Outlook 2003/2007 NK2 File Format and Developer Guidelines

Size: px
Start display at page:

Download "Outlook 2003/2007 NK2 File Format and Developer Guidelines"

Transcription

1 Outlook 2003/2007 NK2 File Format and Developer Guidelines This post explains how Microsoft Office Outlook 2007 interacts with the nickname cache file, also known as the.nk2 file. The.nk2 file is where Outlook 2007 persists the autocomplete list, which is the list of names that displays in the To, Cc, and Bcc edit boxes while composing an . This post also discusses the binary format of the file and the recommended ways for interacting with the.nk2 file. This blog post should contain sufficient information to support reading and modifying the.nk2 file. You can use any programming language to write your application because there are no dependencies on the Outlook object model or MAPI APIs. Outlook 2007 Interaction with the.nk2 file When a user logs on to Outlook 2007, Outlook reads the user s MAPI Profile. Later, when the autocomplete list is shown, the.nk2 file is loaded. The.nk2 file has the same name as the profile that was used to log on, typically outlook.nk2, in the default scenario. This file can be found here: %APPDATA%\Microsoft\Outlook Outlook 2007 interacts with the.nk2 file in two ways: 1. Loading the.nk2 file. 2. And, later, saving the.nk2 file. Loading the.nk2 file Outlook 2007 loads the.nk2 file when any item with addressing functionality gets initialized. For example, addresses are used in a new mail, a mail reply, a contact item, a meeting request, etc. To load, Outlook 2007 reads all of the contents of the file as a binary stream into a structure in memory. For autocomplete operations, Outlook interacts exclusively with this in-memory structure for the duration of the outlook.exe process lifetime. Outlook 2007 does not interact with the.nk2 file in any additional ways until it saves the in-memory structure back to disk on shutdown. Saving the.nk2 file Outlook 2007 saves the.nk2 file on shutdown if the autocomplete list has changed in any way. Here are the ways that the autocomplete list gets changed: A new nickname entry is added through resolving a name, picking a recipient from the address book dialog, or sending mail to a recipient that was not already in the list. An entry is modified by sending mail to an existing recipient in the list.

2 An entry is removed by the user through the UI. Other minor scenarios not relevant to this blog post Outlook 2007 does not save the.nk2 file on shutdown if the autocomplete list has not changed. The save involves writing the in-memory structure to the.nk2 file as a binary stream. If the size of the.nk2 file contents shrink during an Outlook session (for example, the user deletes some entries), Outlook saves the new contents to the file, but the file itself will not shrink in size. Recommendations Never partially modify the.nk2 file. The supported interaction is to 1) read the entire file into memory, 2) modify the memory structure, and 3) write out the entire file when the modifications are finished. We recommend locking the file from modification by other processes while you re reading it and writing it using standard Windows file locking APIs (e.g. LockFile in C/C++ and FileStream.Lock in C#). Don t interact with the.nk2 file while Outlook is running. If Outlook is running while you modify the file, Outlook will likely overwrite your changes when it shuts down. Do not write properties of type PT_MV_UNICOD and PR_MV_STRING8 into an.nk2 file to be consumed by Outlook These properties are only understood by Outlook Do not write properties of types that are not mentioned in this document. NK2 File Format In addition to knowing how Outlook interacts with the.nk2 file, you must also understand the binary file format of the.nk2 file. The.nk2 file is a set of recipient property rows that are saved as a binary stream along with some bookkeeping metadata that is used only by Outlook 2007 and Outlook The metadata is relevant to Outlook s interactions with the.nk2 file so third parties must preserve what is in each metadata block when saving a modified.nk2 file. In other words, third parties should modify only the row-set portion of the binary format and preserve what was already in the metadata blocks of the file. When creating a new.nk2 file from scratch, use the metadata values from the binary example below to populate the metadata in the new file. File Visualization The high-level layout of the file looks like this: Metadata (12 bytes) Number of rows n (4 bytes)

3 Number of properties p in row one (4 bytes) Property 1 s property tag (4 bytes) Property 1 s reserved data (4 bytes) Property 1 s value union (8 bytes) Property 1 s value data (0 or variable bytes) (property 2 through property P-1) Property p s property tag (4 bytes) Property p s reserved data (4 bytes) Property p s value union (8 bytes) Property p s value data (0 or variable bytes) Number of properties q in row two (4 bytes) (row two s properties) (row 3 through row n-1) Number of properties r in row n (4 bytes) (row n s properties) Metadata (12 bytes) For an example of a binary file structure, see here. High-level Layout Broadly speaking, this is the layout of the.nk2 file: Metadata 12 Row-set Variable Metadata 12 Row-set Layout The row-set layout is as follows:

4 Number of rows 4 Rows Variable The number of rows identifies how many rows will come in the next part of the binary stream sequence. Row Layout ach row is of the following format: Number of properties 4 Properties Variable The number of properties identifies how many properties will come in the next part of the binary stream sequence. Property Layout ach property is of the following format: Property Tag 4 Reserved Data 4 Property Value Union 8 0 or variable (depending on the prop tag) Interpreting the Property Value The Property Value Union and the are to be interpreted based on the property tag in the first 4 bytes of the property block. This property tag is in the same format as a MAPI property tag. Bits 0 through 15 of the property tag are the property s type. Bits 16 through 31 are the property s identifier. The property type determines how the rest of the property should be read.

5 Static Values Some properties have no and only have data in the union. The following property types (which come from the Property Tag) should interpret the 8-byte Property Union data as follows: Prop Type PT_I2 PT_LONG PT_R4 PT_DOUBL PT_BOOLAN PT_SYSTIM PT_I8 Property Union Interpretation short int long float double short int FILTIM LARG_INTGR Dynamic Values Other properties have data in a block after the first 16 bytes that contain the Property Tag, the Reserved Data, and the Property Value Union. Unlike static values, the data stored in the 8 byte Property Value union is irrelevant on reading. When writing, make sure to fill these 8 bytes with something, but the content of the 8 bytes doesn t matter. In dynamic values, the property tag s type determines how to interpret the. PT_STRING8 Number of bytes n 4 Bytes to be interpreted as an ANSI string (includes NULL terminator) n Number of bytes n 4 Bytes to be interpreted as a UNICOD string (includes NULL n

6 terminator) PT_CLSID Bytes to be interpreted as a GUID 16 PT_BINARY Number of bytes n 4 Bytes to be interpreted as a byte array n PT_MV_BINARY Number of binary arrays X 4 A run of bytes containing X binary arrays. ach array should be interpreted like the PT_BINARY byte run described above. Variable PT_MV_STRING8 (Outlook 2007) Number of ANSI strings X 4 A run of bytes containing X ANSI strings. ach string should be interpreted like the PT_STRING8 byte run described above. Variable PT_MV_UNICOD (Outlook 2007)

7 Number of UNICOD strings X 4 A run of bytes containing X UNICOD strings. ach string should be interpreted like the byte run described above. Variable For an example of a binary file structure, see here. Significant properties As mentioned above, the binary blocks that represent properties have property tags that correspond to properties on address book recipients. For properties that aren t listed here, you can look up the property description at The properties below are the minimum set of properties necessary for a row to be valid. Therefore, new rows added to the.nk2 file must be populated with the properties below. Property Name Property Tag Description (see MSDN for more details) PR_NICK_NAM_W (not transmitted on recipients, specific to.nk2 file only) 0x F This property must be first in each recipient row. Functionally serves as a key identifier for the recipient row. PR_NTRYID 0x0FFF0102 The address book entry identifier for the recipient. PR_DISPLAY_NAM_W 0x F The recipient s display name. PR_MAIL_ADDRSS_W 0x F The recipient s address (e.g. johndoe@contoso.com or /o=contoso/ou=foo/cn=recipients/cn=johnd oe). PR_ADDRTYP_W 0x F The recipient s address type (e.g. SMTP or X). PR_SARCH_KY 0x300B0102 The recipient s MAPI search key. PR_SMTP_ADDRSS_W 0x39F001F The recipient s SMTP address. PR_OBJCT_TYP 0x0FF0003 Represents the type of this recipient. Values can either be MAPI_MAILUSR or

8 MAPI_DISTLIST. PR_DISPLAY_TYP 0x Similar to PR_OBJCT_TYP, but it s used by Outlook s UI to determine how to display the recipient (for example, bolding a distribution list). Common values for this are DT_DISTLIST and DT_MAILUSR. PR_NW_NICK_NAM (not transmitted on recipients, specific to.nk2 file only) PR_DROPDOWN_DISPLAY_NAM_ W (not transmitted on recipients, specific to.nk2 file only) PR_NICK_NAM_WIGHT (not transmitted on recipients, specific to.nk2 file only) 0x B 0x F 0x Specifies whether this row was just added to the nickname cache or not. If you are creating a new row, this should be set to true. The display string that shows up in the autocomplete list. The weight of this autocomplete entry. The weight is used to determine in what order autocomplete entries show up when matching the autocomplete list. ntries with higher weight will show before entries with lower weight. The entire autocomplete list is sorted by this property. The weight periodically decreases over time and increases when the user sends an to this recipient. See the description below for more information about this property. PR_NICK_NAM_WIGHT The set of rows in the.nk2 file is sorted in descending order by the PR_NICK_NAM_WIGHT property and the.nk2 file should always preserve this sorted characteristic. Therefore, any changes to a row s weight should also ensure that the row s position retains the sorted order of the entire set of rows. Any additions to the row-set should be inserted to the proper position to maintain the sorted order. The minimum value of this weight is 0x1 and the maximum value is LONG_MAX. Any other values for the weight are considered invalid. When Outlook 2007 sends a mail to or resolves a recipient, it will increase that recipient s weight by 0x2000.

9 Binary xample The following binary is an example of an.nk2 with two SMTP recipients in it: and h: 0D F0 AD BA 0A h: F FD A h: C A h: D F h: F F F h: C h: F 00 0A 00 F F h: A A 2D F h: A A h: F4 FC 5F 03 0B A C a0h: D0 FC 5F b0h: C B 30 CD A B c0h: AC 1A B D A 4A d0h: D F F 53 4F 2 4F e0h: F9 0F AC 00 7A C f0h: 1A A B 1F A4 B h: A D 6 00 DD 01 0F A h: D h: F F F h: F D h: A D h: F h: 00 6F F F h: FF 0F A B h: 04 7A B 1F A4 B A h: 19 9D 6 00 DD 01 0F A a0h: D b0h: F F F c0h: 00 6F D d0h: A D e0h: F F f0h: F F

10 h: 00 F 0F 94 FC 5F F h: A A BB 1B C 31 AC 00 2C h: A D h: F F h: F F F h: C 31 AC B C FC 5F 03 0A h: D F h: F1 1B 3 04 FF FF C h: 00 6A D h: F F a0h: 00 6F F FF b0h: 5F D c0h: 5F 4F FD d0h: 5F F 00 F e0h: 5F F 00 1D 1C C f0h: 00 6A D h: F F h: 00 6F F F h: 5F AA 0A 18 C7 7A C A h: B 1F A4 B A D h: DD 01 0F A h: D F h: F F F h: D A h: D h: F F F a0h: F DF 5F b0h: FD B c0h: FD F d0h: CF C3 1C C A e0h: D f0h: F F F h: F C h: FF FF 7F F h: FD F h: A 00 6F F 00 65

11 h: F F F h: F 00 6D C h: F A 00 F h: F A A h: BF F 38 0F C4 B F A h: 32 1A F4 FC 2B 06 0B A a0h: 1 1C D0 FC 2B b0h: C B 30 CD c0h: A F d0h: 4D A 4A 4F F F e0h: 4F 53 4F F 4D F9 0F AC f0h: F h: 81 2B 1F A4 B A D 6 00 DD 01 0F h: A 00 6F F h: F F h: 6F F 00 6D D h: A 00 6F h: 6F F F h: F F 00 6D h: FF 0F B F h: B 1F A4 B A D h: 00 DD 01 0F A 00 6F a0h: F F b0h: F F F 00 6D c0h: D A 00 6F d0h: F F e0h: F F F f0h: 6D F 0F 94 FC 2B h: 30 B F A A D F h: 3C 31 AC A 00 6F h: F F h: 6F F F 00 6D h: 1F C 31 AC F C FC 2B h: 0A D F h: F F FF FF h: A 00 6F F

12 h: F F F h: F 00 6D FF 5F a0h: D 5F b0h: FD 5F 4D c0h: F 00 F6 5F d0h: B7 F A e0h: 6F F f0h: 6F F F h: 6F 00 6D F7 5F h: DF F B h: 1F A4 B A D 6 00 DD 01 0F h: A 00 6F F h: F F F h: F 00 6D D h: A 00 6F F h: F F h: 6F F 00 6D DF 5F h: FD B a0h: 90 FD F b0h: D0 9F F c0h: 6A 00 6F F d0h: F F F e0h: F 00 6D C f0h: B FF FF 7F D F4 7D Binary h: 72 B6 CA 01 Name Size Type Value 0DF0ADBA0A DF0ADBA0A Header 12 Binary Number of rows 4 ULONG Hex: 0x Decimal: Row 1 number of properties 4 ULONG Hex: 0x Decimal: 23 1F Row 1 Property 1 Property Tag 4 ULONG Hex: 0x f Decimal: FD1300 Reserved 4 ULONG Hex: 0x0013fd90 Decimal: A Irrelevant Union 8 Binary 801A C Unicode String bytes 4 ULONG Hex: 0x c Decimal: 44

13 6A D F F F F Unicode String Value C Row 1 Property 2 Property Tag 4 ULONG Hex: 0x0c Decimal: Reserved 4 ULONG Hex: 0x Decimal: F00 Property Union 8 PT_I4 Hex: 0x Decimal: 1 0A00F39 Row 1 Property 3 Property Tag 4 ULONG Hex: 0x39fe000a Decimal: Reserved 4 ULONG Hex: 0x Decimal: F Irrelevant Union 8 Binary 0F A00003A Row 1 Property 4 Property Tag 4 ULONG Hex: 0x3a00000a Decimal: D Reserved 4 ULONG Hex: 0x d Decimal: F Irrelevant Union 8 Binary 0F A Row 1 Property 5 Property Tag 4 ULONG Hex: 0x3a Decimal: A39 Reserved 4 ULONG Hex: 0x391a3240 Decimal: F4FC5F03 Property Union 8 PT_I4 Hex: 0x Decimal: 0 0B00403A Row 1 Property 6 Property Tag 4 ULONG Hex: 0x3a40000b Decimal: C02 Reserved 4 ULONG Hex: 0x021c1e90 Decimal: D0FC5F03 Property Union 8 PT_BOOLA N Hex: 0x Decimal: Row 1 Property 7 Property Tag 4 ULONG Hex: 0x Decimal: Reserved 4 ULONG Hex: 0x Decimal: C02 Property Union 8 PT_I4 Hex: 0x Decimal: B30 Row 1 Property 8 Property Tag 4 ULONG Hex: 0x300b0102 Decimal: CDA26032 Reserved 4 ULONG Hex: 0x3260a2cd Decimal: B000000AC1A304 Irrelevant Union 8 Binary 1B000000AC1A304 1B Binary num bytes 4 ULONG Hex: 0x b Decimal: D54503A4A D F4544F534F2 4F Binary content 27 Binary 0201F90F Row 1 Property 9 Property Tag 4 ULONG 534D54503A4A D F4544F534F24 F Hex: 0x0ff90102 Decimal:

14 8006AC00 Reserved 4 ULONG Hex: 0x00ac0680 Decimal: A000000C71A304 Irrelevant Union 8 Binary 7A000000C71A304 7A Binary num bytes 4 ULONG Hex: 0x a Decimal: A D F F F F D A D F F F002006F Binary content 122 Binary 0201FF0F Row 1 Property 10 Property Tag 4 ULONG Reserved 4 ULONG 906A D F F F F D A D F F F002006F Hex: 0x0fff0102 Decimal: Hex: 0x Decimal: A B304 Irrelevant Union 8 Binary 7A B304 7A Binary num bytes 4 ULONG Hex: 0x a Decimal: A D F F F F D A D F F F002006F Binary content 122 Binary 906A D F F F F D A D F F F002006F F0F Row 1 Property 11 Property Tag 4 ULONG Hex: 0x0ffe0003 Decimal: FC5F03 Reserved 4 ULONG Hex: 0x035ffc94 Decimal: Property Union 8 PT_I4 Hex: 0x Decimal: 6 1F Row 1 Property 12 Property Tag 4 ULONG Hex: 0x f Decimal: AA6032 Reserved 4 ULONG Hex: 0x3260ae2a Decimal: BB1B3043C31AC00 Irrelevant Union 8 Binary BB1B3043C31AC00 2C Unicode String bytes 4 ULONG Hex: 0x c Decimal: 44

15 6A D F F F F Unicode String Value 44 1F Row 1 Property 13 Property Tag 4 ULONG Hex: 0x f Decimal: C31AC00 Reserved 4 ULONG Hex: 0x00ac313c Decimal: B3047CFC5F03 Irrelevant Union 8 Binary 71B3047CFC5F03 0A Unicode String bytes 4 ULONG Hex: 0x a Decimal: D Unicode String Value 10 SMTP 1F Row 1 Property 14 Property Tag 4 ULONG Hex: 0x f Decimal: Reserved 4 ULONG Hex: 0x Decimal: 0 F11B304FFFF0000 Irrelevant Union 8 Binary F11B304FFFF0000 2C Unicode String bytes 4 ULONG Hex: 0x c Decimal: 44 6A D F F F F Unicode String Value 44 janesmith@contoso.org 0300FF5F Row 1 Property 15 Property Tag 4 ULONG Hex: 0x5fff0003 Decimal: Reserved 4 ULONG Hex: 0x Decimal: 0 0 Property Union 8 PT_I4 Hex: 0x Decimal: D5F Row 1 Property 16 Property Tag 4 ULONG Hex: 0x5fde0003 Decimal: F Reserved 4 ULONG Hex: 0x f Decimal: Property Union 8 PT_I4 Hex: 0x Decimal: FD5F Row 1 Property 17 Property Tag 4 ULONG Hex: 0x5ffd0003 Decimal: Reserved 4 ULONG Hex: 0x Decimal: Property Union 8 PT_I4 Hex: 0x Decimal: 1 1F00F65F Row 1 Property 18 Property Tag 4 ULONG Hex: 0x5ff6001f Decimal: F00 Reserved 4 ULONG Hex: 0x006f0042 Decimal: D1C Irrelevant Union 8 Binary 1D1C C Unicode String bytes 4 ULONG Hex: 0x c Decimal: 44

16 6A D F F F F Unicode String Value F75F Row 1 Property 19 Property Tag 4 ULONG Hex: 0x5ff70102 Decimal: AA0A18C7 Reserved 4 ULONG Hex: 0xc7180aaa Decimal: A C304 Irrelevant Union 8 Binary 7A C304 7A Binary num bytes 4 ULONG Hex: 0x a Decimal: A D F F F F D A D F F F002006F Binary content 122 Binary 906A D F F F F D A D F F F002006F DF5F Row 1 Property 20 Property Tag 4 ULONG Hex: 0x5fdf0003 Decimal: Reserved 4 ULONG Hex: 0x Decimal: FD1300 Property Union 8 PT_I4 Hex: 0x Decimal: 0 0B Row 1 Property 21 Property Tag 4 ULONG Hex: 0x b Decimal: 90FD1300 Reserved 4 ULONG Property Union 8 PT_BOOLA N Hex: 0x0013fd90 Decimal: Hex: 0x Decimal: 0 1F Row 1 Property 22 Property Tag 4 ULONG Hex: 0x f Decimal: CF0205 Reserved 4 ULONG Hex: 0x0502cf30 Decimal: C31C Irrelevant Union 8 Binary C31C C Unicode String bytes 4 ULONG Hex: 0x c Decimal: 44 6A D F F F F Unicode String Value Row 1 Property 23 Property Tag 4 ULONG janesmith@contoso.org Hex: 0x Decimal:

17 C Reserved 4 ULONG Hex: 0x301044c7 Decimal: FFFF7F Property Union 8 PT_I4 Hex: 0x Decimal: Row 2 number of properties 4 ULONG Hex: 0x Decimal: 23 1F Row 2 Property 1 Property Tag 4 ULONG Hex: 0x f Decimal: FD1300 Reserved 4 ULONG Hex: 0x0013fd90 Decimal: F Irrelevant Union 8 Binary 38F Unicode String bytes 4 ULONG Hex: 0x Decimal: 40 6A006F F F F F F006D Unicode String Value 40 johndoe@contoso.com C Row 2 Property 2 Property Tag 4 ULONG Hex: 0x0c Decimal: Reserved 4 ULONG Hex: 0x Decimal: F Property Union 8 PT_I4 Hex: 0x Decimal: 1 0A00F39 Row 2 Property 3 Property Tag 4 ULONG Hex: 0x39fe000a Decimal: Reserved 4 ULONG Hex: 0x Decimal: 0 0F Irrelevant Union 8 Binary 0F A00003A Row 2 Property 4 Property Tag 4 ULONG Hex: 0x3a00000a Decimal: BFF38 Reserved 4 ULONG Hex: 0x38efbf6e Decimal: F010480C4BF38 Irrelevant Union 8 Binary 0F010480C4BF A Row 2 Property 5 Property Tag 4 ULONG Hex: 0x3a Decimal: A39 Reserved 4 ULONG Hex: 0x391a3240 Decimal: F4FC2B06 Property Union 8 PT_I4 Hex: 0x Decimal: 0 0B00403A Row 2 Property 6 Property Tag 4 ULONG Hex: 0x3a40000b Decimal: C02 Reserved 4 ULONG Hex: 0x021c1e90 Decimal: D0FC2B06 Property Union 8 PT_BOOLA N Row 2 Property 7 Property Tag 4 ULONG Hex: 0x Decimal: 0 Hex: 0x Decimal: Reserved 4 ULONG Hex: 0x Decimal: C02 Property Union 8 PT_I4 Hex: 0x Decimal: B30 Row 2 Property 8 Property Tag 4 ULONG Hex: 0x300b0102 Decimal:

18 CDA26032 Reserved 4 ULONG Hex: 0x3260a2cd Decimal: F4204 Irrelevant Union 8 Binary F Binary num bytes 4 ULONG Hex: 0x Decimal: D54503A4A4F484444F F4544F534F2434F4 D00 Binary content 25 Binary 534D54503A4A4F484444F F4544F534F2434F4 D F90F Row 2 Property 9 Property Tag 4 ULONG Hex: 0x0ff90102 Decimal: AC00 Reserved 4 ULONG Hex: 0x00ac0680 Decimal: F4204 Irrelevant Union 8 Binary F Binary num bytes 4 ULONG Hex: 0x Decimal: A006F F F F F F006D D A006F F F F F F006D Binary content 114 Binary 0201FF0F Row 2 Property 10 Property Tag 4 ULONG Reserved 4 ULONG 906A006F F F F F F006D D A006F F F F F F006D Hex: 0x0fff0102 Decimal: Hex: 0x e Decimal: BF4204 Irrelevant Union 8 Binary BF Binary num bytes 4 ULONG Hex: 0x Decimal: A006F F F A006F F F F F F F Binary content 114 Binary 06F006D D0054 F006D D A006F F F F F F006D A006F F F F F F006D F0F Row 2 Property 11 Property Tag 4 ULONG Hex: 0x0ffe0003 Decimal: FC2B06 Reserved 4 ULONG Hex: 0x062bfc94 Decimal:

19 B5307 Property Union 8 PT_I4 Hex: 0x Decimal: 6 1F Row 2 Property 12 Property Tag 4 ULONG Hex: 0x f Decimal: AA6032 Reserved 4 ULONG Hex: 0x3260ae2a Decimal: DF52043C31AC00 Irrelevant Union 8 Binary 5DF52043C31AC Unicode String bytes 4 ULONG Hex: 0x Decimal: 40 6A006F F F F F F006D Unicode String Value 40 johndoe@contoso.com 1F Row 2 Property 13 Property Tag 4 ULONG Hex: 0x f Decimal: C31AC00 Reserved 4 ULONG Hex: 0x00ac313c Decimal: F52047CFC2B06 Irrelevant Union 8 Binary 85F52047CFC2B06 0A Unicode String bytes 4 ULONG Hex: 0x a Decimal: D Unicode String Value 10 SMTP 1F Row 2 Property 14 Property Tag 4 ULONG Hex: 0x f Decimal: Reserved 4 ULONG Hex: 0x Decimal: 0 8FF5204FFFF0000 Irrelevant Union 8 Binary 8FF5204FFFF Unicode String bytes 4 ULONG Hex: 0x Decimal: 40 6A006F F F F F F006D Unicode String Value 40 johndoe@contoso.com 0300FF5F Row 2 Property 15 Property Tag 4 ULONG Hex: 0x5fff0003 Decimal: Reserved 4 ULONG Hex: 0x Decimal: 0 0 Property Union 8 PT_I4 Hex: 0x Decimal: D5F Row 2 Property 16 Property Tag 4 ULONG Hex: 0x5fde0003 Decimal: Reserved 4 ULONG Hex: 0x Decimal: Property Union 8 PT_I4 Hex: 0x Decimal: FD5F Row 2 Property 17 Property Tag 4 ULONG Hex: 0x5ffd0003 Decimal: D Reserved 4 ULONG Hex: 0x d Decimal: Property Union 8 PT_I4 Hex: 0x Decimal: 1 1F00F65F Row 2 Property 18 Property Tag 4 ULONG Hex: 0x5ff6001f Decimal:

20 Reserved 4 ULONG Hex: 0x Decimal: B7F Irrelevant Union 8 Binary B7F Unicode String bytes 4 ULONG Hex: 0x Decimal: 40 6A006F F F F F F006D Unicode String Value 40 johndoe@contoso.com 0201F75F Row 2 Property 19 Property Tag 4 ULONG Hex: 0x5ff70102 Decimal: Reserved 4 ULONG Hex: 0x Decimal: DFF5204 Irrelevant Union 8 Binary DFF Binary num bytes 4 ULONG Hex: 0x Decimal: A006F F F A006F F F F F F F Binary content 114 Binary 06F006D D0054 F006D D A006F F F F F F006D A006F F F F F F006D DF5F Row 2 Property 20 Property Tag 4 ULONG Hex: 0x5fdf0003 Decimal: Reserved 4 ULONG Hex: 0x Decimal: FD1300 Property Union 8 PT_I4 Hex: 0x Decimal: 0 0B Row 2 Property 21 Property Tag 4 ULONG Hex: 0x b Decimal: 90FD1300 Reserved 4 ULONG Property Union 8 PT_BOOLA N Hex: 0x0013fd90 Decimal: Hex: 0x Decimal: 0 1F Row 2 Property 22 Property Tag 4 ULONG Hex: 0x f Decimal: D09F3307 Reserved 4 ULONG Hex: 0x07339fd0 Decimal: F Irrelevant Union 8 Binary 51F Unicode String bytes 4 ULONG Hex: 0x Decimal: 40

21 6A006F F F F F F006D Unicode String Value Row 2 Property 23 Property Tag 4 ULONG C Reserved 4 ULONG BFFFF7F Property Union 8 PT_I DF47D72B6CA0 1 Footer Metadata 12 Binary johndoe@contoso.com Hex: 0x Decimal: Hex: 0x301044c7 Decimal: Hex: 0x Decimal: DF47D72B6CA0 1

Visa Smart Debit/Credit Certificate Authority Public Keys

Visa Smart Debit/Credit Certificate Authority Public Keys CHIP AND NEW TECHNOLOGIES Visa Smart Debit/Credit Certificate Authority Public Keys Overview The EMV standard calls for the use of Public Key technology for offline authentication, for aspects of online

More information

Discussion Session 9. CS/ECE 552 Ramkumar Ravi 26 Mar 2012

Discussion Session 9. CS/ECE 552 Ramkumar Ravi 26 Mar 2012 Discussion Session 9 CS/ECE 55 Ramkumar Ravi 6 Mar CS/ECE 55, Spring Mark your calendar IMPORTANT DATES TODAY 4/ Spring break 4/ HW5 due 4/ Project Demo HW5 discussion Error in mem_system_randbench.v (will

More information

Appendix C: Keyboard Scan Codes

Appendix C: Keyboard Scan Codes Thi d t t d ith F M k 4 0 2 Appendix C: Keyboard Scan Codes Table 90: PC Keyboard Scan Codes (in hex) Key Down Up Key Down Up Key Down Up Key Down Up Esc 1 81 [ { 1A 9A, < 33 B3 center 4C CC 1! 2 82 ]

More information

Xbox 360 File Specifications Reference

Xbox 360 File Specifications Reference Xbox 360 File Specifications Reference Introduction This reference attempts to document the specifications of the custom data formats in use by the Xbox 360 console. This data has either been discovered

More information

This proposal is to extend the Generic Devices, Telephony, Consumer and Alphanumeric Display pages to support Dual-Mode Telephone devices.

This proposal is to extend the Generic Devices, Telephony, Consumer and Alphanumeric Display pages to support Dual-Mode Telephone devices. Company: Microsoft Phone: +1-425-703-8380 FAX: +1.425.93-MSFAX email: nathans@microsoft.com CurrentStatus: Review - Content-related comments resolved. Priority: Normal Submitted: 14 January 2008 Voting

More information

2 ASCII TABLE (DOS) 3 ASCII TABLE (Window)

2 ASCII TABLE (DOS) 3 ASCII TABLE (Window) 1 ASCII TABLE 2 ASCII TABLE (DOS) 3 ASCII TABLE (Window) 4 Keyboard Codes The Diagram below shows the codes that are returned when a key is pressed. For example, pressing a would return 0x61. If it is

More information

Nemo 96HD/HD+ MODBUS

Nemo 96HD/HD+ MODBUS 18/12/12 Pagina 1 di 28 MULTIFUNCTION FIRMWARE 2.30 Nemo 96HD/HD+ MODBUS COMMUNICATION PROTOCOL CONTENTS 1.0 ABSTRACT 2.0 DATA MESSAGE DESCRIPTION 2.1 Parameters description 2.2 Data format 2.3 Description

More information

USB HID to PS/2 Scan Code Translation Table

USB HID to PS/2 Scan Code Translation Table Key Name HID Usage Page HID Usage ID PS/2 Set 1 Make* PS/2 Set 1 Break* PS/2 Set 2 Make PS/2 Set 2 Break System Power 01 81 E0 5E E0 DE E0 37 E0 F0 37 System Sleep 01 82 E0 5F E0 DF E0 3F E0 F0 3F System

More information

Outlook E-Mail. Step 1: Open and Configure Outlook

Outlook E-Mail. Step 1: Open and Configure Outlook Outlook E-Mail Step 1: Open and Configure Outlook 1. Click the Microsoft Button in the lower left task bar 2. Select All Programs 3. Select Microsoft Office 4. Select Microsoft Outlook 5. Follow the Start

More information

Parallax Serial LCD 2 rows x 16 characters Non-backlit (#27976) 2 rows x 16 characters Backlit (#27977) 4 rows x 20 characters Backlit (#27979)

Parallax Serial LCD 2 rows x 16 characters Non-backlit (#27976) 2 rows x 16 characters Backlit (#27977) 4 rows x 20 characters Backlit (#27979) 599 Menlo Drive, Suite 100 Rocklin, California 95765, USA Office: (916) 624-8333 Fax: (916) 624-8003 General: info@parallax.com Technical: support@parallax.com Web Site: www.parallax.com Educational: www.stampsinclass.com

More information

Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr

Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Copyright c 2007-2010 Xavier Clerc cadmium@x9c.fr Released under the LGPL version 3 February 6, 2010 Abstract: This

More information

Hagenberg Linz Steyr Wels. API Application Programming Interface

Hagenberg Linz Steyr Wels. API Application Programming Interface Hagenberg Linz Steyr Wels API Application Programming Interface Version 1.1 October 2015 FH OÖ Forschungs & Entwicklungs GmbH Franz-Fritsch-Strasse 11 / Top 3 4600 Wels Austria Research Center Hagenberg

More information

URL encoding uses hex code prefixed by %. Quoted Printable encoding uses hex code prefixed by =.

URL encoding uses hex code prefixed by %. Quoted Printable encoding uses hex code prefixed by =. ASCII = American National Standard Code for Information Interchange ANSI X3.4 1986 (R1997) (PDF), ANSI INCITS 4 1986 (R1997) (Printed Edition) Coded Character Set 7 Bit American National Standard Code

More information

Application Note RMF Magic 5.1.0: EMC Array Group and EMC SRDF/A Reporting. July 2009

Application Note RMF Magic 5.1.0: EMC Array Group and EMC SRDF/A Reporting. July 2009 Application Note RMF Magic 5.1.0: EMC Array Group and EMC SRDF/A Reporting July 2009 Summary: This Application Note describes the new functionality in RMF Magic 5.1 that enables more effective monitoring

More information

Cache Configuration Reference

Cache Configuration Reference Sitecore CMS 6.2 Cache Configuration Reference Rev: 2009-11-20 Sitecore CMS 6.2 Cache Configuration Reference Tips and Techniques for Administrators and Developers Table of Contents Chapter 1 Introduction...

More information

ACR122 NFC Contactless Smart Card Reader

ACR122 NFC Contactless Smart Card Reader Datenblatt / Specifications ACR122 NFC Contactless Smart Card Reader Table of Contents 1. Introduction... 3 1.1. USB Interface... 3 2. Implementation... 4 2.1. Smart Card Reader Interface Overview... 5

More information

Configurable Events for APC Network Management Card

Configurable Events for APC Network Management Card Configurable s for APC Network Management Card Table of Contents Silcon DP300E Series 3 Smart-UPS / Matrix 7 Symmetra 9 Symmetra 3-Phase 13 Environmental Monitor 21 Configurable s for APC Network Management

More information

Application Programming Interface

Application Programming Interface Application Programming Interface Advanced Card Systems Ltd. Website: www.acs.com.hk Email: info@acs.com.hk CONTENTS Introduction 4 Features 4 USB interface 4 Contact and Contactless interface handling

More information

ND48-RS ASCII A2.04 Communication Protocol

ND48-RS ASCII A2.04 Communication Protocol ND48-RS ASCII A2.04 Communication Protocol SEM 06.2003 Str. 1/6 ND48-RS ASCII A2.04 Communication Protocol ASCII A2.04 protocol provides serial communication with most of the measurement and control devices

More information

CPM 5.2.1 5.6 release notes

CPM 5.2.1 5.6 release notes 1 (18) CPM 5.2.1 5.6 release notes Aditro Oy, 2014 CPM Release Notes Page 1 of 18 2 (18) Contents Fakta version 5.2.1. version 1.2.1... 3 Fakta version 5.2.1.1038 sp1 version 1.2.1.300 sp1... 4 Fakta version

More information

Table 1 below is a complete list of MPTH commands with descriptions. Table 1 : MPTH Commands. Command Name Code Setting Value Description

Table 1 below is a complete list of MPTH commands with descriptions. Table 1 : MPTH Commands. Command Name Code Setting Value Description MPTH: Commands Table 1 below is a complete list of MPTH commands with descriptions. Note: Commands are three bytes long, Command Start Byte (default is 128), Command Code, Setting value. Table 1 : MPTH

More information

Supporting ZDOs with the XBee API

Supporting ZDOs with the XBee API Supporting ZDOs with the XBee API The ZigBee Device Profile is a management and discovery service layer supported on all ZigBee devices. Like all other profiles, the ZigBee Device Profile defines a set

More information

Pattern Co. Monkey Trouble Wall Quilt. Size: 48" x 58"

Pattern Co. Monkey Trouble Wall Quilt. Size: 48 x 58 .............................................................................................................................................. Pattern Co..........................................................................................

More information

Decimal to Binary Conversion

Decimal to Binary Conversion Decimal to Binary Conversion A tool that makes the conversion of decimal values to binary values simple is the following table. The first row is created by counting right to left from one to eight, for

More information

E-mailing a large amount of recipients

E-mailing a large amount of recipients E-mailing a large amount of recipients DO NOT use the TO or CC field! If you have a large list of recipients you need to send an email you, you should never try sending one large email with all of the

More information

SERVER CERTIFICATES OF THE VETUMA SERVICE

SERVER CERTIFICATES OF THE VETUMA SERVICE Page 1 Version: 3.5, 4.11.2015 SERVER CERTIFICATES OF THE VETUMA SERVICE 1 (18) Page 2 Version: 3.5, 4.11.2015 Table of Contents 1. Introduction... 3 2. Test Environment... 3 2.1 Vetuma test environment...

More information

The Hexadecimal Number System and Memory Addressing

The Hexadecimal Number System and Memory Addressing APPENDIX C The Hexadecimal Number System and Memory Addressing U nderstanding the number system and the coding system that computers use to store data and communicate with each other is fundamental to

More information

We r e going to play Final (exam) Jeopardy! "Answers:" "Questions:" - 1 -

We r e going to play Final (exam) Jeopardy! Answers: Questions: - 1 - . (0 pts) We re going to play Final (exam) Jeopardy! Associate the following answers with the appropriate question. (You are given the "answers": Pick the "question" that goes best with each "answer".)

More information

File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1

File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1 File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New

More information

SERVER CERTIFICATES OF THE VETUMA SERVICE

SERVER CERTIFICATES OF THE VETUMA SERVICE Page 1 Version: 3.4, 19.12.2014 SERVER CERTIFICATES OF THE VETUMA SERVICE 1 (18) Page 2 Version: 3.4, 19.12.2014 Table of Contents 1. Introduction... 3 2. Test Environment... 3 2.1 Vetuma test environment...

More information

Programmer s Reference

Programmer s Reference Programmer s Reference 1 Introduction This manual describes Launchpad s MIDI communication format. This is all the proprietary information you need to be able to write patches and applications that are

More information

SL-8800 HDCP 2.2 and HDCP 1.x Protocol Analyzer for HDMI User Guide

SL-8800 HDCP 2.2 and HDCP 1.x Protocol Analyzer for HDMI User Guide SL-8800 HDCP 2.2 and HDCP 1.x Protocol Analyzer for HDMI Simplay-UG-02003-A July 2015 Contents 1. Overview... 4 1.1. SL-8800 HDCP Protocol Analyzer Test Equipment... 4 1.2. HDCP 2.2/HDCP 1.x Protocol Analyzer

More information

Note: Before E-Z Mail can be installed; Microsoft Outlook or Lotus Notes must be installed on your system.

Note: Before E-Z Mail can be installed; Microsoft Outlook or Lotus Notes must be installed on your system. Note: Before E-Z Mail can be installed; Microsoft Outlook or Lotus Notes must be installed on your system. Install E-Z Mail by using the E-Z Mail installation on the original CDS installation disk, or

More information

Binary Representation

Binary Representation Binary Representation The basis of all digital data is binary representation. Binary - means two 1, 0 True, False Hot, Cold On, Off We must tbe able to handle more than just values for real world problems

More information

Application Note. Introduction AN2471/D 3/2003. PC Master Software Communication Protocol Specification

Application Note. Introduction AN2471/D 3/2003. PC Master Software Communication Protocol Specification Application Note 3/2003 PC Master Software Communication Protocol Specification By Pavel Kania and Michal Hanak S 3 L Applications Engineerings MCSL Roznov pod Radhostem Introduction The purpose of this

More information

Outline. Cache Parameters. Lecture 5 Cache Operation

Outline. Cache Parameters. Lecture 5 Cache Operation Lecture Cache Operation ECE / Fall Edward F. Gehringer Based on notes by Drs. Eric Rotenberg & Tom Conte of NCSU Outline Review of cache parameters Example of operation of a direct-mapped cache. Example

More information

Chapter 4: Computer Codes

Chapter 4: Computer Codes Slide 1/30 Learning Objectives In this chapter you will learn about: Computer data Computer codes: representation of data in binary Most commonly used computer codes Collating sequence 36 Slide 2/30 Data

More information

EMAIL QUICK START GUIDE

EMAIL QUICK START GUIDE IT Services Microsoft Outlook 2010 EMAIL QUICK START GUIDE Contents What is Outlook?...2 Quick Guide to Email...2 Create a new e-mail message...2 Forward or reply to an e-mail message...2 Creating new

More information

Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.7

Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.7 Written By: Adam Berent Advanced Encryption Standard by Example V.1.7 1.0 Preface The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL)

More information

Using SQL Server Management Studio

Using SQL Server Management Studio Using SQL Server Management Studio Microsoft SQL Server Management Studio 2005 is a graphical tool for database designer or programmer. With SQL Server Management Studio 2005 you can: Create databases

More information

Base Conversion written by Cathy Saxton

Base Conversion written by Cathy Saxton Base Conversion written by Cathy Saxton 1. Base 10 In base 10, the digits, from right to left, specify the 1 s, 10 s, 100 s, 1000 s, etc. These are powers of 10 (10 x ): 10 0 = 1, 10 1 = 10, 10 2 = 100,

More information

Consult protocol, Nissan Technical egroup, Issue 6

Consult protocol, Nissan Technical egroup, Issue 6 Consult protocol, Nissan Technical egroup, Issue 6 1. Electrical and Signaling protocol 1.1. Consult terminal or PC communications is via three wire bus. TX, RX and Async Clock. 1.2. TX data to ECU level

More information

Windows 7 Security Event Log Format

Windows 7 Security Event Log Format Windows 7 ecurity vent Log Format Todd Heberlein 23 ep 2010 Windows security event log provides a rich source of information to detect and analyze a wide range of threats against computer systems. Unfortunately

More information

Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.5

Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.5 Written By: Adam Berent Advanced Encryption Standard by Example V.1.5 1.0 Preface The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL)

More information

Extensible Storage Engine (ESE) Database File (EDB) format specification

Extensible Storage Engine (ESE) Database File (EDB) format specification Extensible Storage Engine (ESE) Database File (EDB) format specification Analysis of the Extensible Storage Engine (ESE) Database File (EDB) format By Joachim Metz Summary

More information

OUTLOOK WEB APP (OWA): MAIL

OUTLOOK WEB APP (OWA): MAIL Office 365 Navigation Pane: Navigating in Office 365 Click the App Launcher and then choose the application (i.e. Outlook, Calendar, People, etc.). To modify your personal account settings, click the Logon

More information

Microsoft Office 365 Exchange Online Cloud

Microsoft Office 365 Exchange Online Cloud Microsoft Office 365 Exchange Online Cloud 9/24/14 Jason K. 1. Instructions When a Distribution Group (or other migrated account) email address bounces back with a message like the following: Delivery

More information

Bluetooth HID Profile

Bluetooth HID Profile RN-WIFLYCR-UM-.01 RN-HID-UM Bluetooth HID Profile 2012 Roving Networks. All rights reserved. Version 1.0r 1/17/2012 USER MANUAL www.rovingnetworks.com 1 OVERVIEW Roving Networks Bluetooth modules support

More information

HOST Embedded System. SLAVE EasyMDB interface. Reference Manual EasyMDB RS232-TTL. 1 Introduction

HOST Embedded System. SLAVE EasyMDB interface. Reference Manual EasyMDB RS232-TTL. 1 Introduction Reference Manual EasyMDB RS232-TTL 1 Introduction This document explains how to use the interface EasyMDB RS232-TTL and describe the connections and the necessary commands for communicating with Cash System

More information

MICROSOFT OUTLOOK 2010 READ, ORGANIZE, SEND AND RESPONSE E-MAILS

MICROSOFT OUTLOOK 2010 READ, ORGANIZE, SEND AND RESPONSE E-MAILS MICROSOFT OUTLOOK 2010 READ, ORGANIZE, SEND AND RESPONSE E-MAILS Last Edited: 2012-07-09 1 Read Emails... 4 Find the inbox... 4 Change new incoming e-mail notification options... 5 Read email... 6 Change

More information

Syscall 5. Erik Jonsson School of Engineering and Computer Science. The University of Texas at Dallas

Syscall 5. Erik Jonsson School of Engineering and Computer Science. The University of Texas at Dallas Syscall 5 System call 5 allows input of numerical data from the keyboard while a program is running. Syscall 5 is a bit unusual, in that it requires the use of register $v0 twice. In syscall 5 (as for

More information

3. USB FLASH DRIVE PREPARATION. Almost all current PC firmware permits booting from a USB drive, allowing the launch

3. USB FLASH DRIVE PREPARATION. Almost all current PC firmware permits booting from a USB drive, allowing the launch 3. USB FLASH DRIVE PREPARATION 3.1 INTRODUCTION Almost all current PC firmware permits booting from a USB drive, allowing the launch of an operating system from a bootable flash drive. Such a configuration

More information

PSM/SAK Event Log Error Codes

PSM/SAK Event Log Error Codes PSM Error Codes PSM/SAK Event Log Error Codes If you experience a problem using Persistent Storage Manager, the following list of event log messages can be used to troubleshoot. Error codes are logged

More information

Storing Measurement Data

Storing Measurement Data Storing Measurement Data File I/O records or reads data in a file. A typical file I/O operation involves the following process. 1. Create or open a file. Indicate where an existing file resides or where

More information

Simple Image File Formats

Simple Image File Formats Chapter 2 Simple Image File Formats 2.1 Introduction The purpose of this lecture is to acquaint you with the simplest ideas in image file format design, and to get you ready for this week s assignment

More information

This text refers to the 32bit version of Windows, unfortunately I don't have access to a 64bit development environment.

This text refers to the 32bit version of Windows, unfortunately I don't have access to a 64bit development environment. Windows 7/2008 Event Log forensic and reversing analysis eseugutrop Reversed 2011/03/16 by ar1vr This text refers to the 32bit version of Windows, unfortunately I don't have access to a 64bit development

More information

RTI Real-Time Connect. Release Notes

RTI Real-Time Connect. Release Notes RTI Real-Time Connect Release Notes Version 4.5f 2012 Real-Time Innovations, Inc. All rights reserved. Printed in U.S.A. First printing. March 2012. Trademarks Real-Time Innovations, RTI, and Connext are

More information

CTNET Field Protocol Specification November 19, 1997 DRAFT

CTNET Field Protocol Specification November 19, 1997 DRAFT CTNET Field Protocol Specification November 19, 1997 DRAFT Introduction Version 1.0 of CTNET will support the AB3418 protocol for communication to field controllers. AB3418 is a point-topoint protocol

More information

Training Manual. Version 6

Training Manual. Version 6 Training Manual TABLE OF CONTENTS A. E-MAIL... 4 A.1 INBOX... 8 A.1.1 Create New Message... 8 A.1.1.1 Add Attachments to an E-mail Message... 11 A.1.1.2 Insert Picture into an E-mail Message... 12 A.1.1.3

More information

Brunata Optuna W (171)

Brunata Optuna W (171) Brunata Optuna W (171) Communication description Edition 1.1 UK-QB101414 / 26.02.2013 Brunata a/s is a Danish owned company. We have more than 90 years of experience within developing and producing meters,

More information

Soft-Starter SSW-06 V1.6X

Soft-Starter SSW-06 V1.6X Motors Energy Automation Coatings Soft-Starter SSW-06 V1.6X Serial Communication Manual Language: English Document: 0899.5731 / 04 Serial Communication Manual Series: SSW-06 V1.6X Language: English Document

More information

The first thing to do is choose if you are creating a mail merge for printing or an e-mail merge for distribution over e-mail.

The first thing to do is choose if you are creating a mail merge for printing or an e-mail merge for distribution over e-mail. Create a mail or e-mail merge Use mail or e-mail merge when you want to create a large number of documents that are mostly identical but include some unique information. For example, you can use mail merge

More information

UNDERSTANDING SMS: Practitioner s Basics

UNDERSTANDING SMS: Practitioner s Basics UNDERSTANDING SMS: Practitioner s Basics Michael Harrington, CFCE, EnCE It is estimated that in 2006, 72% of all mobile phone users world wide were active users of SMS or text messaging. In European countries

More information

ECDL. European Computer Driving Licence. Spreadsheet Software BCS ITQ Level 2. Syllabus Version 5.0

ECDL. European Computer Driving Licence. Spreadsheet Software BCS ITQ Level 2. Syllabus Version 5.0 European Computer Driving Licence Spreadsheet Software BCS ITQ Level 2 Using Microsoft Excel 2010 Syllabus Version 5.0 This training, which has been approved by BCS, The Chartered Institute for IT, includes

More information

Hacking cars in the style of Stuxnet

Hacking cars in the style of Stuxnet Hacking cars in the style of Stuxnet András Szijj 1, Levente Buttyán 1, Zsolt Szalay 2 1 CrySyS Lab, Department of Networked Systems and Services 2 Department of Automobiles and Vehicle Manufacturing Budapest

More information

Off-by-One exploitation tutorial

Off-by-One exploitation tutorial Off-by-One exploitation tutorial By Saif El-Sherei www.elsherei.com Introduction: I decided to get a bit more into Linux exploitation, so I thought it would be nice if I document this as a good friend

More information

7-1. This chapter explains how to set and use Event Log. 7.1. Overview... 7-2 7.2. Event Log Management... 7-2 7.3. Creating a New Event Log...

7-1. This chapter explains how to set and use Event Log. 7.1. Overview... 7-2 7.2. Event Log Management... 7-2 7.3. Creating a New Event Log... 7-1 7. Event Log This chapter explains how to set and use Event Log. 7.1. Overview... 7-2 7.2. Event Log Management... 7-2 7.3. Creating a New Event Log... 7-6 7-2 7.1. Overview The following are the basic

More information

GroupWise to MS Outlook 2007

GroupWise to MS Outlook 2007 GroupWise to MS Outlook 2007 "GroupWise to MS Outlook 2007" The following is a list of GroupWise features with the equivalent names and brief instructions for performing similar actions in Microsoft Outlook.

More information

ONLINEHELP. Flexi Soft RK512. RK512 Telegram-Listing. RK512 Telegram-Listing

ONLINEHELP. Flexi Soft RK512. RK512 Telegram-Listing. RK512 Telegram-Listing ONLINEHELP Flexi Soft RK512 RK512 Telegram-Listing RK512 Telegram-Listing GB This document is protected by the law of copyright, whereby all rights established therein remain with the company SICK AG.

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Mulberry Internet Email/Calendar Client Version 4.0 Cyrus Daboo Pittsburgh PA USA mailto:mulberry@mulberrymail.com http://www.mulberrymail.com/ Information in this document is subject

More information

Intel Solid State Drive Toolbox

Intel Solid State Drive Toolbox 3.3.6 Document Number: 325993-027US Intel technologies features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending

More information

Exercise 1: Set up the Environment

Exercise 1: Set up the Environment RFID Lab Gildas Avoine, 2014 Contact: gildas.avoine@irisa.fr Objective: Learn how much it is easy to read contactless tags, possibly simulate/clone. Requirement: Hardware: Reader SCL3711 or ACR122, Reader

More information

Outlook Quick Steps & Rules

Outlook Quick Steps & Rules Page 1 of 8 Page 1 of 8 Page 1 of 8 Automate common or repetitive tasks with Quick Steps and manage email messages by using Rules. QUICK STEPS Default Quick Steps in Outlook 2013: Quick Step Move to: To

More information

NFC Tag Type 5 Specification

NFC Tag Type 5 Specification Document Type: Software Technical Specification Reference: STS_NFC_0707-001 Version 1.8 (14516) Release Date: Nov. 18, 2011 File Name: STS_NFC_0707-001 NFC Tag Type 5 Specification.pdf Security Level:

More information

TCG. TCG Storage Application Note: Encrypting Storage Devices Compliant with Enterprise SSC. Specification Version 1.00 Final Revision 1.

TCG. TCG Storage Application Note: Encrypting Storage Devices Compliant with Enterprise SSC. Specification Version 1.00 Final Revision 1. TCG Storage Application Note: Encrypting Storage Devices Compliant with Enterprise SSC Specification Version 1.00 Final Revision 1.00 December 21, 2009. Contacts: admin@trustedcomputinggroup.org TCG Copyright

More information

CROSS REFERENCE. Cross Reference Index 110-122. Cast ID Number 110-111 Connector ID Number 111 Engine ID Number 112-122. 2015 Ford Motor Company 109

CROSS REFERENCE. Cross Reference Index 110-122. Cast ID Number 110-111 Connector ID Number 111 Engine ID Number 112-122. 2015 Ford Motor Company 109 CROSS REFERENCE Cross Reference Index 110-122 Cast ID Number 110-111 Connector ID Number 111 112-122 2015 Ford Motor Company 109 CROSS REFERENCE Cast ID Number Cast ID Ford Service # MC Part # Part Type

More information

BCSD WebMail Documentation

BCSD WebMail Documentation BCSD WebMail Documentation Outlook Web Access is available to all BCSD account holders! Outlook Web Access provides Webbased access to your e-mail, your calendar, your contacts, and the global address

More information

ISDN Diagnostic Codes

ISDN Diagnostic Codes ISDN Diagnostic Codes See also: Error Messages - Main Menu Cause Code (Dec) Value in trace (Dec) Cause Code (Hex) Value in trace (Hex) Meaning Category 0 - normal event 00 128 00 80 Normal Disconnect 01

More information

Community College of Philadelphia Calling Code 218 Employer Scan Client Approved: November 17, 2005 Region (CIRCLE) City MSA

Community College of Philadelphia Calling Code 218 Employer Scan Client Approved: November 17, 2005 Region (CIRCLE) City MSA Community College of Philadelphia Calling Code 218 Employer Scan Client Approved: November 17, 2005 Region (CIRCLE) City MSA Zip V0 V1 V2 Month/ Day/ Year of Contact: Business Name: Address: V3 City: V4

More information

User Manual Microsoft Dynamics AX Add-on LabAX Label Printing

User Manual Microsoft Dynamics AX Add-on LabAX Label Printing User Manual Microsoft Dynamics AX Add-on LabAX Label Printing Version 1.7 Last Update: 17.04.2011 User Manual Microsoft Dynamics AX Add-on LabAX Label Printing Page 2 / 23 Contents 1 Introduction... 3

More information

Terms and Definitions for CMS Administrators, Architects, and Developers

Terms and Definitions for CMS Administrators, Architects, and Developers Sitecore CMS 6 Glossary Rev. 081028 Sitecore CMS 6 Glossary Terms and Definitions for CMS Administrators, Architects, and Developers Table of Contents Chapter 1 Introduction... 3 1.1 Glossary... 4 Page

More information

The x86 PC: Assembly Language, Design, and Interfacing 5 th Edition

The x86 PC: Assembly Language, Design, and Interfacing 5 th Edition Online Instructor s Manual to accompany The x86 PC: Assembly Language, Design, and Interfacing 5 th Edition Muhammad Ali Mazidi Janice Gillispie Mazidi Danny Causey Prentice Hall Boston Columbus Indianapolis

More information

SDLT Event Log Troubleshooting Guide

SDLT Event Log Troubleshooting Guide SDLT Event Log Troubleshooting Guide 8/30/01 Quantum Corporation Created by Anthony G Tan Page 1 Rev A4 How to Use this Document This manual support SDLT220. The manual is in numerical order of the EVENT

More information

Merging Labels, Letters, and Envelopes Word 2013

Merging Labels, Letters, and Envelopes Word 2013 Merging Labels, Letters, and Envelopes Word 2013 Merging... 1 Types of Merges... 1 The Merging Process... 2 Labels - A Page of the Same... 2 Labels - A Blank Page... 3 Creating Custom Labels... 3 Merged

More information

XMailer Reference Guide

XMailer Reference Guide XMailer Reference Guide Version 7.00 Wizcon Systems SAS Information in this document is subject to change without notice. SyTech assumes no responsibility for any errors or omissions that may be in this

More information

Exchange Mailbox Protection

Exchange Mailbox Protection User Guide This guide applies to Windows Server 2008 and later. For Windows Server 2003, refer to the Exchange Server Protection whitepaper. BackupAssist User Guides explain how to create and modify backup

More information

EMV (Chip-and-PIN) Protocol

EMV (Chip-and-PIN) Protocol EMV (Chip-and-PIN) Protocol Märt Bakhoff December 15, 2014 Abstract The objective of this report is to observe and describe a real world online transaction made between a debit card issued by an Estonian

More information

How To Send A Message From A Computer To A Computer (Iwea) On A Microsoft Macbook 2.5 (Isoa) To A Microsatellite 2.4 (Ios) On An Unix (Ise

How To Send A Message From A Computer To A Computer (Iwea) On A Microsoft Macbook 2.5 (Isoa) To A Microsatellite 2.4 (Ios) On An Unix (Ise 1. PROTOCOL ASTRA COMMUNICATION PROTOCOL (via RS232C) Argentina specification (B0319G) 26 Oct 2004 METHOD TRANSMISSION CONTROL PROCEDURE BAUD RATE DATA BIT STOP BIT PARITY DATA COMMUNCATION ORDER CONNECTOR

More information

PRODUCT MANUAL SKX OPEN SKX ADVANCE ZN1RX-SKXOPEN. Edition 2 Version 1.1

PRODUCT MANUAL SKX OPEN SKX ADVANCE ZN1RX-SKXOPEN. Edition 2 Version 1.1 PRODUCT MANUAL SKX OPEN SKX ADVANCE ZN1RX-SKXOPEN Edition 2 Version 1.1 INDEX 1. Introduction... 3 1.1. SKX Interface... 3 1.2. SKX Installation... 5 1.3. SKX Advance: Application Program... 5 1.3.1. SKX

More information

THE MYSTERIOUS OUTLOOK OUTBOX

THE MYSTERIOUS OUTLOOK OUTBOX THE MYSTERIOUS OUTLOOK OUTBOX Understand why messages get stuck in the Outbox folder in an Exchange environment. (Today's post is courtesy of Scott Bradley, Principal Escalation Engineer, Office Technical

More information

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Medical Administrative Aspects

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Medical Administrative Aspects NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS COURSE IDENTIFICATION Course Code/Number: ALMA 120 Course Title: Medical Administrative Aspects Division: Applied Science (AS) Liberal Arts (LA) Workforce

More information

Volume Serial Numbers and Format Date/Time Verification

Volume Serial Numbers and Format Date/Time Verification Volume Serial Numbers and Format Date/Time Verification Written by Craig Wilson, MSc MBCS CITP Digital Detective Group October 2003 (updated June 2005) Table of Contents Table of Contents... 2 Introduction...

More information

15R1 Enterprise Email Integration and Functionality

15R1 Enterprise Email Integration and Functionality Help Documents 15R1 Enterprise Email Integration and Functionality The integration of email within Enterprise allows Enterprise users to mirror their Microsoft Outlook. or other SMTP or IMAP email, including

More information

USB Simply Buffered (USB) Mass Storage Class Bulk-Only Transport

USB Simply Buffered (USB) Mass Storage Class Bulk-Only Transport USB Simply Buffered (USB) ass Storage Class Bulk-Only Transport Copyright 2007. Shakthi Kannan. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation

More information

20 Using Scripts. (Programming without Parts) 20-1

20 Using Scripts. (Programming without Parts) 20-1 20 Using Scripts (Programming without Parts) This chapter explains the basics of creating and using programming scripts in GP-Pro EX. Please start by reading 20.1 Settings Menu (page 20-2) and then turn

More information

SRF08 Ultra sonic range finder Technical Specification

SRF08 Ultra sonic range finder Technical Specification SRF08 Ultra sonic range finder Technical Specification Communication with the SRF08 ultrasonic rangefinder is via the I2C bus. This is available on popular controllers such as the OOPic and Stamp BS2p,

More information

[ X OR DDoS T h r e a t A d v i sory] akamai.com

[ X OR DDoS T h r e a t A d v i sory] akamai.com [ X OR DDoS T h r e a t A d v i sory] akamai.com What is the XOR DDoS threat The XOR DDoS botnet has produced DDoS attacks from a few Gbps to 150+ Gbps The gaming sector has been the primary target, followed

More information

Mastering Mail Merge. 2 Parts to a Mail Merge. Mail Merge Mailings Ribbon. Mailings Create Envelopes or Labels

Mastering Mail Merge. 2 Parts to a Mail Merge. Mail Merge Mailings Ribbon. Mailings Create Envelopes or Labels 2 Parts to a Mail Merge 1. MS Word Document (Letter, Labels, Envelope, Name Badge, etc) 2. Data Source Excel Spreadsheet Access Database / query Other databases (SQL Server / Oracle) Type in New List Mail

More information

GB ethernet UDP interface in FPGA

GB ethernet UDP interface in FPGA GB ethernet UDP interface in FPGA NIKHEF, PeterJ 05 August 2013 1 LED0 RxFifos 0 1 n Rx Stream Select Rx_buf2data pkt_buffers Rx Packet Buffer 64 KB Flags Rx_mac2buf Overview Good/Bad Frame Rx FPGA ML605

More information

Counting in base 10, 2 and 16

Counting in base 10, 2 and 16 Counting in base 10, 2 and 16 1. Binary Numbers A super-important fact: (Nearly all) Computers store all information in the form of binary numbers. Numbers, characters, images, music files --- all of these

More information