Graffiti Networks: A Subversive, Internet-Scale File Sharing Model. Andrew Pavlo DC401 Rhode Island Defcon Group October 12, 2009
|
|
- Arleen Beasley
- 8 years ago
- Views:
Transcription
1 Graffiti Networks: A Subversive, Internet-Scale File Sharing Model Andrew Pavlo DC401 Rhode Island Defcon Group October 12, 2009
2 Co-Authors Ning Shi (Brown)
3 Outline Open BitTorrent Problems A Subversive Solution Experimental Evaluation Aftermath Lessons Learned Concluding Remarks
4 BitTorrent Overview Leech Seed Tracker Seed Leech Seed
5 Two months later Tracker? Seed Leech Seed Seed
6 Problem Statement How to provide a means for peers to retrieve data long after seeds have disappeared? Requirements: Must provide public access. Must not allow malicious users to destroy data. Must allow all content. Must be free!
7 Case Studies Average time a peer remains connected to swarm after finished downloading = 7 hours Izal et al., Dissecting BitTorrent: Five Months in a Torrent's Lifetime Average life-span of a torrent = 9-13 days Guo et al., Measurements, Analysis, and Modeling of BitTorrent-like Systems Faster departure rates for copyrighted content. Pouwelse et al., The Bittorrent P2P File-sharing System: Measurements and Analysis. 2005
8 BitTorrent Security Problems Swarm participation is public. Private invite-only communities can be breached. Pair-wise communications can identify type of traffic (see SandVine).
9 Graffiti Network Project Distributed file-sharing protocol that utilizes third-party entities as storage sites and data transfer intermediaries: Storage sites are likely unwanted participants. Target abandoned areas of the web. Massive replication provides durability. Strict tit-for-tat: Peers must make a new replica for each piece that they download.
10 Graffiti Network Overview <Encryption Key, Start/Stop Sequence, Checksum> Tracker Binary Data Encrypted Data Base64 Text Seed Leech Seed
11 Graffiti Network Benefits Similar to steganographic data systems: Plausible deniability. Difficult to throttle HTTP traffic. Multi-site subpoenas. Integration with BitTorrent: GN tracker incentivizes network participation through BT peer discovery. Pieces obtained through BT or GN can be shared with either network.
12 Storage Site Alternatives Good: Cloud Resources (Amazon S3), Usenet Better: File upload sites (RapidShare), Free webmail, Image upload services, Message Boards, Pastebins, Blogs. Best: Wikis!
13 Experimental Evaluation Graffiti Network prototype: Tracker: MySQL + Django Client: Python + libtorrent Hybrid BitTorrent + Graffiti system. Goal: Measure the lifespan of data stored on third-party storage sites outside of our control. Use Graffiti Network to store a 700MB Linux ISO
14 MediaWiki Most widely used open-source wiki software: Likely to be many novice users and install-thenforget installations. Default permissions are very lax: Anonymous edits enabled by default. Non-trivial to install CAPTCHA plugins: Default SimpleCAPTCHA is useless.
15 SimpleCAPTCHA Authentication October 12, 2009
16 Discovering Target Sites Scraped two well-known search engines looking for MediaWiki installations: Used phrases indicative of a fresh install + a random word from dictionary. Example: `Configuration settings list squirrels Total Sites Found: +22,000 Probe each site to determine security and whether it is abandoned.
17 Target Site Criteria No Wikimedia Foundation Sites: Example: Wikipedia, Wikitionary, etc. No commercial hosting sites: Example: wikia.com Last update >= 3 months No CAPTCHAS. If requires login, allow registration.
18 Open MediaWiki Sites # of Sites Anonymous Edits: 8,483 Open Registration: 5,983 Puzzle Protection: 1,157 Total Open: 15,623 Total Open+Abandoned: 11,987
19 Experiment Setup Leave a calling card to inform non-network users of the system: Link back to project website using URL containing unique tracking code. Do not modify existing pages. More resilient approach would be to modify homepage and then immediately rollback. Only store one replica per site.
20 Example Replica Random Title+User Exact Revision Calling Card Tracking URL Base64+Encrypted Payload
21 Tracking Page October 12, 2009
22 We turn it on Simulation started April 10 th, 2009 Shutdown on April 11 th, 2009 Only stored 5,646 replicas before I got a call
23 Aftermath Reversed pages (since we couldn t delete). Posted apology. Removed list of open MediaWiki sites. Removed link to source code. Removed Brown logo.
24 Unwanted Notoriety? October 12, 2009
25 Constructive Feedback You should have asked me, I would have let you store the data Not a real-world experiment. You should have ran it in your own local cluster/planetlab Again, not real-world conditions. You should have ran it from Starbucks/Panera Hiding makes it looks like you know you are doing something wrong.
26 Replica Availability April 10 th, 2009 to October 11 th, 2009 percentage 0.6 Total Replicas Removed Replicas with Tracking Click-Throughs # of days since replica created
27 Replica Availability by Protection April 10 th, 2009 to October 11 th, 2009 Puzzle Protected Registration Protected Anonymous Edits percentage # of days since replica created
28 Protection Enhancements recaptcha is the answer: Allow anonymous edits, but require verification. Does not require server-side graphics libraries. Throttle users creating too many pages or posting data larger than threshold. Automatically lock-down abandoned sites: Should be part of all open-source CMS software.
29 Lessons Learned Be careful how you advertise yourself. Consider how your system will affect others. Consult others outside of your project. Be open and upfront about project. Don t pee in the pool!
30 Project Status Checking replica status daily. Two workshop submissions, two rejections: IPTPS 09 WOOT 09 Planning to submit one last time: LEET 10 (April 5 th, 2010)
31 Concluding Remarks Final vindication: The system works! Tread lightly Off probation at the end of this semester!
32 More Information Additional info is available at our website: Source code available through SVN: Questions/Comments?
Lecture 6 Content Distribution and BitTorrent
ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Lecture 6 Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent
More informationThe BitTorrent Protocol
The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions
More informationPeer-to-peer filetransfer protocols and IPv6. János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004
-to-peer filetransfer protocols and IPv6 János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004 Motivation IPv6 traffic is
More informationSearching for Malware in BitTorrent
Searching for Malware in BitTorrent Andrew D. Berns and Eunjin (EJ) Jung April 24, 2008 Abstract One of the most widely publicized aspects of computer security has been the presence and propagation of
More informationCS5412: TORRENTS AND TIT-FOR-TAT
1 CS5412: TORRENTS AND TIT-FOR-TAT Lecture VI Ken Birman BitTorrent 2 Today we ll be focusing on BitTorrent The technology really has three aspects A standard tht BitTorrent client systems follow Some
More informationSkirting ISP Traffic Shaping in P2P Systems, and Countermeasures
Distributed Computing Skirting ISP Traffic Shaping in P2P Systems, and Countermeasures Bachelor s Thesis Pascal Studerus studi@student.ethz.ch Distributed Computing Group Computer Engineering and Networks
More informationDDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia kcsia@cs.ucla.edu Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
More informationPeer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe
Chapter 2: Initial (real world) systems Thorsten Strufe 1 Chapter Outline Overview of (previously) deployed P2P systems in 3 areas P2P file sharing and content distribution: Napster, Gnutella, KaZaA, BitTorrent
More informationBitTorrent File Sharing in Mobile Ad-hoc Networks
BitTorrent File Sharing in Mobile Ad-hoc Networks Gábor Balázsfalvi University of Debrecen, Hungary János Sztrik University of Debrecen, Hungary September 29, 2006 Abstract This paper presents an application
More informationFrom Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
More informationWELCOME TO CITUS CLOUD LOAD TEST
USER S GUIDE CONTENTS Contents... 2 Chapter 1: Welcome to Citus Cloud Load Test... 3 1. What is Citus Cloud Load Test?... 3 2. Why Citus Cloud Load Test?... 3 3. Before using this guide... 3 Chapter 2:
More informationBitTorrent Peer To Peer File Sharing
BitTorrent Peer To Peer File Sharing CS290F: Networking for Multimedia Mini PhD Major Area Exam I) Introduction Content distribution is an important topic in networking and has been evolving from the start
More informationAttacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent
Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent Marlom A. Konrath, Marinho P. Barcellos, Rodrigo B. Mansilha PIPCA Programa de Pós-Graduação em Computação Aplicada
More informationThe Challenges of Stopping Illegal Peer-to-Peer File Sharing
The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:
More informationJava Bit Torrent Client
Java Bit Torrent Client Hemapani Perera, Eran Chinthaka {hperera, echintha}@cs.indiana.edu Computer Science Department Indiana University Introduction World-wide-web, WWW, is designed to access and download
More informationThe Algorithm of Sharing Incomplete Data in Decentralized P2P
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 149 The Algorithm of Sharing Incomplete Data in Decentralized P2P Jin-Wook Seo, Dong-Kyun Kim, Hyun-Chul Kim,
More informationCreating Research Web Sites with Drupal. Randy Carpenter & Steven Akins, May 25, 2010 TSO Brown Bag Course
Creating Research Web Sites with Drupal Randy Carpenter & Steven Akins, May 25, 2010 TSO Brown Bag Course Last Revision: May 24, 2010 Introduction Randy Carpenter, Lead of TSO Research Program Support
More informationBUILDING WEB JOURNAL DIRECTORY AND ITS ARTICLES WITH DRUPAL
BUILDING WEB JOURNAL DIRECTORY AND ITS ARTICLES WITH DRUPAL Suwanto Raharjo Institute Science & Technology AKPRIND, Yogyakarta, Indonesia email: wa2n@akprind.ac.id Abstract The rapid growths of web based
More informationMedia Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
More informationTraffic Localization for DHT-based BitTorrent networks
Traffic Localization for DHT-based BitTorrent networks Moritz Steiner and Matteo Varvello 1 OUTLINE Motivation DHT Traffic Localization DHT Traffic Localization in Action! Evaluation Conclusion Motivation
More informationEvaluating the Effectiveness of a BitTorrent-driven DDoS Attack
Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Jurand Nogiec University of Illinois Fausto Paredes University of Illinois Joana Trindade University of Illinois 1. Introduction BitTorrent
More informationBaidu: Webmaster Tools Overview and Guidelines
Baidu: Webmaster Tools Overview and Guidelines Agenda Introduction Register Data Submission Domain Transfer Monitor Web Analytics Mobile 2 Introduction What is Baidu Baidu is the leading search engine
More informationConfiguring a single-tenant BIG-IP Virtual Edition in the Cloud
Deployment Guide Document Version: 1.0 What s inside: 2 Configuration example 4 Securing the isession deployment 6 Downloading and importing the new iapp 6 Configuring the BIG- IP systems using the Cloud
More informationThe Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst
The Internet is Flat: A brief history of networking over the next ten years Don Towsley UMass - Amherst 1 What does flat mean? The World Is Flat. A Brief History of the Twenty-First Century, Thomas Friedman
More informationOrangeHRM Web Installation Guide for Windows
OrangeHRM Web Installation Guide for Windows All rights reserved. Published in the United States of America. This publication is protected by copyright, and permission must be obtained from the publisher
More informationCloud Computing Trends
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered
More informationTorrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System
Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System Debarghya Das Cornell University, Ithaca, NY 14850 dd367@cornell.edu Abstract Most cloud storage platforms today offer a centralized
More informationA Comparison of Mobile Peer-to-peer File-sharing Clients
1. ABSTRACT A Comparison of Mobile Peer-to-peer File-sharing Clients Imre Kelényi 1, Péter Ekler 1, Bertalan Forstner 2 PHD Students 1, Assistant Professor 2 Budapest University of Technology and Economics
More informationFileMaker Server 14. FileMaker Server Help
FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
More informationMicrosoft Office Live Meeting Events User s Guide
Microsoft Office Live Meeting Events User s Guide Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies,
More informationSE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S.
BitTorrent Technology How and why it works SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S. Kartik Krishnan 1 Abstract BitTorrent
More informationA Guide to the Research Data Service
A Guide to the Research Data Service DMP online ONLINE DATASHARE MY RESEARCH DATA PURE DATA SYNC DATA VAULT DATA STORE This booklet was produced in April 2016 by the Research Data Service Team, Information
More informationFileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
More informationCloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5. www.kc-class.eu
Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5 www.kc-class.eu 1 1 Outline Cloud computing General overview Deployment and service models Security issues Threats
More informationFileMaker Server 10 Help
FileMaker Server 10 Help 2007-2009 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker, the file folder logo, Bento and the Bento logo
More informationSetup Amazon Payments for Woocommerce
Setup Amazon Payments for Woocommerce This document explains the necessary steps to offer Amazon Payments on your website. You will need to create an Amazon Payments account and enter your Merchant ID
More informationUpload Your Culminating Project to The Repository at St. Cloud State University
Upload Your Culminating Project to The Repository at St. Cloud State University There are two parts to uploading your culminating project (starred paper, thesis, or dissertation) to The Repository at St.
More informationHow To Set Up Wiremock In Anhtml.Com On A Testnet On A Linux Server On A Microsoft Powerbook 2.5 (Powerbook) On A Powerbook 1.5 On A Macbook 2 (Powerbooks)
The Journey of Testing with Stubs and Proxies in AWS Lucy Chang lucy_chang@intuit.com Abstract Intuit, a leader in small business and accountants software, is a strong AWS(Amazon Web Services) partner
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationTurnitin Sakai Integration Administrator Installation Guide
Turnitin Sakai Integration Administrator Installation Guide Updated August 6, 2012 Copyright 1998 2012 iparadigms, LLC. All rights reserved. Turnitin Sakai Integration Manual: 1 Contents Administrator
More informationPlease note that after installation, you can configure the backup, but no backup files will be created until the Server / PC has been restarted.
How to Configure Shadow Protect and Image Manager with our Cloud Service This guide will walk you through installation of Shadow Protect (SP) and Image Manager (IM), ready to send Offsite to our Cloud
More informationMedia Shuttle. Secure, Subscription-based File Sharing Software for Any Size Enterprise or Workgroup. Powerfully Simple File Movement
Media Exchange TM Media Shuttle TM Secure, Subscription-based File Sharing Software for Any Size Enterprise or Workgroup. Powerfully Simple File Movement The Fastest, Easiest, Safest Way to Move Digital
More informationP2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
More informationAutomated Cloud Migration
Automated Cloud Migration Now you can quickly and safely deploy multi-tier production apps into the cloud without virtualization and/or modification for use cases that include DevTest and Disaster Recovery.
More informationSYSTEM DEVELOPMENT AND IMPLEMENTATION
CHAPTER 6 SYSTEM DEVELOPMENT AND IMPLEMENTATION 6.0 Introduction This chapter discusses about the development and implementation process of EPUM web-based system. The process is based on the system design
More informationefolder BDR for Veeam Cloud Connection Guide
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
More informationHow To Test The Speed Of Bittorrent On A Bitt Client And Torrent On A Pc Or Ipad (For Free) On A Microsoft Flash Get 2.5 (For A Free) Computer (For Pc Or Mac) On An Ip
Zhicheng Yang, yangzhicheng@wustl.edu (A paper written under the guidance of Prof. Raj Jain) Download The file distribution protocol BitTorrent(BT) is very popular nowadays, and people are used to sharing
More informationRightFax Internet Connector Frequently Asked Questions
RightFax Internet Connector Frequently Asked Questions What is the RightFax Internet Connector? The RightFax Internet Connector is a connector within RightFax 10.5 which provides an Internet connection
More informationTARGETPROCESS HELP DESK PORTAL
TARGETPROCESS HELP DESK PORTAL v.2.17 User Guide This document describes TargetProcess Help Desk Portal functionality and provides information about TargetProcess Help Desk Portal usage. 1 HELP DESK PORTAL...2
More informationTurnitin Blackboard 9.0 Integration Instructor User Manual
Turnitin Blackboard 9.0 Integration Instructor User Manual Version: 2.1.3 Updated December 16, 2011 Copyright 1998 2011 iparadigms, LLC. All rights reserved. Turnitin Blackboard Learn Integration Manual:
More informationThe Implementation of Wiki-based Knowledge Management Systems for Small Research Groups
International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM) ISSN 2150-7988 Vol.1 (2009), pp. 68 75 http://www.mirlabs.org/ijcisim The Implementation of Wiki-based
More informationThe Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May
More informationCloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
More informationNovell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
More informationHow swift is your Swift? Ning Zhang, OpenStack Engineer at Zmanda Chander Kant, CEO at Zmanda
How swift is your Swift? Ning Zhang, OpenStack Engineer at Zmanda Chander Kant, CEO at Zmanda 1 Outline Build a cost-efficient Swift cluster with expected performance Background & Problem Solution Experiments
More informationOpenSSO: Cross Domain Single Sign On
OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2
More informationSystem Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................
More informationSyncThru TM Web Admin Service Administrator Manual
SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included
More informationShould Internet Service Providers Fear Peer-Assisted Content Distribution?
Should Internet Service Providers Fear Peer-Assisted Content Distribution? Thomas Karagiannis, UC Riverside Pablo Rodriguez, Microsoft Research Cambridge Konstantina Papagiannaki, Intel Research Cambridge
More informationA Guide to Mobile Security For Citizen Journalists
A Guide to Mobile Security For Citizen Journalists Your Citizen journalism, and with it the rise of alternative media voices, is one of the most exciting possibilities for mobile phones in activism. Mobile
More informationQlikView 11 Source Control Walkthrough
QlikView 11 Source Control Walkthrough A QlikView Technology White Paper Originally published: August, 2011 Updated August, 2012 www.qlikview.com 1 Table of Contents BACKGROUND... 3 SOURCE CONTROL BASICS...
More informationNovell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
More informationDSI File Server Client Documentation
Updated 11/23/2009 Page 1 of 10 Table Of Contents 1.0 OVERVIEW... 3 1.0.1 CONNECTING USING AN FTP CLIENT... 3 1.0.2 CONNECTING USING THE WEB INTERFACE... 3 1.0.3 GETTING AN ACCOUNT... 3 2.0 TRANSFERRING
More information5 Questions to ask a 3 rd Party Cloud Provider
Effective Data, Inc. White Paper: 5 Questions to ask a 3 rd Party Cloud Provider By Timothy Wightman 1515 E. Woodfield Rd. Suite 200 Schaumburg, IL 60173 Tel (847) 969-9300 Fax (847) 969-9350 www.effective-data.com
More informationAn apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
More informationComputation and Economics - Spring 2012 Assignment #3: File Sharing
Computation and Economics - Spring 2012 Assignment #3: File Sharing Professor Sven Seuken Department of Informatics, University of Zurich Out Thursday, March 8, 2012 Due 14:00 sharp: Monday, March 19,
More informationP2P Filesharing Population Tracking Based on Network Flow Data
P2P Filesharing Population Tracking Based on Network Flow Data Arno Wagner, Thomas Dübendorfer, Lukas Hämmerle, Bernhard Plattner Contact: arno@wagner.name Communication Systems Laboratory Swiss Federal
More informationSimple Storage Service (S3)
Simple Storage Service (S3) Amazon S3 is storage for the Internet. It is designed to make web-scale computing easier for developers. Amazon S3 provides a simple web services interface that can be used
More informationAmazon S3 Essentials
Fr Amazon Simple Storage Service (Amazon S3), provides developers and IT teams with secure, durable, and highly scalable object storage. Amazon S3 is easy to use, with a simple web services interface to
More informationSetting Up Resources in VMware Identity Manager
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationHW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009
HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationCA Unified Infrastructure Management Server
CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for
More informationModeling an Agent-Based Decentralized File Sharing Network
Modeling an Agent-Based Decentralized File Sharing Network Alex Gonopolskiy Benjamin Nash December 18, 2007 Abstract In this paper we propose a distributed file sharing network model. We take inspiration
More informationOracle Fusion Middleware. 1 Oracle Team Productivity Center Server System Requirements. 2 Installing the Oracle Team Productivity Center Server
Oracle Fusion Middleware Installation Guide for Oracle Team Productivity Center Server 11g Release 2 (11.1.2.1.0) E17075-02 September 2011 This document provides information on: Section 1, "Oracle Team
More informationPenetration Test Report
Penetration Test Report MegaCorp One August 10 th, 2013 Offensive Security Services, LLC 19706 One Norman Blvd. Suite B #253 Cornelius, NC 28031 United States of America Tel: 1-402-608-1337 Fax: 1-704-625-3787
More informationAdministrator Guide. v 11
Administrator Guide JustSSO is a Single Sign On (SSO) solution specially developed to integrate Google Apps suite to your Directory Service. Product developed by Just Digital v 11 Index Overview... 3 Main
More informationBeBanjo Infrastructure and Security Overview
BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits
More informationapt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates
apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates authors: Cameron Dale, Jiangchuan Liu presented by: Cameron Dale Simon Fraser University Burnaby, BC, Canada camerond@cs.sfu.ca
More informationFS2You: Peer-Assisted Semi-Persistent Online Storage at a Large Scale
FS2You: Peer-Assisted Semi-Persistent Online Storage at a Large Scale Ye Sun, Fangming Liu, Bo Li, Baochun Li, Xinyan Zhang Hong Kong University of Science & Technology, University of Toronto, Roxbeam
More informationFS2You: Peer-Assisted Semi-Persistent Online Storage at a Large Scale
FS2You: Peer-Assisted Semi-Persistent Online Storage at a Large Scale Ye Sun, Fangming Liu, Bo Li, Baochun Li, Xinyan Zhang Hong Kong University of Science & Technology, University of Toronto, Roxbeam
More informationConnect Business Communication. Training Guide
1 Training Checklist Section 1: Getting Started 3 Section 2: Course and Section Creation 4 Creating a New Course with Sections... 4 Editing Course Details... 9 Editing Section Details... 9 Copying a Section
More informationThe Internet and Network Technologies
The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationOpen Source Content Management System for content development: a comparative study
Open Source Content Management System for content development: a comparative study D. P. Tripathi Assistant Librarian Biju Patnaik Central Library NIT Rourkela dptnitrkl@gmail.com Designing dynamic and
More informationA Virtualized Infrastructure for Automated BitTorrent Performance Testing and Evaluation
A Virtualized Infrastructure for Automated BitTorrent Performance Testing and Evaluation Răzvan Deaconescu George Milescu Bogdan Aurelian Răzvan Rughiniş Nicolae Ţăpuş University Politehnica of Bucharest
More informationSoftware Development In the Cloud Cloud management and ALM
Software Development In the Cloud Cloud management and ALM First published in Dr. Dobb's Journal, February 2009: http://www.ddj.com/development-tools/212900736 Nick Gulrajani is a Senior Solutions Architect
More informationSGI NAS. Quick Start Guide. 007-5865-001a
SGI NAS Quick Start Guide 007-5865-001a Copyright 2012 SGI. All rights reserved; provided portions may be copyright in third parties, as indicated elsewhere herein. No permission is granted to copy, distribute,
More informationHow To Install Storegrid Server On Linux On A Microsoft Ubuntu 7.5 (Amd64) Or Ubuntu (Amd86) (Amd77) (Orchestra) (For Ubuntu) (Permanent) (Powerpoint
StoreGrid Linux Server Installation Guide Before installing StoreGrid as Backup Server (or) Replication Server in your machine, you should install MySQL Server in your machine (or) in any other dedicated
More informationDynamic Website For DANECO
Dynamic Website For DANECO Author: Digilution Creation Date: 05/10/13 Project Number: Version: 1.0 Approved By: 1.0 Design Concept This website shall serve as an online community for DANECO, offering several
More informationTechnical. Overview. ~ a ~ irods version 4.x
Technical Overview ~ a ~ irods version 4.x The integrated Ru e-oriented DATA System irods is open-source, data management software that lets users: access, manage, and share data across any type or number
More informationMicrosoft SharePoint 2010 Deployment with Coyote Point Equalizer
The recognized leader in proven and affordable load balancing and application delivery solutions Deployment Guide Microsoft SharePoint 2010 Deployment with Coyote Point Equalizer Coyote Point Systems,
More informationHow To Create A P2P Network
Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised
More informationPart II. Managing Issues
Managing Issues Part II. Managing Issues If projects are the most important part of Redmine, then issues are the second most important. Projects are where you describe what to do, bring everyone together,
More informationProfessor Yashar Ganjali Department of Computer Science University of Toronto. yganjali@cs.toronto.edu http://www.cs.toronto.
Professor Yashar Ganjali Department of Computer Science University of Toronto yganjali@cs.toronto.edu http://www.cs.toronto.edu/~yganjali Announcements Programming assignment 2 Extended Deadline: Fri.
More informationOptimizing Drupal Performance. Benchmark Results
Benchmark Results February 2010 Table of Contents Overview 3 Test Environment 3 Results Summary 4 Configurations and Test Details 8 Bytecode Caching 12 Improving Drupal Code with Partial Caching 13 Full
More informationWeb Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
More informationHow to Install MediaWiki on Windows Server 2003
How to Install MediaWiki on Windows Server 2003 Larry Kahm This article describes how you can install MediaWiki on Windows Server 2003 so that you can provide a wiki for your intranet users. According
More informationDual Bay Home Media Store. User Manual
Dual Bay Home Media Store User Manual CH3HNAS2 V1.0 CONTENTS Chapter 1: Home Page... 3 Setup Wizard... 3 Settings... 3 User Management... 3 Download Station... 3 Online User Manual... 3 Support... 3 Chapter
More informationTHE OPEN UNIVERSITY OF TANZANIA
THE OPEN UNIVERSITY OF TANZANIA Institute of Educational and Management Technologies COURSE OUTLINES FOR DIPLOMA IN COMPUTER SCIENCE 2 nd YEAR (NTA LEVEL 6) SEMESTER I 06101: Advanced Website Design Gather
More informationVisualisation in the Google Cloud
Visualisation in the Google Cloud by Kieran Barker, 1 School of Computing, Faculty of Engineering ABSTRACT Providing software as a service is an emerging trend in the computing world. This paper explores
More information