I Know Where You ve Been:! Geo-Inference Attacks via the Browser Cache!

Size: px
Start display at page:

Download "I Know Where You ve Been:! Geo-Inference Attacks via the Browser Cache!"

Transcription

1 I Know Where You ve Been:! Geo-Inference Attacks via the Browser Cache! Yaoqi Jia, Xinshu Dong, Zhenkai Liang, Prateek Saxena! School of Computing, National University of Singapore! Advanced Digital Sciences Center!

2 Geo-location in Browsers! Benefits Threats 1!

3 May I Access Your Geo-location?! 2!

4 Sources of Users Geo-locations! Browser 3!

5 Problem Statement!? Browser Can we infer the user s geolocation from his browser? 4!

6 Site-Related States in Browser! Browser! 5!

7 Browser Cache Saves Loading Time! 1 st : 1360ms 2 nd : 320ms 3 rd : 350ms Browser Cache! 6!

8 Browser Cache Abused: Timing Channels of Leakage! Felten and Shneider, CCS 00 Browser cache is shared across all sites Browser Cache! 7!

9 Our Contributions!! Geo-inference attacks via the browser cache!! Infer a user s country, city or even neighborhood!! Prevalence of geo-inference attacks!! Five mainstream browsers and TorBrowser!! Top 55 Alexa and 11 map websites!! Pros & cons of potential solutions! 8!

10 Outline!! Problem Statement!! Case Studies!! Evaluation!! Discussion! 9!

11 Case Studies!! Can we infer a user s country?!!! Can we infer a user s city?!!! Can we infer a user s neighborhood?! 10!

12 How to Infer a User s Country?! Google has 191 regional sites, and one site represents one country or region. Measure image load time of Google s logo from Google s 191 regional sites 11!

13 Measuring Image Load Time! Before Loading img.onload Fires var image = document.createelement(`img'); image.setattribute(`starttime', (new Date().getTime())); image.onload = function() { var endtime = new Date().getTime(); var loadtime = endtime - parseint(this.getattribute(`starttime')); }... 12!

14 How to Infer a User s City?! Measure page load time of Craigslist s 712 city sites, determine which page is cached 13!

15 Measuring Page Load Time! Before Loading iframe.onload Fires var page = document.createelement(`iframe'); page.setattribute(`starttime', (new Date()).getTime()); page.onload = function () { var endtime = (new Date()).getTime(); var loadtime = ( endtime - parseint(this.getattribute(`starttime'))); }... 14!

16 How to Infer a User s Neighborhood?! Measure the image load time of map tiles of the user s city from Google Maps, determine which tiles are cached 15!

17 Evaluation! Questions to be answered:!! (Prevalence) How many browsers and websites are susceptible to geo-inference attacks?!! (Reliability) How big is the time difference between resources load time without cache and that with cache?! 16!

18 Evaluation Setup!! Websites: 191 Google s regional sites, 100 Craigslist s city sites, and 4,646 map tiles of New York City from Google Maps.!! Browsers: Five mainstream browsers, i.e., Chrome, Firefox, Safari, Opera and IE, as well as TorBrowser (version ) on both desktop and available mobile platforms.!! Locations: US, UK, Australia, Singapore, and Japan, via VPN service Hotspot Shield.! 17!

19 Websites with Location-Related! Resources in Browser Cache! Total 11 map service sites! 62% of 55 top Alexa global sites! 18!

20 Browsers Susceptible to! Geo-Inference Attacks! Mainstream Browsers! Desktop Platforms! Mobile Platforms! 19!

21 Reliability (Time Difference)! 2000" 1800" 1600" 1400" 1200" 1000" 800" 600" 400" 200" 0" 1" 3" 5" 7" 9" 11" 13" 15" 17" 19" 21" 23" 25" 27" 29" 31" 33" 35" 37" 39" 41" 43" 45" 47" 49" 51" 53" 55" 57" 59" 61" 63" 65" 67" 69" 71" 73" 75" 77" 79" 81" 83" 85" 87" 89" 91" 93" 95" 97" 99" Without"Cache" With"Cache" The huge difference between the page load time (in millisecond) of 100 Craigslist sites without cache (> 1000 ms) and with cache ( 220 ms) indicates geo-inference attacks with Craigslist 20!

22 Discussion of Defense Solutions!! Private Browsing Mode and TorBrowser!! Randomizing timing measurements!! Segregating browser cache! 21!

23 Private Browsing Mode! Private Browsing Mode! Clear browser cache after closing window.!! Disable disk cache, enable memory cache.! is not the Cure!! It cannot prevent one site from inferring geo-location of another site!! Confirmed by experiments.! Browser Cache!! TorBrowser is VPN + Private Browsing Mode! 22!

24 Randomizing Timing Measurements!! Add noise into timing measurement mechanisms.!! Intricate engineering effort.! Browser Cache! 23!

25 Segregating Browser Cache!! Deploy Same-Origin Policy on browser cache. [Jackson et al. WWW 06]!! High performance overhead measured in our experiment! Browser Cache! 24!

26 To Cache or Not To Cache?!! No cache for location-sensitive resources.!! Cache-Control: no-cache HTTP response header!! Identifying location-sensitive resource!! Developer assistance!! Automated tool to detect location-sensitive resources! 25!

27 Conclusion!! Geo-inference attacks via the browser cache!! All five mainstream browsers and TorBrowser, as well as 11 map service sites and 62% of Alexa Top 100 websites, are susceptible to such attacks.!! Discussion of existing and potential defenses.!! Calling for actions! 26!

28 Yaoqi Jia! 27!

Microsoft Dynamics NAV 2015 Hardware and Server Requirements. Microsoft Dynamics NAV Windows Client Requirements

Microsoft Dynamics NAV 2015 Hardware and Server Requirements. Microsoft Dynamics NAV Windows Client Requirements Microsoft Dynamics NAV 2015 Hardware and Server Requirements Microsoft Dynamics NAV Windows Client Requirements Windows client. operating systems Hardware resources Reports Windows 8.1 Professional or

More information

Getting a Grip on CDN Performance Why & How. http://www.flickr.com/photos/59632563@n04/6261230701/

Getting a Grip on CDN Performance Why & How. http://www.flickr.com/photos/59632563@n04/6261230701/ Getting a Grip on CDN Performance Why & How http://www.flickr.com/photos/59632563@n04/6261230701/ How many sites use a CDN? CDN Performance in the Real World http://www.flickr.com/photos/59632563@n04/6261230701/

More information

Release Notes for Websense Web Endpoint (32- and 64-bit OS)

Release Notes for Websense Web Endpoint (32- and 64-bit OS) Release Notes for Websense Web Endpoint (32- and 64-bit OS) Updated: 8-Feb-2013 Applies To: Websense Cloud Web Security solutions Use the Release Notes to learn about: What s new in Websense Web Endpoint?

More information

1. Right click using your mouse on the desktop and select New Shortcut.

1. Right click using your mouse on the desktop and select New Shortcut. offers 3 login page styles: Standard Login, List Login or Quick Time Punch. Each login page can be saved as a shortcut to your desktop or as a bookmark for easy fast login access. For quicker access to

More information

isupplygw Site Login Troubleshooting

isupplygw Site Login Troubleshooting Site Login Troubleshooting Tips User name is administrator s email address Password requirements: o Passwords must be at least 8 characters long and can be as long as 30 characters. o Passwords must contain

More information

Tidspunkt 18-08-2015 11:58 01-07-2015 00:00-18-08-2015 23:59 (49 dag(e)) Operativsystem (OS) fordelt på browsere Total: 267852. Safari9 ios 7921 100%

Tidspunkt 18-08-2015 11:58 01-07-2015 00:00-18-08-2015 23:59 (49 dag(e)) Operativsystem (OS) fordelt på browsere Total: 267852. Safari9 ios 7921 100% Indstillinger Tidspunkt 18-08-2015 11:58 Periode 01-07-2015 00:00-18-08-2015 23:59 (49 dag(e)) Operativsystem (OS) fordelt på browsere Total: 267852 Safari9 ios 7921 100% MAC OS X 1 0% Safari8 ios 572

More information

Scriptless Timing Attacks on Web Browser Privacy

Scriptless Timing Attacks on Web Browser Privacy 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Scriptless Timing Attacks on Web Browser Privacy Bin Liang, Wei You, Liangkun Liu, Wenchang Shi Renmin University

More information

System Requirements for Microsoft Dynamics NAV 2015

System Requirements for Microsoft Dynamics NAV 2015 System Requirements for Microsoft Dynamics September 2014 Contents... 3 Microsoft Dynamics NAV Windows Client Requirements... 4 Microsoft Dynamics NAV Development Environment Requirements... 5 Microsoft

More information

How To Install the Virtual Learning App

How To Install the Virtual Learning App Table of Contents Installation Instructions... 2 MAC: Using Firefox... 2 MAC: Using Chrome... 6 Disabling PepperFlash... 9 MAC: Using Safari Unsafe Mode We Can t Control So Use Firefox or Chrome... 11

More information

Setting up a Virtual Private Network (VPN) connection (Windows 7)

Setting up a Virtual Private Network (VPN) connection (Windows 7) Setting up a Virtual Private Network (VPN) connection (Windows 7) The VPN client works on Windows XP, Vista and 7, as well as on MacOS X and Linux. More information can be found here. A Virtual Private

More information

Performance Analysis of Web-browsing Speed in Smart Mobile Devices

Performance Analysis of Web-browsing Speed in Smart Mobile Devices Performance Analysis of Web-browsing Speed in Smart Mobile Devices Yu-Doo Kim and Il-Young Moon Korea University of Technology and Education, kydman@koreatech.ac.kr Abstract The rapid growth of telecommunication

More information

Real Time Data Communication over Full Duplex Network Using Websocket

Real Time Data Communication over Full Duplex Network Using Websocket Real Time Data Communication over Full Duplex Network Using Websocket Shruti M. Rakhunde 1 1 (Dept. of Computer Application, Shri Ramdeobaba College of Engg. & Mgmt., Nagpur, India) ABSTRACT : Internet

More information

2X Cloud Portal v10.5

2X Cloud Portal v10.5 2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...

More information

Recruiting - Hiring Managers Guide for Users Updated on 14 May 2015

Recruiting - Hiring Managers Guide for Users Updated on 14 May 2015 Updated on 14 May 2015 Contents Getting Help... iii Supported Browsers... iii About Hiring Managers... 1 Browse Job Openings... 2 View Applicants... 4 Page ii Getting Help ehr Online Learning You will

More information

A Step-by-Step Patient Guide to Upload Medical Images to the Cleveland Clinic Neurological Institute

A Step-by-Step Patient Guide to Upload Medical Images to the Cleveland Clinic Neurological Institute A Step-by-Step Patient Guide to Upload Medical Images to the Cleveland Clinic Neurological Institute Cleveland Clinic 1995-2014. All Rights Reserved. v.08.05.14 Table of Contents Get Started Step 1: Locate

More information

Browser Performance Tests We put the latest web browsers head-to-head to try to find out which one is best!

Browser Performance Tests We put the latest web browsers head-to-head to try to find out which one is best! Browser Performance Tests We put the latest web browsers head-to-head to try to find out which one is best! Browsers Tested Google Chrome 31 Mozilla Firefox 25 Internet Explorer 11 Opera 17 Apple Safari

More information

Browser Performance Tests We put the latest web browsers head-to-head to try to find out which one is best!

Browser Performance Tests We put the latest web browsers head-to-head to try to find out which one is best! Browser Performance Tests We put the latest web browsers head-to-head to try to find out which one is best! Browsers Tested Google Chrome 23 Mozilla Firefox 16 Internet Explorer 10 Internet Explorer 9

More information

Setting up a Virtual Private Network (VPN) connection Windows 8

Setting up a Virtual Private Network (VPN) connection Windows 8 Setting up a Virtual Private Network (VPN) connection Windows 8 A Virtual Private Network (VPN) is best described as a tunnel to MAASnet, the university network. After having configured the VPN connection,

More information

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack. Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.

More information

Clearing Browser Cache/History

Clearing Browser Cache/History Clearing Browser Cache/History A number of concerns in RamCT can usually be resolved by clearing the Browser Cache on your local computer. The browsers that are supported with RamCT are Internet Explorer,

More information

PC Security & Housekeeping March 2015

PC Security & Housekeeping March 2015 PC Security & Housekeeping March 2015 Anti-malware programs Always keep your firewall, anti-virus, and anti-spyware products up to date! There are many good commercial products available, such as: o Norton

More information

NETWRIX IDENTITY MANAGEMENT SUITE

NETWRIX IDENTITY MANAGEMENT SUITE NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

System Requirements for Microsoft Dynamics NAV 2013 R2

System Requirements for Microsoft Dynamics NAV 2013 R2 System Requirements for Microsoft Dynamics NAV 2013 R2 February 2014 Contents 3 System Requirements for the Microsoft Dynamics NAV Windows Client 3 Web Client 4 System Requirements for Microsoft Dynamics

More information

Self Service - Personal Information Guide for Users Updated on 5 May 2015

Self Service - Personal Information Guide for Users Updated on 5 May 2015 Updated on 5 May 2015 Contents Getting Help... iii Supported Browsers... iii Self Service - Personal Information... Error! Bookmark not defined. Personal Information... 1 Update Your Emergency Contact...

More information

ADA Applicant Business Process Guide

ADA Applicant Business Process Guide Objectives ADA Applicant Business Process Guide The purpose of this document is to give you an understanding of how to apply and maintain an applicant account at the American Dental Association (ADA).

More information

System Requirements. Microsoft Dynamics NAV 2016

System Requirements. Microsoft Dynamics NAV 2016 System Requirements Microsoft Dynamics NAV 2016 Contents System Requirements for Microsoft Dynamics NAV 2016... 4 Microsoft Dynamics NAV Windows Client Requirements... 5 Microsoft Dynamics NAV Development

More information

System Requirements for Microsoft Dynamics NAV 2016

System Requirements for Microsoft Dynamics NAV 2016 System Requirements for Microsoft Dynamics NAV 2016 Microsoft Dynamics NAV 2016 The following sections list the minimum hardware and software requirements to install and run Microsoft Dynamics NAV 2016.

More information

LabStats 5 System Requirements

LabStats 5 System Requirements LabStats Tel: 877-299-6241 255 B St, Suite 201 Fax: 208-473-2989 Idaho Falls, ID 83402 LabStats 5 System Requirements Server Component Virtual Servers: There is a limit to the resources available to virtual

More information

Infor Xtreme Browser References

Infor Xtreme Browser References Infor Xtreme Browser References This document describes the list of supported browsers, browser recommendations and known issues. Contents Infor Xtreme Browser References... 1 Browsers Supported... 2 Browser

More information

Proposal submitted by

Proposal submitted by Proposal submitted by To Mac Sharma For developing web site and related IT Support Date of submission: 11 th May 2009 www.rtcamp.com page 2 About rtcamp We're artists, analysts, technologists, writers,

More information

Symantec Endpoint Protection 12.1.2

Symantec Endpoint Protection 12.1.2 Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high

More information

KUB Website Troubleshooting

KUB Website Troubleshooting KUB Website Troubleshooting Are you having problems getting to the KUB website at http://www.kub.org/? If you type in your user ID and password and press the login button, are you routed right back to

More information

BROWSER SUPPORT FOR SCIQUEST PRODUCTS. June 2015

BROWSER SUPPORT FOR SCIQUEST PRODUCTS. June 2015 BROWSER SUPPORT FOR SCIQUEST PRODUCTS June 2015 WELCOME! Our Policy This document provides a list of Supported Browsers for the following SciQuest Products: SciQuest is committed to providing industry-leading

More information

Recent Advances in Web Application Security

Recent Advances in Web Application Security Recent Advances in Web Application Security Author: Neelay S Shah Principal Security Consultant Foundstone Professional Services Table of Contents Introduction 3 Content Security Policy 3 Best Practices

More information

This document is provided to you by ABC E BUSINESS, Microsoft Dynamics Preferred partner. System Requirements NAV 2016

This document is provided to you by ABC E BUSINESS, Microsoft Dynamics Preferred partner. System Requirements NAV 2016 This document is provided to you by ABC E BUSINESS, Microsoft Dynamics Preferred partner. System Requirements NAV 2016 Page 1 System Requirements NAV 2016 Microsoft Dynamics NAV Windows Client Requirements

More information

Microsoft Dynamics NAV

Microsoft Dynamics NAV Microsoft Dynamics NAV Requirements for Microsoft Dynamics NAV 2013 System Requirements for Microsoft Dynamics NAV 2013... 1 System Requirements for the Microsoft Dynamics NAV Windows Client... 1 System

More information

Support Portal User Guide. Version 3.0

Support Portal User Guide. Version 3.0 Support Portal User Guide Version 3.0 What is the Coldharbour Support Portal? The Coldharbour Support Portal is a new tool which allows our customers to create or update support requests via the Coldharbour

More information

System Requirements for Microsoft Dynamics NAV 2016

System Requirements for Microsoft Dynamics NAV 2016 1 of 13 19.01.2016 17:52 System Requirements for Microsoft Dynamics NAV 2016 Microsoft Dynamics NAV 2016 The following sections list the minimum hardware and software requirements to install and run Microsoft

More information

OE Cloud Standard Terms of Service

OE Cloud Standard Terms of Service OE Cloud Standard Terms of Service Version 1.0 Last update: 29th May 2014 These terms of service ("Terms") cover your use and access to the services of OE Cloud, and websites ("Services") provided by Ecometrica

More information

System Requirements for Microsoft Dynamics NAV 2016

System Requirements for Microsoft Dynamics NAV 2016 Page 1 of 7 System Requirements for Microsoft Dynamics NAV 2016 Microsoft Dynamics NAV 2016 The following sections list the minimum hardware and software requirements to install and run Microsoft Dynamics

More information

WatchGuard Training. Introduction to WatchGuard Dimension

WatchGuard Training. Introduction to WatchGuard Dimension WatchGuard Training Introduction to WatchGuard Dimension Introduction to WatchGuard Dimension What is WatchGuard Dimension? Deploy WatchGuard Dimension Configure WatchGuard Dimension Use WatchGuard Dimension

More information

Web Application Security

Web Application Security Web Application Security The OWASP Foundation Securing the application Input validation Authorization Session mgmt Config mgmt Authenticatio n Error handling Web server App server DB server Secure storage

More information

A digital Creative Company

A digital Creative Company Table of Contents 3 Responsive Websites 9 Responsive Web & Mobile Apps 10 Branding 12 Online Marketing 2 We Build Responsive Websites A responsive website has a flexible layout that adapts to fit various

More information

Hosted Email Security Quick Start Guide

Hosted Email Security Quick Start Guide Hosted Email Security Quick Start Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Experian Secure Transport Service

Experian Secure Transport Service Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport

More information

HTML5. Eoin Keary CTO BCC Risk Advisory. www.bccriskadvisory.com www.edgescan.com

HTML5. Eoin Keary CTO BCC Risk Advisory. www.bccriskadvisory.com www.edgescan.com HTML5 Eoin Keary CTO BCC Risk Advisory www.bccriskadvisory.com www.edgescan.com Where are we going? WebSockets HTML5 AngularJS HTML5 Sinks WebSockets: Full duplex communications between client or server

More information

Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014

Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014 Usable Crypto: Introducing minilock Nadim Kobeissi HOPE X, NYC, 2014 2012 Browsers are an environment that is hostile to cryptography Malleability of the JavaScript runtime. The lack of low-level (system-level)

More information

Qualification Programme (QP) Online Registration System. User Guide

Qualification Programme (QP) Online Registration System. User Guide Qualification Programme (QP) Online Registration System User Guide Qualification Programme (QP) Online Registration To facilitate applicants in the QP application procedure and to further enhance the progressing

More information

Optimal Browser Settings for Internet Explorer Running on Microsoft Windows

Optimal Browser Settings for Internet Explorer Running on Microsoft Windows Optimal Browser Settings for Internet Explorer Running on Microsoft Windows If you have Internet Explorer 7 or 8: Each time you log in to our web site, it evaluates whether you are using the same computer

More information

How to Hack Millions of Routers. Craig Heffner, Seismic LLC

How to Hack Millions of Routers. Craig Heffner, Seismic LLC How to Hack Millions of Routers Craig Heffner, Seismic LLC SOHO Router Security? Common Attack Techniques Cross Site Request Forgery No trust relationship between browser and router Can t forge Basic Authentication

More information

MyNet FAQ s GETTING STARTED: Q: What is the MyNet website address? A: http://mynet.englandnetball.co.uk

MyNet FAQ s GETTING STARTED: Q: What is the MyNet website address? A: http://mynet.englandnetball.co.uk MyNet FAQ s GETTING STARTED: Q: What is the MyNet website address? A: http://mynet.englandnetball.co.uk Q: Can I use any computer? A: The MyNet system is viewed using an internet browser on any computer

More information

Hardwarekrav. 30 MB. Memory: 1 GB. Additional software Microsoft.NET Framework 4.0.

Hardwarekrav. 30 MB. Memory: 1 GB. Additional software Microsoft.NET Framework 4.0. Hardwarekrav Bemærk især afsnittet System Requirements for Microsoft Dynamics NAV Server samt System Requirements for Microsoft Dynamics NAV 2013 Database Components for SQL Server. System Requirements

More information

Network Security Platform 8.0

Network Security Platform 8.0 XC-Cluster Release Notes Network Security Platform 8.0 Revision A Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document

More information

Web Conferencing Version 8.3 Troubleshooting Guide

Web Conferencing Version 8.3 Troubleshooting Guide System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which

More information

PROS CS (Client-Server) Installation and Basic-configuration Guide

PROS CS (Client-Server) Installation and Basic-configuration Guide PROS CS (Client-Server) Installation and Basic-configuration Guide Contents PROS CS (Client-Server)... 1 Installation and Basic-configuration Guide... 1 1. Overview... 2 2. Intro... 3 3. UPGRADING from

More information

U.S. Mobile Benchmark Report

U.S. Mobile Benchmark Report U.S. Mobile Benchmark Report ADOBE DIGITAL INDEX 2014 80% 40% Methodology Report based on aggregate and anonymous data across retail, media, entertainment, financial service, and travel websites. Behavioral

More information

Cyclope Internet Filtering Proxy. - Installation Guide -

Cyclope Internet Filtering Proxy. - Installation Guide - Cyclope Internet Filtering Proxy - Installation Guide - 1. Overview 3 2. Installation 4 2.1 System requirements 4 2.2 Cyclope Internet Filtering Proxy Installation 4 2.3 Client Browser Configuration 6

More information

1 Main components... 3

1 Main components... 3 Quick Start Guide Table of contents 1 Main components... 3 2 Supported operating systems and environments... 4 2.1 Acronis vmprotect 8 Windows Agent... 4 2.2 Acronis vmprotect 8 Virtual Appliance... 4

More information

SuperGIS Server 3 High Availability Test Report

SuperGIS Server 3 High Availability Test Report SuperGIS Server 3 High Availability Test Report Published by: SuperGeo Technologies Inc. RD Team 2011-01-11 All Rights Reserved. Printed in Taiwan, R.O.C. The information contained in this document is

More information

New Online Banking Guide for FIRST time Login

New Online Banking Guide for FIRST time Login New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms

More information

Downloading and Installing Interactive Reporting (Hyperion) Web Client

Downloading and Installing Interactive Reporting (Hyperion) Web Client Use the links below to skip to a specific section in the document: Downloading and Installing Interactive Reporting (Hyperion) Web Client... 1 Introduction... 1 Setup... 1 Identifying the version of Internet

More information

TxEIS Browser Settings

TxEIS Browser Settings TxEIS Browser Settings Updated May 2016 The TxEIS Browser Settings document lists supported browsers and recommended browser settings which will allow you to utilize the TxEIS system at its fullest potential

More information

Update logo and logo link on A Master. Update Date and Product on B Master

Update logo and logo link on A Master. Update Date and Product on B Master Cover Be sure to: Update META data Update logo and logo link on A Master Update Date and Product on B Master Web Performance Metrics 101 Contents Preface...3 Response Time...4 DNS Resolution Time... 4

More information

Troubleshooting steps for Oracle Financials and Markview. Jan 2015

Troubleshooting steps for Oracle Financials and Markview. Jan 2015 Troubleshooting steps for Oracle Financials and Markview Jan 2015 RU-VPN... 3 RECOMMENDED BROWSERS AND BROWSER SETTINGS... 4 Mozilla Firefox... 4 Internet Explorer... 5 CHROME... 7 Verify JAVA Version...

More information

ADOBE FLASH PLAYER Local Settings Manager

ADOBE FLASH PLAYER Local Settings Manager ADOBE FLASH PLAYER Local Settings Manager Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Storage...............................................................................................................

More information

Cost Analysis of Cloud and Traditional Legal Practice Management Software

Cost Analysis of Cloud and Traditional Legal Practice Management Software Cost Analysis of Cloud and Traditional Legal Practice Management Software Legal technology consumers have a lot of choices these days. But that wasn t always the case. Now, law firms can choose from an

More information

RingCentral for Desk. Admin Guide

RingCentral for Desk. Admin Guide RingCentral for Desk Admin Guide RingCentral for Desk Admin Guide Contents Contents Introduction... 3 About RingCentral for Desk........................................................... 4 About this

More information

Symantec Endpoint Protection 12.1.4

Symantec Endpoint Protection 12.1.4 Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

Sage 200 Online. System Requirements and Prerequisites

Sage 200 Online. System Requirements and Prerequisites Sage 200 Online System Requirements and Prerequisites v2013 Copyright statement Sage (UK) Limited, 2013. All rights reserved. If this documentation includes advice or information relating to any matter

More information

AppSec USA 2014 Denver, Colorado Security Header Injection Module (SHIM)

AppSec USA 2014 Denver, Colorado Security Header Injection Module (SHIM) AppSec USA 2014 Denver, Colorado Security Header Injection Module (SHIM) Inspired By: The OWASP Secure Headers Project Introduction Eric Johnson (@emjohn20) Cypress Data Defense Security Consultant SANS

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Installation and usage of SSL certificates: Your guide to getting it right

Installation and usage of SSL certificates: Your guide to getting it right Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.

More information

Junos Pulse VPN Client Installation

Junos Pulse VPN Client Installation Junos Pulse VPN Client Installation Windows 7 Installation p 2-6 Windows 8.1 Installation p 7-11 Macintosh version 10.6 and greater p 12-17 *This vpn appliance is to replace the Legacy SP vpn client Cisco

More information

System Requirements for Microsoft Dynamics NAV 2016

System Requirements for Microsoft Dynamics NAV 2016 System Requirements for Microsoft Dynamics NAV 2016 Contents System Requirements for Microsoft Dynamics NAV 2016...3 Microsoft Dynamics NAV 2016 Windows Client Requirements...4 Microsoft Dynamics NAV Development

More information

Adobe Flash Player and Adobe AIR security

Adobe Flash Player and Adobe AIR security Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,

More information

Minimum Requirements for Web Based Applications

Minimum Requirements for Web Based Applications Recommended Browsers Skyward recognizes the diverse Operating Systems, Devices, and Internet browsers our customers are using. While we want every customer to have the best possible experience, we recognize

More information

MAXA-COOKIE-MANAGER - USER MANUAL - SW-Release V 5.0 / Document Rev. 1.1

MAXA-COOKIE-MANAGER - USER MANUAL - SW-Release V 5.0 / Document Rev. 1.1 MAXA-COOKIE-MANAGER - USER MANUAL - SW-Release V 5.0 / Document Rev. 1.1 Quick Start Once installed MAXA Cookie Manager goes to work immediately to gather information about the cookies on your system and

More information

Setting up Client Browsers Oracle FLEXCUBE Universal Banking Release 11.3.0 [May] [2011]

Setting up Client Browsers Oracle FLEXCUBE Universal Banking Release 11.3.0 [May] [2011] Setting up Client Browsers Oracle FLEXCUBE Universal Banking Release 11.3.0 [May] [2011] Table of Contents 1. SETTING UP CLIENT BROWSERS... 1-1 1.1 INTRODUCTION... 1-1 1.2 LIST OF CLIENT BROWSERS... 1-1

More information

User Installation Guide

User Installation Guide The will provide a step-by-step walkthough of how to download and install the application, activate each feature of the product, install any of the feature's prerequisites, extend the license, and deactivate

More information

Mac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network.

Mac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network. Mac OS X The University Technology Services is privileged to offer a secure wifi network to the university community. Connecting to this network will provide you with benefits in security and improved

More information

Table of Contents. Troubleshooting Guide for Home Users

Table of Contents. Troubleshooting Guide for Home Users Table of Contents Introduction... 1 Chapter 1: System Requirements... 2 Recommended and Minimum Supported Requirements*... 2 Additional Information... 3 Internet Connectivity... 3 Tablet Compatibility...

More information

Hardware & Software Specification i2itracks/popiq

Hardware & Software Specification i2itracks/popiq Hardware & Software Specification i2itracks/popiq 3663 N. Laughlin Rd., Suite 200 Santa Rosa, CA 95403 866-820- 2212 www.i2isys.com 1 I2iSystems Hardware and Software Specifications Revised 04/09/2015

More information

Remote Access. Remote Access Start-up Guide. Non Cheshire East Council PC s/laptops. Page 0

Remote Access. Remote Access Start-up Guide. Non Cheshire East Council PC s/laptops. Page 0 Remote Access Remote Access Start-up Guide Non Cheshire East Council PC s/laptops Page 0 Page 1 1. Getting Started NGD provides easy access to all your Cheshire East documents and applications whilst not

More information

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview

More information

Checking Browser Settings, and Basic System Requirements for QuestionPoint

Checking Browser Settings, and Basic System Requirements for QuestionPoint Checking Browser Settings, and Basic System Requirements for QuestionPoint This document covers basic IE settings and system requirements necessary for QuestionPoint. These settings and requirements apply

More information

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Sophistication of attacks will keep improving, especially APT and zero-day exploits FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint

More information

ACORD. Lync 2013 Web-app Install Guide

ACORD. Lync 2013 Web-app Install Guide ACORD Lync 2013 Web-app Install Guide 1 Index Internet Explorer Pages 3-5 Google Chrome..Pages 6-8 Mozilla Firefox.Pages 9-12 Safari..Pages 13-16 2 If using Internet Explorer as your default browser upon

More information

1. Do I need to upgrade my Broadband at Home modem firmware?

1. Do I need to upgrade my Broadband at Home modem firmware? 1. Do I need to upgrade my Broadband at Home modem firmware? Please follow the steps below to ensure you have the most up to date firmware for your Broadband at Home modem. 1. Make sure that you have connected

More information

Five Tips to Reduce Risk From Modern Web Threats

Five Tips to Reduce Risk From Modern Web Threats Five Tips to Reduce Risk From Modern Web Threats By Chris McCormack, Senior Product Marketing Manager and Chester Wisniewski, Senior Security Advisor Modern web threats can infect your network, subvert

More information

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer

More information

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan Law Office Technology Specialist Program

More information

Download Instructions Thieme E-Book Library

Download Instructions Thieme E-Book Library http://ebooks.thieme.com Download Instructions Thieme E-Book Library How to download Thieme E-Books to your PC or ipad to read offline PC Download Instructions In order to download E-Books from the Thieme

More information

RME6 System Requirements

RME6 System Requirements RME6 System Requirements Prepared by March 2016 Copyright 2016, ResearchMaster Pty Ltd (RMPL). This publication is protected by copyright, remains the property of RMPL and is provided under specific product

More information

Akamai CDN, IPv6 and DNS security. Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013

Akamai CDN, IPv6 and DNS security. Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013 Akamai CDN, IPv6 and DNS security Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013 Agenda Akamai Introduction Who s Akamai? Intelligent Platform & Traffic Snapshot Basic Technology Akamai

More information

Windows (7, 8, or Vista) or Mac OS X (10.9 or later) 1 GB RAM (2 GB recommended) 20 MB free disk space

Windows (7, 8, or Vista) or Mac OS X (10.9 or later) 1 GB RAM (2 GB recommended) 20 MB free disk space SortSite Reviewers Guide One click site testing, compliance, and search engine optimization Product name: Platforms: Product publisher: Product category: SortSite Windows desktop application Browser-based

More information

The Microsoft JPEG Vulnerability and the Six New Content Security Requirements

The Microsoft JPEG Vulnerability and the Six New Content Security Requirements The Microsoft JPEG Vulnerability and the Six New Content Security Requirements Table of Contents OVERVIEW...3 1. THE VULNERABILITY DESCRIPTION...3 2. NEEDED: A NEW PARADIGM IN CONTENT SECURITY...4 3. PRACTICAL

More information

No refunds can be issued after the start date published in your Financial Award document

No refunds can be issued after the start date published in your Financial Award document Testing Services and Programs 1200 N. DuPont Highway Dover, DE 19901 http://www.desu.edu/academics/university-testing-services-and-programs Contact: Amystique Harris-Church 302.857.6143 achurch@desu.edu

More information