Validating Malware Signature Installations on Ixia BreakingPoint Hardware
|
|
- Shon Berry
- 7 years ago
- Views:
Transcription
1 Validating Malware Signature Installations on Ixia BreakingPoint Hardware 1
2 Introduction Ixia BreakingPoint products ship with the capability to generate large numbers of live malware binaries, which can then be sent in two-arm fashion through a network topology of your choosing. This is very useful in determining whether firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and related equipment can correctly detect (and block!) these binaries via policies such as routine malware signature analysis. Using Ixia BreakingPoint equipment in two-arm fashion for this testing ensures that nothing else in the network will be compromised. Solutions are configured in two-armed mode to be both the originating element and the terminating element, using IPv4 addresses, IPv6 addresses, or both. However, this feature cannot be used unless users log in to Ixia s secure StrikeCenter support site with the appropriate customer credentials and download and install the binary malware strikepacks. Until then, if you attempt to select and configure one or more of our malware strikes, the output Reports will show Errored Malware package X missing where the X will vary based on the package number in question. There are currently seven malware strikepacks (numbered 0-6) available from our StrikeCenter portal, and each package is roughly 1GB in size. Once you ve downloaded and installed the appropriate packages, you won t see a change in the total number of your security strikes. It will be exactly the same as before because all that s happened with the malware strikepack updates is that malware binary images have been attached to the previous templatized placeholders for each. Although you won t see a change in the total number of strikes after installing the malware strikepacks, there is still a simple way to validate that they have been installed correctly. Just pick one piece of malware from each of the seven packages, saving the results to a strike list, and run them through a security component across a piece of cable connecting two ports of your Ixia BreakingPoint unit. When the test is completed, you can analyze the report data and verify that strikes were allowed through the cable, or in the case that the packages have not been installed, that strikes were reported as Errored. Let s walk through the entire process of creating and running this simple validation test. 2
3 Methodology First, choose Managers > Strike Lists from the home screen: In the Search box, enter malware package You ll see precisely two results which cover the first two packages. Right-click on the results and choose Add All Results : 3
4 You ll notice that the total number of strikes included is now displayed as 2 in the top right. Next, we change our search term to be malware package You ll see precisely two more strikes. Right-click on the results and choose Add All Results. Your total count will now be four. Do this again using a search term of malware package package You ll see precisely two more strikes. Right-click on the results and choose Add All Results. Your total count will now be six. You now have just one more to do, from package 6, so use the search term malware package You ll see two search results here, but you only need the one from package 6, so left-click that one so that it turns yellow, and then right-click and choose Add Strike. 4
5 When that s done, you ll notice you now have seven strikes, precisely one from each of the seven packages. Save this seven-count strike list by selecting Strike List > Save As: A dialog will prompt you for a name; let s call it Malware Package Validation. Once you ve done that, click on the eye icon in the top right to double-check that you ve included one strike from each package: Looks like we did a good job! We have one piece of malware from each of the seven packages (indexed 0-6), just like we wanted. 5
6 Now we will reserve the two ports that we ve externally connected with a piece of cable. To select the ports you ve connected, click the green chassis icon on the top of the home screen, click on the two ports that you connected your cable to, and then close the chassis window: Now we will create our test configuration. From the home screen select Test > New Test: 6
7 Since we are just running across a piece of cable, the network addressing doesn t really matter much, so we will leave the default setting of BreakingPoint Switching which will work just fine. In the Test Components section, click the Add New button and select a Security component, and the click Select: A dialog will prompt you to enter the component name, which we ll call Malware Validation. Once you ve done that, click on the component name on the left to be able to configure it: 7
8 The basic security configuration screen is quite simple. In the upper left, you can change the name or add a description. In the Component Tags section, you can map the addressing from the default BreakingPoint Switching network neighborhood, and since we re just on a loopback cable, leave the defaults as-is. On the right you can select the various security parameters. In this case we ll use all of the default values, except that we want to use our created Malware Package Validation strike list. Click Browse and select it while entering a package search keyword to make it easier to find: 8
9 Once you ve selected the Malware Package Validation strike list, your test configuration shows it as selected: 9
10 Once you ve clicked on the Return to Test Workspace button in the bottom of that screen, you simply have to save and run the test by clicking the Save and Run button in the bottom right. A dialog will ask for the name of the test, which we ll call Malware Package Validation, then click Save : Once the save operation finishes, the test will begin to initialize, which only takes a few seconds, after which it will immediately start to run. It will run very quickly, as it doesn t take long for the malware binaries to propagate from the origination to the termination point across the loopback cable. 10
11 While the test is running, you can investigate the Attacks tab in the real time statistics to monitor progress: In this case, all seven strikes were Errored! That means that this Ixia BreakingPoint box does not have any of the malware packages installed. You can also see a more detailed message as to the problem in the detailed report for the test: 11
12 If, on the other hand, the Ixia BreakingPoint unit had one or more of the malware packages installed, then at run-time you would actually get a warning that you must click Yes on to proceed. You might think that this is sufficient to ensure that the packages were correctly installed, but it is not. If any one of the packages had been correctly installed, this warning will be displayed, but it doesn t tell you if all of them were correctly installed: Once you click yes, the test will finish initializing and run. It runs very fast, so you ll probably see the test completion dialog before you have a chance to go to the Attacks tab. That s okay; you ll note that the Test Criteria failed, because the default criteria expects that these security malware strikes would have been blocked by network security equipment in the path. That did not happen since we are running in a looped back environment all of the attacks got right through. So once you click close on that window and choose the Attacks tab, you ll see your results. In order to truly validate the results, you ll need to investigate the full output report. Here, in this example, we determine that malware package 1 was successfully installed (as we report that the strike was allowed through the network under test which was just a simple piece of CAT6 cable between two ports): 12
13 After investigation of the remaining strikes, all are reported as Errored. For simplicity, we show only the last one, for package 6: And so you now know that only one of the seven malware packages was installed, and that you ll need to install the other six. After doing that, this test can be re-run to verify that all seven strikes lists are Allowed in the Strike Result field in the output report. 13
Using e-mail and the Internet
Using e-mail and the Internet New to Windows 7? Even though there s a lot in common with the version of Windows that you had before, you might still need a hand getting up to speed. This guide is filled
More informationEnjoying EPUB ebooks on Your Nook
Enjoying EPUB ebooks on Your Nook From the New Hampshire Downloadable Books Consortium Outline: 1. Download & Install Adobe Digital Editions. 2. Register for an Adobe account or use your existing account
More informationATTENTION: End users should take note that Main Line Health has not verified within a Citrix
Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal
More informationCOMMONWEALTH OF PA OFFICE OF ADMINISTRATION. Human Resource Development Division. SAP LSO-AE Desk Guide 15 T H J A N U A R Y, 2 0 1 3
COMMONWEALTH OF PA OFFICE OF ADMINISTRATION Human Resource Development Division SAP LSO-AE Desk Guide 15 T H J A N U A R Y, 2 0 1 3 S A P L S O A U T H O R I N G E N V I R O N M E N T Authoring & Publishing
More informationCLEARONE DOCUMENT 801-000-002 (REVISION 1.0) October, 2008. with Converge Pro Units
APPLICATION NOTES Converge Pro Products CLEARONE DOCUMENT 801-000-002 (REVISION 1.0) October, 2008. Troubleshooting USB Connections with Converge Pro Units Description This document explains how to connect
More informationCOPYRIGHT TOP NOTCH TABLETS LLC. 2012. HOW TO: Install the Drivers to your PC so you can Flash Firmware to your RK3066 Powered Tablet.
HOW TO: Install the Drivers to your PC so you can Flash Firmware to your RK3066 Powered Tablet. 1. Inside the RKBatchTool1.5en folder you will see a sub folder called Driver 2. Inside of that folder are
More informationRTI Integration Release Notes
RTI Integration Release Notes Content Introduction...1 Connecting the XP-3 controller to the ClareHome data network...2 Configuring with Integration Designer...2 Configuring in Fusion...6 Button IDs and
More informationVirtual Appliance Setup Guide
The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment
More informationPigCHAMP Knowledge Software. Enterprise Edition Installation Guide
PigCHAMP Knowledge Software Enterprise Edition Installation Guide Enterprise Edition Installation Guide MARCH 2012 EDITION PigCHAMP Knowledge Software 1531 Airport Rd Suite 101 Ames, IA 50010 Phone (515)
More informationConfigure SPLM 2012 on Windows 7 Laptop
Configure SPLM 2012 on Windows 7 Laptop 7/12/2012 SmartPlant License Manager (SPLM) requires a static IP Address on the license machine. To fulfill this requirement on laptops a virtual network adapter
More informationTool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
More informationSupplement I.B: Installing and Configuring JDK 1.6
Supplement I.B: Installing and Configuring JDK 1.6 For Introduction to Java Programming Y. Daniel Liang This supplement covers the following topics: Downloading JDK 1.6 ( 1.2) Installing JDK 1.6 ( 1.3)
More informationInventory Computers Using TechAtlas for Libraries
Inventory Computers Using TechAtlas for Libraries WebJunction.org 9/11/2008 Table of Contents Introduction... 3 Additional Resources... 3 Your Computer Login... 3 TechAtlas Login... 3 Browser Options...
More informationSetting up Remote Desktop
Setting up Remote Desktop Terminology: Host PC the computer you want to access remotely; the destination Client PC the computer you are actually using to access another PC; the source IP Address the numerical
More informationInstalling the USB driver for Firmware 7 or later For use with E-blocks programmer boards and PICmicro Development boards.
Installing the USB driver for Firmware 7 or later For use with E-blocks programmer boards and PICmicro Development boards. Matrix Multimedia USB PICmicro programmer boards with Firmware version 7 or later
More informationBusiness Process Management IBM Business Process Manager V7.5
Business Process Management IBM Business Process Manager V7.5 Federated task management for BPEL processes and human tasks This presentation introduces the federated task management feature for BPEL processes
More informationDropSend Getting Started Guide
DropSend Getting Started Guide DropSend Ltd. 2012 Step 1: How to send a file without registration If you want to quickly send a large file, you can do it from the homepage in just a couple of clicks. Here
More informationTo begin, visit this URL: http://www.ibm.com/software/rational/products/rdp
Rational Developer for Power (RDp) Trial Download and Installation Instructions Notes You should complete the following instructions using Internet Explorer or Firefox with Java enabled. You should disable
More informationESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide
ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine
More informationSerial ATA 2 Ports PCI Host
Serial ATA 2 Ports PCI Host This Manual is for the various Model of 2ports SATA HBA: Model A: Low Profile Serial ATA Internal 2 Ports Model B: Low Profile External 1 Port + Internal 1 Port Model C: Low
More informationVirtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
More informationHow-To: Changing the target IP address for pcanywhere Remote Control
How-To: Changing the target IP address for pcanywhere Remote Control Q: Why is this necessary? A: Because many ISPs (Internet Service Providers) allocate numerical addresses on an asneeded basis especially
More informationNote: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.
Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.
More informationInstalling VPN for PC v1.3
Follow these instructions to access your Public/Private folders from home. Please Note: If you are having connectivity issues after installing or upgrading VPN, please refer to Troubleshooting Connectivity
More informationInstructions for Configuring a SAS Metadata Server for Use with JMP Clinical
Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical These instructions describe the process for configuring a SAS Metadata server to work with JMP Clinical. Before You Configure
More informationMicrosoft Dynamics GP Release
Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.
More informationSOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
More informationHow to Configure Windows Firewall on a Single Computer
Security How to Configure Windows Firewall on a Single Computer Introduction Windows Firewall is a new feature of Microsoft Windows XP Service Pack 2 (SP2) that is turned on by default. It monitors and
More informationScotEID Desktop Quick Start Guide
ScotEID Desktop Quick Start Guide Last updated 16/01/2013 Table of Contents Table of Contents Supported Readers Installation Java Runtime Environment ScotEID Desktop Configuration General Default Lot ScotEID
More informationAdd in Guide for Microsoft Dynamics CRM May 2012
Add in Guide for Microsoft Dynamics CRM May 2012 Microsoft Dynamics CRM Addin Guide This document will guide you through configuration of the Microsoft Dynamics CRM addin. Microsoft Dynamics CRM is a bit
More informationUsing SSH Secure Shell Client for FTP
Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking
More informationUsing your Bluetooth laptop with the Logitech wireless hub
Using your Bluetooth laptop with the Logitech wireless hub 2003 Logitech, Inc. Contents Introduction 3 Product compatibility 3 About this guide 4 Get connected 5 Connecting your Bluetooth laptop 5 Checking
More informationExtracting an S/MIME certificate from a digital signature
Extracting an S/MIME certificate from a digital signature Instructions for Microsoft Outlook 2007 and 2010 Document User_Instruction_Outlook_Certificate_Handling Status Final Date: 03.06.2012 Version:
More informationKPN SMS mail. Send SMS as fast as e-mail!
KPN SMS mail Send SMS as fast as e-mail! Quick start Start using KPN SMS mail in 5 steps If you want to install and use KPN SMS mail quickly, without reading the user guide, follow the next five steps.
More informationEasy Setup Guide for the Sony Network Camera
-878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer
More informationSmartLink for Lotus Notes User Guide
SmartLink for Lotus Notes User Guide Copyright 1998-2006 E-Z Data, Inc. All Rights Reserved No part of this documentation may be copied, reproduced, or translated in any form without the prior written
More informationMany home and small office networks exist for no
C H A P T E R Accessing and Sharing Network Resources Many home and small office networks exist for no other reason than to share a broadband Internet connection. The administrators of those networks attach
More informationCreate an ios App using Adobe Flash Side by Side Training, 2013. And without using a Mac
Create an ios App using Adobe Flash And without using a Mac Contents 1 Become an Apple ios Developer... 2 2 Add a Development Certificate... 4 3 Create a Certificate Signing Request (CSR)... 6 4 Register
More informationWeb Editing Tutorial. Copyright 1995-2010 Esri All rights reserved.
Copyright 1995-2010 Esri All rights reserved. Table of Contents Tutorial: Creating a Web editing application........................ 3 Copyright 1995-2010 Esri. All rights reserved. 2 Tutorial: Creating
More informationA-AUTO 50 for Windows Setup Guide
A-AUTO 50 for Windows Setup Guide 1st Edition 1 A-AUTO is a registered trade mark of UNIRITA Inc. "This product includes software developed by the Apache Software Foundation (http://www.apache.org/)."
More informationNetwork Load Balancing
Network Load Balancing Step by Step installation of Network Load Balancing in Windows Server 2008 R2. Prerequisite for NLB Cluster 1. Log on to NODE1 Windows Server 2008 R2 system with a domain account
More informationHow to Install Applications (APK Files) on Your Android Phone
How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android
More informationHow To Connect To A Wireless Network On Windows 7 (Windows 7) On A Pc Or Mac Or Ipad (Windows) On Pc Or Ipa (Windows 8) On Your Computer Or Mac (Windows). (Windows.7) On An
Wireless Configuration for Windows 7 Frostburg State University offers wireless service to all employees and students which can be accessed almost anywhere on campus. Network and Sharing Windows 7 includes
More informationAutodesk Installation
Autodesk Installation All of the Autodesk products install in a similar fashion. I have included some screenshots of what you can expect to see during the installations. The first thing you need to check,
More informationHow To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
More informationInstallation Guide. Your FedEx Ship Manager system number. Before you start
Installation Guide Your FedEx Ship Manager system number Installation Guide During registration, you receive a FedEx Ship Manager system number. Write the number here so you have it on hand whenever you
More informationIntraVUE Plug Scanner/Recorder Installation and Start-Up
IntraVUE Plug Scanner/Recorder Installation and Start-Up The IntraVUE Plug is a complete IntraVUE Hardware/Software solution that can plug directly into any network to continually scan and record details
More informationGETTING STARTED WITH SQL SERVER
GETTING STARTED WITH SQL SERVER Download, Install, and Explore SQL Server Express WWW.ESSENTIALSQL.COM Introduction It can be quite confusing trying to get all the pieces in place to start using SQL. If
More informationv. 2.4.1 v. 3.4.1 Alarm Notifications: [Y] Bounding boxes for analytics: [N]
VideoIQ Milestone Integration CCTV Systems AB, Nordic Agent for VideoIQ has together with VideoIQ and Milestone created this document. This document explains the different parts of software in Milestone
More information5. Tutorial. Starting FlashCut CNC
FlashCut CNC Section 5 Tutorial 259 5. Tutorial Starting FlashCut CNC To start FlashCut CNC, click on the Start button, select Programs, select FlashCut CNC 4, then select the FlashCut CNC 4 icon. A dialog
More informationAT&T Global Network Client v6.8.0 and Passport IP Setup Instructions for Broadband VPN Access
AT&T Global Network Client v6.8.0 and Passport IP Setup Instructions for Broadband VPN Access October 19, 2006 1 Installing AT&T GNC 6.8.0 for Broadband VPN Access... 3 Getting Started... 3 License Agreement...
More informationComtrend 1 Port Router Installation Guide CT-5072T
Comtrend 1 Port Router Installation Guide CT-5072T 1 Installing Access Point s DSL Service with a Comtrend Router Thank you for selecting Access Point, Inc. to be your Internet service provider. This guide
More informationVodafone PC SMS 2010. (Software version 4.7.1) User Manual
Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6
More informationInstallation of IR under Windows Server 2008
Installation of IR under Windows Server 2008 Installation of IR under windows 2008 involves the following steps: Installation of IIS Check firewall settings to allow HTTP traffic through firewall Installation
More informationTo add Citrix XenApp Client Setup for home PC/Office using the 32bit Windows client.
I. PURPOSE To add Citrix XenApp Client Setup for home PC/Office using the 32bit Windows client. II. POLICY: Network Request form must be sent from MIS staff to HCN Hardware Support requesting Citrix XenApp
More informationUsing Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista
Using Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista 1. In order to use Remote Desktop and the VPN client, users must first complete the Blackboard Remote Users training course and
More informationRemote Access Services Apple Macintosh - Installation Guide
Remote Access Services Apple Macintosh - Installation Guide Version. February, 05 P age Contents GETTING STARTED... JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... Checking Mac OS version... Java
More informationInstalling S500 Power Monitor Software and LabVIEW Run-time Engine
EigenLight S500 Power Monitor Software Manual Software Installation... 1 Installing S500 Power Monitor Software and LabVIEW Run-time Engine... 1 Install Drivers for Windows XP... 4 Install VISA run-time...
More informationORDERING ONLINE WITH YOURAVON.COM
ORDERING ONLINE WITH YOURAVON.COM The My Orders section of youravon.com is your dashboard for everything related to your Customer orders and your Orders submitted to AVON. Here, you can: Search Customers
More informationUsing Device Discovery
2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery
More informationMicrosoft Word 2011: Create a Table of Contents
Microsoft Word 2011: Create a Table of Contents Creating a Table of Contents for a document can be updated quickly any time you need to add or remove details for it will update page numbers for you. A
More informationSupplement I.B: Installing and Configuring JDK 1.6
Supplement I.B: Installing and Configuring JDK 1.6 For Introduction to Java Programming Y. Daniel Liang This supplement covers the following topics: Downloading JDK 1.6 ( 1.2) Installing JDK 1.6 ( 1.3)
More informationDebug Failed to connect to server!
Debug Failed to connect to server! Version 2 To many of the first time visitors to the forums, the following screenshot may look all too familiar. There are many causes for this error and unfortunately
More informationPrinterOn Mobile App for ios and Android
PrinterOn Mobile App for ios and Android User Guide Version 3.4 Contents Chapter 1: Getting started... 4 Features of the PrinterOn Mobile App... 4 Support for PrinterOn Secure Release Anywhere printer
More informationUSER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6
KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly
More informationOnline Scheduling Instructions
Online Scheduling Instructions 1. First, you will need to create a user account. Go to: https://emsweb.ad.siu.edu/virtualems/ a. Click on My Account, then scroll down to create an account. b. Fill out
More informationTable of Contents. FleetSoft Installation Guide
FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating
More informationTOSHIBA GA-1310. Printing from Windows
TOSHIBA GA-1310 Printing from Windows 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45081979 04 February 2009 CONTENTS 3 CONTENTS
More informationDeployment Guide: Transparent Mode
Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This
More informationGuide to Installing BBL Crystal MIND on Windows 7
Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP
More informationJob Aid: Creating Additional Remote Access Logins
This job aid describes the steps required to add an additional remote access login to the Avaya S8300, S8500, and S8700 Series Media Servers. These logins may be used to establish a Point to Point Protocol
More informationDeposit Direct. Getting Started Guide
Deposit Direct Getting Started Guide Table of Contents Before You Start... 3 Installing the Deposit Direct application for use with Microsoft Windows Vista... 4 Running Programs in Microsoft Windows Vista...
More informationInternet Explorer 7 and Internet Explorer 8 Browser Security Settings
Internet Explorer 7 and Internet Explorer 8 Browser Security Settings From either the Menu Bar or the Tool Bar in your browser click on Tools. Select Internet Options which is the last item on the drop
More informationHow to test and debug an ASP.NET application
Chapter 4 How to test and debug an ASP.NET application 113 4 How to test and debug an ASP.NET application If you ve done much programming, you know that testing and debugging are often the most difficult
More information1 Installation. Note: In Windows operating systems, you must be logged in with administrator rights to install the printer driver.
Installation A printer driver is an application that manages communication between a printer and your computer. Once installed, the printer driver settings must be configured in the printer Properties
More informationProjectWise Explorer V8i Client Installation
ProjectWise Explorer V8i Client Installation This document describes how to install ProjectWise Explorer V8i, which is the Windows client component for SHA s engineering document management system. You
More informationRemote Access Services Microsoft Windows - Installation Guide
Remote Access Services Microsoft Windows - Installation Guide Version 3.1 February 23, 2015 1 P age Contents GETTING STARTED... 3 JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... 3 Windows XP... 3
More informationSetting up VPN Access for Remote Diagnostics Support
Setting up VPN Access for Remote Diagnostics Support D. R. Joseph, Inc. supports both dial-up and Internet access for remote support of 3GIBC1 and LF-Sizer control systems. This document describes how
More informationThis presentation introduces you to the new call home feature in IBM PureApplication System V2.0.
This presentation introduces you to the new call home feature in IBM PureApplication System V2.0. Page 1 of 19 This slide shows the agenda, which covers the process flow, user interface, commandline interface
More information2) Sharing Projects Made easy by IntelliGantt s Share Wizard, there are three share options to fit the needs of your project.
Introduction TeamDirection IntelliGantt solutions allows you and the rest of your project team to collaborate on your projects together. How you would like work together is up to you. The project manager
More informationHosting Users Guide 2011
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
More informationComtrend 4 Port Router Installation Guide CT-5361T
Comtrend 4 Port Router Installation Guide CT-5361T 1 Installing Access Point s DSL Service with a Comtrend Router Thank you for selecting Access Point, Inc. to be your Internet service provider. This guide
More informationTeam Foundation Server 2012 Installation Guide
Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day benday@benday.com v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation
More informationImplementation Guide. Implementation set up: Configure your channel. Implementation customization: Enable your social profiles
Implementation Guide Welcome to the Buddy Media social marketing suite! Now that your channel and admin account have been created, this guide walks through the steps to configure your channel, users and
More informationCisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
More informationSetting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationGetting the most from Contracts Finder
Getting the most from Contracts Finder A guide for businesses and the public May 2012 What s in this guide What s this guide for?...2 What s on Contracts Finder...2 Searching for notices the basics...2
More informationXerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows
Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices
More informationUser Guide. Introduction to 3M Digital Designs. User Guide Contents: Installing 3M Digital Designs Software. Setting up a Plotter
User Guide June 2008 Introduction to 3M Digital Designs 3M Digital Designs provides you with a convenient system for precision cutting of paint protection film kits. When these cut pieces are applied to
More informationCustomer admin guide. UC Management Centre
Customer admin guide UC Management Centre June 2013 Contents 1. Introduction 1.1 Logging into the UC Management Centre 1.2 Language Options 1.3 Navigating Around the UC Management Centre 4 4 5 5 2. Customers
More informationUser s Manual for Fingerprint Door Control Software
User s Manual for Fingerprint Door Control Software Foreword The naissance of F7 indicated that fingerprint reader enters into professional door control domain. That s why we developed this software to
More informationConfiguring user provisioning for Amazon Web Services (Amazon Specific)
Chapter 2 Configuring user provisioning for Amazon Web Services (Amazon Specific) Note If you re trying to configure provisioning for the Amazon Web Services: Amazon Specific + Provisioning app, you re
More informationVoIP Intercom and Elastix Server
VoIP Intercom and Elastix Server Setup Guide http://www.elastix.org 1.0 Setup Diagram Figure 1-1 is a setup diagram for a single VoIP Intercom configuration. In this configuration, the VoIP Intercom acts
More informationeservice Portal Overview
eservice Portal Overview About this Guide Purpose The eservice Portal Overview Guide provides a differences overview of Support Online to eservice Portal migration. The new eservice portal provides the
More informationVidyoDesktop Media Player Quick Reference Guide
Quick Reference Guide 2010 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoRouter, VidyoPortal, VidyoGateway, VidyoRoom, and VidyoDesktop are trademarks of Vidyo, Inc.
More informationEncrypting a USB Drive Using TrueCrypt
Encrypting a USB Drive Using TrueCrypt This document details the steps to encrypt a USB Pen drive using TrueCrypt. TrueCrypt is free and open-source security software allowing encryption of documents and
More informationMalwarebytes Anti-Malware 1.42
Downloading Installing And First-Time Use Updating and Scanning Malwarebytes Anti-Malware 1.42 DOWNLOADING Download the latest version of Malwarebytes Anti-Malware (currently 1.42) from http://www.download.com.
More informationFusion. User s Guide: Updating the Fusion s Image
Fusion User s Guide: Updating the Fusion s Image The Fusion s operating system and sound-set (called the image for short) are upgradeable and allow us to make many improvements even after the Fusion has
More informationSQL Server 2008 R2 Express Edition Installation Guide
Hardware, Software & System Requirements for SQL Server 2008 R2 Express Edition To get the overview of SQL Server 2008 R2 Express Edition, click here. Please refer links given below for all the details
More informationONLINE BANKING - INTERNET BROWSER SETTINGS: COOKIES
One of the biggest challenges in today s online banking landscape is the process to prevent unauthorized parties from accessing your personal online banking information. Because mal-ware, spy-ware, and
More information