DAVIX Visualization. Workshop
|
|
|
- Patricia Atkinson
- 9 years ago
- Views:
Transcription
1 V DAVIX Visualization D X Workshop
2 V DAVIX Visualization D X Workshop Jan. Monsch at iplosion. com Raffael. Marty at secviz. org
3 Chief Security Splunk> Passion for Visualization Senior Security Analyst DAVIX initiator and engineer Applied Security Visualization Paperback: 552 pages Publisher: Addison Wesley (August, 2008) ISBN:
4 Raffael Marty Jan P. Monsch Chief Security Splunk> Passion for Visualization Senior Security Analyst DAVIX initiator and engineer Applied Security Visualization Paperback: 552 pages Publisher: Addison Wesley (August, 2008) ISBN:
5 Workshop Preparation 30 DAVIX CDs - DAVIX image - DAVIX manual Copy files to your disk and hand the CD to your neighbor! - PCAP file for analysis in /root Recommended setup VMware Player or VMware Fusion Bridged or NAT networking VM setup assistance: Chapter and in the manual Configure host to access DEFCON wireless network
6 Agenda DAVIX Visualization Example analysis Hands-on analysis Show us what you got 4
7 Agenda DAVIX Visualization Example analysis Goal: You can use DAVIX to analyze your data! Hands-on analysis Show us what you got 4
8 Visualization Questions Who analyzes logs? Who uses visualization for log analysis? Who has used DAVIX? Have you heard of SecViz.org? What tools are you using for log analysis? 5
9 V D X Data Analysis and Visualization Linux DAVIX
10 What is DAVIX? Live Linux CD system based on SLAX 6 - Software packages are modularized - Easy customizable - Runs from CD/DVD, USB stick or hard drive Collection of free tools for data processing & visualization - Tools work out of the box - No compilation or installation of tools required Comes with documentation - Quick start description for the most important tools - Links to manuals and tutorials
11 Why Did We Build DAVIX? No free solution offering wide range of visualization tools - Huge hurdle for people to get start with visualization Cumbersome to get tools running - Compiler issues, e.g. gcc 3 vs. gcc 4 - Dependencies with uncommon and old libraries - Different runtime environments DAVIX Goals - Getting tools running is simple User can concentrate on analysis - Easy customizable Users can add missing things - Perfect workspace to get you started with visualization!
12 User Interface - Menu Organization Menu organized around the information visualization process Capture Process Visualize Tools often cover more than one category - Afterglow Process, Visualize Additional tools/services: - Apache, MySQL, NTP
13 Tools Capture - Network tools Argus Snort Wireshark - Logging syslog-ng - Fetching data wget ftp scp Processing - Shell tools awk, grep, sed - Graphic preprocessing Afterglow LGL - Date enrichment geoiplookup whois/gwhois Visualization - Network Traffic EtherApe InetVis tnv - Generic Afterglow LGL Viewer Mondrian R Project * Non-concluding list of tools
14 PDF User Manual Quick start guide Network setup information Tool usage examples Links to online resource: Tool home pages, manuals, tutorials Customizing DAVIX - Customizing ISO image - Creating new modules - Installation on USB stick or hard drive
15 User Manual in the Menu The manual is browsable by chapter or individual tool chapters
16 The Manual Is Not Not an introduction to security analysis methodologies Not a collection of security analysis use-cases Not covering exhaustive examples - The usage examples are not security related - It is a quick usage guide for the tools Look at Raffael s book to get these details!
17 Customizations The DAVIX and SLAX can be modified in two ways - LZM modules Adding or removing modules in the directory slax/modules Modules are highly compressed software packages - rootcopy Overwrite or add individual files of LZM modules by copying modified files to the directory slax/rootcopy LZM modules can be generated out of standard Slackware or dropline GNOME packages using tgz2lzm
18 Visualization
19 Information Visualization Process Capture Process Visualize 16
20 Data Formats CSV / TSV ,80, ,failed ,80, ,success TM3 Source Port Destination Action STRING INTEGER STRING STRING DOT digraph structs { graph [label= My Graph ]; node [shape=ellipse]; edge [len=1]; ram -> activity 1 ; failed GML } ram [fillcolor=white]; 17
21 AfterGlow 1.x Parser CSV File AfterGlow Graph LanguageFile Grapher aaelenes,printing Resume abbe,information Encrytion aanna,patent Access aatharuy,ping digraph structs { graph [label="afterglow 1.5.8", fontsize=8]; node [shape=ellipse, style=filled, fontsize=10, width=1, height=1, fixedsize=true]; edge [len=1.6]; } "aaelenes" -> "Printing Resume" ; "abbe" -> "Information Encryption" ; "aanna" -> "Patent Access" ; "aatharuv" -> "Ping" ;
22 AfterGlow 1.x Parser CSV File AfterGlow Graph LanguageFile Grapher aaelenes,printing Resume abbe,information Encrytion aanna,patent Access aatharuy,ping digraph structs { graph [label="afterglow 1.5.8", fontsize=8]; node [shape=ellipse, style=filled, fontsize=10, width=1, height=1, fixedsize=true]; edge [len=1.6]; } "aaelenes" -> "Printing Resume" ; "abbe" -> "Information Encryption" ; "aanna" -> "Patent Access" ; "aatharuv" -> "Ping" ;
23 An Example Analysis
24 Worms in Mobile Networks Problem: Find worms in mobile networks Data: Call Detail Records (CDR) GMT GMT xxxx xxxx GMT GMT image/jpeg CHEC1_MMSC1 MM4Rrecord 0 1 MM xxxx xxxx xxxx Process: cat mms.cdr awk -o VFS=, {print $5, $6} Visual Transformation:
25 Multimedia Message Service 21
26 Multimedia Message Service Service Numbers? 21
27 Multimedia Message Service 22
28 Multimedia Message Service Long Chains 22
29 Hands-on Analysis
30 Let s Go Captures are in /root/davix_workshop_captures.pcap Find something interesting? Come show! Hints: tcpdump -nlr /root/davix_workshop_captures.pcap tcpdump2csv.pl afterglow.pl -h bar.pl -h
31 AfterGlow # Variable and Color variable=@violation=("backdoor Access", "HackerTool Download ); color.target="orange" if (grep(/$fields[1]/,@violation)); color.target="palegreen" # Node Size and Threshold maxnodesize=1; size.source=$fields[2] size=0.5 sum.target=0; threshold.source=14; # Color and Cluster color.source="palegreen" if ($fields[0] =~ /^111/) color.source="red" color.target="palegreen" cluster.source=regex_replace("(\\d\+)\\.\\d+")."/8"
32 Thank You S secviz. org E V C I Z davix. secviz. org
DAVIX Visualization Bootcamp 25C3
DAVIX Visualization Bootcamp 25C3 Visualize Your Network! Jan P. Monsch Marius Ciepluch About Your Hosts Jan P. Monsch DAVIX Project Initiator & Lead Engineer Marius Ciepluch DAVIX User & Workshop Assistant
IT Data Visualization
IT Data Visualization Raffael Marty, GCIA, CISSP Chief Security Strategist @ Splunk> SUMIT, Michigan - October 08 Raffael Marty Chief Security Strategist @ Splunk> Looked at logs/it data for over 10 years
DAVIX Visualization Workshop
DAVIX Visualization Workshop Jan P. Monsch [email protected] About Jan P. Monsch Currently Senior Security Analyst Technical Reviewer @ Pearson Education DAVIX Project Initiator & Lead Engineer On
Cloud-based Log Analysis and Visualization
Cloud-based Log Analysis and Visualization DeepSec 2010, Vienna, Austria mobile-166 My syslog Raffael Marty - @zrlram Raffael (Raffy) Marty Founder @ Chief Security Strategist and Product Manager @ Splunk
Insider Threat The Visual Conviction
Copyright Copyright (c) 2007 (c) 2007 by by Raffael Marty Insider Threat The Visual Conviction Raffael Marty, GCIA, CISSP Manager Solutions @ ArcSight, Inc. FIRST June 2007 Seville Copyright (c) 2007 by
DAVIX. The Data Analysis and Visualization Linux. Version 0.5.0. Authors: Jan P. Monsch, jan döt monsch ät iplosion döt com
DAVIX The Data Analysis and Visualization Linux Version 0.5.0 Authors: Jan P. Monsch, jan döt monsch ät iplosion döt com Raffael Marty, raffy ät secviz döt org 1 / 111 Contents 1. DAVIX - Visualize Your
Virtual machine W4M- Galaxy: Installation guide
Virtual machine W4M- Galaxy: Installation guide Christophe Duperier August, 6 th 2014 v03 This document describes the installation procedure and the functionalities provided by the W4M- Galaxy virtual
Wireshark Deep packet inspection with Wireshark
Wireshark Deep packet inspection with Wireshark Wireshark is a free and open-source packet analyzer. It is commonly used to troubleshoot network issues and analysis. Originally named Ethereal, in May 2006
CS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System J.D. DeVaughn-Brown University of Massachusetts Amherst Department of Computer Science [email protected] 1 Reminders After
Accessing RCS IBM Console in Windows Using Linux Virtual Machine
Accessing RCS IBM Console in Windows Using Linux Virtual Machine For Graphics Simulation Experiment, Real Time Applications, ECSE 4760 Quan Wang Department of ECSE, Rensselaer Polytechnic Institute March,
How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment?
Author Janice Hong Version 1.0.0 Date Mar. 2014 Page 1/56 How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment? Application Note The 32-bit operating system
Asia Web Services Ltd. (vpshosting.com.hk)
. (vpshosting.com.hk) Getting Started guide for VPS Published: July 2011 Copyright 2011 Table of Contents Page I. Introduction to VPS 3 II. Accessing Plesk control panel 4 III. Adding your domain in Plesk
CDH installation & Application Test Report
CDH installation & Application Test Report He Shouchun (SCUID: 00001008350, Email: [email protected]) Chapter 1. Prepare the virtual machine... 2 1.1 Download virtual machine software... 2 1.2 Plan the guest
User Manual of the Pre-built Ubuntu 9 Virutal Machine
SEED Document 1 User Manual of the Pre-built Ubuntu 9 Virutal Machine Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document is funded by the National Science Foundation
Overview. Remote access and file transfer. SSH clients by platform. Logging in remotely
Remote access and file transfer Overview Remote logins to Bio-Linux with ssh Running software from another machine Logging in from another machine Getting files on and off Bio-Linux Transferring files
Edge Configuration Series Reporting Overview
Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed
Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort
License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons
ORACLE BUSINESS INTELLIGENCE WORKSHOP. Prerequisites for Oracle BI Workshop
ORACLE BUSINESS INTELLIGENCE WORKSHOP Prerequisites for Oracle BI Workshop Introduction...2 Hardware Requirements...2 Minimum Hardware configuration:...2 Software Requirements...2 Virtual Machine: Runtime...2
Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration
ULI101 Week 06b Week Overview Installing Linux Linux on your Desktop Virtualization Basic Linux system administration Installing Linux Standalone installation Linux is the only OS on the computer Any existing
About This Document 3. About the Migration Process 4. Requirements and Prerequisites 5. Requirements... 5 Prerequisites... 5
Contents About This Document 3 About the Migration Process 4 Requirements and Prerequisites 5 Requirements... 5 Prerequisites... 5 Installing the Migration Tool and Enabling Migration 8 On Linux Servers...
PRM and DRBD tutorial. Yves Trudeau October 2012
PRM and DRBD tutorial Yves Trudeau October 2012 Agenda Introduction to Pacemaker PRM principle PRM Hands-on HA over shared storage What is DRBD? Impacts of DRBD on MySQL DRBD Hands-on About me Pacemaker
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED.
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *If you are using
Capture and analysis of 802.11 wireless traffic
Capture and analysis of 802.11 wireless traffic October 2012 Ver. 1.00 Copyright Connect One Ltd., 2008-2012 The information in this document is subject to change without notice and shall not be construed
Kaltura On-Prem Evaluation Package - Getting Started
Kaltura On-Prem Evaluation Package - Getting Started Thank you for your interest in the Kaltura On-Prem Online Video Platform (OVP). Before you get started with your Kaltura On-Prem evaluation, a Kaltura
GETTING STARTED WITH DRUPAL. by Stephen Cross
GETTING STARTED WITH DRUPAL by Stephen Cross STEPHEN CROSS @stephencross [email protected] ParallaxInfoTech.com www.talkingdrupal.com ASSUMPTIONS You may or may not have development experience You
BackTrack Hard Drive Installation
BackTrack Hard Drive Installation BackTrack Development Team jabra [at] remote-exploit [dot] org Installing Backtrack to a USB Stick or Hard Drive 1 Table of Contents BackTrack Hard Drive Installation...3
Katana: Portable Multi-Boot Security Suite. JP Dunning DefCon 2010. Shadow Cave LLC
Katana: Portable Multi-Boot Security Suite JP Dunning DefCon 2010 JP Dunning Graduate Student: Computer Science, Virginia Tech Research Focus: Wireless and Portable Security Website: www.hackfromacave.com
IBM Software Hadoop Fundamentals
Hadoop Fundamentals Unit 2: Hadoop Architecture Copyright IBM Corporation, 2014 US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
TORNADO Solution for Telecom Vertical
BIG DATA ANALYTICS & REPORTING TORNADO Solution for Telecom Vertical Overview Last decade has see a rapid growth in wireless and mobile devices such as smart- phones, tablets and netbook is becoming very
[Jet-Magento Integration]
CedCommerce. All rights reserved. [email protected] [Jet-Magento Integration] CedCommerce Jet-Magento Integration, an extension by CedCommerce, establishes synchronization of inventory, price, other
Enterprise Erase LAN
Enterprise Erase LAN Network Erasing and Asset Management Server Version 2.0 Users Guide 888.700.8560 toll free www.tabernus.com 11130 Jollyville Rd Suite 301 Austin, TX 78757 Table of Contents 1 Product
13.1 Backup virtual machines running on VMware ESXi / ESX Server
13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines
Software installation and configuration IEC-line series
Software installation and configuration IEC-line series update: 04-10-2014 IEC-line by OVERDIGIT overdigit.com Table of contents 1. Installing the software... 3 1.1. Installing CoDeSys... 4 1.2. Installing
The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications
The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications Joshua Ellul [email protected] Overview Brief introduction to Body Sensor Networks BSN Hardware
1 Download & Installation... 4. 1 Usernames and... Passwords
Contents I Table of Contents Part I Document Overview 2 Part II Document Details 3 Part III EventSentry Setup 4 1 Download & Installation... 4 Part IV Configuration 4 1 Usernames and... Passwords 5 2 Network...
Visualization of PRADS Output Data Using Open-source Visualization Tools For Improved Log Analysis. Dawit Hailu Desta [email protected].
UNIVERSITY OF OSLO Department of Informatics Visualization of PRADS Output Data Using Open-source Visualization Tools For Improved Log Analysis Dawit Hailu Desta [email protected] Network and System Administration
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
Advanced Server Virtualization: Vmware and Microsoft Platforms in the Virtual Data Center
Advanced Server Virtualization: Vmware and Microsoft Platforms in the Virtual Data Center Marshall, David ISBN-13: 9780849339318 Table of Contents BASIC CONCEPTS Introduction to Server Virtualization Overview
Enterprise Service Bus
We tested: Talend ESB 5.2.1 Enterprise Service Bus Dr. Götz Güttich Talend Enterprise Service Bus 5.2.1 is an open source, modular solution that allows enterprises to integrate existing or new applications
Secure Shell. The Protocol
Usually referred to as ssh The name is used for both the program and the protocol ssh is an extremely versatile network program data encryption and compression terminal access to remote host file transfer
OS Installation Guide Red Hat Linux 9.0
OS Installation Guide Red Hat Linux 9.0 C o n t e n t s Contents 3 About This Guide 5 1 Planning Your Installation 7 Requirements 7 2 Installing Red Hat 9.0 Error! Bookmark not defined. What s Next? 19
Network Security, ISA 656, Angelos Stavrou. Snort Lab
Snort Lab Purpose: In this lab, we will explore a common free Intrusion Detection System called Snort. Snort was written initially for Linux/Unix, but most functionality is now available in Windows. In
Newton Linux User Group Graphing SNMP with Cacti and RRDtool
Newton Linux User Group Graphing SNMP with Cacti and RRDtool Summary: Cacti is an interface that can be used to easily manage the graphing of SNMP data. These graphs allow you to visualize performance
EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13
Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV
Network visualization
Whether you are a security analyst, system administrator or technical manager, chances are you are confronted with an overwhelming sea of security related data. Typically, we analyze this data with textual
VMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
PROGRAMMABLE LINUX GATEWAY WITH JAVA AND OSGI
PROGRAMMABLE LINUX GATEWAY WITH JAVA AND OSGI 1 Develco Wallplug / Color coding MADE BY MAKERS / 2011 Side 7 PROGRAMMABLE LINUX GATEWAY WITH JAVA & OSGI Lots of compatible products The multiprotocol gateway
Nesstar Server Nesstar WebView Version 3.5
Unlocking data creating knowledge Version 3.5 Release Notes November 2006 Introduction These release notes contain general information about the latest version of the Nesstar products and the new features
Introduction. Interoperability & Tools Group. Existing Network Packet Capture Tools. Challenges for existing tools. Microsoft Message Analyzer
Introduction Interoperability & Tools Group Existing Network Packet Capture Tools Challenges for existing tools Microsoft Message Analyzer Slide 2 Interop and Tools What we do Part of Windows Server Org
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
Practice Fusion API Client Installation Guide for Windows
Practice Fusion API Client Installation Guide for Windows Quickly and easily connect your Results Information System with Practice Fusion s Electronic Health Record (EHR) System Table of Contents Introduction
Packet Sniffing and Spoofing Lab
SEED Labs Packet Sniffing and Spoofing Lab 1 Packet Sniffing and Spoofing Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following grants from
USB HSPA Modem. User Manual
USB HSPA Modem User Manual Congratulations on your purchase of this USB HSPA Modem. The readme file helps you surf the Internet, send and receive SMS, manage contacts and use many other functions with
Restoring a Suse Linux Enterprise Server 9 64 Bit on Dissimilar Hardware with CBMR for Linux 1.02
Cristie Bare Machine Recovery Restoring a Suse Linux Enterprise Server 9 64 Bit on Dissimilar Hardware with CBMR for Linux 1.02 This documentation shows how to restore or migrate a Linux system on dissimilar
Introduction to Linux and Cluster Basics for the CCR General Computing Cluster
Introduction to Linux and Cluster Basics for the CCR General Computing Cluster Cynthia Cornelius Center for Computational Research University at Buffalo, SUNY 701 Ellicott St Buffalo, NY 14203 Phone: 716-881-8959
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
LICENSE4J FLOATING LICENSE SERVER USER GUIDE
LICENSE4J FLOATING LICENSE SERVER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 2 Floating License Usage... 2 Installation... 4 Windows Installation... 4 Linux
Backup of ESXi Virtual Machines using Affa
Backup of ESXi Virtual Machines using Affa From SME Server Skill level: Advanced The instructions on this page may require deviations from procedure, a good understanding of linux and SME is recommended.
StruxureWare Data Center Expert 7.2.4 Release Notes
StruxureWare Data Center Expert 7.2.4 Release Notes Table of Contents Page # Part Numbers Affected...... 1 Minimum System Requirements... 1 New Features........ 1 Issues Fixed....3 Known Issues...3 Upgrade
Using VirtualBox ACHOTL1 Virtual Machines
Using VirtualBox ACHOTL1 Virtual Machines The steps in the Apache Cassandra Hands-On Training Level One courseware book were written using VMware as the virtualization technology. Therefore, it is recommended
Labnet Services Summary
Labnet Historical Background Labnet Services Summary by Michael Rayment Department of Computer Science The Labnet development team's mantra of success has always been, We can do it better. Even back in
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
Linux VPS with cpanel. Getting Started Guide
Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught
Web Hosting: Pipeline Program Technical Self Study Guide
Pipeline Program Technical Self Study Guide Thank you for your interest in InMotion Hosting and our Technical Support positions. Our technical support associates operate in a call center environment, assisting
WA1625 Web Services Development Using WebLogic Server v10. Classroom Setup Guide. Web Age Solutions Inc. Copyright 2012 Web Age Solutions Inc.
WA1625 Web Services Development Using WebLogic Server v10 Classroom Setup Guide Web Age Solutions Inc. Copyright 2012 Web Age Solutions Inc. 1 Table of Contents Classroom Requirements...3 Part 1 - Minimum
Application Note: FTP Server Setup on computers running Windows-7 For use with 2500P-ACP1
Application Note: FTP Server Setup on computers running Windows-7 For use with 2500P-ACP1 The CTI 2500P-ACP1 is capable of transferring data files to a remote FTP Server. This document provides information
JustClust User Manual
JustClust User Manual Contents 1. Installing JustClust 2. Running JustClust 3. Basic Usage of JustClust 3.1. Creating a Network 3.2. Clustering a Network 3.3. Applying a Layout 3.4. Saving and Loading
Altaro Hyper-V Backup V4 - User Manual
Altaro Hyper-V Backup V4 - User Manual 2009 2013 Altaro, Ltd. All Rights Reserved Table of contents Introducing Altaro Hyper-V Backup... 5 Add-Ons... 6 Sample Scenario... 7 Different Editions... 9 Getting
Using VMware Player. VMware Player. What Is VMware Player?
VMWARE APPLICATION NOTE VMware Player Using VMware Player This document contains the following sections: Work and Play in a Virtual World on page 1 Options and Features in VMware Player on page 4 Installing
Altaro Hyper-V Backup - Getting Started
Altaro Hyper-V Backup - Getting Started System Requirements Supported Host Operating Systems: Altaro Hyper-V Backup: o Windows 2008 R2 (all editions) o Windows 2008 R2 SP1 o Windows Hyper-V Server 2008
StruxureWare Data Center Expert 7.2.1 Release Notes
StruxureWare Data Center Expert 7.2.1 Release Notes Table of Contents Page # Part Numbers Affected...... 1 Minimum System Requirements... 1 New Features........ 1 Issues Fixed....2 Known Issues...2 Upgrade
CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security
Security+ Supported Labs - V1 Lab 1 Network Devices and Technologies - Capturing Network Using tcpdump to Capture Network with Wireshark with Network Miner 2 Secure Network Administration Principles -
JovianDSS Evaluation and Product Training. Presentation updated: October 2015
JovianDSS Evaluation and Product Training JovianDSS High Availability Cluster running in a virtual environment on VMware ESXi Step-by-Step Presentation updated: October 2015 www.open-e.com 1 The aim of
Learning and Playing: Integrating Competition Experiences Into Formal Curriculum. 2014 3CS Palos Hills, IL
Learning and Playing: Integrating Competition Experiences Into Formal Curriculum 2014 3CS Palos Hills, IL Discussion What is the NCL? Partnerships Features Enrichment & Assessment Preparation for Certifications
Information Security Training. Assignment 1 Networking
Information Security Training Assignment 1 Networking By Justin C. Klein Keane September 28, 2012 Assignment 1 For this assignment you will utilize several networking utilities
HOW TO BUILD A VMWARE APPLIANCE: A CASE STUDY
HOW TO BUILD A VMWARE APPLIANCE: A CASE STUDY INTRODUCTION Virtual machines are becoming more prevalent. A virtual machine is just a container that describes various resources such as memory, disk space,
How To Manage A Wireless Network With Avaya Wlan 9100 Series (Wlan) System (Wos)
Avaya WLAN Orchestration System Overview The Avaya WLAN Orchestration System (WOS) is a wireless network management platform that provides full monitoring and management of the Avaya WLAN 9100 Series network
WHITE PAPER. ClusterWorX 2.1 from Linux NetworX. Cluster Management Solution C ONTENTS INTRODUCTION
WHITE PAPER A PRIL 2002 C ONTENTS Introduction 1 Overview 2 Features 2 Architecture 3 Monitoring 4 ICE Box 4 Events 5 Plug-ins 6 Image Manager 7 Benchmarks 8 ClusterWorX Lite 8 Cluster Management Solution
Metasploit Pro Getting Started Guide
Metasploit Pro Getting Started Guide Metasploit Pro Getting Started Guide Release 3.6 March 7, 2011 Table of Contents Metasploit Pro... 1 Getting Started Guide... 1 Welcome... 4 About This Guide... 5 Target
Tutorial. Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired
Setup Tutorial Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired Necessary Downloads 1. Download VM at http://www.cs.princeton.edu/courses/archive/fall10/cos561/assignments/cos561tutorial.zip
ORACLE BUSINESS INTELLIGENCE WORKSHOP
ORACLE BUSINESS INTELLIGENCE WORKSHOP Integration of Oracle BI Publisher with Oracle Business Intelligence Enterprise Edition Purpose This tutorial mainly covers how Oracle BI Publisher is integrated with
CYCLOPE let s talk productivity
Cyclope 6 Installation Guide CYCLOPE let s talk productivity Cyclope Employee Surveillance Solution is provided by Cyclope Series 2003-2014 1 P age Table of Contents 1. Cyclope Employee Surveillance Solution
Safe network analysis
Safe network analysis Generating network traffic captures within a virtual network. Presented by Andrew Martin 1 Introduction What is a sniffer How does sniffing work Usages Scenarios Building safe repositories
CS5331 Web Security - Assignment 0
CS5331 Web Security - Assignment 0 Due : 25 Jan 2016 1 Background The objective of this assignment is to give you a hands-on experience of setting up a virtual machine. This is an INDIVIDUAL assignment
Host Configuration (Linux)
: Location Date Host Configuration (Linux) Trainer Name Laboratory Exercise: Host Configuration (Linux) Objectives In this laboratory exercise you will complete the following tasks: Check for IPv6 support
FUJITSU Software ServerView Cloud Monitoring Manager V1 Introduction
FUJITSU Software ServerView Cloud Monitoring Manager V1 Introduction November 2015 Fujitsu Limited Product Overview 1 Why a Monitoring & Logging OpenStack Service? OpenStack systems are large, complex
New Technology Introduction: Android Studio with PushBot
FIRST Tech Challenge New Technology Introduction: Android Studio with PushBot Carol Chiang, Stephen O Keefe 12 September 2015 Overview Android Studio What is it? Android Studio system requirements Android
W H I T E P A P E R. Best Practices for Building Virtual Appliances
W H I T E P A P E R Best Practices for Building Virtual Appliances Table of Contents Objectives.................................................................................. 3 Design Principles...........................................................................
Parallels Plesk Panel
Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2009, Parallels, Inc.
Alinto Mail Server Pro
Alinto Mail Server Pro Installation Guide Alinto Version 2.0.1 Index 1. Introduction....................................................................................... 1 2. Prerequisites......................................................................................
Getting Started Guide
Getting Started Guide Sophos Firewall Virtual Appliance Document Date: November 2015 November 2015 Page 1 of 20 Contents Preface...3 Minimum Hardware Requirement...3 Installation Procedure...3 Configuring
User Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Configuring Sun StorageTek SL500 tape library for Amanda Enterprise backup software
Configuring Sun StorageTek SL500 tape library for Amanda Enterprise backup software Zmanda Inc. October 2009 Table of Contents Introduction... 4... 5 Sun StorageTek SL 500TM... 5 SL 500 Configuration...
Bitrix Site Manager. VMBitrix Virtual Machine. Quick Start And Usage Guide
Bitrix Site Manager VMBitrix Virtual Machine. Quick Start And Usage Guide Contents Introduction... 3 Chapter 1. Starting The VMBitrix Virtual Machine... 4 Minimum Requirements For VMWare Player / VMBitrix...
