Steganographic AVI Filesystems for fun and profit. Paul Sebastian Ziegler HITB KL 2011
|
|
- Eunice Palmer
- 8 years ago
- Views:
Transcription
1 Steganographic AVI Filesystems for fun and profit Paul Sebastian Ziegler HITB KL 2011
2 Introduction
3 Introduction In 30 seconds or less
4 Paul Sebastian Ziegler
5 Pentester
6 01_okladka_FR.indd , 15:09:37 Cross-Site Scripting Paul Sebastian Ziegler Cross-Site Scripting (XSS) ist die Schwachstelle in Webanwendungen schlechthin. Wie kaum eine andere Technik kombiniert diese Technik einfache Methoden und Ansätze zu letztendlich verheerenden Angriffen. Jedoch ist das Wissen um diese Schwachstelle und die damit verbundenen Angriffe derzeitig lediglich Sicherheitsexperten vorbehalten. Es existieren zwar umfangreiche Berichte und Dokumentationen, aber diese können zumeist nur von Insidern verstanden werden. Der normale Programmierer oder Nutzer, der sich mit Cross-Site Scripting auseinandersetzen muss, bleibt in der Regel außen vor. Dieses TecFeed ist bemüht, das zu ändern. In einfachen Schritten führt Sie der Autor in das komplexe Thema ein. Sie werden lernen, was Cross-Site Scripting ist und wie man mit seiner Hilfe Webanwendungen angreifen kann. Nach der Lektüre dieses TecFeeds werden Sie in der Lage sein, Schwachstellen zu erkennen und zu beheben. INHALT Einleitung 2 Aufbau eines XSS-Angriffs gegen eine ungesicherte Webanwendung 2 Effekte, die ein Angreifer durch XSS hervorrufen kann 8 Schutzmechanismen, die zu kurz greifen 19 Der Aufbau starker Schutzmechanismen Escapen und listenbasiertes Filtern 36 Das Gefahrenpotenzial von XSS heute und in naher Zukunft 47 Zusammenfassung 52 Anhang A Liste verschiedener Angriffsvektoren 53 Anhang B safehtml 54 Über den Autor 72 Danksagung 72 TecFeeds
7 Ninja Penguin Limited
8 Chief Executive Penguin Trainer
9 Artificial Intelligence
10 Make my computers act on their own.
11 That s what HE thinks!
12 Write code Hack stuff Things I do Train ninja penguins Write books & articles
13 Visit observed.de for more l33t-cred
14 Steganographic AVI File Systems
15 Securing your Data
16 I don t want anyone to be able to access my data!
17 Great!
18 Cryptography!
19 Many algorithms to choose from Cryptography!
20 Variable strength Many algorithms to choose from adapts to your needs Cryptography!
21 Variable strength Many algorithms to choose from adapts to your needs Cryptography! Algorithms are rarely (*cough*) broken
22 Variable strength Many algorithms to choose from adapts to your needs Cryptography! Crypto Cascade + Algorithms are rarely (*cough*) broken Secure Passphrase = Secured data for 5 years
23
24 Me?
25
26 Airport
27 Airport Yeah, well need to check your computer.
28 Solutions
29 Don t possess the passphrase
30 Transmit data through separate channel
31 Physically hide the data
32 Thou shall not pass!
33 (That, or the wrench)
34 Introducing Super Hero #1
35 Steganography
36 Hey, Truecrypt does that!
37 Truecrypt 7.0a - Hidden partitions - Hidden volume within crypto container - Hidden OS
38 3 Problems
39 Need for fake outer partition
40
41 Partition Overwriting
42 Cool. Just write one gig of data to that disk and we ll let you go.
43 Transporting lots of data
44 I always travel with 5 1-terabyte-disks containing only 15MB each!
45 Introducing Super Hero #2
46 File-Based Steganography!
47 Plausible Deniability
48 What? That picture I got from flickr contained a hidden message? Great Scott!
49 Carrying lots of data
50 Scenario: Male TB of data
51 Scenario A: Male TB of data 5 1-terabyteharddrives containing 150MB each
52 Scenario B: Male TB of data 5 terabytes of miscellaneous video files
53 Sharing through open channels
54
55 Problem?
56 Yes, actually.
57 Storing and accessing data is tiresome
58 Carrying specialized tools for access
59 Don t mind my 400GB picture collection and the folder labeled steganographic imaging toolset
60 Can t be modified while hidden
61 Files need to be decloaked to be accessed
62
63 Let s address some of these issues
64 Introducing MariaFS
65 Put your money where your mouth is!
66 -- Cut at the perforated line --
67 -- Cut at the perforated line --
68 Goals
69 Easy to use Goals Reasonably fast Unsuspicious in airport setting Clear language
70 Problem Solution Hiding Files Carrying Lots of Files Steganography File Based Steganography Specialized Toolset Hard to use Needs to decrypt to alter Hard to alter, adapt, extend
71 Problem Solution Hiding Files Carrying Lots of Files Specialized Toolset Hard to use Needs to decrypt to alter Hard to alter, adapt, extend Steganography Steganography in AVI Containers File System Driver (1 file) Simple CLI usage (once, when mounting) Steganography hidden from user Python
72 PornFS
73 PornFS MariaFS
74 PornFS MariaFS (Ask someone Japanese if you don t get the joke)
75 2_cups_1_girl_starbucks_commercial.avi
76 2_cups_1_girl_starbucks_commercial.avi Mount using custom FUSE driver
77 2_cups_1_girl_starbucks_commercial.avi Mount using custom FUSE driver Provide data to user abstracted as FS
78 FUSE?
79 FUSE? Filesystem in User Space
80 FUSE? Filesystem in User Space Allows fast FS implementation
81 FUSE? Filesystem in User Space Allows fast FS implementation Supports many languages
82 Implemented in FUSE ntfs-3g GmailFS sshfs GVFS (Gnome) s3fs
83 Ideas for Infosec Write custom FS to nail down access policies, log, etc Specialized FS for honeypots Extend existing FS Write custom FS that returns the complete lyrics to Rick Astley s Never gonna give you up for every file read
84
85 AVI?
86 Very common AVI?
87 Very common AVI? Large size differences
88 Gap between Very common data and index AVI? Large size differences
89 Gap between Very common data and index AVI? Large size Easy Structure differences
90 AVI File Structure
91 RIFF Resource Interchange File Format
92 RIFF Length AVI LIST hdrl hdrl data movi movi data idx1 idx1 data
93 RIFF Length AVI LIST hdrl hdrl data movi movi data idx1 idx1 data
94 RIFF Length AVI LIST hdrl hdrl data movi movi data MariaFS Data idx1 idx1 data
95 Internals
96 Requirements
97 FUSE OSXFuse macfuse Requirements
98 FUSE OSXFuse macfuse Python 2.6+ Requirements
99 FUSE OSXFuse macfuse Python 2.6+ Requirements FUSE-Python bindings + PyCrypto
100 FUSE OSXFuse macfuse Python 2.6+ Requirements FUSE-Python bindings + PyCrypto Tons o RAM
101 creating python mariafs.py -c somefile.avi
102 FS Markers "VIDFSBEGIN" Passphrase "VIDFSEND" AES Encrypted Markers Insert before IDX
103 mounting python mariafs.py somefile.avi \ mountpoint/ -o allow_other
104 FS Markers "VIDFSBEGIN" Passphrase "VIDFSEND" AES Encrypted Markers Encrypted Markers in File?
105 deleting python mariafs.py -x somefile.avi
106 FS Markers "VIDFSBEGIN" Passphrase "VIDFSEND" AES Encrypted Markers Delete everything between markers
107 Markers BEGINNING_MARKER_PLAIN = "VIDFSBEGIN" END_MARKER_PLAIN = "VIDFSEND" FILE_NAME_MARKER_PLAIN = "FILENAME" FILE_STATS_MARKER_PLAIN = "FILESTATS" FILE_DATA_MARKER_PLAIN = "FILEDATA"
108 FILENAMEDATADATADATA FILESTATSDATADATADATA FILEDATADATADATADATA
109 FILENAMEDATADATADATA FILESTATSDATADATADATA FILEDATADATADATADATA FILENAMEDATADATADATA FILESTATSDATADATADATA FILEDATADATADATADATA FILENAMEDATADATADATA FILESTATSDATADATADATA FILEDATADATADATADATA
110 VIDFSBEGIN FILENAMEDATADATADATA FILESTATSDATADATADATA FILEDATADATADATADATA FILENAMEDATADATADATA FILESTATSDATADATADATA FILEDATADATADATADATA FILENAMEDATADATADATA FILESTATSDATADATADATA FILEDATADATADATADATA VIDFSEND
111 Stats atime mtime ctime size uid gid
112 Detectability
113 Writing Data
114 File is mmaped Writing Data
115 File is mmaped Writing Data New file created or old one updated with fresh data / stats
116 File is mmaped Writing Data Rebuild mmap New file created or old one updated with fresh data / stats
117 File is mmaped Return Writing Data Rebuild mmap New file created or old one updated with fresh data / stats
118 Speed Read: 0.01 MB/s Write: 0.2 MB/s
119
120 Speed Read: 0.3 MB/s Write: 2.5 MB/s
121 Main Demonstration
122 Limitations
123 Scalability
124 Maximum Number of Files Scalability
125 Maximum Number of Files Scalability RAM Usage
126 Maximum Number of Files Scalability RAM Usage Maximum File Size
127 Non-implemented FS Features
128 Simultaneous Access Non-implemented FS Features
129 Simultaneous Access Non-implemented FS Features Access Controls
130 Simultaneous Access Non-implemented FS Features Access Controls Devices
131 Code:
132 Image Attributions pigpogm (page 4) xkcd (page 10) djwundi (page 34) skampy (page 45) logos of respective companies (page 54) steffenz (page 62) 60 in 3 (page 84) Hyperbole and a half (page 118)
133 Questions? Ideas? Bacon?
134 Thank you for listening!
Software / FileMaker / Plug-Ins Mailit 6 for FileMaker 10-13
Software / FileMaker / Plug-Ins Mailit 6 for FileMaker 10-13 Seite 1 / 5 Mailit 6 for FileMaker 10-13 The Ultimate Email Plug-In Integrate full email capability into your FileMaker 10-13 solutions with
More informationDiese Liste wird präsentiert von. Netheweb.de
Diese Liste wird präsentiert von Netheweb.de Die Liste enthält 1000 Do-Follow Blogs, die zum Linkbuilding genutzt werden können, es kann sein, dass verkürzte URL s nicht korrekt weiter geleitet werden.
More informationAfter installation of Rohos Disk Encryption, insert your USB pen drive to the computer and run the Rohos Disk Encryption application.
Rohos Disk Encryption - creates hidden and password protected partitions on the computer or USB flash drive. With megabytes of sensitive files and private data on your computer or USB drive you can not
More informationCertificate SAP INTEGRATION CERTIFICATION
Certificate SAP INTEGRATION CERTIFICATION SAP SE hereby confirms that the interface software MCC SR2015 for the product MCC SR2015 of the MEIERHOFER AG. has been certified for integration with SAP ECC
More informationLinux & Docker auf Azure
Linux & Docker auf Azure Linux in der Azure Cloud Web Mail Twitter Rainer Stropek software architects gmbh http://www.timecockpit.com rainer@timecockpit.com @rstropek Saves the day. Your Host Rainer Stropek
More informationGuide how to protect your private data with Rohos Disk Encryption
Guide how to protect your private data with Rohos Disk Encryption 1 Content 1. Encrypt USB drive - Portable Application 2. Encrypt HDD 3. Hide folder 4. Have USB Key for access control 5. Rohos disk options
More informationMicrosoft Nano Server «Tuva» Rinon Belegu
1 Microsoft Nano Server «Tuva» Rinon Belegu Partner: 2 Agenda Begrüssung Vorstellung Referent Content F&A Weiterführende Kurse 3 Vorstellung Referent Rinon Belegu Microsoft Certified Trainer (AWS Technical
More informationEncrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data
More informationLEARNING AGREEMENT FOR STUDIES
LEARNING AGREEMENT FOR STUDIES The Student Last name (s) First name (s) Date of birth Nationality 1 Sex [M/F] Academic year 20../20.. Study cycle EQF level 6 Subject area, Code Phone E-mail 0421 The Sending
More informationCloud Performance Group 1. Cloud@Night Event. 14. Januar 2016 / Matthias Gessenay (matthias.gessenay@corporatesoftware.ch)
1 Cloud@Night Event 14. Januar 2016 / Matthias Gessenay (matthias.gessenay@corporatesoftware.ch) 2 Agenda SharePoint ABC Project Server ABC What s new in O365 4 SharePoint 2016 ABC A Access App-Support
More informationTIn 1: Lecture 3: Lernziele. Lecture 3 The Belly of the Architect. Basic internal components of the 8086. Pointers and data storage in memory
Mitglied der Zürcher Fachhochschule TIn 1: Lecture 3 The Belly of the Architect. Lecture 3: Lernziele Basic internal components of the 8086 Pointers and data storage in memory Architektur 8086 Besteht
More informationAnyWeb AG 2008 www.anyweb.ch
HP SiteScope (End-to-End Monitoring, System Availability) Christof Madöry AnyWeb AG ITSM Practice Circle September 2008 Agenda Management Technology Agentless monitoring SiteScope in HP BTO SiteScope look
More informationMit einem Auge auf den mathema/schen Horizont: Was der Lehrer braucht für die Zukun= seiner Schüler
Mit einem Auge auf den mathema/schen Horizont: Was der Lehrer braucht für die Zukun= seiner Schüler Deborah Löwenberg Ball und Hyman Bass University of Michigan U.S.A. 43. Jahrestagung für DidakEk der
More informationDie Versant-DB ist ein wesentlicher Bestandteil von CADISON.
Die Versant-DB Die Versant-DB ist ein wesentlicher Bestandteil von CADISON. Die Software wurde von einem in den USA gegründeten Unternehmen mit Niederlassung in Hamburg entwickelt. Die Versant Datenbank
More informationIBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence
IBM Security Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence Peter Kurfürst Vertrieb IBM Security Lösungen Enterprise-Kunden Baden-Württemberg
More informationSearch Engines Chapter 2 Architecture. 14.4.2011 Felix Naumann
Search Engines Chapter 2 Architecture 14.4.2011 Felix Naumann Overview 2 Basic Building Blocks Indexing Text Acquisition Text Transformation Index Creation Querying User Interaction Ranking Evaluation
More informationImplementing Data Models and Reports with Microsoft SQL Server
Implementing Data Models and Reports with Microsoft SQL Server Dauer: 5 Tage Kursnummer: M20466 Überblick: Business Intelligence (BI) wird für Unternehmen von verschiedenen Größen aufgrund des dadurch
More informationUpgrading Your Skills to MCSA Windows Server 2012 MOC 20417
Upgrading Your Skills to MCSA Windows Server 2012 MOC 20417 In dieser Schulung lernen Sie neue Features und Funktionalitäten in Windows Server 2012 in Bezug auf das Management, die Netzwerkinfrastruktur,
More informationquick documentation Die Parameter der Installation sind in diesem Artikel zu finden:
quick documentation TO: FROM: SUBJECT: ARND.SPIERING@AS-INFORMATIK.NET ASTARO FIREWALL SCAN MIT NESSUS AUS BACKTRACK 5 R1 DATE: 24.11.2011 Inhalt Dieses Dokument beschreibt einen Nessus Scan einer Astaro
More informationProcessing Dialogue-Based Data in the UIMA Framework. Milan Gnjatović, Manuela Kunze, Dietmar Rösner University of Magdeburg
Processing Dialogue-Based Data in the UIMA Framework Milan Gnjatović, Manuela Kunze, Dietmar Rösner University of Magdeburg Overview Background Processing dialogue-based Data Conclusion Gnjatović, Kunze,
More informationEmbedded Software Development and Test in 2011 using a mini- HIL approach
Primoz Alic, isystem, Slovenia Erol Simsek, isystem, Munich Embedded Software Development and Test in 2011 using a mini- HIL approach Kurzfassung Dieser Artikel beschreibt den grundsätzlichen Aufbau des
More informationHYPO TIROL BANK AG. EUR 5,750,000,000 Debt Issuance Programme (the "Programme")
Third Supplement dated 29 December 2015 to the Prospectus dated 9 June 2015 This document constitutes a supplement (the "Third Supplement") within the meaning of Article 16 of the Directive 2003/71/EC
More information10 Ways to Not Get Caught Hacking On Your Mac
10 Ways to Not Get Caught Hacking On Your Mac Three18 is a Comprehensive Technology Solutions Provider Apple Certified Partner Microsoft Gold Partner Symantec Security Solutions Partner Novell and RedHat
More informationNATIVE ADVERTISING, CONTENT MARKETING & CO. AUFBRUCH IN EIN NEUES GOLDENES ZEITALTER DES MARKETINGS?
NATIVE ADVERTISING, CONTENT MARKETING & CO. AUFBRUCH IN EIN NEUES GOLDENES ZEITALTER DES MARKETINGS? 2014 in Frankfurt am Main DATUM 11.11.2014 SEITE 2 Christian Paul Stobbe Director Strategy Düsseldorf
More informationDesigning and Deploying Messaging Solutions with Microsoft Exchange Server 2010 MOC 10233
Designing and Deploying Messaging Solutions with Microsoft Exchange Server MOC 10233 In dieser Schulung erhalten Sie das nötige Wissen für das Design und die Bereitstellung von Messaging-Lösungen mit Microsoft
More informationDokumentation über die Übernahme von. "GS-R-3" (The Management System for Facilities and Activities) "Sicherheitskriterien für Kernkraftwerke"
Dokumentation über die Übernahme von "GS-R-3" () in die "Sicherheitskriterien für Kernkraftwerke" REVISION D APRIL 2009 1. INTRODUCTION BACKGROUND 1.1 This Safety Requirements publication defines the requirements
More informationSPICE auf der Überholspur. Vergleich von ISO (TR) 15504 und Automotive SPICE
SPICE auf der Überholspur Vergleich von ISO (TR) 15504 und Automotive SPICE Historie Software Process Improvement and Capability determination 1994 1995 ISO 15504 Draft SPICE wird als Projekt der ISO zur
More informationOracle Whitepaper April 2015. Security and the Oracle Database Cloud Service
Oracle Whitepaper April 2015 Security and the Oracle Database Cloud Service Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database Cloud
More informationExemplar for Internal Achievement Standard. German Level 1
Exemplar for Internal Achievement Standard German Level 1 This exemplar supports assessment against: Achievement Standard 90885 Interact using spoken German to communicate personal information, ideas and
More informationEncrypting removable storage devices Removable device encryption R/W compatible with Linux and Windows
Encrypting removable storage devices Removable device encryption R/W compatible with Linux and Windows for TF-CSIRT, 22nd Meeting Oporto, PT September 21, 2007 Background and (my) Motivation Some private
More informationInstalling Ubuntu 12.04.1 LTS with full disk encryption
Installing Ubuntu 12.04.1 LTS with full disk encryption Intro: This is a simple step by step tutorial showing you how to install Ubuntu 12.04.1 LTS with enabled full disk encryption. If you don't know
More informationAssessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
More informationIs Cloud relevant for SOA? 2014-06-12 - Corsin Decurtins
Is Cloud relevant for SOA? 2014-06-12 - Corsin Decurtins Abstract SOA (Service-Orientierte Architektur) war vor einigen Jahren ein absolutes Hype- Thema in Unternehmen. Mittlerweile ist es aber sehr viel
More informationExchange Synchronization AX 2012
Exchange Synchronization AX 2012 Autor... Pascal Gubler Dokument... Exchange Synchronization 2012 (EN) Erstellungsdatum... 25. September 2012 Version... 2 / 17.06.2013 Content 1 PRODUKTBESCHREIBUNG...
More informationZielgruppe Dieses Training eignet sich für IT-Professionals.
Advanced Solutions of Microsoft Exchange Server 2013 MOC 20342 In diesem Kurs wird den Teilnehmern das Wissen vermittelt, eine Microsoft Exchange Server 2013 Umgebung zu konfigurieren und zu verwalten.
More informationUse of DB2 purescale with SAP Applications
Use of DB2 purescale with SAP Applications December, 2013 Customer SAP Applications on DB2 purescale End users Can use SAP log-on groups to direct similar work to same set of servers Central Services Application
More informationInformation Systems 2
Information Systems 2 Prof. Dr. Dr. L. Schmidt-Thieme MSc. André Busche Übung 9 0. Allerlei 1. Übung 2. Hands on some things 2.1 Saxon 2.2 Corba 28.06.10 2/ 0. Allerlei 1. Übung 2. Hands on some things
More informationBible Software on the Workbench of the Biblical Scholar and Biblical Languages Learner: assessment and perspective
Bible Software on the Workbench of the Biblical Scholar and Biblical Languages Learner: assessment and perspective (Oliver Glanz) The present Bible software situation > From Pages to Bits > Saving > Speeding
More informationLaptop Encryption. Tom Throwe. 1 August 2007. RHIC and ATLAS Computing Facility. (Brookhaven National Laboratory) Laptop Encryption 8/1/07 1 / 17
Laptop Encryption Tom Throwe RHIC and ATLAS Computing Facility 1 August 2007 (Brookhaven National Laboratory) Laptop Encryption 8/1/07 1 / 17 Outline 1 Introduction Requirements Realities 2 Software 3
More informationUpgrade-Preisliste. Upgrade Price List
Upgrade-Preisliste Mit Firmware Features With list of firmware features Stand/As at: 10.09.2014 Änderungen und Irrtümer vorbehalten. This document is subject to changes. copyright: 2014 by NovaTec Kommunikationstechnik
More informationForking, Scratching und Re-Merging
Forking, Scratching und Re-Merging Kei Ishii, Bernd Lutterbeck, Frank Pallas Greifswald, 5. März 2008 RI = R I R I R I RI = R I R I I R Forking ? I R «to think about software differently» «the shift
More informationPavlo Baron. Big Data and CDN
Pavlo Baron Big Data and CDN Pavlo Baron www.pbit.org pb@pbit.org @pavlobaron What is Big Data Big Data describes datasets that grow so large that they become awkward to work with using on-hand database
More informationFormat the USB Thumb Drive for Ghost
First, download the 3 files found on this FTP site: ftp://ftp.meta.moleculardevices.com/outgoing/kudoh/ Also, download the files found here: ftp://ftp.meta.moleculardevices.com/support/wavetracer/ You
More informationGuidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
More informationSynopse: EU-GMP- Leitfaden Annex 11 Computerised Systems
Synopse: EU-GMP- Leitfaden Annex 11 Computerised Systems Am 3. Januar 2011 wurde die neue Fassung des Annex 11 Computerised Systems durch die Europäische Kommission freigegeben. Der Annex wurde überarbeitet,
More informationComodo Disk Encryption
Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3
More informationDepartment of Geography - Birgit Sattler - University of Duisburg-Essen ILIAS. in geography and landscape architecture
ILIAS in geography and landscape architecture ILIAS in geography and landscape architecture computer skills and internet access of the students practical experience with ILIAS selected evaluation results
More informationEvaluating parallel file system security
Evaluating parallel file system security 1. Motivation After successful Internet attacks on HPC centers worldwide, there has been a paradigm shift in cluster security strategies. Clusters are no longer
More informationRun SAP Implementation Partner Program Guide 2009 ADOPTING THE RUN METHODOLOGY INTO YOUR SAP IMPLEMENTATIONS
Run SAP Implementation Partner Program Guide 2009 ADOPTING THE RUN METHODOLOGY INTO YOUR SAP IMPLEMENTATIONS Executive Summary The foundation for business process availability is laid in the technical
More informationSafer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: arul.bharathi@yahoo.com,
More informationSymantec Backup Exec (TM) 13 Installation Log
v Symantec Backup Exec (TM) 13 Installation Log 05-26-2010,15:07:12 : Explorer exists. Launching UI. 05-26-2010,15:07:14 : Executing managed _Setup: 05-26-2010,15:07:14 : C:\Dokumente und orms_multilingual_dvd\be\winnt\install\be32\install\_setup.exe
More informationStep by step guide how to password protect your USB flash drive
Step by step guide how to password protect your USB flash drive 1 Content 1. How to create encrypted partition on USB flash drive 2. How to work with encrypted partition on the USB flash drive - Rohos
More informationDeutsche Bank Finance IT Migration Oracle Exadata
Deutsche Bank Finance IT Migration Oracle Exadata March 2012 Dr. Marcus Praetzas Agenda 1 2 3 Business Drivers / Background Motivation PoC (Phase 1) 4 Migration (Phase 2) 5 Observations Deutsche Bank Finance
More informationCobraNet TM User s Manual
CobraNet TM User s Manual 19201 Cook Street, Foothill Ranch, CA 92610-3501 USA Phone: (949) 588-9997 Fax: (949) 588-9514 Email: sales@renkus-heinz.com Web: www.renkus-heinz.com CobraNet TM is a registered
More informationLeitfaden für die Antragstellung zur Förderung einer nationalen Biomaterialbankeninitiative
Seite 1 von 8 Leitfaden für die Antragstellung zur Förderung einer nationalen Biomaterialbankeninitiative Anträge zu Biomaterialbanken sind entsprechend den Vorgaben dieses Leitfadens zu erstellen (DIN
More informationTUXERA NTFS for Mac USER GUIDE 2/13. Index
2/13 Index 1. Introduction to Tuxera NTFS for Mac... 3 1.1 What is a file system driver?... 3 1.2 How does it work?... 3 2. Installation... 5 2.1 Installing Tuxera NTFS for Mac... 5 2.2 Uninstalling Tuxera
More informationHow To Backup Your Computer With A File Copy Engine
Secondary Backup Entire System Including Windows Installation Data Files, Emails, Databases, Documents Not Important Important Critical Ultra Critical Secondary Backup Data Archival Backup Secondary Backup
More informationISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014
ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014 Legende: gering mittel hoch Änderungsgrad A.5 Information security policies
More informationPGP Portable Quick Start Guide Version 10.2
PGP Portable Quick Start Guide Version 10.2 Introduction to PGP Portable Use PGP Portable to distribute encrypted files to users who do not have PGP Desktop software. Use PGP Portable to transport files
More informationSystem Image Backup and Recovery
System Image Backup and Recovery Enveloc s new System and Drive Imaging feature is an important part of an effective disaster recovery plan and can allow you to restore a machine after a complete crash
More informationThe Changing Global Egg Industry
Vol. 46 (2), Oct. 2011, Page 3 The Changing Global Egg Industry - The new role of less developed and threshold countries in global egg production and trade 1 - Hans-Wilhelm Windhorst, Vechta, Germany Introduction
More informationINSTALLING NOVA DATA ENCRYPTION SOFTWARE
INSTALLING NOVA DATA ENCRYPTION SOFTWARE Introduction 1. Here is what you will need to do to install the college s data encryption software on your computer, laptop, or USB storage device. The encryption
More informationF5 Applikationsbereitstellung ohne Grenzen
F5 Applikationsbereitstellung ohne Grenzen Profi AG Endkunden-Webcast, 27.11.14 Dino Schmid d.schmid@f5.com Major Channel Account Manager Worum geht es in der IT? F5 Networks, Inc 2 Das wichtigste in der
More informationProject Cost Reporting for PPM
Project Cost Reporting for PPM A PLM Consulting Solution Public Project Cost Reporting for PPM The Consulting Solution Project Cost Reporting supports project-centric and cross-project evaluations in PPM,
More informationSeagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide for Use With Your FreeAgent Drive 1
Seagate Manager User Guide For Use With Your FreeAgent TM Drive Seagate Manager User Guide for Use With Your FreeAgent Drive 1 Seagate Manager User Guide for Use With Your FreeAgent Drive Revision 1 2008
More informationSAP Enterprise Portal 6.0 KM Platform Delta Features
SAP Enterprise Portal 6.0 KM Platform Delta Features Please see also the KM Platform feature list in http://service.sap.com/ep Product Management Operations Status: January 20th, 2004 Note: This presentation
More informationWindows Server 2008 R2 Essentials
Windows Server 2008 R2 Essentials Installation, Deployment and Management 2 First Edition 2010 Payload Media. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution
More informationwww.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon
Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor
More informationBuilding an Architecture Model 1. 1. Entwerfen Sie mit AxiomSys ein Kontextdiagramm, das folgendermaßen aussieht:
Building an Architecture Model 1 1. Entwerfen Sie mit AxiomSys ein Kontextdiagramm, das folgendermaßen aussieht: Wie Ihnen aus der vergangenen Lehrveranstaltung bekannt ist, bedeuten Sterne neben den Bezeichnungen,
More informationStrategien im Adeptra-Portal
Strategien im Adeptra-Portal Burkhard Meier Senior Account Executive 1 User Interface Überblick Das Adeptra Portal ist unterteilt in 4 Hauptfunktionen: 1. Portfolio Manager» Regeln & Strategien 2. Direkt»
More informationI Textarbeit. Text 1. I never leave my horse
BEJ Musterprüfung Englisch (11020) 1 I Textarbeit Text 1 I never leave my horse 1 5 10 15 20 Police officers in Ireland don t carry guns. But they often ride through Dublin on horses. Julie Folan is a
More informationPGP Desktop Email Quick Start Guide version 9.6
What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages
More informationINSRUCTION MANUAL AND GUARANTEE POLICY
INSRUCTION MANUAL AND GUARANTEE POLICY FRACTOMETER II made in Germany by: IML- Instrumenta Mechanik Labor GmbH Großer Stadtacker 2 69168 Wiesloch Germany Phone: (+49) 6222 / 6797-0 Fax: (+49) 6222-6797-
More informationHere is a guide on how to encrypt a part of your USB flash drive and access it on any computer:
How to password protect your USB flash drive. According to the XXX agency reports 80% of all lost and stolen USB flash drives contained a very important information: business or government data. The following
More informationCORPORATE DESIGN MANUAL English 5/2015
CORPORATE DESIGN MANUAL English 5/2015 CONTENT Corporate Design Manual Introduction and contact 3 1 Name and logo 4 2 Label 6 3 Fonts 10 4 Colours 11 2 INTRODUCTION Introduction This corporate design manual
More informationLernsituation 9. Giving information on the phone. 62 Lernsituation 9 Giving information on the phone
Fachkunde 1, Lernfeld 2, Useful Office Vocabulary Lernsituation 9 Giving information on the phone Rolf astian, Managing Director of E Partners KG, recently visited the Promo World Fair in Düsseldorf, an
More informationCS; SSART-Treffen, November 18, 2015. Internet Banking: Increasing power of cyber crime... and what to do?
CS; SSART-Treffen, November 18, 2015 Internet Banking: Increasing power of cyber crime.. and what to do? Different targets for cyber crime Collect large data volumes (financial data) Collect customer related
More informationConfiguring and Administering Hyper-V in Windows Server 2012 MOC 55021
Configuring and Administering Hyper-V in Windows Server 2012 MOC 55021 In dem Kurs MOC 55021 Configuring and Administering Hyper-V in Windows Server 2012 lernen Sie die Konfiguration und Administration
More informationETK Technical Workshop 17.11.2011 User Centric vs. Device Centric
ETK Technical Workshop 17.11.2011 User Centric vs. Device Centric René Princz-Schelter Head of PreSales Alcatel-Lucent Enterprise Germany emphasized Member of EMEA Marketing Team 1 2 Dynamic Enterprise
More informationCLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) DATA IMPORT GUIDE
CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) DATA IMPORT GUIDE ABOUT THIS GUIDE This guide provides you with the required steps and instructions to transfer your data to your desired virtual server(s).
More informationwww.infoplc.net Application example AC500 Scalable PLC for Individual Automation Communication between AC500 and KNX network abb
Application example www.infoplc.net AC500 Scalable PLC for Individual Automation Communication between AC500 and KNX network abb Content www.infoplc.net 1 Disclaimer...2 1.1 For customers domiciled outside
More informationLEHMAN BROTHERS SECURITIES N.V. LEHMAN BROTHERS (LUXEMBOURG) EQUITY FINANCE S.A.
SUPPLEMENTS NO. 2 DATED 6 JUNE 2008 in accordance with 6(2) and 16 of the German Securities Prospectus Act to the two published Base Prospectuses, one per Issuer (together the "Base Prospectus") relating
More informationSupporting Windows 8.1 MOC 20688
Supporting Windows 8.1 MOC 20688 In diesem 5 tägigen Seminar lernen die Teilnehmer, wie sie Windows 8.1 in mittelgroßen und großen IT-Umgebung installieren, konfigurieren und warten. Außerdem erlernen
More informationEaseTag Cloud Storage Solution
EaseTag Cloud Storage Solution The Challenge For most companies, data especially unstructured data, continues to grow by 50 percent annually. The impact of spending more every year on storage, and on protecting
More informationPromise Pegasus R6 Thunderbolt RAID Performance
Introduction Promise Pegasus R6 Thunderbolt RAID Performance This document summarises the results of some performance testing I carried out on a Pegasus R6 Thunderbolt RAID drive from Promise Technologies
More informationHow To Talk To A Teen Help
Sprechen - Speaking Das Sprechen in der englischen Sprache ist viel leichter, wenn du einige Tipps beherzigst! 1. Bevor du ein Gespräch beginnst, überlege dir: Was ist die Situation? Welche Rolle soll
More informationSAP Solution Manager Change Request Management. SAP Solution Manager Product Management SAP AG
SAP Solution Manager Change Request Management SAP Solution Manager Product Management SAP AG Change Request Management Maintenance Activities Project Activities Administration Activities SAP Solution
More informationSymbio system requirements. Version 4.x
Symbio system requirements Version 4.x Stand: September 2015 2015 Ploetz + Zeller GmbH Symbio system requirements 2 Content 1 Symbio Client... 3 1.1 Overview... 3 1.2 Symbio Client... 3 1.2.1 Minimum hardware
More informationHow To Use Teamdrive On A Pc Or Mac Or Ipad (For Acedo)
Version 2.4 DIRECTORY INTRODUCTION...3 INSTALLATION AND REGISTRATION...4 1.1 SYSTEM REQUIREMENTS...4 2 FIRST STEPS...5 2.1 MONITORING FOLDERS...5 2.2 INVITING USERS...8 3 THE TEAMDRIVE EXPLORER...9 3.1
More informationSQL Server 2016. Neuerungen für Administratoren, Entwickler und BI-Nerds
SQL Server 2016 Neuerungen für Administratoren, Entwickler und BI-Nerds Referent Senior Consultant für SQL Server Data Platform Business Intelligence Master-Trainer für SQL Server Trainings Thomas Pfeiffer
More informationMASTER THESIS ABOUT THE RELEVANCE OF THE CONTEXT FOR THE MOOC LEARNER EXPERIENCE
MASTER THESIS ABOUT THE RELEVANCE OF THE CONTEXT FOR THE MOOC LEARNER EXPERIENCE eduhub.ch / SwissMOOC Renato Soldenhoff March 25, 2015 renatosoldenhoff 2 Abstract Masterthesis zur Relevanz des Kontextes
More informationUser Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013)
1 Laplink DiskImage 7 Professional Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/contact E-mail: CustomerService@laplink.com Laplink Software, Inc. 600 108th Ave.
More informationActive Directory Services with Windows Server 2012 MOC 10969
Active Directory Services with Windows Server 2012 MOC 10969 In dem Seminar MS-10969: Active Directory Services with Windows Server lernen Sie die Administration von Active Directory-Technologien in Windows
More informationSAP GLOBAL DIVERSITY POLICY
SAP GLOBAL DIVERSITY POLICY Date 29.8.2006 1 TABLE OF CONTENTS Cover Sheet... 2 PREFACE... 3 1 DEFINITION... 4 2 OBJECTIVES AND SCOPE... 4 2.1 KEY TARGETS FOR DIVERSITY AT SAP... 5 2.2 COMPLIANCE/SANCTIONS...
More informationUsing TrueCrypt to protect data
Using TrueCrypt to protect data Password protecting and encrypting files one by one is a certainly an effective way to securely store and share data. However, what if you have a lot of files? Creating
More informationMatthias Kistler, Urs Marti, Jérôme Ray, Christian Baumann and Adrian Wiget (Federal Office of Topography swisstopo - Switzerland)
Towards a Distortion Free National Spatial Data Infrastructure in Switzerland: Approach, Developed Tools and Internet Services for the Change of the Reference Frame Matthias Kistler, Urs Marti, Jérôme
More informationRalf Kaltenbach, Regional Director Germany. Arrow Sommerforum 2015
Ralf Kaltenbach, Regional Director Germany Arrow Sommerforum 2015 Unsere IT ist doch sicher 2 oder vielleicht doch nicht? 3 2015 VDBIR 4 VDBR - Hintergründe und High level Fakten Dozens of TBs of data
More informationGCE EXAMINERS' REPORTS. GERMAN AS/Advanced
GCE EXAMINERS' REPORTS GERMAN AS/Advanced JANUARY 2012 Statistical Information This booklet contains summary details for each unit: number entered; maximum mark available; mean mark achieved; grade ranges.
More informationHow To Backup On A Computer With A Backup From A Backup To A Backup On Your Computer (Windows) On A Microsoft Vsphere (Windows 10) On Your Pc Or Macbook (Windows Xp) On An Uniden Computer (For
What s new in NovaBACKUP 17.1? Release Notes: NovaBACKUP 17.1 NovaBACKUP 17.1.804 (August, 2015) Backup wie für mich gemacht. New Features NovaBACKUP o Windows 10 Support Fixed issues / bugs (17.1.804)
More informationElena Chiocchetti & Natascia Ralli (EURAC) Tanja Wissik & Vesna Lušicky (University of Vienna)
Elena Chiocchetti & Natascia Ralli (EURAC) Tanja Wissik & Vesna Lušicky (University of Vienna) VII Conference on Legal Translation, Court Interpreting and Comparative Legilinguistics Poznań, 28-30.06.2013
More information