Windows XP Login Vulnerabilities

Size: px
Start display at page:

Download "Windows XP Login Vulnerabilities"

Transcription

1 Windows XP Login Vulnerabilities A Case Study Using Ophcrack Yoan Hermida 12/1/2008

2 Hermida 2 Abstract This paper aims to demonstrate that the login process for Windows XP is inherently unsecure. It will demonstrate through a case study how a password cracking utility known as Ophcrack can easily crack simple alphanumeric passwords. The weakest point of the login process is that Windows XP utilizes the LM or LAN Manager hash to store user passwords. Through the use of rainbow tables, cracking utilities such as Ophcrack can easily cycle through partially pre-computed hash values until a match is established.

3 Hermida 3 Outline This paper will begin with an introduction stating the nature of the problem, and why I believe it is interesting. It will then move on to explain out-of-the-box vulnerabilities present in the BIOS of almost all PCs, which allow cracking programs and other malicious code to be executed. This will be followed by an explanation of the Windows XP boot process, paying particular attention to the use of the LM hash in storing user passwords. We will then move on to the method of attack I chose to study, paying particular attention to rainbow tables and how they are utilized to defeat Windows XP passwords of 14 characters or less. Results from my experiment with Ophcrack as well as screenshots will be presented. Lastly, I will go into how to secure a Windows XP system from this particular method of attack. Introduction The problem I am describing involves the use of Live CDs/DVDs that contain pre-stored data known as rainbow tables, which can be used to defeat most simple alphanumeric passwords created by users in a Windows XP system. The nature of the vulnerability lies in Microsoft s decision to retain a legacy method of storing user passwords that is now deprecated in the industry: the LM or LAN Manager hash. The reason the LM hash has been retained as a password storage method is because backward compatibility must be maintained with systems that are still running DOS or other Microsoft legacy operating systems. I believe this is an interesting problem because most computers in the world run Microsoft Windows and of those most run Windows XP. This is true despite the fact that the

4 Hermida 4 latest Microsoft operating system, Windows Vista, is widely perceived in the industry as a total disaster. Moreover, many IT departments are bypassing Vista altogether and retaining their Windows XP systems until the next version of Windows, Windows 7, is released. This means that a majority of the World s computers have two disastrous login vulnerabilities: 1. Live CDs can be run before the bootstrap; 2. Simple alphanumeric passwords are stored using LM hashes and can be cracked using programs that run off of live CDs. Even if the optical drive is disabled by default in the BIOS, a potential attacker who has physical access to the system can simply enter an unprotected BIOS enable the optical drive as a bootable device. The attacker can then insert a live CD containing a cracking program such as Ophcrack and obtain all user passwords (including the Administrator) in a matter of minutes. The attacker then simply makes a note of the password, kills the program, removes the optical media, reboots the machine and allows the operating system to load. Once the login screen is visible, he or she can then log into the account of any user of that system. Some essential steps that need to be taken by users of the Windows XP operating system are to password-protect their BIOS and choose strong passwords that are either longer than 8 characters and/or contain non-alphanumeric characters. These two steps are the secret to defeating an Ophcrack attack, and yet a lot of people have no knowledge of either these vulnerabilities or the ease with which they can be exploited. BIOS Vulnerabilities Before delving into the details of the login vulnerabilities in Windows XP, we shall explore a security gap in the BIOS of most PCs which allows the method of attack discussed in

5 Hermida 5 this paper to be executed. That is, the lack of BIOS passwords on most PC systems. The simplicity of the solution is as stunning as the major hole that not having a password set on the BIOS constitutes. One merely needs to enter the BIOS by pressing F2 another simple keyboard key, enter the correct property setting, and set an administrator password for your BIOS. The fix seems simple enough and yet millions of systems lie unsecure and waiting for an attacker to insert a live CD and exploit the LM hash vulnerability. While the simple measure described above goes a long way to preventing the type of attack described in this paper, it is useless without modifying another BIOS setting: the boot order and whether anything but the hard drive should even be scanned for bootable media. Again, plugging the hole simply involves going into the BIOS and specifying that only the C drive (or whatever hard drive contains the operating system) should be active during boot. Coupled with the BIOS password, this denies a would-be attacker the opportunity to insert a program such as Ophcrack. While the BIOS concept is called something else in the Mac world, Apple machines are no less vulnerable to a very simple firmware (the term used Mac land) attack. Armed with a Mac OS X install disc, the attacker needs to hold down the Command and C keys and, upon entering the installation environment, would then be able to change Root s password to whatever he desires. This is because by default, Mac client systems do not password protect firmware. Password-protecting the firmware would prevent this type of attack. Apple servers do have firmware password protection enabled by default, but the password is typically several characters of the serial number.

6 Hermida 6 Overview of the Windows XP Boot Process As with most modern computer systems, once the power button is pressed the computer undergoes a POST, or Power On Self-Test, which is run from by the BIOS or Basic Input Output System. Once the BIOS determines that memory and other subsystems are in working order it will then attempt to read the Master Boot Record, which is the first sector of the first hard drive. Once this has taken place, the operating system begins to take control of the system and begins to be loaded into memory. The MBR analyzes the boot sector and passes on the job of loading the operating system to NTLDR, which is Windows XP s boot loader. The boot loader allows for memory addressing, initiates the file system, reads boot.ini and loads the boot menu. Once XP is selected from the boot menu if it is not the default (in multi-os systems) NTDETECT.COM, BOOT.INI, and BOOTSECT.DOS take over and finish loading the operating system. Initially the system starts in 16-bit real mode and then changes to 32-bit protected mode. NTLDR then loads NTOSKRNL.EXE and HAL.DLL which effectively make up Windows XP. NTLDR reads the registry and loads the proper drivers. NTOSKRNL.EXE takes over and starts WINLOGON.EXE which then starts LSASS.EXE. [1] WINLOGON.EXE is actually independent of authentication and handles mostly interface functions. Such functions include Windows station and access protection, ensuring that the local system will have access to these objects. The process also handles SAS recognition, which is an event such as Ctrl + Alt + Del that tells the operating system that user is ready to login or wants to lock the workstation. User profiles are loaded by WINLOGON.EXE. The process also assigns security to the user shell and monitors keyboard and mouse events in order to determine when to activate the screen saver. Lastly, Winlogon provides multiple network support. [2]

7 Hermida 7 LSASS.EXE or Local Security Authority Subsystem Service is a process that is responsible for executing the security policy on the system. The process verifies users that are logging on, handles changes in passwords, writes to the security log, and creates access tokens. Access tokens contain the relevant security information for a login session, identifies the user, group, and privileges. The infamous Sasser worm exploited a buffer overflow in the LSASS process that would show a timer on the screen and prompt the user to log off and shut down. [3] Overview of How Windows XP Saves User Authentication Information When a user creates a password in Windows XP that is less than 15 characters long, rather than storing the password in clear text, the system stores the password in the Security Accounts Manager in two forms of hashes. A hash is produced when a hash function is applied to clear text. One form of the hashes produced by Windows XP is the LM or LAN Manager hash which is a legacy hash that has its origins in the Windows LAN Manager operating system. Windows Me was the last commercial version of Windows that exclusively saved user passwords using the LM hash function. With the introduction of Windows XP, the LM hash was kept for the purpose of backward compatibility with legacy systems and is enabled by default, with the possibility of manually disabling the creation of LM hash passwords. LM hashes are created when the user s password as an OEM string is converted to uppercase. The password is then changed to 14 bytes by truncating it or padding it with null values. The password is then split into two 7-byte halves. These two values are used to create two DES keys by converting the seven bytes into a bit stream and inputting a 0 after every seven

8 Hermida 8 bits. The purpose of this is to generate the 64 bits necessary for a DES key. The two keys are then used to DES-encrypt the constant string KGS!@#$% which creates two 8 byte cipher texts. These two values are then concatenated into a 16-byte value, the LM hash. ( The other hash that Windows XP utilizes is the NTLM hash. The NT LAN Manager hash is part of NTLM, which is an authentication protocol used in conjunction with the SMB protocol. There are two versions of NTLM, NTLMv1 and NTLMv2. Version 1 attempted to be a replacement for the less secure LM protocol discussed before. The NT hash utilizes the MD4 algorithm in order to compute a hash value of the user s password. While the NT hash is harder to crack than the LM hash, it is also vulnerable to brute force attack. [4] Both the LM and NTLM hashes are stored in the SAM or Security Accounts Manager database. Beginning with Windows NT, the SAM has been stored as a file in the Registry. The database can be partially encrypted using a 128 bit key when the SYSKEY function is enabled. Furthermore, the SAM cannot be accessed while Windows XP is running since the kernel keeps an exclusive lock on the file, which is not released until the operating system shuts down or the Blue Screen of Death occurs. There various techniques, however, to dump the contents of the SAM and perform a brute force attack. One such technique is by running Ophcrack from a live CD before the operating system loads and using rainbow tables on the LM hashes. This case study will utilize this technique to crack a Windows XP password. [5]

9 Hermida 9 Rainbow Tables and Ophcrack A rainbow table is a collection of pre-computed values used in recovering the plaintext from a password hash created by a hash function. Rainbow tables offer what is known as a timememory tradeoff when performing brute force attacks. Time-memory tradeoff is when memory requirements decrease at the expense of longer program execution, or when memory requirements increase but program execution happens rapidly. Because rainbow tables are a set of pre-computed values, it can be said that entire tables require more storage space (an entire DVD, for example) but program execution will happen rapidly because the values have been computed already. Rainbow tables are created by taking plaintext and putting it through a hash function such as the LM hash function explained before. The hash function is then put through a reduction function. The reduction function comes up with a string of random plaintext which is then hashed. The hashed is reduced, obtaining another random string of plaintext, which is then hashed. This general pattern produces rainbow chains and continues for as many strings as is feasible to store. The chains that this process creates are stored in tables, creating rainbow tables. In order to obtain a plaintext value from a hash value, the attacker needs to cycle through the rainbow tables. This is where Ophcrack and programs like it come in. Ophcrack is open source and can be downloaded as a Live CD ISO for free. The Live CD version loads a minimal Linux kernel with a graphical user interface that then allows the attacker to retrieve, decrypt, and crack Windows passwords in a fairly automatic manner. Rainbow tables for LM hashes of

10 Hermida 10 alphanumeric passwords up to 14 characters are provided free of charge by the developers of the program. First, the program obtains a hash value by importing them directly from various sources such as the SAM files discussed previously. That hash value is reduced and checked against the last value that appears in the rainbow table. If the reduction fails to find a match, the program then moves on to the second, third, etc. tables until a match is found. If a match is found, the password that generated that hash is obtained and a chain generated using that password. The hash values generated as the chain iterates are compared against the original hash value. If a match is found, we know the password does indeed correspond to that hash value and the attack has been successful. [6] Experiment In order to demonstrate the practical applications of Ophcrack I conducted a small experiment on my own Windows XP system. I created a new user account with username of computer and password security.

11 Hermida 11 I then went over to the Ophcrack website at and downloaded the Opcrack Live CD for Windows XP, and burnt the ISO onto a CD. I restarted my system and booted off the LiveCD. The program indicated it had found an active Windows partition. It then proceeded to crack the password for user computer with password security.

12 Hermida 12 [7] Results The entire operation, from the time I booted off the Ophcrack Live CD until the password was found took a total of 2 minutes 24 seconds. The first minute and 54 seconds consisted of Ophcrack booting up and loading the rainbow tables. Once all tables were loaded, the password security was cracked in 30.6 seconds with the first 7 characters being revealed in half that time. In other words, an attacker would only need access to a Windows XP system for about 2.5 minutes in order to crack a password with similar characteristics to the one used for this test. This illustrates the absolute necessity to harden systems running Windows XP. Guarding Against an Ophcrack Attack No system is ever 100% secure and no password is ever crack-proof. There are, however, bad and good practices. Users should be aware that the simple act of disabling

13 Hermida 13 bootable optical drives and setting an administrator password in the BIOS virtually eliminates the possibility for an Ophcrack-type attack or any attack that is run from a Live CD. A second effective measure to guard against an attack using LM hash rainbow tables is to disable the use of the LM hash by default. While the LM hash is enabled by default in Windows XP, a user can disable it by editing the Registry. A simple Google search will produce dozens of tutorials on how to accomplish this. Unfortunately, while doing research for this project I discovered that there are now several utilities (including Ophcrack) that include rainbow tables for the more secure NTLM hash. Had this not been the case another suggestion might have been to select passwords longer than 14 characters. These types of passwords are automatically stored using the NTLM hash. Nonetheless, users should try to include in their passwords as many non-alphanumeric passwords as possible. As of this writing, rainbow tables with stored values for passwords containing nonalphanumeric are either not freely available (Ophcrack) or too complex for your average Joe H4x0r to configure. Conclusion This paper explored the theoretical foundations of an attack using the Ophcrack utility and conducted an experiment which demonstrated that a simple alphanumeric password could be cracked in 30 seconds using said utility. I discussed why lack of security at the BIOS level is the catalyst for this type of attack. I went on to talk about the Windows XP boot process and the subsystems that handle user authentication. Afterward, I described how Windows XP saves authentication information in the Security Accounts Manager or SAM database. This was

14 Hermida 14 followed by an explanation of rainbow tables and how Ophcrack utilizes these to perform a brute force attack on the LM hash obtained from the SAM. A demonstration of the utility and the results of this experiment on my Windows XP system were also detailed. Lastly, I offered some tips on how to guard against on Ophcrack-type attack.

15 Hermida 15 Works Cited [1] Simpson, Michael. "Windows XP Boot Sequence." Suite Oct Nov 2008 < [2] "Winlogon". Wikipedia. 15 Oct 2008 < [3] "Local Security Authority Subsystem Service". Wikipedia. 15 Oct 2008 < [4] "NTLM". Wikipedia. 15 Oct 2008 < [5] "Security Accounts Manager". Wikipedia. 15 Oct 2008 < [6] "Rainbow table". Wikipedia. 15 Oct 2008 < [7] "Ophcrack Password Recovery". About.com. 15 Oct 2008 <

Windows passwords security

Windows passwords security IT Advisory Windows passwords security ADVISORY WHOAMI 2 Agenda The typical windows environment Local passwords Secure storage mechanims: Syskey & SAM File Password hashing & Cracking: LM & NTLM Into the

More information

The PC Boot Process - Windows XP.

The PC Boot Process - Windows XP. The PC Boot Process - Windows XP. Power supply switched on. The power supply performs a selftest. When all voltages and current levels are acceptable, the supply indicates that the power is stable and

More information

Chapter 5: Fundamental Operating Systems

Chapter 5: Fundamental Operating Systems Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

Windows servers. NT networks

Windows servers. NT networks Windows servers The NT security model NT networks Networked NT machines can be: Primary Domain controller Centralizes user database/authentication Backup Domain controller Domain member Non-domain member

More information

Getting Started with VMware Fusion

Getting Started with VMware Fusion Getting Started with VMware Fusion VMware Fusion for Mac OS X 2008 2012 EN-000933-00 2 Getting Started with VMware Fusion You can find the most up-to-date technical documentation on the VMware Web site

More information

9 Headless Systems & Remote Management

9 Headless Systems & Remote Management 9 Headless Systems & Remote Management Headless support is a key feature of XPe. Since the nature of the XP operating system is to have a graphical interface, designing an XPe headless device involves

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

System Area Manager. Remote Management

System Area Manager. Remote Management System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for

More information

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Five Steps to Improve Internal Network Security. Chattanooga ISSA Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy stephen@averagesecurityguy.info github.com/averagesecurityguy ChattSec.org 2 Why? The methodical

More information

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting

More information

Getting Started with VMware Fusion. VMware Fusion for Mac OS X

Getting Started with VMware Fusion. VMware Fusion for Mac OS X Getting Started with VMware Fusion VMware Fusion for Mac OS X 2 Getting Started with VMware Fusion Getting Started with VMware Fusion Item: EN-000189-00 You can find the most up-to-date technical documentation

More information

DESKTOP. Internal Drive Installation Guide

DESKTOP. Internal Drive Installation Guide DESKTOP Internal Drive Installation Guide Seagate Desktop Installation Guide 2013 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or

More information

Getting Started with Paragon Recovery CD. Quick Guide

Getting Started with Paragon Recovery CD. Quick Guide Getting Started with Paragon Recovery CD Quick Guide Paragon Recovery CD 2 Quick Guide CONTENTS 1 Introduction... 3 2 Distribution...3 2.1 Distributive CD...3 2.2 Online Distribution...3 3 Booting from

More information

More Than You Ever Wanted to Know about NT Login Authentication

More Than You Ever Wanted to Know about NT Login Authentication A Perspective On Practical Security 2000 More Than You Ever Wanted to Know about NT Login Authentication SystemExperts Corporation Philip C. Cox & Paul B. Hill Abstract The login process is the user's

More information

WARNING!!: Before installing Truecrypt encryption software on your

WARNING!!: Before installing Truecrypt encryption software on your Truecrypt installation and usage guide for Windows XP, 7, Vista and 8 WARNING!!: Before installing Truecrypt encryption software on your computer, you should create an Acronis image back up of your computer

More information

How to Encrypt your Windows 7 SDS Machine with Bitlocker

How to Encrypt your Windows 7 SDS Machine with Bitlocker How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly

More information

Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes

Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes Compass Security AG, Daniel Stirnimann Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel +41 55-214 41 60 Fax +41

More information

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Virtual CD v10. Network Management Server Manual. H+H Software GmbH Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual

More information

About Microsoft Windows Server 2003

About Microsoft Windows Server 2003 About Microsoft Windows Server 003 Windows Server 003 (WinK3) requires extensive provisioning to meet both industry best practices and regulatory compliance. By default the Windows Server operating system

More information

University of Rochester Sophos SafeGuard Encryption for Windows Support Guide

University of Rochester Sophos SafeGuard Encryption for Windows Support Guide Sophos SafeGuard Encryption for Windows Support Guide University Information Technology Security & Policy September 15, 2015 Version Date Modification 1.0 September 15, 2015 Initial guide 1.1 1.2 1.3 1.4

More information

ISL AlwaysOn 1.0 Manual

ISL AlwaysOn 1.0 Manual Contents 2 Table of Contents Foreword 0 Part I Introduction 3 Part II Security Statement 4 Part III System requirements 6 Part IV Setting up ISL AlwaysOn on a computer 7... 1 Register ISL Online account

More information

VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED.

VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED. VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *If you are using

More information

How to Make a USB Bootable

How to Make a USB Bootable /0/0 Ways to Make a USB Bootable - wiki How to Make a USB Bootable Five Methods: Ad Making a USB Drive to Install Any PC Operating System Making a Windows Vista or 7 Install Drive Creating a USB PC Repair

More information

Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish.

Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish. Backup. If your computer refuses to boot or load Windows or if you are trying to restore an image to a partition the Reflect cannot lock (See here), and then you will have to start your PC using a rescue

More information

Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR

Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR SETUP & CONFIGURATION GUIDE FOR Intel vpro Technology-based PCs This Setup Guide details what makes a true Intel vpro technology-based PC, and how to set up and configure Intel AMT (Active Management Technology)

More information

Cloud Backup Express

Cloud Backup Express Cloud Backup Express Table of Contents Installation and Configuration Workflow for RFCBx... 3 Cloud Management Console Installation Guide for Windows... 4 1: Run the Installer... 4 2: Choose Your Language...

More information

User Guide Software Version 2.1.0

User Guide Software Version 2.1.0 Intel Solid State Drive Firmware Update Tool User Guide Software Version 2.1.0 Order Number: 322570-007US Intel disclaims all express and implied warranties, including without limitation, the implied warranties

More information

Module 7. The Windows XP Boot Process

Module 7. The Windows XP Boot Process Module 7 The Windows XP Boot Process Copyright 2003 N+S training! Objectives! The Boot Process! Registry Control Sets! Advanced Startup Options! The Boot.ini file! Use System Restore! Use Automated System

More information

for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later

for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later Copyright 2015, Lucid Innovations Limited. All Rights Reserved Lucid Research

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation

More information

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and

More information

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis

More information

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do

More information

Instrument Software Update Instructions. Keysight X-Series Signal Analyzers (PXA/MXA/EXA/CXA) Upgrading an older version to A.12.

Instrument Software Update Instructions. Keysight X-Series Signal Analyzers (PXA/MXA/EXA/CXA) Upgrading an older version to A.12. Instrument Software Update Instructions Keysight X-Series Signal Analyzers (PXA/MXA/EXA/CXA) Purpose Upgrading an older version to A.12.09 and above The purpose of this document is to outline the instrument

More information

Getting Started User s Guide

Getting Started User s Guide Getting Started This short guide can help you to quickly start using Acronis True Image Home 2011. It describes just a few of the key features of Acronis True Image Home 2011. For detailed program information,

More information

Firmware security features in HP Compaq business notebooks

Firmware security features in HP Compaq business notebooks HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot

More information

Boston University Security Awareness. What you need to know to keep information safe and secure

Boston University Security Awareness. What you need to know to keep information safe and secure What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately

More information

Remote Administration

Remote Administration Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over

More information

Installing and Upgrading to Windows XP

Installing and Upgrading to Windows XP Installing and Upgrading to Windows XP Although Windows XP was released many years ago, you will still see it in the field and might need to install it as well, or upgrade older Windows computers to XP.

More information

HP ProtectTools Embedded Security Guide

HP ProtectTools Embedded Security Guide HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded

More information

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research

More information

Lab - Dual Boot - Vista & Windows XP

Lab - Dual Boot - Vista & Windows XP Lab - Dual Boot - Vista & Windows XP Brought to you by RMRoberts.com After completing this lab activity, you will be able to: Install and configure a dual boot Windows XP and Vista operating systems. Explain

More information

How to Install and use Windows XP Mode and Windows Virtual PC in Windows 7 for older 32 bit only Applications

How to Install and use Windows XP Mode and Windows Virtual PC in Windows 7 for older 32 bit only Applications How to Install and use Windows XP Mode and Windows Virtual PC in Windows 7 for older 32 bit only Applications Important Applies to Windows 7 Professional, Ultimate, Enterprise As of April 8, 2014, technical

More information

Using iscsi with BackupAssist. User Guide

Using iscsi with BackupAssist. User Guide User Guide Contents 1. Introduction... 2 Documentation... 2 Terminology... 2 Advantages of iscsi... 2 Supported environments... 2 2. Overview... 3 About iscsi... 3 iscsi best practices with BackupAssist...

More information

ATX Document Manager. User Guide

ATX Document Manager. User Guide ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2010 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,

More information

Network FAX Driver. Operation Guide

Network FAX Driver. Operation Guide Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network

More information

Installing a Second Operating System

Installing a Second Operating System Installing a Second Operating System Click a link below to view one of the following sections: Overview Key Terms and Information Operating Systems and File Systems Managing Multiple Operating Systems

More information

Yale Software Library

Yale Software Library e/ Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 432-9000 or helpdesk@yale.edu Installation PGP Desktop for Windows Operating Systems Preparing your computer:

More information

SecureDoc for Mac v6.1. User Manual

SecureDoc for Mac v6.1. User Manual SecureDoc for Mac v6.1 User Manual Copyright 1997-2012 by WinMagic Inc. All rights reserved. Printed in Canada Many products, software and technologies are subject to export control for both Canada and

More information

Full Disk Encryption Agent Reference

Full Disk Encryption Agent Reference www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or

More information

CRYPTOLogon Agent. for Windows Domain Logon Authentication. Deployment Guide. Copyright 2002-2003, CRYPTOCard Corporation, All Rights Reserved.

CRYPTOLogon Agent. for Windows Domain Logon Authentication. Deployment Guide. Copyright 2002-2003, CRYPTOCard Corporation, All Rights Reserved. CRYPTOLogon Agent for Windows Domain Logon Authentication Deployment Guide Table of Contents 1. OVERVIEW... 1 1.1 SINGLE AUTHENTICATION MODE (MS-GINA REPLACEMENT)... 1 1.2 DUAL AUTHENTICATION MODE (MS-GINA

More information

How to dual-boot Vista with XP (with XP installed first) - step-by-step guide with screenshots

How to dual-boot Vista with XP (with XP installed first) - step-by-step guide with screenshots How to dual-boot Vista with XP (with XP installed first) - step-by-step guide with screenshots Want to install Vista on your PC but don't want to get rid of XP just yet? Here's how to install it so you

More information

Mount & Boot Center. Contents

Mount & Boot Center. Contents Contents 1. About the.................................................................................. 2 2. How to start.....................................................................................................

More information

NTLDR is missing. Below are the full error messages that may be seen when the computer is booting.

NTLDR is missing. Below are the full error messages that may be seen when the computer is booting. NTLDR is missing Issue NTLDR is Missing. Related errors Below are the full error messages that may be seen when the computer is booting. NTLDR is Missing Press any key to restart Boot: Couldn't find NTLDR

More information

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016 ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Attacking NTLM with Precomputed Hashtables

Attacking NTLM with Precomputed Hashtables Attacking NTLM with Precomputed Hashtables warlord warlord@nologin.org Contents 1 Introduction 2 2 The design of LM and NTLM 3 2.1 The LanMan disaster......................... 3 2.2 NTLM.................................

More information

Terminal Server Guide

Terminal Server Guide Terminal Server Guide Contents What is Terminal Server?... 2 How to use Terminal Server... 2 Remote Desktop Connection Client... 2 Logging in... 3 Important Security Information... 4 Logging Out... 4 Closing

More information

Operating System Installation Guidelines

Operating System Installation Guidelines Operating System Installation Guidelines The following document guides you step-by-step through the process of installing the operating systems so they are properly configured for boot camp. The document

More information

Iridium Extreme TM Satellite Phone. Data Services Manual

Iridium Extreme TM Satellite Phone. Data Services Manual Iridium Extreme TM Satellite Phone Data Services Manual Table of Contents 1 OVERVIEW... 1 2 HOW IT WORKS... 1 3 BEFORE INSTALLING... 2 4 USB DRIVER INSTALLATION... 3 5 MODEM INSTALLATION AND CONFIGURATION...

More information

Faculty Details. : Assistant Professor ( OG. ),Assistant Professor (OG) Course Details. : B. Tech. Batch : 2010-2014. : Information Technology

Faculty Details. : Assistant Professor ( OG. ),Assistant Professor (OG) Course Details. : B. Tech. Batch : 2010-2014. : Information Technology COURSE FILE (COURSE PLAN) Year : 2012-13 Sem: ODD Faculty Details Name of the Faculty : Mullai.P & Yaashuwanth.C Designation : Assistant Professor ( OG. ),Assistant Professor (OG) Department : Information

More information

Team Foundation Server 2013 Installation Guide

Team Foundation Server 2013 Installation Guide Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day benday@benday.com v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide

More information

II. Installing Debian Linux:

II. Installing Debian Linux: Debian Linux Installation Lab Spring 2013 In this lab you will be installing Debian Linux in a KVM (Kernel Virtual Machine). You will be guided through a series of steps to setup the network (IP addresses,

More information

How to Install Microsoft Windows Server 2008 R2 in VMware ESXi

How to Install Microsoft Windows Server 2008 R2 in VMware ESXi How to Install Microsoft Windows Server 2008 R2 in VMware ESXi I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support

More information

Using Red Hat Enterprise Linux with Georgia Tech's RHN Satellite Server Installing Red Hat Enterprise Linux

Using Red Hat Enterprise Linux with Georgia Tech's RHN Satellite Server Installing Red Hat Enterprise Linux Using Red Hat Enterprise Linux with Georgia Tech's RHN Satellite Server Installing Red Hat Enterprise Linux NOTE: If you need more information regarding the installation process for other distributions

More information

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed

More information

Configuring Authentication for Microsoft Windows

Configuring Authentication for Microsoft Windows Chapter 4 Configuring Authentication for Microsoft Windows In this chapter: Storing and Transmitting Credentials..............................69 Storing Secrets in Windows......................................83

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group ofir@sys-security.com http://www.sys-security.com September 2002

More information

for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later

for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research

More information

SSD Guru. Installation and User Guide. Software Version 1.4

SSD Guru. Installation and User Guide. Software Version 1.4 SSD Guru Installation and User Guide Software Version 1.4 Contents Welcome!............................................................................. 1 Key features.........................................................................

More information

WINDOWS 7 & HOMEGROUP

WINDOWS 7 & HOMEGROUP WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

Using. Microsoft Virtual PC. Page 1

Using. Microsoft Virtual PC. Page 1 Using Microsoft Virtual PC T4 Page 1 Microsoft Virtual PC Microsoft Virtual PC allows multiple Guest Operating Systems (Virtual Machines) to run using the resources of the Host Operating System (The PC

More information

YubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015

YubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015 YubiKey OSX Login Via Yubico-PAM Challenge-Response Version 1.6 October 24, 2015 YubiKey OSX Login 2015 Yubico. All rights reserved. Page 1 of 18 About Yubico Disclaimer As the inventors of the YubiKey,

More information

How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment?

How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment? Author Janice Hong Version 1.0.0 Date Mar. 2014 Page 1/56 How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment? Application Note The 32-bit operating system

More information

Understanding the Boot Process and Command Line Chapter #3

Understanding the Boot Process and Command Line Chapter #3 Understanding the Boot Process and Command Line Chapter #3 Amy Hissom Key Terms 1. Active Partition the primary partition on the hard drive that boots the OS. Windows NT/2000/XP calls the active partition

More information

Fiery E100 Color Server. Welcome

Fiery E100 Color Server. Welcome Fiery E100 Color Server Welcome 2011 Electronics For Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45098226 27 June 2011 WELCOME 3 WELCOME This Welcome

More information

Universal Management Service 2015

Universal Management Service 2015 Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,

More information

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 2 Introducing Operating Systems

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 2 Introducing Operating Systems A+ Guide to Managing and Maintaining Your PC, 7e Chapter 2 Introducing Operating Systems Objectives Learn about the various operating systems and the differences between them Learn about the components

More information

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features 1.0 Key Features Addonics T E C H N O L O G I E S NAS Adapter Model: NASU2 User Manual Convert any USB 2.0 / 1.1 mass storage device into a Network Attached Storage device Great for adding Addonics Storage

More information

Getting Started. rp5800, rp5700 and rp3000 Models

Getting Started. rp5800, rp5700 and rp3000 Models Getting Started rp5800, rp5700 and rp3000 Models Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft, Windows, and Windows

More information

1. Scope of Service. 1.1 About Boxcryptor Classic

1. Scope of Service. 1.1 About Boxcryptor Classic Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic

More information

Getting Started With Parallels Desktop 9

Getting Started With Parallels Desktop 9 Getting Started With Parallels Desktop 9 Copyright 1999-2013 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland

More information

Parallels Desktop for Mac

Parallels Desktop for Mac Parallels Software International, Inc. Parallels Desktop for Mac Quick Start Guide 3.0 (c) 2005-2007 Copyright 2006-2007 by Parallels Software International, Inc. All rights reserved. Parallels and Parallels

More information

Print Server Application Guide. This guide applies to the following models.

Print Server Application Guide. This guide applies to the following models. Print Server Application Guide This guide applies to the following models. TL-WR842ND TL-WR1042ND TL-WR1043ND TL-WR2543ND TL-WDR4300 CONTENTS Chapter 1. Overview... 1 Chapter 2. Before Installation...

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

A+ Practical Applications Solution Key

A+ Practical Applications Solution Key A+ Practical Applications Solution Key Module 1 Assignment: Introducing Microsoft Windows - answer the following questions: 1. What attributes are available in the NTFS file system that are not available

More information

Password Manager with 3-Step Authentication System

Password Manager with 3-Step Authentication System Password Manager with 3-Step Authentication System Zhelyazko Petrov, Razvan Ragazan University of Westminster, London z.petrov@my.westminster.ac.uk, razvan.ragazan@my.westminster.ac.uk Abstract: A big

More information

Enabling Backups for Windows and MAC OS X

Enabling Backups for Windows and MAC OS X Enabling Backups for Windows and MAC OS X TM Trademarks and Copyrights Copyright Storix, Inc. 1999-2005 Storix is a registered trademark of Storix, Inc. SBAdmin is a trademark of Storix, Inc in the USA

More information

Active@ Password Changer for DOS User Guide

Active@ Password Changer for DOS User Guide Active@ Password Changer for DOS User Guide 1 Active@ Password Changer Guide Copyright 1999-2014, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form

More information

Troubleshooting AVAYA Meeting Exchange

Troubleshooting AVAYA Meeting Exchange Troubleshooting AVAYA Meeting Exchange Is my browser supported? Avaya Web Conferencing supports the following browser clients for joining conferences (with the described limitations). The supported browsers

More information

Land Information New Zealand (LINZ) SALT Database. Migration from original hardware to virtualised hardware: Process Documentation

Land Information New Zealand (LINZ) SALT Database. Migration from original hardware to virtualised hardware: Process Documentation Land Information New Zealand (LINZ) SALT Database Migration from original hardware to virtualised hardware: Process Documentation Contents Migration from original hardware to virtualised hardware: Process

More information

Reporting works by connecting reporting tools directly to the database and retrieving stored information from the database.

Reporting works by connecting reporting tools directly to the database and retrieving stored information from the database. Print Audit 6 - Step by Step Walkthrough IMPORTANT: READ THIS BEFORE PERFORMING A PRINT AUDIT 6 INSTALLATION Print Audit 6 is a desktop application that you must install on every computer where you want

More information

Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version.

Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version. Release notes version 7.01 Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version. It s available as a free downloadable upgrade to existing version 7.0 customers

More information

Guest PC. for Mac OS X. User Guide. Version 1.6. Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved.

Guest PC. for Mac OS X. User Guide. Version 1.6. Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved. Guest PC for Mac OS X Version 1.6 User Guide Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved. Table of Contents About Guest PC... 1 About your Virtual Computer... 1 Creating a Virtual

More information

Dual-boot Windows 10 alongside Windows 8

Dual-boot Windows 10 alongside Windows 8 Most of the people are very much interested to install the newly launched Operating System Windows 10 on their devices. But, it is not recommended to directly use Windows 10 as the primary OS because it

More information

IBM Client Security Solutions. Client Security User's Guide

IBM Client Security Solutions. Client Security User's Guide IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First

More information

IT Quick Reference Guides Using Windows 7

IT Quick Reference Guides Using Windows 7 IT Quick Reference Guides Using Windows 7 Windows Guides This sheet covers many of the basic commands for using the Windows 7 operating system. WELCOME TO WINDOWS 7 After you log into your machine, the

More information