows that this UA has provided the identification string X-Lite release 1006e stamp 34025, a common softphone. ;login: december

2 Figre 1: Honeypot log showing the attacker s IP, the phone nmber being reqested, and the ser agent identification string Making Sense of the Data The traffic targeted to port 5060/UDP in or honeypots was related to the following attack steps: 1. Scanning: searching for SIP servers. 2. Enmeration: once a SIP server is identified, the attackers try to enmerate the server configration, available extensions, and so on. 3. Brte force: attackers try to access extensions that are protected with weak passwords. 4. Abse: after gaining access to a PABX extension, the attackers will try to call external PSTN (Pblic Switched Telephone Network) nmbers, sally to place international calls. In a preliminary analysis of the collected data, we were able to identify that the attackers wold try to call a given nmber by sing several prefixes to increase the attack sccess (see Figre 2). This occrs becase a SIP server can be configred in different ways for example 0 or 9 to access PSTN lines. In some contries, sch as Brazil, one mst also specify the telecommnication operator to be sed for long distance calls. Figre 2: A phone nmber reqested in different ways in order to identify the correct prefix for dialing long distance or international calls Figre 2 illstrates the many variations one attacker was sing for the phone nmber 9725*****586. To deal with this sitation, which we called redndancy, we implemented a heristic to identify it and to store only a nified SIP session related to this nmber in the database. Besides redcing the size of the database, this heristic also helped s to identify the phone nmber s contry code and to 26 ;login: Vol. 37, No. 6

3 correlate calls placed at different times and coming from different sorces, to a niqe phone nmber. Table 1 smmarizes the data that reached or honeypot infrastrctre from September 2011 to September Data Cont REGISTER messages 64,249,923 INVITE messages 1,007,697 Unified INVITE messages 153,773 Uniqe IPs 7,752 Uniqe Atonomos System Nmbers - ASNs 858 Total nmber of days 358 Uniqe sorce contry codes - CCs 83 Table 1: Smmary of the data collected from September 2011 to September 2012 The majority of the REGISTER messages are from atomated scans. Most of them have the signatre of the SipVicios toolkit [5], a collection of tools for aditing SIP-based VoIP systems. The INVITE messages are actal abse attempts directed to the listeners, i.e., phone call attempts. The nified INVITE messages are the INVITE messages after redndancies were identified. Note that the nmber of niqe ASNs and CCs demonstrate a high dispersion of the origin of the attacks. In the following sections, we will focs on the analysis of the nified INVITE messages, inclding the phone nmbers that were called the most and the abse sorces. User Agents and IDS Evasion An important piece of information logged is the ser agent identification string provided by the SIP clients that connected to the honeypots and tried to place a call. The most freqent ser agents provided are presented in Figre 3. Figre 3: Top ser agent identification strings provided by the SIP clients that tried to place calls ;login: december 2012 Anatomy of SIP Attacks 27

4 Note that 61.23% of the connections came from SIP clients that didn t provide any ser agent string. We groped all these clients nder an identification string we called ndefined. This behavior is not expected from SIP clients and may sggest that many attackers are sing cstomized tools to abse SIP servers. Also note that the third most freqent ser agent is the VaxSIPUserAgent, which is sed by a software development kit, also sggesting cstomized tools. Additionally, there was a grop of attempts where the ser agent almost never repeated. In every new session, the client provided a random 20-character ser agent, as shown in Table 2. This behavior was the second most freqent and was observed even in seqential reqests coming from the same IP address. Or best gess is that this is being sed to hide attack fingerprints or to evade IDS detection. Timestamp IP User Agent String T04:02:15Z 194.X.X.131 DmQCAsNRKZYayfosaXES T04:02:17Z 194.X.X.131 yy3bhtwncbpco3knmrqg T04:02:19Z 194.X.X.131 KdUhQNVVxaZYfHg0rXFD T04:02:21Z 194.X.X.131 otyvaff8mpzvis2cff6m T04:02:23Z 194.X.X.131 5y5ttWMXPbFIeyHb4l4D T04:02:25Z 194.X.X.131 YDjb3Q8Wiw6442YCXMnE Table 2: Examples of random ser agent identification strings captred by the honeypots We have also observed ser agents commonly sed by SIP servers, sch as Asterisk. These ser agents cold be fake (set by the attacker) or cold represent compromised SIP servers sed to abse other servers. The remaining ser agents presented in Figre 3 refer to poplar softphones. As we can see, almost 85% of all connections came from cstomized or potentially malicios software. Where Is It Coming From? When looking into the sorce of the abse attempts, we can try to identify specific patterns in the geographical origin and try to identify other characteristics that cold give some insights abot possible motivations. Based on the sorce IP addresses of the attempted calls, we were able to estimate the sorce contry code (CC) for the attacks. The contry code allocation is based on information provided by the Regional Internet Registries (RIRs). Figre 4 shows these top CCs. 28 ;login: Vol. 37, No. 6

5 Figre 4: Top contry codes of call reqests (based on sorce IPs), aggregated by reqested phone nmbers In Table 3 we list the top 10 IP addresses. For each IP, there is also information abot how many different IDD (International Direct Dialing) codes it tried to call and the ser agent string provided. # Cont IP CC IDDs User Agent String 01 19, X.X.205 CN 142 ndefined 02 11, X.X.16 NL 62 ndefined 03 7, X.X.9 US 67 VaxSIPUserAgent/ , X.X.99 US 27 ndefined 05 6, X.X.93 TH 38 ndefined 06 5, X.X.212 FR 2 ndefined 07 5, X.X.83 TH 37 ndefined 08 4, X.X.37 CA 6 ndefined 09 4, X.X.36 MD 48 random 10 4, X.X.204 ID 27 ndefined Table 3: Top sorce IPs, contry codes, nmber of contries called, and the ser agent provided The most freqent CCs observed are US and CN, which are also the ones for three of the niqe IPs that tried to place most of the calls. Note that the top 10 IPs were responsible for 44% of all call attempts. Additionally, the first IP address is responsible for 67% of all attempts coming from Chinese IPs. Likewise, the third and forth IPs were responsible for 47% of all call attempts coming from IPs allocated to the US. Another interesting fact is that the ser agents provided by the top sorce IPs are not those of poplar softphones bt, instead, are possibly from cstomized attack tools. And, most interestingly, all the ser agents provided by the ninth IP were 20-character random strings, as discssed in the previos section. This combination of few IPs with distinctive ser agents points to the possibility of these being roge VoIP servers or proxies sed as hbs to place phone calls. ;login: december 2012 Anatomy of SIP Attacks 29

6 Considering that one of the expected behaviors of a roge VoIP server is high geographic dispersion of the destination phone calls, we tried to corroborate this hypothesis with additional analysis. We sed AfterGlow [1] to explore the relationship among the top IP (113.X.X.205) and the destination of all calls. Figre 5 presents this IP address and the contry codes it attempted to call. The CC was determined sing the Perl library Nmber::Phone::Contry, that associates an IDD to a contry code. We can see that this IP, a possible VoIP server, places calls to 142 different contries. Figre 5: Destination contry code for all calls placed by the IP 113.X.X.205 Who They Are Calling, and Why... To gain more nderstanding of the abse, we have also stdied the natre of the phone nmbers the attackers attempted to call. The most reqested phone nmbers fall into the following categories: Cell phones: identified by the nmber prefix Financial services: cstomer services from financial instittions (mainly Bank of America and Citibank) Pre-paid phones: pre-paid card services for international phone calls (Net2Phone) Cstomer relations: e-commerce cstomer relation services The most called phone nmber was Bank of America s Credit Card Cstomer Service, totaling 5,090 attempts. Only seven IPs reqested this phone nmber, and for of them have the roge VoIP server behavior that was discssed earlier. Actally, 64% of all calls to Bank of America s Credit Card Cstomer Service came from the eighth IP listed in Table ;login: Vol. 37, No. 6

7 Sorce IP Destination IDD Cont (%) PS IL % EG EG % MD CZ % US CZ % FR RU % CA 800 (Free) % US IL % US ZW % CA CZ % DE CZ % Table 4: Most freqent combinations of sorce IPs and destination IDD contry codes The IP addresses that originated the calls were, for the most part, not the same as the IDD destination contry. Table 4 shows the most freqent pairs, consisting of IPs allocated to a contry code that are calling nmbers in a given destination IDD contry code. Based on the data analyzed so far, we can present some hypotheses abot the attackers motivations: 1. Absing SIP servers in order to place free phone calls or to gain anonymity; 2. Absing the premim-rate telephone nmbers bsiness model; 3. Reselling VoIP services by absing poorly configred SIP servers; and 4. Validating personal identifiable information, sch as credit cards and bank accont details. Secring Yor SIP Server The types of activities observed reinforce the importance of implementing the crrent SIP secrity best practices [6]. Most attacks wold have been prevented or mitigated by following one or more of these recommendations: Protect the SIP server from the Internet: be more restrictive in terms of which extensions can be reached from external IP addresses. Use strong passwords: se long, hard-to-gess passwords. Most SIP clients reqire the password to be entered only once, so there is no need to create easy-toremember passwords. The crrent recommendation is to se at least 12-character passwords, inclding nmbers, symbols, and lower and ppercase letters. Create sernames different from extensions: most brte force attempts try sernames that match the extension nmbers. Monitor the SIP se in yor organization: monitor yor SIP server logs for abse attempts, bt also keep an eye on yor PSTN billing information, looking for nsal long distance and international calls. ;login: december 2012 Anatomy of SIP Attacks 31

8 Conclsion As the adoption of SIP services grows, being aware of the characteristics of the abse against them is increasingly important. As or analysis showed, almost 85% of all call reqests came from cstomized or potentially malicios software, and some of the calls may be related to nlawfl activities. Also, becase there are attackers crrently taking advantage of poorly configred servers, the need to increase monitoring is clear. The good news is that the implementation of basic VoIP secrity best practices will prevent most of the attacks seen in the wild. References [1] AfterGlow: Link Graph Visalization: [2] Asterisk: The Open Sorce Telephony Projects: [3] CERT.br: honeytarg Honeynet Project: [4] RFC 3261 SIP: Session Initiation Protocol: rfc3261.txt. [5] SIPVicios Tools for aditing SIP-based VoIP systems: [6] John Todd, Seven Steps to Better SIP Secrity with Asterisk, 2009: [7] Niels Provos and Thorsten Holz, Virtal Honeypots: From Botnet Tracking to Intrsion Detection, Addison-Wesley, BECOME A USENIX SUPPORTER AND REACH YOUR TARGET AUDIENCE The USENIX Association welcomes indstrial sponsorship and offers cstom packages to help yo promote yor organization, programs, and prodcts to or membership and conference attendees. Whether yo are interested in sales, recriting top talent, or branding to a highly targeted adience, we offer key otreach for or sponsors. To learn more abot becoming a USENIX Spporter, as well as or mltiple conference sponsorship packages, please contact sponsorship@ senix.org. Yor spport of the USENIX Association frthers or goal of fostering technical excellence and innovation in netral forms. Sponsorship of USENIX keeps or conferences affordable for all and spports scholarships for stdents, eqal representation of women and minorities in the compting research commnity, and the development of open sorce technology ;login: Vol. 37, No. 6

Deploying Network Load Balancing

Deploying Network Load Balancing C H A P T E R 9 Deploying Network Load Balancing After completing the design for the applications and services in yor Network Load Balancing clster, yo are ready to deploy the clster rnning the Microsoft

More information

Introduction to HBase Schema Design

Introduction to HBase Schema Design Introdction to HBase Schema Design Amandeep Khrana Amandeep Khrana is a Soltions Architect at Clodera and works on bilding soltions sing the Hadoop stack. He is also a co-athor of HBase in Action. Prior

More information

EMC VNX Series. EMC Secure Remote Support for VNX. Version VNX1, VNX2 300-014-340 REV 03

EMC VNX Series. EMC Secure Remote Support for VNX. Version VNX1, VNX2 300-014-340 REV 03 EMC VNX Series Version VNX1, VNX2 EMC Secre Remote Spport for VNX 300-014-340 REV 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Jly, 2014 EMC believes the information

More information

Designing and Deploying File Servers

Designing and Deploying File Servers C H A P T E R 2 Designing and Deploying File Servers File servers rnning the Microsoft Windows Server 2003 operating system are ideal for providing access to files for sers in medim and large organizations.

More information

Enabling Advanced Windows Server 2003 Active Directory Features

Enabling Advanced Windows Server 2003 Active Directory Features C H A P T E R 5 Enabling Advanced Windows Server 2003 Active Directory Featres The Microsoft Windows Server 2003 Active Directory directory service enables yo to introdce advanced featres into yor environment

More information

Planning a Managed Environment

Planning a Managed Environment C H A P T E R 1 Planning a Managed Environment Many organizations are moving towards a highly managed compting environment based on a configration management infrastrctre that is designed to redce the

More information

Designing an Authentication Strategy

Designing an Authentication Strategy C H A P T E R 1 4 Designing an Athentication Strategy Most organizations need to spport seamless access to the network for mltiple types of sers, sch as workers in offices, employees who are traveling,

More information

High Availability for Internet Information Server Using Double-Take 4.x

High Availability for Internet Information Server Using Double-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks

More information

Planning a Smart Card Deployment

Planning a Smart Card Deployment C H A P T E R 1 7 Planning a Smart Card Deployment Smart card spport in Microsoft Windows Server 2003 enables yo to enhance the secrity of many critical fnctions, inclding client athentication, interactive

More information

High Availability for Microsoft SQL Server Using Double-Take 4.x

High Availability for Microsoft SQL Server Using Double-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks of Network

More information

Direct Loan Basics & Entrance Counseling Guide. For Graduate and Professional Student Direct PLUS Loan Borrowers

Direct Loan Basics & Entrance Counseling Guide. For Graduate and Professional Student Direct PLUS Loan Borrowers Direct Loan Basics & Entrance Conseling Gide For Gradate and Professional Stdent Direct PLUS Loan Borrowers DIRECT LOAN BASICS & ENTRANCE COUNSELING GUIDE For Gradate and Professional Stdent Direct PLUS

More information

Designing a TCP/IP Network

Designing a TCP/IP Network C H A P T E R 1 Designing a TCP/IP Network The TCP/IP protocol site defines indstry standard networking protocols for data networks, inclding the Internet. Determining the best design and implementation

More information

Pgrading To Windows XP 4.0 Domain Controllers and Services

Pgrading To Windows XP 4.0 Domain Controllers and Services C H A P T E R 8 Upgrading Windows NT 4.0 Domains to Windows Server 2003 Active Directory Upgrading yor domains from Microsoft Windows NT 4.0 to Windows Server 2003 Active Directory directory service enables

More information

aééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë

aééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë C H A P T E R 7 aééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë Deploying Microsoft Windows Server 2003 s involves creating new geographically based child domains nder the forest root domain. Deploying

More information

10 Evaluating the Help Desk

10 Evaluating the Help Desk 10 Evalating the Help Desk The tre measre of any society is not what it knows bt what it does with what it knows. Warren Bennis Key Findings Help desk metrics having to do with demand and with problem

More information

Planning an Active Directory Deployment Project

Planning an Active Directory Deployment Project C H A P T E R 1 Planning an Active Directory Deployment Project When yo deploy the Microsoft Windows Server 2003 Active Directory directory service in yor environment, yo can take advantage of the centralized,

More information

Chapter 1. LAN Design

Chapter 1. LAN Design Chapter 1 LAN Design CCNA3-1 Chapter 1 Note for Instrctors These presentations are the reslt of a collaboration among the instrctors at St. Clair College in Windsor, Ontario. Thanks mst go ot to Rick Graziani

More information

8 Service Level Agreements

8 Service Level Agreements 8 Service Level Agreements Every organization of men, be it social or political, ltimately relies on man s capacity for making promises and keeping them. Hannah Arendt Key Findings Only abot 20 percent

More information

EMC Storage Analytics

EMC Storage Analytics EMC Storage Analytics Version 2.1 Installation and User Gide 300-014-858 09 Copyright 2013 EMC Corporation. All rights reserved. Pblished in USA. Pblished December, 2013 EMC believes the information in

More information

7 Help Desk Tools. Key Findings. The Automated Help Desk

7 Help Desk Tools. Key Findings. The Automated Help Desk 7 Help Desk Tools Or Age of Anxiety is, in great part, the reslt of trying to do today s jobs with yesterday s tools. Marshall McLhan Key Findings Help desk atomation featres are common and are sally part

More information

9 Setting a Course: Goals for the Help Desk

9 Setting a Course: Goals for the Help Desk IT Help Desk in Higher Edcation ECAR Research Stdy 8, 2007 9 Setting a Corse: Goals for the Help Desk First say to yorself what yo wold be; and then do what yo have to do. Epictets Key Findings Majorities

More information

f.airnet DECT over IP System

f.airnet DECT over IP System The modlar IP commnication system for voice and messaging with the greatest mobility: flexible, easy to maintain, expandable. Fnkwerk Secrity Commnications For s, efficient commnication is vital. New:

More information

EMC VNX Series Setting Up a Unisphere Management Station

EMC VNX Series Setting Up a Unisphere Management Station EMC VNX Series Setting Up a Unisphere Management Station P/N 300-015-123 REV. 02 April, 2014 This docment describes the different types of Unisphere management stations and tells how to install and configre

More information

EMC ViPR. Concepts Guide. Version 1.1.0 302-000-482 02

EMC ViPR. Concepts Guide. Version 1.1.0 302-000-482 02 EMC ViPR Version 1.1.0 Concepts Gide 302-000-482 02 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is

More information

The bintec HotSpot Solution. Convenient internet access anywhere

The bintec HotSpot Solution. Convenient internet access anywhere The bintec HotSpot Soltion Convenient internet access anywhere Convenient internet access for all kinds of spaces Today s internet sers are freqently on the go. They expect to have internet access on their

More information

Planning and Implementing An Optimized Private Cloud

Planning and Implementing An Optimized Private Cloud W H I T E PA P E R Intelligent HPC Management Planning and Implementing An Optimized Private Clod Creating a Clod Environment That Maximizes Yor ROI Planning and Implementing An Optimized Private Clod

More information

WHAT IT TAKES TO WIN. In the Chinese App Market

WHAT IT TAKES TO WIN. In the Chinese App Market WHAT IT TAKES TO WIN In the Chinese App Market JUNE 2013 Table of Contents Exective Smmary... 01 Introdction... 02 Research objective and methodology... 02 App landscape... 03 App discovery and download

More information

Firewall Feature Overview

Firewall Feature Overview PALO ALTO NETWORKS: Firewall Featre Overview Firewall Featre Overview Palo Alto Networks family of next generation firewalls delivers nprecedented visibility and control of applications, sers and content

More information

Motorola Reinvents its Supplier Negotiation Process Using Emptoris and Saves $600 Million. An Emptoris Case Study. Emptoris, Inc. www.emptoris.

Motorola Reinvents its Supplier Negotiation Process Using Emptoris and Saves $600 Million. An Emptoris Case Study. Emptoris, Inc. www.emptoris. Motorola Reinvents its Spplier Negotiation Process Using Emptoris and Saves $600 Million An Emptoris Case Stdy Emptoris, Inc. www.emptoris.com VIII-03/3/05 Exective Smmary With the disastros telecommnication

More information

EMC PowerPath Virtual Appliance

EMC PowerPath Virtual Appliance EMC PowerPath Virtal Appliance Version 1.2 Administration Gide P/N 302-000-475 REV 01 Copyright 2013 EMC Corporation. All rights reserved. Pblished in USA. Pblished October, 2013 EMC believes the information

More information

BIS - Overview and basic package V2.5

BIS - Overview and basic package V2.5 Engineered Soltions BIS - Overview and basic package V2.5 BIS - Overview and basic package V2.5 www.boschsecrity.com Complete enterprise management for efficient, integrated bilding and secrity management

More information

HSBC Internet Banking. Combined Product Disclosure Statement and Supplementary Product Disclosure Statement

HSBC Internet Banking. Combined Product Disclosure Statement and Supplementary Product Disclosure Statement HSBC Internet Banking Combined Prodct Disclosre Statement and Spplementary Prodct Disclosre Statement AN IMPORTANT MESSAGE FOR HSBC CUSTOMERS NOTICE OF CHANGE For HSBC Internet Banking Combined Prodct

More information

Opening the Door to Your New Home

Opening the Door to Your New Home Opening the Door to Yor New Home A Gide to Bying and Financing. Contents Navigating Yor Way to Home Ownership...1 Getting Started...3 Finding Yor Home...9 Finalizing Yor Financing...12 Final Closing...13

More information

6 Funding and Staffing the Central IT Help Desk

6 Funding and Staffing the Central IT Help Desk 6 Fnding and Staffing the Central IT Help Desk Money may kindle, bt it cannot itself, or for very long, brn. Igor Stravinsky Key Findings At most instittions the central IT bdget is a major sorce of help

More information

Form M-1 Report for Multiple Employer Welfare Arrangements (MEWAs) and Certain Entities Claiming Exception (ECEs)

Form M-1 Report for Multiple Employer Welfare Arrangements (MEWAs) and Certain Entities Claiming Exception (ECEs) U.S. Department of Labor Employee Benefits Secrity Administration Room N5511 200 Constittion Avene, NW Washington, DC 20210 P-450 Form M-1 Report for Mltiple Employer Welfare Arrangements (MEWAs) and Certain

More information

Technical Notes. PostgreSQL backups with NetWorker. Release number 1.0 302-001-174 REV 01. June 30, 2014. u Audience... 2. u Requirements...

Technical Notes. PostgreSQL backups with NetWorker. Release number 1.0 302-001-174 REV 01. June 30, 2014. u Audience... 2. u Requirements... PostgreSQL backps with NetWorker Release nmber 1.0 302-001-174 REV 01 Jne 30, 2014 Adience... 2 Reqirements... 2 Terminology... 2 PostgreSQL backp methodologies...2 PostgreSQL dmp backp... 3 Configring

More information

FINANCIAL FITNESS SELECTING A CREDIT CARD. Fact Sheet

FINANCIAL FITNESS SELECTING A CREDIT CARD. Fact Sheet FINANCIAL FITNESS Fact Sheet Janary 1998 FL/FF-02 SELECTING A CREDIT CARD Liz Gorham, Ph.D., AFC Assistant Professor and Family Resorce Management Specialist, Utah State University Marsha A. Goetting,

More information

BIS - Overview and basic package V4.0

BIS - Overview and basic package V4.0 Engineered Soltions BIS - Overview and basic package V4.0 BIS - Overview and basic package V4.0 www.boschsecrity.com Complete enterprise management for efficient, integrated bilding and secrity management

More information

Herzfeld s Outlook: Seasonal Factors Provide Opportunities in Closed-End Funds

Herzfeld s Outlook: Seasonal Factors Provide Opportunities in Closed-End Funds VIRTUS HERZFELD FUND Herzfeld s Otlook: Seasonal Factors Provide Opportnities in Closed-End Fnds When it comes to investing in closed-end fnds, a comprehensive nderstanding of the inefficiencies of the

More information

5 Using Your Verbatim Autodialer

5 Using Your Verbatim Autodialer 5 Using Yor Verbatim Atodialer 5.1 Placing Inqiry Calls to the Verbatim Atodialer ( Yo may call the Verbatim atodialer at any time from any phone. The nit will wait the programmed nmber of rings before

More information

Borrowing for College. Table of contents. A guide to federal loans for higher education

Borrowing for College. Table of contents. A guide to federal loans for higher education Borrowing for College A gide to federal loans for higher edcation Table of contents Edcation loan basics 2 Applying for edcation loans 3 Repaying edcation loans 3 Controlling edcation loan debt 5 Glossary

More information

Position paper smart city. economics. a multi-sided approach to financing the smart city. Your business technologists.

Position paper smart city. economics. a multi-sided approach to financing the smart city. Your business technologists. Position paper smart city economics a mlti-sided approach to financing the smart city Yor bsiness technologists. Powering progress From idea to reality The hman race is becoming increasingly rbanised so

More information

EMC ViPR Analytics Pack for VMware vcenter Operations Management Suite

EMC ViPR Analytics Pack for VMware vcenter Operations Management Suite EMC ViPR Analytics Pack for VMware vcenter Operations Management Site Version 1.1.0 Installation and Configration Gide 302-000-487 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished

More information

Social Work Bursary: Academic year 2015/16 Application notes for students on undergraduate courses

Social Work Bursary: Academic year 2015/16 Application notes for students on undergraduate courses Social Work Brsary: Academic year 2015/16 Application notes for stdents on ndergradate corses These notes are for ndergradate stdents who have previosly received a brsary. Please make sre yo complete the

More information

Galvin s All Things Enterprise

Galvin s All Things Enterprise Galvin s All Things Enterprise The State of the Clod, Part 2 PETER BAER GALVIN Peter Baer Galvin is the CTO for Corporate Technologies, a premier systems integrator and VAR (www.cptech. com). Before that,

More information

Make the College Connection

Make the College Connection Make the College Connection A college planning gide for stdents and their parents Table of contents The compelling case for college 2 Selecting a college 3 Paying for college 5 Tips for meeting college

More information

Facilities. Car Parking and Permit Allocation Policy

Facilities. Car Parking and Permit Allocation Policy Facilities Car Parking and Permit Allocation Policy Facilities Car Parking and Permit Allocation Policy Contents Page 1 Introdction....................................................2 2.0 Application

More information

Vista Information System

Vista Information System Vista Information System FIVE EASY STEPS TO IMPROVED BLOOD CENTER EFFICIENCY People over Paperwork I m glad they took the time to nderstand or process CaridianBCT walked the floor with or people and really

More information

11 Success of the Help Desk: Assessing Outcomes

11 Success of the Help Desk: Assessing Outcomes 11 Sccess of the Help Desk: Assessing Otcomes I dread sccess... I like a state of continal becoming, with a goal in front and not behind. George Bernard Shaw Key Findings Respondents help desks tend to

More information

Corporate performance: What do investors want to know? Innovate your way to clearer financial reporting

Corporate performance: What do investors want to know? Innovate your way to clearer financial reporting www.pwc.com Corporate performance: What do investors want to know? Innovate yor way to clearer financial reporting October 2014 PwC I Innovate yor way to clearer financial reporting t 1 Contents Introdction

More information

Executive Coaching to Activate the Renegade Leader Within. Renegades Do What Others Won t To Get the Results that Others Don t

Executive Coaching to Activate the Renegade Leader Within. Renegades Do What Others Won t To Get the Results that Others Don t Exective Coaching to Activate the Renegade Leader Within Renegades Do What Others Won t To Get the Reslts that Others Don t Introdction Renegade Leaders are a niqe breed of leaders. The Renegade Leader

More information

Kentucky Deferred Compensation (KDC) Program Summary

Kentucky Deferred Compensation (KDC) Program Summary Kentcky Deferred Compensation (KDC) Program Smmary Smmary and Highlights of the Kentcky Deferred Compensation (KDC) Program Simple. Smart. For yo. For life. 457 Plan 401(k) Plan Roth 401(k) Deemed Roth

More information

iet ITSM: Comprehensive Solution for Continual Service Improvement

iet ITSM: Comprehensive Solution for Continual Service Improvement D ATA S H E E T iet ITSM: I T I L V 3 I n n o v at i v e U s e o f B e s t P ra c t i c e s ITIL v3 is the crrent version of the IT Infrastrctre Library. The focs of ITIL v3 is on the alignment of IT Services

More information

Configuration Management for Software Product Lines

Configuration Management for Software Product Lines onfigration Management for Software Prodct Lines Roland Laqa and Peter Knaber Franhofer Institte for Experimental Software Engineering (IESE) Saerwiesen 6 D-67661 Kaiserslatern, Germany +49 6301 707 161

More information

Building Trust How Banks are Attracting and Retaining Business Clients With Institutional Money Fund Portals

Building Trust How Banks are Attracting and Retaining Business Clients With Institutional Money Fund Portals Bilding Trst How Banks are Attracting and Retaining Bsiness Clients With Instittional Money Fnd Portals By George Hagerman, Fonder and CEO, CacheMatrix Holdings, LLC C ompetitive pressres are driving innovation

More information

Isilon OneFS. Version 7.1. Backup and recovery guide

Isilon OneFS. Version 7.1. Backup and recovery guide Isilon OneFS Version 7.1 Backp and recovery gide Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished March, 2014 EMC believes the information in this pblication is accrate

More information

Use of Honeypots for Network Monitoring and Situational Awareness

Use of Honeypots for Network Monitoring and Situational Awareness Use of Honeypots for Network Monitoring and Situational Awareness Cristine Hoepers cristine@cert.br Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br Brazilian

More information

A Novel QR Code and mobile phone based Authentication protocol via Bluetooth Sha Liu *1, Shuhua Zhu 2

A Novel QR Code and mobile phone based Authentication protocol via Bluetooth Sha Liu *1, Shuhua Zhu 2 International Conference on Materials Engineering and Information Technology Applications (MEITA 2015) A Novel QR Code and mobile phone based Athentication protocol via Bletooth Sha Li *1, Shha Zh 2 *1

More information

Successful Conference

Successful Conference The Keynote Gide to Planning a Sccessfl Conference Dr Cathy Key A Keynote Networks Workbook Contents Introdction...2 The Role of the Conference Organiser...3 Establishing a Committee...4 Creating a Bdget...5

More information

SpamPots Project: Using Honeypots to Measure the Abuse of End-User Machines to Send Spam

SpamPots Project: Using Honeypots to Measure the Abuse of End-User Machines to Send Spam SpamPots Project: Using Honeypots to Measure the Abuse of End-User Machines to Send Spam Marcelo H. P. C. Chaves mhp@cert.br CERT.br Computer Emergency Response Team Brazil NIC.br Network Information Center

More information

Monitoring the Abuse of Open Proxies for Sending Spam

Monitoring the Abuse of Open Proxies for Sending Spam Monitoring the Abuse of Open Proxies for Sending Spam Klaus Steding-Jessen jessen@cert.br CERT.br Computer Emergency Response Team Brazil NIC.br Network Information Center Brazil CGI.br Brazilian Internet

More information

MVM-BVRM Video Recording Manager v2.22

MVM-BVRM Video Recording Manager v2.22 Video MVM-BVRM Video Recording Manager v2.22 MVM-BVRM Video Recording Manager v2.22 www.boschsecrity.com Distribted storage and configrable load balancing iscsi disk array failover for extra reliability

More information

CRM Customer Relationship Management. Customer Relationship Management

CRM Customer Relationship Management. Customer Relationship Management CRM Cstomer Relationship Management Farley Beaton Virginia Department of Taxation Discssion Areas TAX/AMS Partnership Project Backgrond Cstomer Relationship Management Secre Messaging Lessons Learned 2

More information

NAPA TRAINING PROGRAMS FOR:

NAPA TRAINING PROGRAMS FOR: NAPA TRAINING PROGRAMS FOR: Employees Otside Sales Store Managers Store Owners See NEW ecatalog Inside O V E R V I E W 2010_StoreTrainingBrochre_SinglePg.indd 1 5/25/10 12:39:32 PM Welcome 2010 Store Training

More information

www.schoolnutrition.org/join

www.schoolnutrition.org/join EZ Event Photography SNA MEMBERSHIP www.schoolntrition.org/join Becase Yor Voice Matters SNA MEMBERSHIP BECAUSE YOUR VOICE MATTERS Yo have sch an important job serving school breakfast and lnch to or nation

More information

FaceTrust: Assessing the Credibility of Online Personas via Social Networks

FaceTrust: Assessing the Credibility of Online Personas via Social Networks FaceTrst: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos Kyngbaek Kim Xiaowei Yang Dke University University of California, Irvine Dke University msirivia@cs.dke.ed

More information

How To Link Data Across Agencies

How To Link Data Across Agencies Rasterized 300 dpi Linking Data across Agencies: States That Are Making It Work Updated March 2010 By: Rebecca Carson and Elizabeth Laird, Data Qality Campaign; Elizabeth Gaines and Thaddes Ferber, The

More information

KEYS TO BEING AN EFFECTIVE WORKPLACE PERSONAL ASSISTANT

KEYS TO BEING AN EFFECTIVE WORKPLACE PERSONAL ASSISTANT 5 KEYS TO BEING AN EFFECTIVE WORKPLACE PERSONAL ASSISTANT by: John Barrett Personal assistants (PAs) and their ability to effectively provide essential spports at the workplace are extremely important

More information

Introducing Revenue Cycle Optimization! STI Provides More Options Than Any Other Software Vendor. ChartMaker Clinical 3.7

Introducing Revenue Cycle Optimization! STI Provides More Options Than Any Other Software Vendor. ChartMaker Clinical 3.7 Introdcing Revene Cycle Optimization! STI Provides More Options Than Any Other Software Vendor ChartMaker Clinical 3.7 2011 Amblatory EHR + Cardiovasclar Medicine + Child Health STI Provides More Choices

More information

Social Work Bursary: Academic Year 2014/15 Application notes for students on postgraduate courses

Social Work Bursary: Academic Year 2014/15 Application notes for students on postgraduate courses Social Work Brsary: Academic Year 2014/15 Application notes for stdents on postgradate corses These notes are for stdents who do not have a partner or any dependants. Please make sre yo complete the correct

More information

GUIDELINE. Guideline for the Selection of Engineering Services

GUIDELINE. Guideline for the Selection of Engineering Services GUIDELINE Gideline for the Selection of Engineering Services 1998 Mission Statement: To govern the engineering profession while enhancing engineering practice and enhancing engineering cltre Pblished by

More information

Teachable Moments for Personal Finance Education. Introduction

Teachable Moments for Personal Finance Education. Introduction Teachable Moments for Personal Finance Edcation Best Practices for Implementing USA Fnds Life Skills and Other Financial Literacy Resorces Introdction Stdents who leave yor instittion eqipped with both

More information

Periodized Training for the Strength/Power Athlete

Periodized Training for the Strength/Power Athlete Periodized Training for the /Power Athlete Jay R. Hoffman, PhD, FACSM, CSCS *D The se of periodized training has been reported to go back as far as the ancient Olympic games. Its basic premise is that

More information

Phone Banking Terms Corporate Accounts

Phone Banking Terms Corporate Accounts Phone Banking Terms Corporate Acconts If there is any inconsistency between the terms and conditions applying to an Accont and these Phone Banking Terms, these Phone Banking Terms prevail in respect of

More information

Curriculum development

Curriculum development DES MOINES AREA COMMUNITY COLLEGE Crriclm development Competency-Based Edcation www.dmacc.ed Why does DMACC se competency-based edcation? DMACC tilizes competency-based edcation for a nmber of reasons.

More information

Identity Management & Access Control

Identity Management & Access Control 4-day training abot increasing secrity and prodctivity while drecreasing cost, downtime and repetitive tasks with (IAM) International Management Form www.imfacademy.com Contents of this brochre What is

More information

Purposefully Engineered High-Performing Income Protection

Purposefully Engineered High-Performing Income Protection The Intelligent Choice for Disability Income Insrance Prposeflly Engineered High-Performing Income Protection Keeping Income strong We engineer or disability income prodcts with featres that deliver benefits

More information

EMC PowerPath/VE Installation and Administration Guide

EMC PowerPath/VE Installation and Administration Guide EMC PowerPath/VE Installation and Administration Gide Version 5.9 and Minor Releases for VMware vsphere P/N 302-000-236 REV 03 Copyright 2009-2014. All rights reserved. Pblished in USA. EMC believes the

More information

EMC Smarts SAM, IP, ESM, MPLS, VoIP, and NPM Managers

EMC Smarts SAM, IP, ESM, MPLS, VoIP, and NPM Managers EMC Smarts SAM, IP, ESM, MPLS, VoIP, and NPM Managers Version 9.2.2 Spport Matrix 302-000-357 REV 02 Copyright 2013 EMC Corporation. All rights reserved. Pblished in USA. Pblished December, 2013 EMC believes

More information

Analog Telephones. User Guide. BusinessPhone Communication Platform

Analog Telephones. User Guide. BusinessPhone Communication Platform Analog Telephones BsinessPhone Commnication Platform User Gide Cover Page Graphic Place the graphic directly on the page, do not care abot ptting it in the text flow. Select Graphics > Properties and make

More information

Welcome to UnitedHealthcare. Ideally, better health coverage should cost less. In reality, now it can.

Welcome to UnitedHealthcare. Ideally, better health coverage should cost less. In reality, now it can. Welcome to UnitedHealthcare Ideally, better health coverage shold cost less. In reality, now it can. The plan designed with both qality and affordability in mind. Consistent, qality care is vitally important.

More information

AN OTT NETWORK FOR THE CONNECTED WORLD

AN OTT NETWORK FOR THE CONNECTED WORLD AN OTT NETWORK FOR THE CONNECTED WORLD 1 AN OTT NETWORK FOR THE CONNECTED WORLD Connect, identify and interact with yor cstomers, via apps, online channels and any other web enabled device. Create social

More information

Closer Look at ACOs. Making the Most of Accountable Care Organizations (ACOs): What Advocates Need to Know

Closer Look at ACOs. Making the Most of Accountable Care Organizations (ACOs): What Advocates Need to Know Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Updated

More information

Tools to help Historically Black Colleges & Universities make the most of their brand, website & marketing campaigns

Tools to help Historically Black Colleges & Universities make the most of their brand, website & marketing campaigns Tools to help Historically Black Colleges & Universities make the most of their brand, website & marketing campaigns A service of vitalink, Universal Printing and AndiSites Universities are challenged

More information

STI Has All The Pieces Hardware Software Support

STI Has All The Pieces Hardware Software Support STI Has All The Pieces Hardware Software Spport STI has everything yo need for sccessfl practice management, now and in the ftre. The ChartMaker Medical Site Incldes: Practice Management/Electronic Billing,

More information

The Intelligent Choice for Basic Disability Income Protection

The Intelligent Choice for Basic Disability Income Protection The Intelligent Choice for Basic Disability Income Protection provider Pls Limited Keeping Income strong We prposeflly engineer or basic disability income prodct to provide benefit-rich featres delivering

More information

The Good Governance Standard for Public Services

The Good Governance Standard for Public Services The Good Governance Standard for Pblic Services The Independent Commission for Good Governance in Pblic Services The Independent Commission for Good Governance in Pblic Services, chaired by Sir Alan Langlands,

More information

Candidate: Shawn Mullane. Date: 04/02/2012

Candidate: Shawn Mullane. Date: 04/02/2012 Shipping and Receiving Specialist / Inventory Control Assessment Report Shawn Mllane 04/02/2012 www.resorceassociates.com To Improve Prodctivity Throgh People. Shawn Mllane 04/02/2012 Prepared For: NAME

More information

The Boutique Premium. Do Boutique Investment Managers Create Value? AMG White Paper June 2015 1

The Boutique Premium. Do Boutique Investment Managers Create Value? AMG White Paper June 2015 1 The Botiqe Premim Do Botiqe Investment Managers Create Vale? AMG White Paper Jne 2015 1 Exective Smmary Botiqe active investment managers have otperformed both non-botiqe peers and indices over the last

More information

MASTER OF ENVIRONMENTAL POLICY. Preparing Tomorrow s Global Environmental Leaders

MASTER OF ENVIRONMENTAL POLICY. Preparing Tomorrow s Global Environmental Leaders MASTER OF ENVIRONMENTAL POLICY Preparing Tomorrow s Global Environmental Leaders WELCOME The imep Program at Dke Knshan University seeks to gradate innovative, skilled agents of change, who can offer workable,

More information

Upgrading Windows 2000 Domains to Windows Server 2003 Domains

Upgrading Windows 2000 Domains to Windows Server 2003 Domains C H A P T E R 9 Upgrading Windows 2000 Domains to Windows Server 2003 Domains Upgrading yor network operating system from Microsoft Windows 2000 to Windows Server 2003 reqires minimal network configration

More information

Candidate: Cassandra Emery. Date: 04/02/2012

Candidate: Cassandra Emery. Date: 04/02/2012 Market Analyst Assessment Report 04/02/2012 www.resorceassociates.com To Improve Prodctivity Throgh People. 04/02/2012 Prepared For: Resorce Associates Prepared by: John Lonsbry, Ph.D. & Lcy Gibson, Ph.D.,

More information

Standard. 8029HEPTA DataCenter. Because every fraction of a second counts. network synchronization requiring minimum space. hopf Elektronik GmbH

Standard. 8029HEPTA DataCenter. Because every fraction of a second counts. network synchronization requiring minimum space. hopf Elektronik GmbH 8029HEPTA DataCenter Standard Becase every fraction of a second conts network synchronization reqiring minimm space hopf Elektronik GmbH Nottebohmstraße 41 58511 Lüdenscheid Germany Phone: +49 (0)2351

More information

EMC NetWorker. Performance Optimization Planning Guide. Version 8.2 302-000-697 REV 01

EMC NetWorker. Performance Optimization Planning Guide. Version 8.2 302-000-697 REV 01 EMC NetWorker Version 8.2 Performance Optimization Planning Gide 302-000-697 REV 01 Copyright 2000-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Janary, 2015 EMC believes the information

More information

The Time is Now for Stronger EHR Interoperability and Usage in Healthcare

The Time is Now for Stronger EHR Interoperability and Usage in Healthcare The Time is Now for Stronger EHR Interoperability and Usage in Healthcare Sponsored by Table of Contents 03 Stdy: Large Nmber of EHRs Do Not Meet Usability Standards 05 Black Book: EHR Satisfaction Growing

More information

Research on Pricing Policy of E-business Supply Chain Based on Bertrand and Stackelberg Game

Research on Pricing Policy of E-business Supply Chain Based on Bertrand and Stackelberg Game International Jornal of Grid and Distribted Compting Vol. 9, No. 5 (06), pp.-0 http://dx.doi.org/0.457/ijgdc.06.9.5.8 Research on Pricing Policy of E-bsiness Spply Chain Based on Bertrand and Stackelberg

More information

Accelerated Leadership Performance Program

Accelerated Leadership Performance Program Accelerated Leadership Performance Program Astralia s premier accelerated leadership program for women managers Managers that engage flly in the program retrn to their workplace as decisive, highly competent

More information

Dialog 4106 Basic/Dialog 4147 Medium

Dialog 4106 Basic/Dialog 4147 Medium Dialog 4106 Basic/Dialog 4147 Medim Analog Telephones for MD110 Commnication System User Gide Cover Page Graphic Place the graphic directly on the page, do not care abot ptting it in the text flow. Select

More information

The Role of the Community Occupational Therapist

The Role of the Community Occupational Therapist Ceredigion Conty Concil Social Services Department The Role of the Commnity Occpational Therapist...taking care to make a difference Large Print or other format/medim are available on reqest please telephone

More information