Steganographic AVI Filesystems for fun and profit. Paul Sebastian Ziegler HITB KL 2011

Size: px
Start display at page:

Download "Steganographic AVI Filesystems for fun and profit. Paul Sebastian Ziegler HITB KL 2011"

Transcription

1 Steganographic AVI Filesystems for fun and profit Paul Sebastian Ziegler HITB KL 2011

2 Introduction

3 Introduction In 30 seconds or less

4 Paul Sebastian Ziegler

5 Pentester

6 01_okladka_FR.indd , 15:09:37 Cross-Site Scripting Paul Sebastian Ziegler Cross-Site Scripting (XSS) ist die Schwachstelle in Webanwendungen schlechthin. Wie kaum eine andere Technik kombiniert diese Technik einfache Methoden und Ansätze zu letztendlich verheerenden Angriffen. Jedoch ist das Wissen um diese Schwachstelle und die damit verbundenen Angriffe derzeitig lediglich Sicherheitsexperten vorbehalten. Es existieren zwar umfangreiche Berichte und Dokumentationen, aber diese können zumeist nur von Insidern verstanden werden. Der normale Programmierer oder Nutzer, der sich mit Cross-Site Scripting auseinandersetzen muss, bleibt in der Regel außen vor. Dieses TecFeed ist bemüht, das zu ändern. In einfachen Schritten führt Sie der Autor in das komplexe Thema ein. Sie werden lernen, was Cross-Site Scripting ist und wie man mit seiner Hilfe Webanwendungen angreifen kann. Nach der Lektüre dieses TecFeeds werden Sie in der Lage sein, Schwachstellen zu erkennen und zu beheben. INHALT Einleitung 2 Aufbau eines XSS-Angriffs gegen eine ungesicherte Webanwendung 2 Effekte, die ein Angreifer durch XSS hervorrufen kann 8 Schutzmechanismen, die zu kurz greifen 19 Der Aufbau starker Schutzmechanismen Escapen und listenbasiertes Filtern 36 Das Gefahrenpotenzial von XSS heute und in naher Zukunft 47 Zusammenfassung 52 Anhang A Liste verschiedener Angriffsvektoren 53 Anhang B safehtml 54 Über den Autor 72 Danksagung 72 TecFeeds

7 Ninja Penguin Limited

8 Chief Executive Penguin Trainer

9 Artificial Intelligence

10 Make my computers act on their own.

11 That s what HE thinks!

12 Write code Hack stuff Things I do Train ninja penguins Write books & articles

13 Visit observed.de for more l33t-cred

14 Steganographic AVI File Systems

15 Securing your Data

16 I don t want anyone to be able to access my data!

17 Great!

18 Cryptography!

19 Many algorithms to choose from Cryptography!

20 Variable strength Many algorithms to choose from adapts to your needs Cryptography!

21 Variable strength Many algorithms to choose from adapts to your needs Cryptography! Algorithms are rarely (*cough*) broken

22 Variable strength Many algorithms to choose from adapts to your needs Cryptography! Crypto Cascade + Algorithms are rarely (*cough*) broken Secure Passphrase = Secured data for 5 years

23

24 Me?

25

26 Airport

27 Airport Yeah, well need to check your computer.

28 Solutions

29 Don t possess the passphrase

30 Transmit data through separate channel

31 Physically hide the data

32 Thou shall not pass!

33 (That, or the wrench)

34 Introducing Super Hero #1

35 Steganography

36 Hey, Truecrypt does that!

37 Truecrypt 7.0a - Hidden partitions - Hidden volume within crypto container - Hidden OS

38 3 Problems

39 Need for fake outer partition

40

41 Partition Overwriting

42 Cool. Just write one gig of data to that disk and we ll let you go.

43 Transporting lots of data

44 I always travel with 5 1-terabyte-disks containing only 15MB each!

45 Introducing Super Hero #2

46 File-Based Steganography!

47 Plausible Deniability

48 What? That picture I got from flickr contained a hidden message? Great Scott!

49 Carrying lots of data

50 Scenario: Male TB of data

51 Scenario A: Male TB of data 5 1-terabyteharddrives containing 150MB each

52 Scenario B: Male TB of data 5 terabytes of miscellaneous video files

53 Sharing through open channels

54

55 Problem?

56 Yes, actually.

57 Storing and accessing data is tiresome

58 Carrying specialized tools for access

59 Don t mind my 400GB picture collection and the folder labeled steganographic imaging toolset

60 Can t be modified while hidden

61 Files need to be decloaked to be accessed

62

63 Let s address some of these issues

64 Introducing MariaFS

65 Put your money where your mouth is!

66 -- Cut at the perforated line --

67 -- Cut at the perforated line --

68 Goals

69 Easy to use Goals Reasonably fast Unsuspicious in airport setting Clear language

70 Problem Solution Hiding Files Carrying Lots of Files Steganography File Based Steganography Specialized Toolset Hard to use Needs to decrypt to alter Hard to alter, adapt, extend

71 Problem Solution Hiding Files Carrying Lots of Files Specialized Toolset Hard to use Needs to decrypt to alter Hard to alter, adapt, extend Steganography Steganography in AVI Containers File System Driver (1 file) Simple CLI usage (once, when mounting) Steganography hidden from user Python

72 PornFS

73 PornFS MariaFS

74 PornFS MariaFS (Ask someone Japanese if you don t get the joke)

75 2_cups_1_girl_starbucks_commercial.avi

76 2_cups_1_girl_starbucks_commercial.avi Mount using custom FUSE driver

77 2_cups_1_girl_starbucks_commercial.avi Mount using custom FUSE driver Provide data to user abstracted as FS

78 FUSE?

79 FUSE? Filesystem in User Space

80 FUSE? Filesystem in User Space Allows fast FS implementation

81 FUSE? Filesystem in User Space Allows fast FS implementation Supports many languages

82 Implemented in FUSE ntfs-3g GmailFS sshfs GVFS (Gnome) s3fs

83 Ideas for Infosec Write custom FS to nail down access policies, log, etc Specialized FS for honeypots Extend existing FS Write custom FS that returns the complete lyrics to Rick Astley s Never gonna give you up for every file read

84

85 AVI?

86 Very common AVI?

87 Very common AVI? Large size differences

88 Gap between Very common data and index AVI? Large size differences

89 Gap between Very common data and index AVI? Large size Easy Structure differences

90 AVI File Structure

91 RIFF Resource Interchange File Format

92 RIFF Length AVI LIST hdrl hdrl data movi movi data idx1 idx1 data

93 RIFF Length AVI LIST hdrl hdrl data movi movi data idx1 idx1 data

94 RIFF Length AVI LIST hdrl hdrl data movi movi data MariaFS Data idx1 idx1 data

95 Internals

96 Requirements

97 FUSE OSXFuse macfuse Requirements

98 FUSE OSXFuse macfuse Python 2.6+ Requirements

99 FUSE OSXFuse macfuse Python 2.6+ Requirements FUSE-Python bindings + PyCrypto

100 FUSE OSXFuse macfuse Python 2.6+ Requirements FUSE-Python bindings + PyCrypto Tons o RAM

101 creating python mariafs.py -c somefile.avi

102 FS Markers "VIDFSBEGIN" Passphrase "VIDFSEND" AES Encrypted Markers Insert before IDX

103 mounting python mariafs.py somefile.avi \ mountpoint/ -o allow_other

104 FS Markers "VIDFSBEGIN" Passphrase "VIDFSEND" AES Encrypted Markers Encrypted Markers in File?

105 deleting python mariafs.py -x somefile.avi

106 FS Markers "VIDFSBEGIN" Passphrase "VIDFSEND" AES Encrypted Markers Delete everything between markers

107 Markers BEGINNING_MARKER_PLAIN = "VIDFSBEGIN" END_MARKER_PLAIN = "VIDFSEND" FILE_NAME_MARKER_PLAIN = "FILENAME" FILE_STATS_MARKER_PLAIN = "FILESTATS" FILE_DATA_MARKER_PLAIN = "FILEDATA"

108 FILENAMEDATADATADATA FILESTATSDATADATADATA FILEDATADATADATADATA

109 FILENAMEDATADATADATA FILESTATSDATADATADATA FILEDATADATADATADATA FILENAMEDATADATADATA FILESTATSDATADATADATA FILEDATADATADATADATA FILENAMEDATADATADATA FILESTATSDATADATADATA FILEDATADATADATADATA

110 VIDFSBEGIN FILENAMEDATADATADATA FILESTATSDATADATADATA FILEDATADATADATADATA FILENAMEDATADATADATA FILESTATSDATADATADATA FILEDATADATADATADATA FILENAMEDATADATADATA FILESTATSDATADATADATA FILEDATADATADATADATA VIDFSEND

111 Stats atime mtime ctime size uid gid

112 Detectability

113 Writing Data

114 File is mmaped Writing Data

115 File is mmaped Writing Data New file created or old one updated with fresh data / stats

116 File is mmaped Writing Data Rebuild mmap New file created or old one updated with fresh data / stats

117 File is mmaped Return Writing Data Rebuild mmap New file created or old one updated with fresh data / stats

118 Speed Read: 0.01 MB/s Write: 0.2 MB/s

119

120 Speed Read: 0.3 MB/s Write: 2.5 MB/s

121 Main Demonstration

122 Limitations

123 Scalability

124 Maximum Number of Files Scalability

125 Maximum Number of Files Scalability RAM Usage

126 Maximum Number of Files Scalability RAM Usage Maximum File Size

127 Non-implemented FS Features

128 Simultaneous Access Non-implemented FS Features

129 Simultaneous Access Non-implemented FS Features Access Controls

130 Simultaneous Access Non-implemented FS Features Access Controls Devices

131 Code:

132 Image Attributions pigpogm (page 4) xkcd (page 10) djwundi (page 34) skampy (page 45) logos of respective companies (page 54) steffenz (page 62) 60 in 3 (page 84) Hyperbole and a half (page 118)

133 Questions? Ideas? Bacon?

134 Thank you for listening!

Software / FileMaker / Plug-Ins Mailit 6 for FileMaker 10-13

Software / FileMaker / Plug-Ins Mailit 6 for FileMaker 10-13 Software / FileMaker / Plug-Ins Mailit 6 for FileMaker 10-13 Seite 1 / 5 Mailit 6 for FileMaker 10-13 The Ultimate Email Plug-In Integrate full email capability into your FileMaker 10-13 solutions with

More information

Diese Liste wird präsentiert von. Netheweb.de

Diese Liste wird präsentiert von. Netheweb.de Diese Liste wird präsentiert von Netheweb.de Die Liste enthält 1000 Do-Follow Blogs, die zum Linkbuilding genutzt werden können, es kann sein, dass verkürzte URL s nicht korrekt weiter geleitet werden.

More information

After installation of Rohos Disk Encryption, insert your USB pen drive to the computer and run the Rohos Disk Encryption application.

After installation of Rohos Disk Encryption, insert your USB pen drive to the computer and run the Rohos Disk Encryption application. Rohos Disk Encryption - creates hidden and password protected partitions on the computer or USB flash drive. With megabytes of sensitive files and private data on your computer or USB drive you can not

More information

Certificate SAP INTEGRATION CERTIFICATION

Certificate SAP INTEGRATION CERTIFICATION Certificate SAP INTEGRATION CERTIFICATION SAP SE hereby confirms that the interface software MCC SR2015 for the product MCC SR2015 of the MEIERHOFER AG. has been certified for integration with SAP ECC

More information

Linux & Docker auf Azure

Linux & Docker auf Azure Linux & Docker auf Azure Linux in der Azure Cloud Web Mail Twitter Rainer Stropek software architects gmbh http://www.timecockpit.com rainer@timecockpit.com @rstropek Saves the day. Your Host Rainer Stropek

More information

Guide how to protect your private data with Rohos Disk Encryption

Guide how to protect your private data with Rohos Disk Encryption Guide how to protect your private data with Rohos Disk Encryption 1 Content 1. Encrypt USB drive - Portable Application 2. Encrypt HDD 3. Hide folder 4. Have USB Key for access control 5. Rohos disk options

More information

Microsoft Nano Server «Tuva» Rinon Belegu

Microsoft Nano Server «Tuva» Rinon Belegu 1 Microsoft Nano Server «Tuva» Rinon Belegu Partner: 2 Agenda Begrüssung Vorstellung Referent Content F&A Weiterführende Kurse 3 Vorstellung Referent Rinon Belegu Microsoft Certified Trainer (AWS Technical

More information

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data

More information

LEARNING AGREEMENT FOR STUDIES

LEARNING AGREEMENT FOR STUDIES LEARNING AGREEMENT FOR STUDIES The Student Last name (s) First name (s) Date of birth Nationality 1 Sex [M/F] Academic year 20../20.. Study cycle EQF level 6 Subject area, Code Phone E-mail 0421 The Sending

More information

Cloud Performance Group 1. Cloud@Night Event. 14. Januar 2016 / Matthias Gessenay (matthias.gessenay@corporatesoftware.ch)

Cloud Performance Group 1. Cloud@Night Event. 14. Januar 2016 / Matthias Gessenay (matthias.gessenay@corporatesoftware.ch) 1 Cloud@Night Event 14. Januar 2016 / Matthias Gessenay (matthias.gessenay@corporatesoftware.ch) 2 Agenda SharePoint ABC Project Server ABC What s new in O365 4 SharePoint 2016 ABC A Access App-Support

More information

TIn 1: Lecture 3: Lernziele. Lecture 3 The Belly of the Architect. Basic internal components of the 8086. Pointers and data storage in memory

TIn 1: Lecture 3: Lernziele. Lecture 3 The Belly of the Architect. Basic internal components of the 8086. Pointers and data storage in memory Mitglied der Zürcher Fachhochschule TIn 1: Lecture 3 The Belly of the Architect. Lecture 3: Lernziele Basic internal components of the 8086 Pointers and data storage in memory Architektur 8086 Besteht

More information

AnyWeb AG 2008 www.anyweb.ch

AnyWeb AG 2008 www.anyweb.ch HP SiteScope (End-to-End Monitoring, System Availability) Christof Madöry AnyWeb AG ITSM Practice Circle September 2008 Agenda Management Technology Agentless monitoring SiteScope in HP BTO SiteScope look

More information

Mit einem Auge auf den mathema/schen Horizont: Was der Lehrer braucht für die Zukun= seiner Schüler

Mit einem Auge auf den mathema/schen Horizont: Was der Lehrer braucht für die Zukun= seiner Schüler Mit einem Auge auf den mathema/schen Horizont: Was der Lehrer braucht für die Zukun= seiner Schüler Deborah Löwenberg Ball und Hyman Bass University of Michigan U.S.A. 43. Jahrestagung für DidakEk der

More information

Die Versant-DB ist ein wesentlicher Bestandteil von CADISON.

Die Versant-DB ist ein wesentlicher Bestandteil von CADISON. Die Versant-DB Die Versant-DB ist ein wesentlicher Bestandteil von CADISON. Die Software wurde von einem in den USA gegründeten Unternehmen mit Niederlassung in Hamburg entwickelt. Die Versant Datenbank

More information

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence IBM Security Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence Peter Kurfürst Vertrieb IBM Security Lösungen Enterprise-Kunden Baden-Württemberg

More information

Search Engines Chapter 2 Architecture. 14.4.2011 Felix Naumann

Search Engines Chapter 2 Architecture. 14.4.2011 Felix Naumann Search Engines Chapter 2 Architecture 14.4.2011 Felix Naumann Overview 2 Basic Building Blocks Indexing Text Acquisition Text Transformation Index Creation Querying User Interaction Ranking Evaluation

More information

Implementing Data Models and Reports with Microsoft SQL Server

Implementing Data Models and Reports with Microsoft SQL Server Implementing Data Models and Reports with Microsoft SQL Server Dauer: 5 Tage Kursnummer: M20466 Überblick: Business Intelligence (BI) wird für Unternehmen von verschiedenen Größen aufgrund des dadurch

More information

Upgrading Your Skills to MCSA Windows Server 2012 MOC 20417

Upgrading Your Skills to MCSA Windows Server 2012 MOC 20417 Upgrading Your Skills to MCSA Windows Server 2012 MOC 20417 In dieser Schulung lernen Sie neue Features und Funktionalitäten in Windows Server 2012 in Bezug auf das Management, die Netzwerkinfrastruktur,

More information

quick documentation Die Parameter der Installation sind in diesem Artikel zu finden:

quick documentation Die Parameter der Installation sind in diesem Artikel zu finden: quick documentation TO: FROM: SUBJECT: ARND.SPIERING@AS-INFORMATIK.NET ASTARO FIREWALL SCAN MIT NESSUS AUS BACKTRACK 5 R1 DATE: 24.11.2011 Inhalt Dieses Dokument beschreibt einen Nessus Scan einer Astaro

More information

Processing Dialogue-Based Data in the UIMA Framework. Milan Gnjatović, Manuela Kunze, Dietmar Rösner University of Magdeburg

Processing Dialogue-Based Data in the UIMA Framework. Milan Gnjatović, Manuela Kunze, Dietmar Rösner University of Magdeburg Processing Dialogue-Based Data in the UIMA Framework Milan Gnjatović, Manuela Kunze, Dietmar Rösner University of Magdeburg Overview Background Processing dialogue-based Data Conclusion Gnjatović, Kunze,

More information

Embedded Software Development and Test in 2011 using a mini- HIL approach

Embedded Software Development and Test in 2011 using a mini- HIL approach Primoz Alic, isystem, Slovenia Erol Simsek, isystem, Munich Embedded Software Development and Test in 2011 using a mini- HIL approach Kurzfassung Dieser Artikel beschreibt den grundsätzlichen Aufbau des

More information

HYPO TIROL BANK AG. EUR 5,750,000,000 Debt Issuance Programme (the "Programme")

HYPO TIROL BANK AG. EUR 5,750,000,000 Debt Issuance Programme (the Programme) Third Supplement dated 29 December 2015 to the Prospectus dated 9 June 2015 This document constitutes a supplement (the "Third Supplement") within the meaning of Article 16 of the Directive 2003/71/EC

More information

10 Ways to Not Get Caught Hacking On Your Mac

10 Ways to Not Get Caught Hacking On Your Mac 10 Ways to Not Get Caught Hacking On Your Mac Three18 is a Comprehensive Technology Solutions Provider Apple Certified Partner Microsoft Gold Partner Symantec Security Solutions Partner Novell and RedHat

More information

NATIVE ADVERTISING, CONTENT MARKETING & CO. AUFBRUCH IN EIN NEUES GOLDENES ZEITALTER DES MARKETINGS?

NATIVE ADVERTISING, CONTENT MARKETING & CO. AUFBRUCH IN EIN NEUES GOLDENES ZEITALTER DES MARKETINGS? NATIVE ADVERTISING, CONTENT MARKETING & CO. AUFBRUCH IN EIN NEUES GOLDENES ZEITALTER DES MARKETINGS? 2014 in Frankfurt am Main DATUM 11.11.2014 SEITE 2 Christian Paul Stobbe Director Strategy Düsseldorf

More information

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 MOC 10233

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 MOC 10233 Designing and Deploying Messaging Solutions with Microsoft Exchange Server MOC 10233 In dieser Schulung erhalten Sie das nötige Wissen für das Design und die Bereitstellung von Messaging-Lösungen mit Microsoft

More information

Dokumentation über die Übernahme von. "GS-R-3" (The Management System for Facilities and Activities) "Sicherheitskriterien für Kernkraftwerke"

Dokumentation über die Übernahme von. GS-R-3 (The Management System for Facilities and Activities) Sicherheitskriterien für Kernkraftwerke Dokumentation über die Übernahme von "GS-R-3" () in die "Sicherheitskriterien für Kernkraftwerke" REVISION D APRIL 2009 1. INTRODUCTION BACKGROUND 1.1 This Safety Requirements publication defines the requirements

More information

SPICE auf der Überholspur. Vergleich von ISO (TR) 15504 und Automotive SPICE

SPICE auf der Überholspur. Vergleich von ISO (TR) 15504 und Automotive SPICE SPICE auf der Überholspur Vergleich von ISO (TR) 15504 und Automotive SPICE Historie Software Process Improvement and Capability determination 1994 1995 ISO 15504 Draft SPICE wird als Projekt der ISO zur

More information

Oracle Whitepaper April 2015. Security and the Oracle Database Cloud Service

Oracle Whitepaper April 2015. Security and the Oracle Database Cloud Service Oracle Whitepaper April 2015 Security and the Oracle Database Cloud Service Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database Cloud

More information

Exemplar for Internal Achievement Standard. German Level 1

Exemplar for Internal Achievement Standard. German Level 1 Exemplar for Internal Achievement Standard German Level 1 This exemplar supports assessment against: Achievement Standard 90885 Interact using spoken German to communicate personal information, ideas and

More information

Encrypting removable storage devices Removable device encryption R/W compatible with Linux and Windows

Encrypting removable storage devices Removable device encryption R/W compatible with Linux and Windows Encrypting removable storage devices Removable device encryption R/W compatible with Linux and Windows for TF-CSIRT, 22nd Meeting Oporto, PT September 21, 2007 Background and (my) Motivation Some private

More information

Installing Ubuntu 12.04.1 LTS with full disk encryption

Installing Ubuntu 12.04.1 LTS with full disk encryption Installing Ubuntu 12.04.1 LTS with full disk encryption Intro: This is a simple step by step tutorial showing you how to install Ubuntu 12.04.1 LTS with enabled full disk encryption. If you don't know

More information

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents

More information

Is Cloud relevant for SOA? 2014-06-12 - Corsin Decurtins

Is Cloud relevant for SOA? 2014-06-12 - Corsin Decurtins Is Cloud relevant for SOA? 2014-06-12 - Corsin Decurtins Abstract SOA (Service-Orientierte Architektur) war vor einigen Jahren ein absolutes Hype- Thema in Unternehmen. Mittlerweile ist es aber sehr viel

More information

Exchange Synchronization AX 2012

Exchange Synchronization AX 2012 Exchange Synchronization AX 2012 Autor... Pascal Gubler Dokument... Exchange Synchronization 2012 (EN) Erstellungsdatum... 25. September 2012 Version... 2 / 17.06.2013 Content 1 PRODUKTBESCHREIBUNG...

More information

Zielgruppe Dieses Training eignet sich für IT-Professionals.

Zielgruppe Dieses Training eignet sich für IT-Professionals. Advanced Solutions of Microsoft Exchange Server 2013 MOC 20342 In diesem Kurs wird den Teilnehmern das Wissen vermittelt, eine Microsoft Exchange Server 2013 Umgebung zu konfigurieren und zu verwalten.

More information

Use of DB2 purescale with SAP Applications

Use of DB2 purescale with SAP Applications Use of DB2 purescale with SAP Applications December, 2013 Customer SAP Applications on DB2 purescale End users Can use SAP log-on groups to direct similar work to same set of servers Central Services Application

More information

Information Systems 2

Information Systems 2 Information Systems 2 Prof. Dr. Dr. L. Schmidt-Thieme MSc. André Busche Übung 9 0. Allerlei 1. Übung 2. Hands on some things 2.1 Saxon 2.2 Corba 28.06.10 2/ 0. Allerlei 1. Übung 2. Hands on some things

More information

Bible Software on the Workbench of the Biblical Scholar and Biblical Languages Learner: assessment and perspective

Bible Software on the Workbench of the Biblical Scholar and Biblical Languages Learner: assessment and perspective Bible Software on the Workbench of the Biblical Scholar and Biblical Languages Learner: assessment and perspective (Oliver Glanz) The present Bible software situation > From Pages to Bits > Saving > Speeding

More information

Laptop Encryption. Tom Throwe. 1 August 2007. RHIC and ATLAS Computing Facility. (Brookhaven National Laboratory) Laptop Encryption 8/1/07 1 / 17

Laptop Encryption. Tom Throwe. 1 August 2007. RHIC and ATLAS Computing Facility. (Brookhaven National Laboratory) Laptop Encryption 8/1/07 1 / 17 Laptop Encryption Tom Throwe RHIC and ATLAS Computing Facility 1 August 2007 (Brookhaven National Laboratory) Laptop Encryption 8/1/07 1 / 17 Outline 1 Introduction Requirements Realities 2 Software 3

More information

Upgrade-Preisliste. Upgrade Price List

Upgrade-Preisliste. Upgrade Price List Upgrade-Preisliste Mit Firmware Features With list of firmware features Stand/As at: 10.09.2014 Änderungen und Irrtümer vorbehalten. This document is subject to changes. copyright: 2014 by NovaTec Kommunikationstechnik

More information

Forking, Scratching und Re-Merging

Forking, Scratching und Re-Merging Forking, Scratching und Re-Merging Kei Ishii, Bernd Lutterbeck, Frank Pallas Greifswald, 5. März 2008 RI = R I R I R I RI = R I R I I R Forking ? I R «to think about software differently» «the shift

More information

Pavlo Baron. Big Data and CDN

Pavlo Baron. Big Data and CDN Pavlo Baron Big Data and CDN Pavlo Baron www.pbit.org pb@pbit.org @pavlobaron What is Big Data Big Data describes datasets that grow so large that they become awkward to work with using on-hand database

More information

Format the USB Thumb Drive for Ghost

Format the USB Thumb Drive for Ghost First, download the 3 files found on this FTP site: ftp://ftp.meta.moleculardevices.com/outgoing/kudoh/ Also, download the files found here: ftp://ftp.meta.moleculardevices.com/support/wavetracer/ You

More information

Guidelines on use of encryption to protect person identifiable and sensitive information

Guidelines on use of encryption to protect person identifiable and sensitive information Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted

More information

Synopse: EU-GMP- Leitfaden Annex 11 Computerised Systems

Synopse: EU-GMP- Leitfaden Annex 11 Computerised Systems Synopse: EU-GMP- Leitfaden Annex 11 Computerised Systems Am 3. Januar 2011 wurde die neue Fassung des Annex 11 Computerised Systems durch die Europäische Kommission freigegeben. Der Annex wurde überarbeitet,

More information

Comodo Disk Encryption

Comodo Disk Encryption Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3

More information

Department of Geography - Birgit Sattler - University of Duisburg-Essen ILIAS. in geography and landscape architecture

Department of Geography - Birgit Sattler - University of Duisburg-Essen ILIAS. in geography and landscape architecture ILIAS in geography and landscape architecture ILIAS in geography and landscape architecture computer skills and internet access of the students practical experience with ILIAS selected evaluation results

More information

Evaluating parallel file system security

Evaluating parallel file system security Evaluating parallel file system security 1. Motivation After successful Internet attacks on HPC centers worldwide, there has been a paradigm shift in cluster security strategies. Clusters are no longer

More information

Run SAP Implementation Partner Program Guide 2009 ADOPTING THE RUN METHODOLOGY INTO YOUR SAP IMPLEMENTATIONS

Run SAP Implementation Partner Program Guide 2009 ADOPTING THE RUN METHODOLOGY INTO YOUR SAP IMPLEMENTATIONS Run SAP Implementation Partner Program Guide 2009 ADOPTING THE RUN METHODOLOGY INTO YOUR SAP IMPLEMENTATIONS Executive Summary The foundation for business process availability is laid in the technical

More information

Safer data transmission using Steganography

Safer data transmission using Steganography Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: arul.bharathi@yahoo.com,

More information

Symantec Backup Exec (TM) 13 Installation Log

Symantec Backup Exec (TM) 13 Installation Log v Symantec Backup Exec (TM) 13 Installation Log 05-26-2010,15:07:12 : Explorer exists. Launching UI. 05-26-2010,15:07:14 : Executing managed _Setup: 05-26-2010,15:07:14 : C:\Dokumente und orms_multilingual_dvd\be\winnt\install\be32\install\_setup.exe

More information

Step by step guide how to password protect your USB flash drive

Step by step guide how to password protect your USB flash drive Step by step guide how to password protect your USB flash drive 1 Content 1. How to create encrypted partition on USB flash drive 2. How to work with encrypted partition on the USB flash drive - Rohos

More information

Deutsche Bank Finance IT Migration Oracle Exadata

Deutsche Bank Finance IT Migration Oracle Exadata Deutsche Bank Finance IT Migration Oracle Exadata March 2012 Dr. Marcus Praetzas Agenda 1 2 3 Business Drivers / Background Motivation PoC (Phase 1) 4 Migration (Phase 2) 5 Observations Deutsche Bank Finance

More information

CobraNet TM User s Manual

CobraNet TM User s Manual CobraNet TM User s Manual 19201 Cook Street, Foothill Ranch, CA 92610-3501 USA Phone: (949) 588-9997 Fax: (949) 588-9514 Email: sales@renkus-heinz.com Web: www.renkus-heinz.com CobraNet TM is a registered

More information

Leitfaden für die Antragstellung zur Förderung einer nationalen Biomaterialbankeninitiative

Leitfaden für die Antragstellung zur Förderung einer nationalen Biomaterialbankeninitiative Seite 1 von 8 Leitfaden für die Antragstellung zur Förderung einer nationalen Biomaterialbankeninitiative Anträge zu Biomaterialbanken sind entsprechend den Vorgaben dieses Leitfadens zu erstellen (DIN

More information

TUXERA NTFS for Mac USER GUIDE 2/13. Index

TUXERA NTFS for Mac USER GUIDE 2/13. Index 2/13 Index 1. Introduction to Tuxera NTFS for Mac... 3 1.1 What is a file system driver?... 3 1.2 How does it work?... 3 2. Installation... 5 2.1 Installing Tuxera NTFS for Mac... 5 2.2 Uninstalling Tuxera

More information

How To Backup Your Computer With A File Copy Engine

How To Backup Your Computer With A File Copy Engine Secondary Backup Entire System Including Windows Installation Data Files, Emails, Databases, Documents Not Important Important Critical Ultra Critical Secondary Backup Data Archival Backup Secondary Backup

More information

ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014

ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014 ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014 Legende: gering mittel hoch Änderungsgrad A.5 Information security policies

More information

PGP Portable Quick Start Guide Version 10.2

PGP Portable Quick Start Guide Version 10.2 PGP Portable Quick Start Guide Version 10.2 Introduction to PGP Portable Use PGP Portable to distribute encrypted files to users who do not have PGP Desktop software. Use PGP Portable to transport files

More information

System Image Backup and Recovery

System Image Backup and Recovery System Image Backup and Recovery Enveloc s new System and Drive Imaging feature is an important part of an effective disaster recovery plan and can allow you to restore a machine after a complete crash

More information

The Changing Global Egg Industry

The Changing Global Egg Industry Vol. 46 (2), Oct. 2011, Page 3 The Changing Global Egg Industry - The new role of less developed and threshold countries in global egg production and trade 1 - Hans-Wilhelm Windhorst, Vechta, Germany Introduction

More information

INSTALLING NOVA DATA ENCRYPTION SOFTWARE

INSTALLING NOVA DATA ENCRYPTION SOFTWARE INSTALLING NOVA DATA ENCRYPTION SOFTWARE Introduction 1. Here is what you will need to do to install the college s data encryption software on your computer, laptop, or USB storage device. The encryption

More information

F5 Applikationsbereitstellung ohne Grenzen

F5 Applikationsbereitstellung ohne Grenzen F5 Applikationsbereitstellung ohne Grenzen Profi AG Endkunden-Webcast, 27.11.14 Dino Schmid d.schmid@f5.com Major Channel Account Manager Worum geht es in der IT? F5 Networks, Inc 2 Das wichtigste in der

More information

Project Cost Reporting for PPM

Project Cost Reporting for PPM Project Cost Reporting for PPM A PLM Consulting Solution Public Project Cost Reporting for PPM The Consulting Solution Project Cost Reporting supports project-centric and cross-project evaluations in PPM,

More information

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide for Use With Your FreeAgent Drive 1

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide for Use With Your FreeAgent Drive 1 Seagate Manager User Guide For Use With Your FreeAgent TM Drive Seagate Manager User Guide for Use With Your FreeAgent Drive 1 Seagate Manager User Guide for Use With Your FreeAgent Drive Revision 1 2008

More information

SAP Enterprise Portal 6.0 KM Platform Delta Features

SAP Enterprise Portal 6.0 KM Platform Delta Features SAP Enterprise Portal 6.0 KM Platform Delta Features Please see also the KM Platform feature list in http://service.sap.com/ep Product Management Operations Status: January 20th, 2004 Note: This presentation

More information

Windows Server 2008 R2 Essentials

Windows Server 2008 R2 Essentials Windows Server 2008 R2 Essentials Installation, Deployment and Management 2 First Edition 2010 Payload Media. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution

More information

www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor

More information

Building an Architecture Model 1. 1. Entwerfen Sie mit AxiomSys ein Kontextdiagramm, das folgendermaßen aussieht:

Building an Architecture Model 1. 1. Entwerfen Sie mit AxiomSys ein Kontextdiagramm, das folgendermaßen aussieht: Building an Architecture Model 1 1. Entwerfen Sie mit AxiomSys ein Kontextdiagramm, das folgendermaßen aussieht: Wie Ihnen aus der vergangenen Lehrveranstaltung bekannt ist, bedeuten Sterne neben den Bezeichnungen,

More information

Strategien im Adeptra-Portal

Strategien im Adeptra-Portal Strategien im Adeptra-Portal Burkhard Meier Senior Account Executive 1 User Interface Überblick Das Adeptra Portal ist unterteilt in 4 Hauptfunktionen: 1. Portfolio Manager» Regeln & Strategien 2. Direkt»

More information

I Textarbeit. Text 1. I never leave my horse

I Textarbeit. Text 1. I never leave my horse BEJ Musterprüfung Englisch (11020) 1 I Textarbeit Text 1 I never leave my horse 1 5 10 15 20 Police officers in Ireland don t carry guns. But they often ride through Dublin on horses. Julie Folan is a

More information

PGP Desktop Email Quick Start Guide version 9.6

PGP Desktop Email Quick Start Guide version 9.6 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages

More information

INSRUCTION MANUAL AND GUARANTEE POLICY

INSRUCTION MANUAL AND GUARANTEE POLICY INSRUCTION MANUAL AND GUARANTEE POLICY FRACTOMETER II made in Germany by: IML- Instrumenta Mechanik Labor GmbH Großer Stadtacker 2 69168 Wiesloch Germany Phone: (+49) 6222 / 6797-0 Fax: (+49) 6222-6797-

More information

Here is a guide on how to encrypt a part of your USB flash drive and access it on any computer:

Here is a guide on how to encrypt a part of your USB flash drive and access it on any computer: How to password protect your USB flash drive. According to the XXX agency reports 80% of all lost and stolen USB flash drives contained a very important information: business or government data. The following

More information

CORPORATE DESIGN MANUAL English 5/2015

CORPORATE DESIGN MANUAL English 5/2015 CORPORATE DESIGN MANUAL English 5/2015 CONTENT Corporate Design Manual Introduction and contact 3 1 Name and logo 4 2 Label 6 3 Fonts 10 4 Colours 11 2 INTRODUCTION Introduction This corporate design manual

More information

Lernsituation 9. Giving information on the phone. 62 Lernsituation 9 Giving information on the phone

Lernsituation 9. Giving information on the phone. 62 Lernsituation 9 Giving information on the phone Fachkunde 1, Lernfeld 2, Useful Office Vocabulary Lernsituation 9 Giving information on the phone Rolf astian, Managing Director of E Partners KG, recently visited the Promo World Fair in Düsseldorf, an

More information

CS; SSART-Treffen, November 18, 2015. Internet Banking: Increasing power of cyber crime... and what to do?

CS; SSART-Treffen, November 18, 2015. Internet Banking: Increasing power of cyber crime... and what to do? CS; SSART-Treffen, November 18, 2015 Internet Banking: Increasing power of cyber crime.. and what to do? Different targets for cyber crime Collect large data volumes (financial data) Collect customer related

More information

Configuring and Administering Hyper-V in Windows Server 2012 MOC 55021

Configuring and Administering Hyper-V in Windows Server 2012 MOC 55021 Configuring and Administering Hyper-V in Windows Server 2012 MOC 55021 In dem Kurs MOC 55021 Configuring and Administering Hyper-V in Windows Server 2012 lernen Sie die Konfiguration und Administration

More information

ETK Technical Workshop 17.11.2011 User Centric vs. Device Centric

ETK Technical Workshop 17.11.2011 User Centric vs. Device Centric ETK Technical Workshop 17.11.2011 User Centric vs. Device Centric René Princz-Schelter Head of PreSales Alcatel-Lucent Enterprise Germany emphasized Member of EMEA Marketing Team 1 2 Dynamic Enterprise

More information

CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) DATA IMPORT GUIDE

CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) DATA IMPORT GUIDE CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) DATA IMPORT GUIDE ABOUT THIS GUIDE This guide provides you with the required steps and instructions to transfer your data to your desired virtual server(s).

More information

www.infoplc.net Application example AC500 Scalable PLC for Individual Automation Communication between AC500 and KNX network abb

www.infoplc.net Application example AC500 Scalable PLC for Individual Automation Communication between AC500 and KNX network abb Application example www.infoplc.net AC500 Scalable PLC for Individual Automation Communication between AC500 and KNX network abb Content www.infoplc.net 1 Disclaimer...2 1.1 For customers domiciled outside

More information

LEHMAN BROTHERS SECURITIES N.V. LEHMAN BROTHERS (LUXEMBOURG) EQUITY FINANCE S.A.

LEHMAN BROTHERS SECURITIES N.V. LEHMAN BROTHERS (LUXEMBOURG) EQUITY FINANCE S.A. SUPPLEMENTS NO. 2 DATED 6 JUNE 2008 in accordance with 6(2) and 16 of the German Securities Prospectus Act to the two published Base Prospectuses, one per Issuer (together the "Base Prospectus") relating

More information

Supporting Windows 8.1 MOC 20688

Supporting Windows 8.1 MOC 20688 Supporting Windows 8.1 MOC 20688 In diesem 5 tägigen Seminar lernen die Teilnehmer, wie sie Windows 8.1 in mittelgroßen und großen IT-Umgebung installieren, konfigurieren und warten. Außerdem erlernen

More information

EaseTag Cloud Storage Solution

EaseTag Cloud Storage Solution EaseTag Cloud Storage Solution The Challenge For most companies, data especially unstructured data, continues to grow by 50 percent annually. The impact of spending more every year on storage, and on protecting

More information

Promise Pegasus R6 Thunderbolt RAID Performance

Promise Pegasus R6 Thunderbolt RAID Performance Introduction Promise Pegasus R6 Thunderbolt RAID Performance This document summarises the results of some performance testing I carried out on a Pegasus R6 Thunderbolt RAID drive from Promise Technologies

More information

How To Talk To A Teen Help

How To Talk To A Teen Help Sprechen - Speaking Das Sprechen in der englischen Sprache ist viel leichter, wenn du einige Tipps beherzigst! 1. Bevor du ein Gespräch beginnst, überlege dir: Was ist die Situation? Welche Rolle soll

More information

SAP Solution Manager Change Request Management. SAP Solution Manager Product Management SAP AG

SAP Solution Manager Change Request Management. SAP Solution Manager Product Management SAP AG SAP Solution Manager Change Request Management SAP Solution Manager Product Management SAP AG Change Request Management Maintenance Activities Project Activities Administration Activities SAP Solution

More information

Symbio system requirements. Version 4.x

Symbio system requirements. Version 4.x Symbio system requirements Version 4.x Stand: September 2015 2015 Ploetz + Zeller GmbH Symbio system requirements 2 Content 1 Symbio Client... 3 1.1 Overview... 3 1.2 Symbio Client... 3 1.2.1 Minimum hardware

More information

How To Use Teamdrive On A Pc Or Mac Or Ipad (For Acedo)

How To Use Teamdrive On A Pc Or Mac Or Ipad (For Acedo) Version 2.4 DIRECTORY INTRODUCTION...3 INSTALLATION AND REGISTRATION...4 1.1 SYSTEM REQUIREMENTS...4 2 FIRST STEPS...5 2.1 MONITORING FOLDERS...5 2.2 INVITING USERS...8 3 THE TEAMDRIVE EXPLORER...9 3.1

More information

SQL Server 2016. Neuerungen für Administratoren, Entwickler und BI-Nerds

SQL Server 2016. Neuerungen für Administratoren, Entwickler und BI-Nerds SQL Server 2016 Neuerungen für Administratoren, Entwickler und BI-Nerds Referent Senior Consultant für SQL Server Data Platform Business Intelligence Master-Trainer für SQL Server Trainings Thomas Pfeiffer

More information

MASTER THESIS ABOUT THE RELEVANCE OF THE CONTEXT FOR THE MOOC LEARNER EXPERIENCE

MASTER THESIS ABOUT THE RELEVANCE OF THE CONTEXT FOR THE MOOC LEARNER EXPERIENCE MASTER THESIS ABOUT THE RELEVANCE OF THE CONTEXT FOR THE MOOC LEARNER EXPERIENCE eduhub.ch / SwissMOOC Renato Soldenhoff March 25, 2015 renatosoldenhoff 2 Abstract Masterthesis zur Relevanz des Kontextes

More information

User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013)

User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013) 1 Laplink DiskImage 7 Professional Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/contact E-mail: CustomerService@laplink.com Laplink Software, Inc. 600 108th Ave.

More information

Active Directory Services with Windows Server 2012 MOC 10969

Active Directory Services with Windows Server 2012 MOC 10969 Active Directory Services with Windows Server 2012 MOC 10969 In dem Seminar MS-10969: Active Directory Services with Windows Server lernen Sie die Administration von Active Directory-Technologien in Windows

More information

SAP GLOBAL DIVERSITY POLICY

SAP GLOBAL DIVERSITY POLICY SAP GLOBAL DIVERSITY POLICY Date 29.8.2006 1 TABLE OF CONTENTS Cover Sheet... 2 PREFACE... 3 1 DEFINITION... 4 2 OBJECTIVES AND SCOPE... 4 2.1 KEY TARGETS FOR DIVERSITY AT SAP... 5 2.2 COMPLIANCE/SANCTIONS...

More information

Using TrueCrypt to protect data

Using TrueCrypt to protect data Using TrueCrypt to protect data Password protecting and encrypting files one by one is a certainly an effective way to securely store and share data. However, what if you have a lot of files? Creating

More information

Matthias Kistler, Urs Marti, Jérôme Ray, Christian Baumann and Adrian Wiget (Federal Office of Topography swisstopo - Switzerland)

Matthias Kistler, Urs Marti, Jérôme Ray, Christian Baumann and Adrian Wiget (Federal Office of Topography swisstopo - Switzerland) Towards a Distortion Free National Spatial Data Infrastructure in Switzerland: Approach, Developed Tools and Internet Services for the Change of the Reference Frame Matthias Kistler, Urs Marti, Jérôme

More information

Ralf Kaltenbach, Regional Director Germany. Arrow Sommerforum 2015

Ralf Kaltenbach, Regional Director Germany. Arrow Sommerforum 2015 Ralf Kaltenbach, Regional Director Germany Arrow Sommerforum 2015 Unsere IT ist doch sicher 2 oder vielleicht doch nicht? 3 2015 VDBIR 4 VDBR - Hintergründe und High level Fakten Dozens of TBs of data

More information

GCE EXAMINERS' REPORTS. GERMAN AS/Advanced

GCE EXAMINERS' REPORTS. GERMAN AS/Advanced GCE EXAMINERS' REPORTS GERMAN AS/Advanced JANUARY 2012 Statistical Information This booklet contains summary details for each unit: number entered; maximum mark available; mean mark achieved; grade ranges.

More information

How To Backup On A Computer With A Backup From A Backup To A Backup On Your Computer (Windows) On A Microsoft Vsphere (Windows 10) On Your Pc Or Macbook (Windows Xp) On An Uniden Computer (For

How To Backup On A Computer With A Backup From A Backup To A Backup On Your Computer (Windows) On A Microsoft Vsphere (Windows 10) On Your Pc Or Macbook (Windows Xp) On An Uniden Computer (For What s new in NovaBACKUP 17.1? Release Notes: NovaBACKUP 17.1 NovaBACKUP 17.1.804 (August, 2015) Backup wie für mich gemacht. New Features NovaBACKUP o Windows 10 Support Fixed issues / bugs (17.1.804)

More information

Elena Chiocchetti & Natascia Ralli (EURAC) Tanja Wissik & Vesna Lušicky (University of Vienna)

Elena Chiocchetti & Natascia Ralli (EURAC) Tanja Wissik & Vesna Lušicky (University of Vienna) Elena Chiocchetti & Natascia Ralli (EURAC) Tanja Wissik & Vesna Lušicky (University of Vienna) VII Conference on Legal Translation, Court Interpreting and Comparative Legilinguistics Poznań, 28-30.06.2013

More information