Hacking Satellite TV receivers : Are those IoT devices secure?
|
|
- Clifford Marshall Logan
- 8 years ago
- Views:
Transcription
1 Hacking Satellite TV receivers : Are those IoT devices secure? Sofiane Talmat Security Consultant
2 Agenda Introduction Many things going wrong Thank you
3 Why Satellite TV receivers?
4 What is this all about?
5 TV encryption scheme ECM : Entitlement Control Message EMM : Entitlement Management Message CW : Content encryption key This is what we are looking for
6 Scrambling ECM CW CAS EMM CAS: Conditional Access System ECM: Entitlement Control Message EMM: Entitlement Management Message CW: Control word Scrambler Scrambled Stream
7 Descrambling STB CAM CAM: Conditional Access Module STB: Set Top Box Smart Card Scrambled Stream EMM CW ECM Descrambler To TV
8 What made the difference? We used to have : Proprietary STBs One service provider per STB We now have : Open STBs Fully featured Linux boxes
9 Case study : Forever Nano Pro
10 Better than my graduation computer Forever Nano pro : ~150 USD Realtek RTL8201CP 10/100M STi7111 Mhz) 2x1 Gb DDR2 SDRAM Tuner 3.1 Services GL850G USB 2.0 Hub 1x2Gb NAND flash CORERIVER CICore 1.0
11 Recap STi7111 processor (St40 ROM=256MB RAM= 256MB 10/100M Ethernet port 2 USB 2.0 ports 1 card reader 2 module reader (CI) HDMI RCA SPDIF
12 Things getting easy
13 What could possibly go wrong?
14 What bring STBs to IoT?
15 What made the difference? We used to have : Proprietary STBs One service provider per STB We now have : Open STBs Fully featured Linux boxes
16 Attack evolution STB without CAS Software emulator STB + CAS Cloned smart cards CAM Card Sharing Protocol providers plugin Internet connectivity Satellite key sharing
17 Card sharing concept Card Server oscam, Internet ECM/EMM CW Client STB ccam mgcamd gbox
18 Components and Actors Root Provider Rseller Reseller End User End User End user End user Plugins Plugins Plugins Plugins
19 Components and Actors Root provider : Generally server hosted at home Reseller : Generate keys and provide/install plugin End user : Plugin running on STB Cardsharing plugins installed on STBs: cccam, mgcamd, newcamd, gbox, etc.: UNKNOWN origin
20 What could possibly go wrong?
21 Vulnerabilities?
22 Root account without password Any other users?
23 Rooting the devices
24 SH4 compiling options Install gcc for SH4: Thanks to cross compiling tools Qemu and SH4 debian image: SH4 vm stlinux
25
26 Everything runs as root Main processes
27 No firewall
28 Iptables config start() { echo Starting firewall: iptables. iptables-restore < /etc/firewall.conf } save() { iptables-save > /etc/firewall.conf } stop() { echo Stopping firewall: iptables. save }
29 FTP config
30 Network Activity
31 What could reversing FRior service Unauthenticated Check status, channel details, configure, View and set alarms View and edit service status Manage streaming to remote IP More, more, more,. Does it contain bugs? : YES
32 What could possibly go wrong?
33 System Updates
34 What about system update? Main firmware update Clear text protocol from internet No digital signature verification Plugins and applications Clear text from internet No digital signature
35 Updated to the latest firmware
36 However they do fix some bugs.
37 Miscellaneous
38 Internet connectivity support Integrated web browser No support for HTTPS IPTV plugins applications Remote SQL Injection
39 What could possibly go wrong?
40 Put all this together
41 Overview Internal Architecture and security Total Fail! Cardsharing plugins installed on STBs: cccam/mgcamd/newcamd/gbox : UNKNOWN DEVLOPERS and Untrusted Firmware upgrade and patching: Total Fail! Main Actors : Unknown, untraceable and untrusted
42 Number of devices Number of cards haring subscribers : ~ 4 Millions in Algeria only / what about the world? End user : Unaware
43 Manufacturers promoting card sharing Free access to card sharing server for 394 days
44 Contacting vendor
45 Building a botnet Building the plugin : Some C/C++ coding skills to build the plugin Thanks to cross compiling tools Hosting the service : Either host a card sharing server Or become a reseller Throw that on internet End users/resellers: They will come for you
46 Demo of a Backdoor
47 OOPS Something went wrong.
48 Thank you
How To Hack A Satellite Receiver For Profit On A Pc Or Ipad (For A Pb) For A Pk (For An Ipad) For Free (For Pc) For Your Computer) For The First Time (For Your Computer Or
Subverting satellite receivers for botnet and profit Sofiane Talmat Senior Security Consultant Agenda The famous who am I? slide The quest for the Control Word A series of What could possibly go wrong?
More informationMOI DVB-S2 Streaming Box Quick Start Guide
MOI DVB-S2 Streaming Box Quick Start Guide V1.1 1 Contents 1. Overview 1.1. At A Glance 1.2. Specifications 1.3. System Requirements 1.4. Package 2. Hardware Connection 3. Software Installation and Configuration
More informationMonitoring Conditional Access Systems
Monitoring Conditional Access Systems Introduction A Conditional Access system is a key component for most digital TV operations. They secure the operators investments by encrypting the signals and ensures
More informationOfficeServ Application Suite
OfficeServ Application Suite Introduction to the standard package The OfficeServ application suite consists of a number of applications designed to enhance the functionality and usability of the Samsung
More informationEnsure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details
ZENworks 11 SP3 System December 2014 The following sections provide the Novell ZENworks 11 SP3 requirements for hardware and software: Section 1, Primary Server, on page 1 Section 2, Managed Device, on
More informationSistemi ad agenti Principi di programmazione di sistema
Sistemi ad agenti Principi di programmazione di sistema Modulo 6 Why would anyone want to hack or write opensource project for embedded system, when you already have a very powerful and relatively cheap
More informationOS Installation Guide Red Hat Linux 9.0
OS Installation Guide Red Hat Linux 9.0 C o n t e n t s Contents 3 About This Guide 5 1 Planning Your Installation 7 Requirements 7 2 Installing Red Hat 9.0 Error! Bookmark not defined. What s Next? 19
More informationAutomated Flashing and Testing for Continuous Integration
Automated Flashing and Testing for Continuous Integration Igor Stoppa Embedded Linux Conference North America 2015 1 Automated Flasher Tester AFT Tool for deploying and verifying a SW image on an appropriate
More information2014 Teradici Corporation.
VDI Client Comparison Thick, Thin, and PCoIP Zero Clients Agenda > Thick, Thin, and PCoIP Zero Clients > Repurposed PCs to Thin Clients > Thin Clients > PCoIP Zero Clients > Total Cost of Ownership Review
More informationCitrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny)
Installing and configuring Intelligent Power Protector On Xen Virtualized Architecture Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny) 1 Introduction... 3 1. Citrix
More informationWindows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and
More informationArchives About ARCHOS TV+
About ARCHOS TV+ General Questions I have installed a firmware/plug-in/game file on my Archos TV+ but it is not recognized by the device. You may have not correctly copied your file on the device. If it
More informationIgnify ecommerce. Item Requirements Notes
wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor
More informationATV310B User Manual. V1.1 www.mygica.es
ATV310B User Manual V1.1 www.mygica.es 1 Introduction Mygica ATV310B is a product connected to your TV via HDMI that turn your TV to a multifunction smart TV. It is a revolutionary entertainment on your
More informationAvaya TM G700 Media Gateway Security. White Paper
Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional
More informationAvaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
More informationEmbedded Operating Systems in a Point of Sale Environment. White Paper
Embedded Operating Systems in a Point of Sale Environment White Paper December 2008 Contents Embedded Operating Systems in a POS Environment... 3 Overview... 3 POS Operating Systems... 3 Operating Systems
More informationDVCrypt Conditional Access System
DVCrypt Conditional Access System Quick start guide 1. Introduction DVCrypt is a conditional access system for digital TV broadcasting networks (DVB). It consists of hardware modules and client/server
More informationAvigilon Control Center Gateway User Guide
Avigilon Control Center Gateway User Guide Version: 5.2 PDF-ACCGATEWAY5-B-Rev1 2013-2014 Avigilon Corporation. All rights reserved. Unless expressly granted in writing, no license is granted with respect
More informationSUN COBALT RaQ 4 Server Appliance FAQ
SUN COBALT RaQ 4 Server Appliance - Frequently Asked Questions THE SUN COBALT RAQ 4 IS ADVANCING SERVER APPLIANCE TECHNOLOGIES BY INTEGRATING THE MOST POWERFUL TOOLS AND APPLICATIONS INTO A RELIABLE, LOW-COST
More informationHigth definition from A to Z. www.azbox-hd.com
Higth definition from A to Z www.azbox-hd.com Do you Feel the full HD multimedia? Wifi Web Browser Yes, you read this correctly. O2media present a new line of AzBox HD receivers, with the AzBox HD Elite
More informationEZCast Universal WiFi Display Dongle Quick Instal ation Guide Ver. 1.3
EZCast Universal WiFi Display Dongle Quick Installation Guide Ver. 1.3 Thanks for using the amazing EZCast WiFi display dongle. This is the universal quick installation guide for Visonicom EZCast WiFi
More informationAn affordable all-digital solution for cable systems of every size
Welcome the Digital Era with CONDOR Set-Top Box Platform & Headend Broadcast System An affordable all-digital solution for cable systems of every size www.picodigital.com Telephone: +1 (858) 546-5050 Toll
More informationPractice Management Installation Guide. Requirements/Prerequisites: Workstation Requirements. Page 1 of 5
Practice Management Installation Guide Your computers must meet the Workstation, Server and Network Requirements (see below for specifics). These requirements will ensure that Practice Management will
More informationHosted SharePoint: Questions every provider should answer
Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money
More informationUpgrade your Software
Video server software From time to time software upgrades are issued for the video servers. These are posted on our website www.ad-networkvideo.com or on the product CD and consist of two parts, the application
More informationTABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
More informationLocking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
More informationClearOS Network, Gateway, Server Quick Start Guide
ClearOS Network, Gateway, Server Quick Start Guide Welcome ClearOS is computer Operating System (OS) that provides enterprise-level network security and application services to the Small/Medium-sized Business
More informationCourse Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
More informationMinimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Express
Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Express SQL 2008 R2 Express Restrictions 1 CPU 1 GB Ram Use Limit 10 GB Database Size High Availability Options None (No Database Mirroring,
More informationMinimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Standard
Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Standard SQL 2008 R2 Standard Restrictions 4 CPU 64 GB Ram Use Limit 524 PB Database Size High Availability Options Limited Database Mirroring,
More informationQualified Integrators and Resellers (QIR) Implementation Statement
Qualified Integrators and Resellers (QIR) Implementation Statement For each Qualified Installation performed, the QIR Employee must complete this document and confirm whether the validated payment application
More informationPurpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption...
Contents Purpose... 3 Background on Keyscan Software... 3 Client... 4 Communication Service... 4 SQL Server 2012 Express... 4 Aurora Optional Software Modules... 5 Computer Hardware Configurations... 6
More informationCoolmax CN-590 Network Storage Solution
Coolmax CN-590 Network Storage Solution Model Name Controller hip CPU OS Memory Interface CN-590 S2892 150MHz RTOS 8MB SDRAM / 1MB NOR Flash LAN Standard 10/100Base-TX Auto MDI/MDI-X Connector Type RJ-45
More informationServers, Clients. Displaying max. 60 cameras at the same time Recording max. 80 cameras Server-side VCA Desktop or rackmount form factor
Servers, Clients Displaying max. 60 cameras at the same time Recording max. 80 cameras Desktop or rackmount form factor IVR-40/40-DSKT Intellio standard server PC 60 60 Recording 60 cameras Video gateway
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
More information- Open Architecture/Interoperability Issues
Digital Set Top Box (STB) - Open Architecture/Interoperability Issues The DVB (Digital Video Broadcast) project group has developed a family of interrelated international standards for digital television
More informationHotelTV1. Client Software Update REV A0.6 D0202. 2014 October. Web : http://support.vestek.com.tr Mail : support@vestek.com.tr Tel : +90 212 286 01 06
D0202 HotelTV1 Client Software Update 2014 October 1. Revision History Date Owner Version Reason & Change 11 Oct 2011 Bora Tunçer A0.1 Initial creation 24 Jan 2012 Bora Tunçer A0.2 Adding bootloader update
More informationEnsim WEBppliance 3.0 for Windows (ServerXchange) Release Notes
Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes May 07, 2002 Thank you for choosing Ensim WEBppliance 3.0 for Windows. This document includes information about the following: About Ensim
More informationHardware/Software Requirements For Self-Hosting Multi Server
Hardware/Software Requirements For Self-Hosting Multi Server Ebix recommends two or more servers for sites with more than 20 active users. The first step is deciding which type of configuration would best
More informationPerformance of Host Identity Protocol on Nokia Internet Tablet
Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007
More informationRemote Monitoring Unit SC8100. Monitoring Unit SC8100
Monitoring Unit SC8100 Remote Monitoring Unit SC8100 Environmental monitoring of any facilities, control of security breaches, temperatures, smoke, water leakages, voltages and more. Compatible with all
More informationIntroduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
More informationKaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
More informationCentral Management System
Central Management System Software Installation Guide Ver. 1.5.0.101115.001 ... ii System Introduction... 3 Client/Server Architecture...3 System Requirements... 4 System Setup...4 Multiple Monitor Configuration...5
More informationHardening Guide. Installation Guide
Installation Guide About this Document The intended use of this guide is to harden devices and also provide collateral for deployment teams to deal with local network policy, configurations and specification.
More informationDigg Dekodere - HDPV-C20CXM - HD-C63CX
Digg Dekodere - HDPV-C20CXM - HD-C63CX HD-C63CX - CAS : Conax Chipset pairing Middleware : Cubiware Raskt og enkelt brukergrensesnitt lineær TV programmering ( DVB-C ) On-demand og Pay-per-view (PPV) programmering
More informationWhat is WS_FTP? How WS_FTP Works
What is WS_FTP? WS_FTP is the leading file transfer client with millions of users worldwide. You can easily and securely transfer files between your home and office and to and from customers, clients,
More informationVirtually Secure. a journey from analysis to remote root 0day on an industry leading SSL-VPN appliance
Virtually Secure a journey from analysis to remote root 0day on an industry leading SSL-VPN appliance Who am I? Tal Zeltzer Independent security researcher from Israel Reverse engineering (mostly embedded
More informationChapter 1 Hardware and Software Introductions of pcduino
Chapter 1 Hardware and Software Introductions of pcduino pcduino is a high performance, cost effective mini PC platform that runs PC like OS such as Ubuntu Linux. It outputs its screen to HDMI enabled
More informationUsing SonicWALL NetExtender to Access FTP Servers
SSL-VPN Using SonicWALL NetExtender to Access FTP Servers Problem: Using NetExtender to access an FTP Server on the LAN segment of a SonicWALL PRO 4060. Solution: Perform the following setup steps. Step
More informationFortiWeb 5.0, Web Application Firewall Course #251
FortiWeb 5.0, Web Application Firewall Course #251 Course Overview Through this 1-day instructor-led classroom or online virtual training, participants learn the basic configuration and administration
More informationSAMSUNG SMARTTV: HOW-TO TO CREATING INSECURE DEVICE IN TODAY S WORLD. Sergey Belov
Sergey Belov # whoami Penetration tester @ Digital Security Bug hunter Speaker Agenda SmartTV - what is it? Current state of research (in the world) Samsung Smart TV - series 2008-2014 Emulator vs real
More informationCDH installation & Application Test Report
CDH installation & Application Test Report He Shouchun (SCUID: 00001008350, Email: she@scu.edu) Chapter 1. Prepare the virtual machine... 2 1.1 Download virtual machine software... 2 1.2 Plan the guest
More informationANTIK JUICE IPTV DEMO KIT MANUAL
ANTIK JUICE IPTV DEMO KIT MANUAL Thank you for purchasing the Juice IPTV Demo Kit (IDK). We have put together the Juice IDK to offer our client a good insight about IPTV, and to give you a hand-on experience
More informationCOURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
More informationCheckmate 5.5 Self Hosted Quick Start Guide
Checkmate 5.5 Self Hosted Quick Start Guide Introduction Checkmate 5.5 offers a new web interface allowing all users in your environment to seamlessly access all of Checkmate s features by connecting to
More informationInstalling and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
More informationYun Shield User Manual VERSION: 1.0. Yun Shield User Manual 1 / 22. www.dragino.com
Yun Shield User Manual VERSION: 1.0 Version Description Date 0.1 Initiate 2014-Jun-21 1.0 Release 2014-Jul-08 Yun Shield User Manual 1 / 22 Index: 1 Introduction... 3 1.1 What is Yun Shield... 3 1.2 Specifications...
More informationSysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
More informationAXIS Camera Station Quick Installation Guide
AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera
More informationArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
More informationVidyo Network Configuration Guide Windows XP and Vista
Vidyo Network Configuration Guide Windows XP and Vista Introduction Vidyo is a new video conferencing system used in the latest Attend Anywhere professional networking, video collaboration & service delivery
More informationCountermeasures for Attacks on Satellite TV Cards using Open Receivers
Countermeasures for Attacks on Satellite TV Cards using Open Receivers Lishoy Francis, William G. Sirett, Keith Mayes, Konstantinos Markantonakis The Information Security Group - Smart Card Centre, Royal
More informationNIVEO Network Attached Storage Series NNAS-D5 NNAS-R4. More information: WWW.NIVEOPROFESSIONAL.COM INFO@NIVEOPROFESSIONAL.COM
NIVEO Network Attached Storage Series NNAS-D5 NNAS-R4 More information: WWW.NIVEOPROFESSIONAL.COM INFO@NIVEOPROFESSIONAL.COM Product Specification Introduction The NIVEO NNAS series is specifically designed
More informationAvigilon Control Center Gateway User Guide. Version 5.4
Avigilon Control Center Gateway User Guide Version 5.4 2006-2014 Avigilon Corporation. All rights reserved. Unless expressly granted in writing, no license is granted with respect to any copyright, industrial
More informationArrow ECS sp. z o.o. Oracle Partner Academy training environment with Oracle Virtualization. Oracle Partner HUB
Oracle Partner Academy training environment with Oracle Virtualization Technology Oracle Partner HUB Overview Description of technology The idea of creating new training centre was to attain light and
More informationCPSC 226 Lab Nine Fall 2015
CPSC 226 Lab Nine Fall 2015 Directions. Our overall lab goal is to learn how to use BBB/Debian as a typical Linux/ARM embedded environment, program in a traditional Linux C programming environment, and
More informationMEGA Web Application Architecture Overview MEGA 2009 SP4
Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.
More informationBuildroot for Vortex86EX (2016/04/20)
Buildroot for Vortex86EX (2016/04/20) Table of Contents Introduction...1 Prepare...1 Install Virtual Machine (optional)...1 Install Buildroot...3 Config Buildroot for VEX-SOM (optional)...4 Generate Linux
More informationBomgar Corporation. Bomgar Application Security Assessment Summary January 26, 2015. This document is the property of Bomgar Corporation.
Bomgar Corporation Bomgar Application Security Assessment Summary January 26, 2015 This document is the property of Bomgar Corporation. Report Author Customer Project Document Control Document Control
More informationKeri USB-A Connection and Configuration
Step 1 - Connect the KPC-1 cable to the K-USB. NOTE: The form of the USB converter may vary, so the unit you receive may not be identical to the one displayed here. Step 2 Plug the USB Connector of the
More informationLecture 2: Computer Hardware and Ports. y.alharbi@sau.edu.sa http://faculty.sau.edu.sa/y.alharbi/en
BMTS 242: Computer and Systems Lecture 2: Computer Hardware and Ports Yousef Alharbi Email Website y.alharbi@sau.edu.sa http://faculty.sau.edu.sa/y.alharbi/en The System Unit McGraw-Hill Copyright 2011
More informationInstalling and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationRaspberry Pi. Set-Top-Box. http://www.raspberrypi.org 13-11-13
Raspberry Pi Set-Top-Box http://www.raspberrypi.org 1 What is set-top box A set-top box (STB) or set-top unit (STU) is an information appliance device that generally contains a tuner and connects to a
More information"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION
"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION CHECK POINT ALERTED EZCAST THAT ITS SMART TV DONGLE, WHICH IS USED BY APPROXIMATELY 5 MILLION USERS, IS EXPOSED TO SEVERE REMOTE CODE EXECUTION VULNERABILITIES
More informationHardware/Software Specifications for Self-Hosted Systems (Multi-Server)
Hardware/Software Specifications for Self-Hosted Systems (Multi-Server) EBIX, INC. 1 Ebix Way, Johns Creek, GA 30097 Rev. 07/2015 2015 Ebix, Inc. and its subsidiaries. All Rights Reserved. This software
More informationUsing Red Hat Network Satellite Server to Manage Dell PowerEdge Servers
Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers Enterprise Product Group (EPG) Dell White Paper By Todd Muirhead and Peter Lillian July 2004 Contents Executive Summary... 3 Introduction...
More informationBefore deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
More informationNETGEAR SMB Storage Line Update and ReadyNAS 2100 Introduction
NETGEAR SMB Storage Line Update and ReadyNAS 2100 Introduction June 2, 2009 ReadyNAS 2100 shown Agenda Overview New Introductions and Updates ReadyNAS 2100 ReadyNAS Remote Current Product Lineup Solutions
More informationUsing the Raspberry Pi to establish a Virtual Private Network (VPN) Connection to a Home Network
Using the Raspberry Pi to establish a Virtual Private Network (VPN) Connection to a Home Network Constadinos Lales Computer Engineering Technology New York City College of Technology, CUNY 186 Jay Street,
More informationSyncThru TM Web Admin Service Administrator Manual
SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included
More informationVMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.
VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.com) Copyright 2008 EMC Corporation. All rights reserved. Agenda
More informationUser s Manual CONTENT. Nano NAS Server for USB storages. 1. Product Information...1. 2. Product Specifications.2. 3. System requirements..
CONTENT Nano NAS Server for USB storages 1. Product Information...1 2. Product Specifications.2 3. System requirements..3 4. Product Connecting. 4 5. Configuring DN-7023....5 6. Setting... 9 7. Note..
More informationCRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
More informationDeep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
More informationAlinto Mail Server Pro
Alinto Mail Server Pro Installation Guide Alinto Version 2.0.1 Index 1. Introduction....................................................................................... 1 2. Prerequisites......................................................................................
More informationSAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation
A BasisOnDemand.com White Paper SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation by Prakash Palani Table of Contents 1. Purpose... 3 2. What is Web Dispatcher?... 3 3. Can
More informationLab Objectives & Turn In
Firewall Lab This lab will apply several theories discussed throughout the networking series. The routing, installing/configuring DHCP, and setting up the services is already done. All that is left for
More informationEV-8000S. Features & Technical Specifications. EV-8000S Major Features & Specifications 1
EV-8000S Features & Technical Specifications EV-8000S Major Features & Specifications 1 I. General Description EV-8000S is fully compliant with the international DVB standard and thus transmits digital
More informationSetting up a Raspberry Pi as a WiFi access point
Setting up a Raspberry Pi as a WiFi access point Created by lady ada Last updated on 2015-03-10 04:30:11 PM EDT Guide Contents Guide Contents Overview What you'll need Preparation Check Ethernet & Wifi
More informationCompany Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
More informationCyber - Security and Investigations. Ingrid Beierly August 18, 2008
Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities
More informationEnterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
More informationVirtual Appliance Setup Guide
The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on
More informationHow to scan/exploit a ssl based webserver. by xxradar. http://www.radarhack.com mailto:xxradar@radarhack.com. Version 1.
How to scan/exploit a ssl based webserver. by xxradar. http://www.radarhack.com mailto:xxradar@radarhack.com. Version 1.0 21-09-2003 1. Introduction Sometimes late at night, playing with openssl and connecting
More informationAspen Cloud Server Management Console
Aspen Cloud Server Management Console Management of Cloud Server Resources Power All Networks Ltd. User Guide June 2011, version 1.1.1 Refer to ICP V1.1 PAGE 1 Table of Content 1. Introduction... 4 2.
More informationEasy H.264 video streaming with Freescale's i.mx27 and Linux
Libre Software Meeting 2009 Easy H.264 video streaming with Freescale's i.mx27 and Linux July 8th 2009 LSM, Nantes: Easy H.264 video streaming with i.mx27 and Linux 1 Presentation plan 1) i.mx27 & H.264
More informationLinux Embedded devices with PicoDebian Martin Noha 28.9.2006
Embedded systems Linux Embedded devices with PicoDebian Martin Noha 28.9.2006 24.03.2005 1 Agenda Why did I look in this stuff? What is an embedded device? Characteristic hardware global requirements for
More information