Final Year Project Interim Report

Size: px
Start display at page:

Download "Final Year Project Interim Report"

Transcription

1 2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing ( ) Leung Sui Lun ( ) January 2013 D e p a r t m e n t o f C o m p u t e r S c i e n c e T h e U n i v e r s i t y o f H o n g K o n g

2 Abstract With the increasing usage of online file sharing platforms, the security of those currently provided services becomes a hot topic among the users. Files are more easily to be shared however their confidentiality is also dropped. Some file sharing platforms allow user to download file even without the need to input any password. AirCrypt has been developing to provide users an online storage and sharing platform and, at the same time, with sufficient security means. Making use of an NFC supported mobile device and a NFC tag, user can access their files in the server securely and conveniently. Sharing of file is also protected by access control. Security, user-friendly and cross-platforms are the main purpose of AirCrypt. 2

3 Contents 1. Background Objectives System Design Security Features Other Features System Architecture Main Application Flow Current Progress Android App Server and Client Program Development Tools Limitations and Difficulties Encountered Limitations Difficulties Encountered and Our Solutions Work Division Future Plan

4 1. Background In this modern year, computer is important device for people to communicate with each other and store information. Files like photos, music, videos, and documents are all stored as electronic copies. With the increasing usage of internet, people would like to share files with the others through the internet. Traditionally, user would share his/her file by sending the file directly to another, for example, through . However, it is quite time-consuming as user has to upload the file to the server every time. It may take a lot of time if there are many files to be sent or the file size is too large. And it is also inconvenient when sharing the file to a group of people. In recent year, file sharing platforms such as Dropbox are very popular as they allow users to share files easily. User just needs to upload the file to the platform once. After that, they can share the file easily by disturbing an URL of the file. People also make use of these platforms as an online storage so that they can access their file at any place and any time. These services are so convenient to be used. However, it is also well-known that they do not provide much security feature. Anyone holding an URL can access the file concerned even without the need to input any password. 4

5 2. Objectives Our objective is to develop a system which can provide an online storage and sharing platform and, at the same time, with high level of security. The security features include but not limited to: - Secure Transmission Channel The transmission of file and commands between client and server are securely protected using SSH. - Secure Online Storage The files stored in the server are encrypted using TrueCrypt, which is free open-source disk encryption software. - File Integrity Control Integrity check is performed whenever the file is uploaded and downloaded. - Access Control Only authorized user can have access to the file. The developed product is targeting on Small-Medium Enterprise, Organizations and individual users. 5

6 3. System Design 3.1 Security Features This section discuss the features that we have applied to make AirCrypt secure. - Multiple Factor Authentication In AirCrypt, users have to provide their mobile phone s International Mobile Station Equipment Identity (IMEI) and a NFC tag ID during registration. These two tokens will act as the password for authentication. The advantage is users can make use of a longer password without remembering it. Besides, since the two tokens are stored in different mediums, it will be more difficult to be stolen at the same time. - Public/Private Disk Separation Each user, after he/she successfully registered, will be assigned with 2 disks, which is public and private. These 2 disks are both located in the server and encrypted by TrueCrypt. The public disk contains files that file owner shared to others. The cryptography key is stored by the server. When authorized users request the file in the public disk, server will decrypt the disk and perform action on it. The private disk contains files that can only be accessed by the file owner and the cryptography key is kept by the owner. The server will have no knowledge about key. Whenever user wants to perform action on the private drive, he/she needs to send the key to the server. After server finished the action, it would destroy the key immediately. By applying different key management policy on public/private disk, we can provide a maximum privacy and security to the user. - Minimum Exposure Another important design for enhancing the security is by minimizing the exposure time. Exposure time means the time that public/private disks are not encrypted and the time that user can directly interact with the disks. We applied 2 mechanisms to minimize the exposure time. (1) Separation of file information and file data In our design, we store the file information in a separate database. For example, when user opens a folder, the server will send the directory list to the client. The list contains the information of files in this folder. So server will get the information from the database. In this process, the public/private disks remain 6

7 encrypted so file data are protected. (2) Indirect Contact with Encrypted Disks Every actions performed on the file is done in a temporary location. One example is downloading a file. When user wants to download a file, the server will first create a temporary space. Then it will decrypt the disk, copy the file and paste to the temporary space, and encrypt the disk. Then the download will start from the temporary location. So actually user has no direct contact with the disks. The private/public disks in server are encrypted in most of the time and will only be decrypted on demand. By doing so, we hope that it can reduce the possibility of any potential attacks. - SSH Communication Channel The server program and client program communicate through a SSH (Secure Shell) channel. The SSH protocol is the IETF (The Internet Engineering Task Force) standard for secure terminal access. It uses public-key cryptography to authenticate the remote computer. We also make use of SFTP (SSH File Transfer Protocol) for the file transmission. - Integrity check Whenever there is file transmission, we will do file integrity check using the md5 checksum. 7

8 3.2 Other Features - Firewall-Friendly Since we are using SSH as the communication channel. The server only needs to listen to port 22. It avoids complicated setting on the server. - Cross-Platform The AirCrypt Client Program is developed by Java, which means platform independent. The advantage is easy to maintain. Update can be done only once and the executable can run on platforms with java installed. Another advantage is the UI looks similar so user can easily pick up when they switch to different working platform. Windows ubuntu 8

9 3.3 System Architecture The following diagram shows the system architecture. AirCrypt applied the 3-Tier Client/Server Architecture. The Android App obtains the mobile phone s IMEI and NFC tag ID and sends to PC client through Bluetooth. The client and server communicate with each other through the SSH channel. Inside the server, there are program to handle requests from client, several databases which store user s information, file information, etc... and also the public/private disks which are encrypted by TrueCrypt. Components Android App Client Program Server Program DBs Frameworks and Technologies Android SDK 4.2, Java JavaSE-1.7, Bluecove, Standard Widget Toolkit JavaSE-1.7, mysql connector/j, Truecrypt Mysql Public/Private Disks Truecrypt 7.0a SSH Channel Provided by Jsch Library 9

10 3.4 Main Application Flow Registration: Step 1: Step 2: Step 3: Step 4: Step 5: PC client program requests IMEI and NFC tag ID from the android app Android app returns the IMEI and a scanned tag ID PC client sends the username, IMEI and tag ID to the server for registration. Server register the new user, create the public/private disk for the user. If success, return a confirm message. If fail, return an error message. Login: Step 1: Step 2: Step 3: Step 4: Step 5: Step 6: PC client program requests IMEI and NFC tag ID from the android app Android app returns the IMEI and a scanned tag ID PC client sends the username, IMEI and tag ID to the server to authenticate Server authenticate the user If success, server returns a Login Credit to user. The Login Credit consists of the Unix login name and password. If fails, server returns an error message. PC client login to the server again using the Login Credit. 10

11 Upload (default private): Step 1: Step 2: Step 3: Step 4: Step 5: Step 6: PC client program sends the file to server Server checks the file integrity If success, server request user to provide private key because, by default, newly uploaded file will be put in the private disk. If fail, server returns error message. Client sends the private key Server unlocks the private disk and copy the file to the disk. After that, server will immediately encrypt the disk and destroy the key. If success, server returns a confirm message. If fail, server returns an error message. Download (private): Step 1: Step 2: Step 3: PC client program sends the request of the file and the private key Server uses the key to decrypt the private disk, copy the file to a temporary location. After that, server will immediately encrypt the disk and destroy the key. If success, server will transfer the file from temporary location to user. If fail, server returns error message. 11

12 Download (public): Step 1: Step 2: Step 3: PC client program sends the request of the file. Server checks the access right of the file. If user has the right, server will get the key from database and use the key to decrypt the public disk, copy the file to a temporary location. Then public disk will then be encrypted again. If success, server will transfer the file from temporary location to user. If fail, server returns error message. Access Control: Step 1: Step 2: Step 3: Step 4: Step 5: Step 6: User wants to change the access right of a file. Client program requests the list of access right of the file. The list contains users who are permitted to access the file. Server returns the list. User modifies the list through client program. Client program sends the modified list back to server. Server changes the access right according to the modified list. If success, server returns confirm message. If fail, server returns error message. 12

13 4. Current Progress 4.1 Android App At this stage, we have successfully developed the android app. The android app is able to scan the NFC tag and get the tag ID. Then it will send the tag ID with the phone s IMEI to the PC Client Program through Bluetooth. 13

14 4.2 Server and Client Program Most of the functions like upload, download and access control are already implemented. However, at this stage, we have only tested the login function and combined the GUI with it. The following screenshots show the testing of login function. Register User: demo Correct IMEI: 353xxxxxxxx Correct tag ID: 0x3b4644b6 Screenshot 1: Unregistered user login Screenshot 2: Registered user login with correct IMEI and NFC tag ID 14

15 Screenshot 3: Registered user login with wrong IMEI but correct NFC tag ID Screenshot 4: Registered user login with correct IMEI but wrong NFC tag ID 15

16 5. Development Tools (A) Eclipse [4.2.1] Eclipse SDK is free and open source software. It is popular software to develop applications in Java. It also provides useful libraries like JFace which helps our project to develop the GUI of the client program. (B) Android SDK [4.2] The Android SDK provides the API libraries and developer tools necessary to build, test, and debug apps for Android. It also contains sample codes about NFC functions which help a lot in developing our Android App. (C) ubuntu [12.04 LTS] We use ubuntu as our server s OS. ubuntu is a Unix-based Operating System. It has fast update of security batch. Also it is more secure when comparing with Windows. 16

17 6. Limitations and Difficulties Encountered 6.1 Limitations - Authentication Tokens Since we use IMEI and NFC tag ID as the authentication token, user must have a mobile phone with NFC function supported. At this moment, only a few android devices support the NFC function. - Bluetooth The Android App communicates with the PC client program through Bluetooth. Therefore, user s PC has to be equipped with Bluetooth. 6.2 Difficulties Encountered and Our Solutions - Permission problem We need to care about the folder/file permission to let authorized user to access the file to achieve the minimum privilege principle. For example: we make the private mount point as (drwx------,i.e. 700), set the owner and the group as the account holder (USER1:Account) to prevent unauthorized user to get into the mountpoint. Another example: we make the sharing mount point as (drwxr-x---,i.e. 750), set the owner and the group as the account holder (USER1:Account) to enable user to access to the mountpoint and get the file. - Account setup It is not feasible to create an UNIX account when a registration is done because of the security issue. So we are going to make the accounts REGULARLY using crontab utility (also called cron-job), schedule account creation each day. - SSH setting We need to decline the access of root accounts so that the hacker cannot take control using root accounts via SSH. (In Ubuntu LTS, after installing ssh package, edit it by sudo nano /etc/ssh/sshd_config And change the option PermitRootLogin Yes PermitRootLogin No) 17

18 - Truecrypt As well known, mounting need root permission. To prevent exposing password of root account when mounting, we need to add Truecrypt application as one application that execute as root permission without password. We use visudo utility to achieve this. - Java environment setting Since Ubuntu LTS does not have Java 7 included in the package (not available to Ubuntu default repository), we need to manually add a Java repository to install JRE and JDK. OpenJDK is not compatible to this program. - NFC detection The mobile device may already install Apps which can automatically detect the NFC tag. According to the Android SDK, a NFC signal can only be handled by one application. Therefore, in order to avoid the interruption by other Apps, we use enableforegrounddispatch to dominate the NFC detection when our App is opened. Another problem of NFC detection is the data obtained from the tag. The data retrieved from the tag is an array of byte. Therefore, we have to write our own function to convert the bytes into meaningful string. 18

19 7. Work Division Fong Chun Sing Leung Sui Lun Client Side - Program - Android App Server Side - Program - Set-up - configuration System Design Presentation Report 19

20 8. Future Plan - Sharing Function In our initial design, the user shares the file by assigning the access right and sends a link to another user for download. However, we think it may not be convenient for user. So we are considering implementing an exchanging system. When user A assigns the access right to user B, the server will automatically send a message to notify user B about the permission. - Prevent request replay attack In this stage, we don t add the mechanism on preventing replay attack because we want to develop and debug easily. In fact, preventing replay attack is important for any system to prevent potential attack. We will achieve that by adding a random generated temporary token to the request to prevent replay attack. - Encrypt all request In this stage, request are sent with plain text (although the transmission channel is secure), it is safe to encrypt the request with symmetric key to prevent any potential misuse of system. - Change password lifetime of an UNIX account At this stage, all UNIX password and username are stored in database permanently and we are not going to modify that password. In fact, it is better to change the password lifetime to prevent potential attack. We will adopt the method on how an account is created. We create a cronjob that regularly update the password of the UNIX account. 20

SSH and FTP on Ubuntu 9.04. WNYLUG Neal Chapman 09/09/2009

SSH and FTP on Ubuntu 9.04. WNYLUG Neal Chapman 09/09/2009 SSH and FTP on Ubuntu 9.04 WNYLUG Neal Chapman 09/09/2009 SSH (Secure Shell) Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices.

More information

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First

More information

ICE Futures Europe. AFTS Technical Guide for Large Position Reporting V1.0

ICE Futures Europe. AFTS Technical Guide for Large Position Reporting V1.0 ICE Futures Europe AFTS Technical Guide for Large Position Reporting V1.0 ICE FUTURES EUROPE Page 1 of 7 Contents 1. Introduction... 3 2. Online access to Clearing Systems... 4 3. Uploading Data... 5 4.

More information

Lab 0 (Setting up your Development Environment) Week 1

Lab 0 (Setting up your Development Environment) Week 1 ECE155: Engineering Design with Embedded Systems Winter 2013 Lab 0 (Setting up your Development Environment) Week 1 Prepared by Kirill Morozov version 1.2 1 Objectives In this lab, you ll familiarize yourself

More information

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols

More information

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures A. Secure File Transfer Protocol (SFTP) Procedures Overview IEHP utilizes our Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits to using

More information

How To Run A Hello World On Android 4.3.3 (Jdk) On A Microsoft Ds.Io (Windows) Or Android 2.7.3 Or Android 3.5.3 On A Pc Or Android 4 (

How To Run A Hello World On Android 4.3.3 (Jdk) On A Microsoft Ds.Io (Windows) Or Android 2.7.3 Or Android 3.5.3 On A Pc Or Android 4 ( Developing Android applications in Windows Below you will find information about the components needed for developing Android applications and other (optional) software needed to connect to the institution

More information

File transfer clients manual File Delivery Services

File transfer clients manual File Delivery Services File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse

More information

User Manual of the Pre-built Ubuntu 12.04 Virutal Machine

User Manual of the Pre-built Ubuntu 12.04 Virutal Machine SEED Labs 1 User Manual of the Pre-built Ubuntu 12.04 Virutal Machine Copyright c 2006-2014 Wenliang Du, Syracuse University. The development of this document is/was funded by three grants from the US

More information

Using Network Attached Storage with Linux. by Andy Pepperdine

Using Network Attached Storage with Linux. by Andy Pepperdine Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to

More information

EZblue BusinessServer The All - In - One Server For Your Home And Business

EZblue BusinessServer The All - In - One Server For Your Home And Business EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan

More information

Securing Ship-to-Shore Data Flow

Securing Ship-to-Shore Data Flow Securing Ship-to-Shore Data Flow Background on Common File Transfer Methods Today corporations, government entities, and other organizations rely on Electronic File Transfers as an important part of their

More information

Cloud Storage Service

Cloud Storage Service Cloud Storage Service User Guide (Web Interface, Android App) Table of Content System Requirements...4 1.1Web Browser... 4 1.2Mobile Apps... 4 Accessing Cloud Storage using a Web Browser... 4 The Web Home

More information

Xerox DocuShare Security Features. Security White Paper

Xerox DocuShare Security Features. Security White Paper Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a

More information

How To Use Cmk On An Ipa (Intralinks) On A Pc Or Mac Mac (Apple) On An Iphone Or Ipa On A Mac Or Ipad (Apple Mac) On Pc Or Ipat (Apple

How To Use Cmk On An Ipa (Intralinks) On A Pc Or Mac Mac (Apple) On An Iphone Or Ipa On A Mac Or Ipad (Apple Mac) On Pc Or Ipat (Apple Intralinks Customer Managed Keys Technical Overview Version 2.0 October 2014 Copyright 2014 Intralinks, Inc. 1 Intralinks Customer Managed Keys, Technical Overview January 5, 2015 About This Document...

More information

IBM WebSphere Application Server Version 7.0

IBM WebSphere Application Server Version 7.0 IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the

More information

Secure Data Transfer

Secure Data Transfer Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol

More information

Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning

Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux

More information

Remote Desktop Administration

Remote Desktop Administration Remote Desktop Administration What is it? Remote Desktop Administration allows a user with appropriate privileges to connect to his/her computer at Rice from another computer, similar to the way one may

More information

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended

More information

How To Install Storegrid Server On Linux On A Microsoft Ubuntu 7.5 (Amd64) Or Ubuntu (Amd86) (Amd77) (Orchestra) (For Ubuntu) (Permanent) (Powerpoint

How To Install Storegrid Server On Linux On A Microsoft Ubuntu 7.5 (Amd64) Or Ubuntu (Amd86) (Amd77) (Orchestra) (For Ubuntu) (Permanent) (Powerpoint StoreGrid Linux Server Installation Guide Before installing StoreGrid as Backup Server (or) Replication Server in your machine, you should install MySQL Server in your machine (or) in any other dedicated

More information

How To Create A Bada App On Android 2.2.2 (Mainfest) On Android 3.5.2 And Get A Download Of Bada (For Android) On A Microsoft Gosu 2.5 (For Black

How To Create A Bada App On Android 2.2.2 (Mainfest) On Android 3.5.2 And Get A Download Of Bada (For Android) On A Microsoft Gosu 2.5 (For Black I. bada... 3 1. Developer Site : Register application development information... 3 1) Registration procedure... 3 2) Standards for managing mainfest.xml depending on status of registration for bada application

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

EZblue BusinessServer The All - In - One Server For Your Home And Business

EZblue BusinessServer The All - In - One Server For Your Home And Business EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Installation Guidelines (MySQL database & Archivists Toolkit client)

Installation Guidelines (MySQL database & Archivists Toolkit client) Installation Guidelines (MySQL database & Archivists Toolkit client) Understanding the Toolkit Architecture The Archivists Toolkit requires both a client and database to function. The client is installed

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

Clearswift Information Governance

Clearswift Information Governance Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration

More information

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features 1.0 Key Features Addonics T E C H N O L O G I E S NAS Adapter Model: NASU2 User Manual Convert any USB 2.0 / 1.1 mass storage device into a Network Attached Storage device Great for adding Addonics Storage

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)

SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) 1 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) Mohammad S. Hasan Agenda 2 Looking at Today What is a management protocol and why is it needed Addressing a variable within SNMP Differing versions Ad-hoc Network

More information

HP SDN VM and Ubuntu Setup

HP SDN VM and Ubuntu Setup HP SDN VM and Ubuntu Setup Technical Configuration Guide Version: 1 September 2013 Table of Contents Introduction... 2 Option 1: VirtualBox Preconfigured Setup... 2 Option 2: VMware Setup (from scratch)...

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Remote Access Platform. Architecture and Security Overview

Remote Access Platform. Architecture and Security Overview Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards

More information

Learning Remote Control Framework ADD-ON for LabVIEW

Learning Remote Control Framework ADD-ON for LabVIEW Learning Remote Control Framework ADD-ON for LabVIEW TOOLS for SMART MINDS Abstract This document introduces the RCF (Remote Control Framework) ADD-ON for LabVIEW. Purpose of this article and the documents

More information

Experian Secure Transport Service

Experian Secure Transport Service Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport

More information

Senomix Timesheets for Mac OS X

Senomix Timesheets for Mac OS X for Mac OS X Self-Installed Server Installation Guide v5.1 2015 Senomix Software Inc. www.senomix.com Table of Contents 1.0 - Introduction... 1 2.0 - System Overview... 2 3.0 - Timesheets Server Installation

More information

Bootstrap guide for the File Station

Bootstrap guide for the File Station Bootstrap guide for the File Station Introduction Through the File Server it is possible to store files and create automated backups on a reliable, redundant storage system. NOTE: this guide considers

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

Features of AnyShare

Features of AnyShare of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...

More information

U.S. Cellular Mobile Data Security. User Guide Version 00.01

U.S. Cellular Mobile Data Security. User Guide Version 00.01 U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4

More information

User s manual for Android Application

User s manual for Android Application Motorised IP Video surveillance camera for smartphones, tablets and PC / MAC. Protect your home and family remotely! User s manual for Android Application Thanks We thank you for choosing Aquila Vizion.

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Encryption Mechanism Software Requirement Specifications changed to Dokumentation Version 1.3.0

Encryption Mechanism Software Requirement Specifications changed to Dokumentation Version 1.3.0 Encryption Mechanism Software Requirement Specifications changed to Dokumentation Version 1.3.0 Page 1 of 13 Table of Contents 1. Introduction... 3 2. System work flow and terminology... 3 3. User Descriptions...

More information

These options allow you to define baseline settings for how scanning will occur on your network

These options allow you to define baseline settings for how scanning will occur on your network Network Discovery Asset Manager can discover devices attached to your network automatically, probe them for configuration data, and create assets in your database. The network discovery system is fully

More information

Nipper Studio Beginner s Guide

Nipper Studio Beginner s Guide Nipper Studio Beginner s Guide Multiple Award Winning Security Software Version 2.1 Published March 2015 Titania Limited 2014. All Rights Reserved This document is intended to provide advice and assistance

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for

More information

Manual for Android 1.5

Manual for Android 1.5 Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor

More information

December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure

December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure December 2015 702P00860 Xerox App Studio 3.0 Information Assurance Disclosure 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation

More information

User and Reference Manual

User and Reference Manual User and Reference Manual User & Reference Manual All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying,

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

Secure Installation and Operation of Your Xerox Multi-Function Device. Version 1.0 August 6, 2012

Secure Installation and Operation of Your Xerox Multi-Function Device. Version 1.0 August 6, 2012 Secure Installation and Operation of Your Xerox Multi-Function Device Version 1.0 August 6, 2012 Secure Installation and Operation of Your Xerox Multi-Function Device Purpose and Audience This document

More information

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software

More information

Fast remote data access for control of TCP/IP network using android Mobile device

Fast remote data access for control of TCP/IP network using android Mobile device RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Qsync Install Qsync utility Login the NAS The address is 192.168.1.210:8080 bfsteelinc.info:8080

Qsync Install Qsync utility Login the NAS The address is 192.168.1.210:8080 bfsteelinc.info:8080 Qsync Qsync is a cloud based file synchronization service empowered by QNAP Turbo NAS. Simply add files to your local Qsync folder, and they will be available on your Turbo NAS and all its connected devices.

More information

Encrypted Email Services

Encrypted Email Services Encrypted Email Services Version 2.1 General Level Instructions HIPAA Compliant Solution for Secured Communications via Email 2012-2013 Page 1 of 13 Table of Contents 1. Introduction 1.1 Description 1.2

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

Enhanced Security for Online Banking

Enhanced Security for Online Banking Enhanced Security for Online Banking MidSouth Bank is focused on protecting your personal and account information at all times. As instances of internet fraud increase, it is no longer sufficient to use

More information

Using the Push Notifications Extension Part 1: Certificates and Setup

Using the Push Notifications Extension Part 1: Certificates and Setup // tutorial Using the Push Notifications Extension Part 1: Certificates and Setup Version 1.0 This tutorial is the second part of our tutorials covering setting up and running the Push Notifications Native

More information

Budget Event Management Design Document

Budget Event Management Design Document Budget Event Management Design Document Team 4 Yifan Yin(TL), Jiangnan Shangguan, Yuan Xia, Di Xu, Xuan Xu, Long Zhen 1 Purpose Summary List of Functional Requirements General Priorities Usability Accessibility

More information

Setting Up One Search

Setting Up One Search Your teachers and students can take advantage of your school s subscription databases all in one place through Destiny One Search. One Search saves staff and patrons time and effort by letting them search

More information

Methods available to GHP for out of band PUBLIC key distribution and verification.

Methods available to GHP for out of band PUBLIC key distribution and verification. GHP PGP and FTP Client Setup Document 1 of 7 10/14/2004 3:37 PM This document defines the components of PGP and FTP for encryption, authentication and FTP password changes. It covers the generation and

More information

CipherLab 5100 Time Attendance Utility Manual

CipherLab 5100 Time Attendance Utility Manual CipherLab 5100 Time Attendance Utility Manual K:\Products\Product Technical\BI\BI-PC5100T\CipherLab5100TimeAttendnaceUtilityManual0707-process.doc Page 1 / 13 1 Login A popup form as follows will appear

More information

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

What IT Auditors Need to Know About Secure Shell. SSH Communications Security What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

SSH Key Exchange: Windows client to Unix/Linux server

SSH Key Exchange: Windows client to Unix/Linux server SSH Key Exchange: Windows client to Unix/Linux server Table of contents 1 Audience... 2 2 Purpose...2 3 Prerequisites...2 4 SSH Key exchange: Windows client & Unix/Linux Server...3 4.1 Outline of steps

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2 RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information

Egnyte App for Android Quick Start Guide

Egnyte App for Android Quick Start Guide Egnyte App for Android Quick Start Guide Introduction Welcome to the Quick Start Guide for the Egnyte App for Android. This guide will explain how to: Access files. Download content for offline access.

More information

Casper Suite Release Notes. Version 9.1

Casper Suite Release Notes. Version 9.1 Casper Suite Release Notes Version 9.1 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

Last modified: September 12, 2013 This manual was updated for TeamDrive Personal Server version 1.1.058

Last modified: September 12, 2013 This manual was updated for TeamDrive Personal Server version 1.1.058 Last modified: September 12, 2013 This manual was updated for TeamDrive Personal Server version 1.1.058 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Installing the TeamDrive Personal Server...

More information

The Security Behind Sticky Password

The Security Behind Sticky Password The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and

More information

Georgia State Longitudinal Data System

Georgia State Longitudinal Data System Georgia State Longitudinal Data System FTP Client Installation Manual Version 3.0 Table of Contents 1 Overview... 3 2 FTP Connection Checklist... 3 3 FTP Installation Instructions... 4 4 Apply license

More information

Access Instructions for United Stationers ECDB (ecommerce Database) 2.0

Access Instructions for United Stationers ECDB (ecommerce Database) 2.0 Access Instructions for United Stationers ECDB (ecommerce Database) 2.0 Table of Contents General Information... 3 Overview... 3 General Information... 3 SFTP Clients... 3 Support... 3 WinSCP... 4 Overview...

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

Tera Term Telnet. Introduction

Tera Term Telnet. Introduction Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start

More information

TABLE OF CONTENTS. Legend:

TABLE OF CONTENTS. Legend: user guide Android Ed. 1.1 TABLE OF CONTENTS 1 INTRODUCTION... 4 1.1 Indicators on the top tool bar... 5 1.2 First control bar... 7 1.3 Second control bar... 7 1.4 Description of the icons in the main

More information

Security in Android apps

Security in Android apps Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps

More information

QuickStart Guide for Managing Mobile Devices. Version 9.2

QuickStart Guide for Managing Mobile Devices. Version 9.2 QuickStart Guide for Managing Mobile Devices Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

Remote Access to Unix Machines

Remote Access to Unix Machines Remote Access to Unix Machines Alvin R. Lebeck Department of Computer Science Department of Electrical and Computer Engineering Duke University Overview We are using OIT Linux machines for some homework

More information

VMware Horizon Workspace Security Features WHITE PAPER

VMware Horizon Workspace Security Features WHITE PAPER VMware Horizon Workspace WHITE PAPER Table of Contents... Introduction.... 4 Horizon Workspace vapp Security.... 5 Virtual Machine Security Hardening.... 5 Authentication.... 6 Activation.... 6 Horizon

More information

NFC EXPRESS User Manual

NFC EXPRESS User Manual NFC EXPRESS User Manual E8557 / First Edition October 2013 Copyright 2013 ASUSTeK Computer Inc. All Rights Reserved Contents 1 Launching NFC EXPRESS... 3 1.2 NFC EXPRESS screen... 4 2 Setting up Windows

More information

Getting Started with Web Hosting at TechServ

Getting Started with Web Hosting at TechServ Getting Started with Web Hosting at TechServ 1/19/2011 http://www.dusers.drexel.edu/techserv/ CollegiateLink: TechServ techserv@drexel.edu Thank you for your interest in TechServ s Web and File Hosting

More information

Ad Hoc (Temporary) Accounts Instructions

Ad Hoc (Temporary) Accounts Instructions DLG/PDV SFTP Server Instructions 1. Ad Hoc (Temporary) Accounts. 2. LeadsGen (Permanent) Accounts. 3. Manually configuring SFTP Clients (WinSCP & FileZilla). 4. Uploading files into SFTP server. 5. Frequently

More information

Penetration Testing for iphone Applications Part 1

Penetration Testing for iphone Applications Part 1 Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone

More information

cbox YOUR FILES GO MOBILE! FOR MAC OSX CLIENT USER MANUAL

cbox YOUR FILES GO MOBILE! FOR MAC OSX CLIENT USER MANUAL cbox YOUR FILES GO MOBILE! FOR MAC OSX CLIENT USER MANUAL Introduction cbox is a software that you can easily install on your computer. Once done, an online storage drive cbox appears in the file tree

More information

GDC Data Transfer Tool User s Guide. NCI Genomic Data Commons (GDC)

GDC Data Transfer Tool User s Guide. NCI Genomic Data Commons (GDC) GDC Data Transfer Tool User s Guide NCI Genomic Data Commons (GDC) Contents 1 Getting Started 3 Getting Started.......................................................... 3 The GDC Data Transfer Tool: An

More information

WinSCP PuTTY as an alternative to F-Secure July 11, 2006

WinSCP PuTTY as an alternative to F-Secure July 11, 2006 WinSCP PuTTY as an alternative to F-Secure July 11, 2006 Brief Summary of this Document F-Secure SSH Client 5.4 Build 34 is currently the Berkeley Lab s standard SSH client. It consists of three integrated

More information

Board also Supports MicroBridge

Board also Supports MicroBridge This product is ATmega2560 based Freeduino-Mega with USB Host Interface to Communicate with Android Powered Devices* like Android Phone or Tab using Android Open Accessory API and Development Kit (ADK)

More information

IceBreak FileShare. Quick Guide. File sharing with workflow management

IceBreak FileShare. Quick Guide. File sharing with workflow management IceBreak FileShare Quick Guide File sharing with workflow management on IBM i 2 IceBreak FileShare Content IceBreak FileShare... 3 Features... 4 Requirements... 6 Limitations... 6 Test sites... 6 Install

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information