Validating Malware Signature Installations on Ixia BreakingPoint Hardware

Size: px
Start display at page:

Download "Validating Malware Signature Installations on Ixia BreakingPoint Hardware"

Transcription

1 Validating Malware Signature Installations on Ixia BreakingPoint Hardware 1

2 Introduction Ixia BreakingPoint products ship with the capability to generate large numbers of live malware binaries, which can then be sent in two-arm fashion through a network topology of your choosing. This is very useful in determining whether firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and related equipment can correctly detect (and block!) these binaries via policies such as routine malware signature analysis. Using Ixia BreakingPoint equipment in two-arm fashion for this testing ensures that nothing else in the network will be compromised. Solutions are configured in two-armed mode to be both the originating element and the terminating element, using IPv4 addresses, IPv6 addresses, or both. However, this feature cannot be used unless users log in to Ixia s secure StrikeCenter support site with the appropriate customer credentials and download and install the binary malware strikepacks. Until then, if you attempt to select and configure one or more of our malware strikes, the output Reports will show Errored Malware package X missing where the X will vary based on the package number in question. There are currently seven malware strikepacks (numbered 0-6) available from our StrikeCenter portal, and each package is roughly 1GB in size. Once you ve downloaded and installed the appropriate packages, you won t see a change in the total number of your security strikes. It will be exactly the same as before because all that s happened with the malware strikepack updates is that malware binary images have been attached to the previous templatized placeholders for each. Although you won t see a change in the total number of strikes after installing the malware strikepacks, there is still a simple way to validate that they have been installed correctly. Just pick one piece of malware from each of the seven packages, saving the results to a strike list, and run them through a security component across a piece of cable connecting two ports of your Ixia BreakingPoint unit. When the test is completed, you can analyze the report data and verify that strikes were allowed through the cable, or in the case that the packages have not been installed, that strikes were reported as Errored. Let s walk through the entire process of creating and running this simple validation test. 2

3 Methodology First, choose Managers > Strike Lists from the home screen: In the Search box, enter malware package You ll see precisely two results which cover the first two packages. Right-click on the results and choose Add All Results : 3

4 You ll notice that the total number of strikes included is now displayed as 2 in the top right. Next, we change our search term to be malware package You ll see precisely two more strikes. Right-click on the results and choose Add All Results. Your total count will now be four. Do this again using a search term of malware package package You ll see precisely two more strikes. Right-click on the results and choose Add All Results. Your total count will now be six. You now have just one more to do, from package 6, so use the search term malware package You ll see two search results here, but you only need the one from package 6, so left-click that one so that it turns yellow, and then right-click and choose Add Strike. 4

5 When that s done, you ll notice you now have seven strikes, precisely one from each of the seven packages. Save this seven-count strike list by selecting Strike List > Save As: A dialog will prompt you for a name; let s call it Malware Package Validation. Once you ve done that, click on the eye icon in the top right to double-check that you ve included one strike from each package: Looks like we did a good job! We have one piece of malware from each of the seven packages (indexed 0-6), just like we wanted. 5

6 Now we will reserve the two ports that we ve externally connected with a piece of cable. To select the ports you ve connected, click the green chassis icon on the top of the home screen, click on the two ports that you connected your cable to, and then close the chassis window: Now we will create our test configuration. From the home screen select Test > New Test: 6

7 Since we are just running across a piece of cable, the network addressing doesn t really matter much, so we will leave the default setting of BreakingPoint Switching which will work just fine. In the Test Components section, click the Add New button and select a Security component, and the click Select: A dialog will prompt you to enter the component name, which we ll call Malware Validation. Once you ve done that, click on the component name on the left to be able to configure it: 7

8 The basic security configuration screen is quite simple. In the upper left, you can change the name or add a description. In the Component Tags section, you can map the addressing from the default BreakingPoint Switching network neighborhood, and since we re just on a loopback cable, leave the defaults as-is. On the right you can select the various security parameters. In this case we ll use all of the default values, except that we want to use our created Malware Package Validation strike list. Click Browse and select it while entering a package search keyword to make it easier to find: 8

9 Once you ve selected the Malware Package Validation strike list, your test configuration shows it as selected: 9

10 Once you ve clicked on the Return to Test Workspace button in the bottom of that screen, you simply have to save and run the test by clicking the Save and Run button in the bottom right. A dialog will ask for the name of the test, which we ll call Malware Package Validation, then click Save : Once the save operation finishes, the test will begin to initialize, which only takes a few seconds, after which it will immediately start to run. It will run very quickly, as it doesn t take long for the malware binaries to propagate from the origination to the termination point across the loopback cable. 10

11 While the test is running, you can investigate the Attacks tab in the real time statistics to monitor progress: In this case, all seven strikes were Errored! That means that this Ixia BreakingPoint box does not have any of the malware packages installed. You can also see a more detailed message as to the problem in the detailed report for the test: 11

12 If, on the other hand, the Ixia BreakingPoint unit had one or more of the malware packages installed, then at run-time you would actually get a warning that you must click Yes on to proceed. You might think that this is sufficient to ensure that the packages were correctly installed, but it is not. If any one of the packages had been correctly installed, this warning will be displayed, but it doesn t tell you if all of them were correctly installed: Once you click yes, the test will finish initializing and run. It runs very fast, so you ll probably see the test completion dialog before you have a chance to go to the Attacks tab. That s okay; you ll note that the Test Criteria failed, because the default criteria expects that these security malware strikes would have been blocked by network security equipment in the path. That did not happen since we are running in a looped back environment all of the attacks got right through. So once you click close on that window and choose the Attacks tab, you ll see your results. In order to truly validate the results, you ll need to investigate the full output report. Here, in this example, we determine that malware package 1 was successfully installed (as we report that the strike was allowed through the network under test which was just a simple piece of CAT6 cable between two ports): 12

13 After investigation of the remaining strikes, all are reported as Errored. For simplicity, we show only the last one, for package 6: And so you now know that only one of the seven malware packages was installed, and that you ll need to install the other six. After doing that, this test can be re-run to verify that all seven strikes lists are Allowed in the Strike Result field in the output report. 13

Using e-mail and the Internet

Using e-mail and the Internet Using e-mail and the Internet New to Windows 7? Even though there s a lot in common with the version of Windows that you had before, you might still need a hand getting up to speed. This guide is filled

More information

Enjoying EPUB ebooks on Your Nook

Enjoying EPUB ebooks on Your Nook Enjoying EPUB ebooks on Your Nook From the New Hampshire Downloadable Books Consortium Outline: 1. Download & Install Adobe Digital Editions. 2. Register for an Adobe account or use your existing account

More information

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal

More information

COMMONWEALTH OF PA OFFICE OF ADMINISTRATION. Human Resource Development Division. SAP LSO-AE Desk Guide 15 T H J A N U A R Y, 2 0 1 3

COMMONWEALTH OF PA OFFICE OF ADMINISTRATION. Human Resource Development Division. SAP LSO-AE Desk Guide 15 T H J A N U A R Y, 2 0 1 3 COMMONWEALTH OF PA OFFICE OF ADMINISTRATION Human Resource Development Division SAP LSO-AE Desk Guide 15 T H J A N U A R Y, 2 0 1 3 S A P L S O A U T H O R I N G E N V I R O N M E N T Authoring & Publishing

More information

CLEARONE DOCUMENT 801-000-002 (REVISION 1.0) October, 2008. with Converge Pro Units

CLEARONE DOCUMENT 801-000-002 (REVISION 1.0) October, 2008. with Converge Pro Units APPLICATION NOTES Converge Pro Products CLEARONE DOCUMENT 801-000-002 (REVISION 1.0) October, 2008. Troubleshooting USB Connections with Converge Pro Units Description This document explains how to connect

More information

COPYRIGHT TOP NOTCH TABLETS LLC. 2012. HOW TO: Install the Drivers to your PC so you can Flash Firmware to your RK3066 Powered Tablet.

COPYRIGHT TOP NOTCH TABLETS LLC. 2012. HOW TO: Install the Drivers to your PC so you can Flash Firmware to your RK3066 Powered Tablet. HOW TO: Install the Drivers to your PC so you can Flash Firmware to your RK3066 Powered Tablet. 1. Inside the RKBatchTool1.5en folder you will see a sub folder called Driver 2. Inside of that folder are

More information

RTI Integration Release Notes

RTI Integration Release Notes RTI Integration Release Notes Content Introduction...1 Connecting the XP-3 controller to the ClareHome data network...2 Configuring with Integration Designer...2 Configuring in Fusion...6 Button IDs and

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment

More information

PigCHAMP Knowledge Software. Enterprise Edition Installation Guide

PigCHAMP Knowledge Software. Enterprise Edition Installation Guide PigCHAMP Knowledge Software Enterprise Edition Installation Guide Enterprise Edition Installation Guide MARCH 2012 EDITION PigCHAMP Knowledge Software 1531 Airport Rd Suite 101 Ames, IA 50010 Phone (515)

More information

Configure SPLM 2012 on Windows 7 Laptop

Configure SPLM 2012 on Windows 7 Laptop Configure SPLM 2012 on Windows 7 Laptop 7/12/2012 SmartPlant License Manager (SPLM) requires a static IP Address on the license machine. To fulfill this requirement on laptops a virtual network adapter

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

Supplement I.B: Installing and Configuring JDK 1.6

Supplement I.B: Installing and Configuring JDK 1.6 Supplement I.B: Installing and Configuring JDK 1.6 For Introduction to Java Programming Y. Daniel Liang This supplement covers the following topics: Downloading JDK 1.6 ( 1.2) Installing JDK 1.6 ( 1.3)

More information

Inventory Computers Using TechAtlas for Libraries

Inventory Computers Using TechAtlas for Libraries Inventory Computers Using TechAtlas for Libraries WebJunction.org 9/11/2008 Table of Contents Introduction... 3 Additional Resources... 3 Your Computer Login... 3 TechAtlas Login... 3 Browser Options...

More information

Setting up Remote Desktop

Setting up Remote Desktop Setting up Remote Desktop Terminology: Host PC the computer you want to access remotely; the destination Client PC the computer you are actually using to access another PC; the source IP Address the numerical

More information

Installing the USB driver for Firmware 7 or later For use with E-blocks programmer boards and PICmicro Development boards.

Installing the USB driver for Firmware 7 or later For use with E-blocks programmer boards and PICmicro Development boards. Installing the USB driver for Firmware 7 or later For use with E-blocks programmer boards and PICmicro Development boards. Matrix Multimedia USB PICmicro programmer boards with Firmware version 7 or later

More information

Business Process Management IBM Business Process Manager V7.5

Business Process Management IBM Business Process Manager V7.5 Business Process Management IBM Business Process Manager V7.5 Federated task management for BPEL processes and human tasks This presentation introduces the federated task management feature for BPEL processes

More information

DropSend Getting Started Guide

DropSend Getting Started Guide DropSend Getting Started Guide DropSend Ltd. 2012 Step 1: How to send a file without registration If you want to quickly send a large file, you can do it from the homepage in just a couple of clicks. Here

More information

To begin, visit this URL: http://www.ibm.com/software/rational/products/rdp

To begin, visit this URL: http://www.ibm.com/software/rational/products/rdp Rational Developer for Power (RDp) Trial Download and Installation Instructions Notes You should complete the following instructions using Internet Explorer or Firefox with Java enabled. You should disable

More information

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine

More information

Serial ATA 2 Ports PCI Host

Serial ATA 2 Ports PCI Host Serial ATA 2 Ports PCI Host This Manual is for the various Model of 2ports SATA HBA: Model A: Low Profile Serial ATA Internal 2 Ports Model B: Low Profile External 1 Port + Internal 1 Port Model C: Low

More information

Virtual Office Remote Installation Guide

Virtual Office Remote Installation Guide Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...

More information

How-To: Changing the target IP address for pcanywhere Remote Control

How-To: Changing the target IP address for pcanywhere Remote Control How-To: Changing the target IP address for pcanywhere Remote Control Q: Why is this necessary? A: Because many ISPs (Internet Service Providers) allocate numerical addresses on an asneeded basis especially

More information

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve. Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.

More information

Installing VPN for PC v1.3

Installing VPN for PC v1.3 Follow these instructions to access your Public/Private folders from home. Please Note: If you are having connectivity issues after installing or upgrading VPN, please refer to Troubleshooting Connectivity

More information

Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical

Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical These instructions describe the process for configuring a SAS Metadata server to work with JMP Clinical. Before You Configure

More information

Microsoft Dynamics GP Release

Microsoft Dynamics GP Release Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.

More information

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,

More information

How to Configure Windows Firewall on a Single Computer

How to Configure Windows Firewall on a Single Computer Security How to Configure Windows Firewall on a Single Computer Introduction Windows Firewall is a new feature of Microsoft Windows XP Service Pack 2 (SP2) that is turned on by default. It monitors and

More information

ScotEID Desktop Quick Start Guide

ScotEID Desktop Quick Start Guide ScotEID Desktop Quick Start Guide Last updated 16/01/2013 Table of Contents Table of Contents Supported Readers Installation Java Runtime Environment ScotEID Desktop Configuration General Default Lot ScotEID

More information

Add in Guide for Microsoft Dynamics CRM May 2012

Add in Guide for Microsoft Dynamics CRM May 2012 Add in Guide for Microsoft Dynamics CRM May 2012 Microsoft Dynamics CRM Addin Guide This document will guide you through configuration of the Microsoft Dynamics CRM addin. Microsoft Dynamics CRM is a bit

More information

Using SSH Secure Shell Client for FTP

Using SSH Secure Shell Client for FTP Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking

More information

Using your Bluetooth laptop with the Logitech wireless hub

Using your Bluetooth laptop with the Logitech wireless hub Using your Bluetooth laptop with the Logitech wireless hub 2003 Logitech, Inc. Contents Introduction 3 Product compatibility 3 About this guide 4 Get connected 5 Connecting your Bluetooth laptop 5 Checking

More information

Extracting an S/MIME certificate from a digital signature

Extracting an S/MIME certificate from a digital signature Extracting an S/MIME certificate from a digital signature Instructions for Microsoft Outlook 2007 and 2010 Document User_Instruction_Outlook_Certificate_Handling Status Final Date: 03.06.2012 Version:

More information

KPN SMS mail. Send SMS as fast as e-mail!

KPN SMS mail. Send SMS as fast as e-mail! KPN SMS mail Send SMS as fast as e-mail! Quick start Start using KPN SMS mail in 5 steps If you want to install and use KPN SMS mail quickly, without reading the user guide, follow the next five steps.

More information

Easy Setup Guide for the Sony Network Camera

Easy Setup Guide for the Sony Network Camera -878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer

More information

SmartLink for Lotus Notes User Guide

SmartLink for Lotus Notes User Guide SmartLink for Lotus Notes User Guide Copyright 1998-2006 E-Z Data, Inc. All Rights Reserved No part of this documentation may be copied, reproduced, or translated in any form without the prior written

More information

Many home and small office networks exist for no

Many home and small office networks exist for no C H A P T E R Accessing and Sharing Network Resources Many home and small office networks exist for no other reason than to share a broadband Internet connection. The administrators of those networks attach

More information

Create an ios App using Adobe Flash Side by Side Training, 2013. And without using a Mac

Create an ios App using Adobe Flash Side by Side Training, 2013. And without using a Mac Create an ios App using Adobe Flash And without using a Mac Contents 1 Become an Apple ios Developer... 2 2 Add a Development Certificate... 4 3 Create a Certificate Signing Request (CSR)... 6 4 Register

More information

Web Editing Tutorial. Copyright 1995-2010 Esri All rights reserved.

Web Editing Tutorial. Copyright 1995-2010 Esri All rights reserved. Copyright 1995-2010 Esri All rights reserved. Table of Contents Tutorial: Creating a Web editing application........................ 3 Copyright 1995-2010 Esri. All rights reserved. 2 Tutorial: Creating

More information

A-AUTO 50 for Windows Setup Guide

A-AUTO 50 for Windows Setup Guide A-AUTO 50 for Windows Setup Guide 1st Edition 1 A-AUTO is a registered trade mark of UNIRITA Inc. "This product includes software developed by the Apache Software Foundation (http://www.apache.org/)."

More information

Network Load Balancing

Network Load Balancing Network Load Balancing Step by Step installation of Network Load Balancing in Windows Server 2008 R2. Prerequisite for NLB Cluster 1. Log on to NODE1 Windows Server 2008 R2 system with a domain account

More information

How to Install Applications (APK Files) on Your Android Phone

How to Install Applications (APK Files) on Your Android Phone How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android

More information

How To Connect To A Wireless Network On Windows 7 (Windows 7) On A Pc Or Mac Or Ipad (Windows) On Pc Or Ipa (Windows 8) On Your Computer Or Mac (Windows). (Windows.7) On An

How To Connect To A Wireless Network On Windows 7 (Windows 7) On A Pc Or Mac Or Ipad (Windows) On Pc Or Ipa (Windows 8) On Your Computer Or Mac (Windows). (Windows.7) On An Wireless Configuration for Windows 7 Frostburg State University offers wireless service to all employees and students which can be accessed almost anywhere on campus. Network and Sharing Windows 7 includes

More information

Autodesk Installation

Autodesk Installation Autodesk Installation All of the Autodesk products install in a similar fashion. I have included some screenshots of what you can expect to see during the installations. The first thing you need to check,

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

Installation Guide. Your FedEx Ship Manager system number. Before you start

Installation Guide. Your FedEx Ship Manager system number. Before you start Installation Guide Your FedEx Ship Manager system number Installation Guide During registration, you receive a FedEx Ship Manager system number. Write the number here so you have it on hand whenever you

More information

IntraVUE Plug Scanner/Recorder Installation and Start-Up

IntraVUE Plug Scanner/Recorder Installation and Start-Up IntraVUE Plug Scanner/Recorder Installation and Start-Up The IntraVUE Plug is a complete IntraVUE Hardware/Software solution that can plug directly into any network to continually scan and record details

More information

GETTING STARTED WITH SQL SERVER

GETTING STARTED WITH SQL SERVER GETTING STARTED WITH SQL SERVER Download, Install, and Explore SQL Server Express WWW.ESSENTIALSQL.COM Introduction It can be quite confusing trying to get all the pieces in place to start using SQL. If

More information

v. 2.4.1 v. 3.4.1 Alarm Notifications: [Y] Bounding boxes for analytics: [N]

v. 2.4.1 v. 3.4.1 Alarm Notifications: [Y] Bounding boxes for analytics: [N] VideoIQ Milestone Integration CCTV Systems AB, Nordic Agent for VideoIQ has together with VideoIQ and Milestone created this document. This document explains the different parts of software in Milestone

More information

5. Tutorial. Starting FlashCut CNC

5. Tutorial. Starting FlashCut CNC FlashCut CNC Section 5 Tutorial 259 5. Tutorial Starting FlashCut CNC To start FlashCut CNC, click on the Start button, select Programs, select FlashCut CNC 4, then select the FlashCut CNC 4 icon. A dialog

More information

AT&T Global Network Client v6.8.0 and Passport IP Setup Instructions for Broadband VPN Access

AT&T Global Network Client v6.8.0 and Passport IP Setup Instructions for Broadband VPN Access AT&T Global Network Client v6.8.0 and Passport IP Setup Instructions for Broadband VPN Access October 19, 2006 1 Installing AT&T GNC 6.8.0 for Broadband VPN Access... 3 Getting Started... 3 License Agreement...

More information

Comtrend 1 Port Router Installation Guide CT-5072T

Comtrend 1 Port Router Installation Guide CT-5072T Comtrend 1 Port Router Installation Guide CT-5072T 1 Installing Access Point s DSL Service with a Comtrend Router Thank you for selecting Access Point, Inc. to be your Internet service provider. This guide

More information

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6

More information

Installation of IR under Windows Server 2008

Installation of IR under Windows Server 2008 Installation of IR under Windows Server 2008 Installation of IR under windows 2008 involves the following steps: Installation of IIS Check firewall settings to allow HTTP traffic through firewall Installation

More information

To add Citrix XenApp Client Setup for home PC/Office using the 32bit Windows client.

To add Citrix XenApp Client Setup for home PC/Office using the 32bit Windows client. I. PURPOSE To add Citrix XenApp Client Setup for home PC/Office using the 32bit Windows client. II. POLICY: Network Request form must be sent from MIS staff to HCN Hardware Support requesting Citrix XenApp

More information

Using Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista

Using Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista Using Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista 1. In order to use Remote Desktop and the VPN client, users must first complete the Blackboard Remote Users training course and

More information

Remote Access Services Apple Macintosh - Installation Guide

Remote Access Services Apple Macintosh - Installation Guide Remote Access Services Apple Macintosh - Installation Guide Version. February, 05 P age Contents GETTING STARTED... JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... Checking Mac OS version... Java

More information

Installing S500 Power Monitor Software and LabVIEW Run-time Engine

Installing S500 Power Monitor Software and LabVIEW Run-time Engine EigenLight S500 Power Monitor Software Manual Software Installation... 1 Installing S500 Power Monitor Software and LabVIEW Run-time Engine... 1 Install Drivers for Windows XP... 4 Install VISA run-time...

More information

ORDERING ONLINE WITH YOURAVON.COM

ORDERING ONLINE WITH YOURAVON.COM ORDERING ONLINE WITH YOURAVON.COM The My Orders section of youravon.com is your dashboard for everything related to your Customer orders and your Orders submitted to AVON. Here, you can: Search Customers

More information

Using Device Discovery

Using Device Discovery 2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery

More information

Microsoft Word 2011: Create a Table of Contents

Microsoft Word 2011: Create a Table of Contents Microsoft Word 2011: Create a Table of Contents Creating a Table of Contents for a document can be updated quickly any time you need to add or remove details for it will update page numbers for you. A

More information

Supplement I.B: Installing and Configuring JDK 1.6

Supplement I.B: Installing and Configuring JDK 1.6 Supplement I.B: Installing and Configuring JDK 1.6 For Introduction to Java Programming Y. Daniel Liang This supplement covers the following topics: Downloading JDK 1.6 ( 1.2) Installing JDK 1.6 ( 1.3)

More information

Debug Failed to connect to server!

Debug Failed to connect to server! Debug Failed to connect to server! Version 2 To many of the first time visitors to the forums, the following screenshot may look all too familiar. There are many causes for this error and unfortunately

More information

PrinterOn Mobile App for ios and Android

PrinterOn Mobile App for ios and Android PrinterOn Mobile App for ios and Android User Guide Version 3.4 Contents Chapter 1: Getting started... 4 Features of the PrinterOn Mobile App... 4 Support for PrinterOn Secure Release Anywhere printer

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

Online Scheduling Instructions

Online Scheduling Instructions Online Scheduling Instructions 1. First, you will need to create a user account. Go to: https://emsweb.ad.siu.edu/virtualems/ a. Click on My Account, then scroll down to create an account. b. Fill out

More information

Table of Contents. FleetSoft Installation Guide

Table of Contents. FleetSoft Installation Guide FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating

More information

TOSHIBA GA-1310. Printing from Windows

TOSHIBA GA-1310. Printing from Windows TOSHIBA GA-1310 Printing from Windows 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45081979 04 February 2009 CONTENTS 3 CONTENTS

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

Guide to Installing BBL Crystal MIND on Windows 7

Guide to Installing BBL Crystal MIND on Windows 7 Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP

More information

Job Aid: Creating Additional Remote Access Logins

Job Aid: Creating Additional Remote Access Logins This job aid describes the steps required to add an additional remote access login to the Avaya S8300, S8500, and S8700 Series Media Servers. These logins may be used to establish a Point to Point Protocol

More information

Deposit Direct. Getting Started Guide

Deposit Direct. Getting Started Guide Deposit Direct Getting Started Guide Table of Contents Before You Start... 3 Installing the Deposit Direct application for use with Microsoft Windows Vista... 4 Running Programs in Microsoft Windows Vista...

More information

Internet Explorer 7 and Internet Explorer 8 Browser Security Settings

Internet Explorer 7 and Internet Explorer 8 Browser Security Settings Internet Explorer 7 and Internet Explorer 8 Browser Security Settings From either the Menu Bar or the Tool Bar in your browser click on Tools. Select Internet Options which is the last item on the drop

More information

How to test and debug an ASP.NET application

How to test and debug an ASP.NET application Chapter 4 How to test and debug an ASP.NET application 113 4 How to test and debug an ASP.NET application If you ve done much programming, you know that testing and debugging are often the most difficult

More information

1 Installation. Note: In Windows operating systems, you must be logged in with administrator rights to install the printer driver.

1 Installation. Note: In Windows operating systems, you must be logged in with administrator rights to install the printer driver. Installation A printer driver is an application that manages communication between a printer and your computer. Once installed, the printer driver settings must be configured in the printer Properties

More information

ProjectWise Explorer V8i Client Installation

ProjectWise Explorer V8i Client Installation ProjectWise Explorer V8i Client Installation This document describes how to install ProjectWise Explorer V8i, which is the Windows client component for SHA s engineering document management system. You

More information

Remote Access Services Microsoft Windows - Installation Guide

Remote Access Services Microsoft Windows - Installation Guide Remote Access Services Microsoft Windows - Installation Guide Version 3.1 February 23, 2015 1 P age Contents GETTING STARTED... 3 JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... 3 Windows XP... 3

More information

Setting up VPN Access for Remote Diagnostics Support

Setting up VPN Access for Remote Diagnostics Support Setting up VPN Access for Remote Diagnostics Support D. R. Joseph, Inc. supports both dial-up and Internet access for remote support of 3GIBC1 and LF-Sizer control systems. This document describes how

More information

This presentation introduces you to the new call home feature in IBM PureApplication System V2.0.

This presentation introduces you to the new call home feature in IBM PureApplication System V2.0. This presentation introduces you to the new call home feature in IBM PureApplication System V2.0. Page 1 of 19 This slide shows the agenda, which covers the process flow, user interface, commandline interface

More information

2) Sharing Projects Made easy by IntelliGantt s Share Wizard, there are three share options to fit the needs of your project.

2) Sharing Projects Made easy by IntelliGantt s Share Wizard, there are three share options to fit the needs of your project. Introduction TeamDirection IntelliGantt solutions allows you and the rest of your project team to collaborate on your projects together. How you would like work together is up to you. The project manager

More information

Hosting Users Guide 2011

Hosting Users Guide 2011 Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure

More information

Comtrend 4 Port Router Installation Guide CT-5361T

Comtrend 4 Port Router Installation Guide CT-5361T Comtrend 4 Port Router Installation Guide CT-5361T 1 Installing Access Point s DSL Service with a Comtrend Router Thank you for selecting Access Point, Inc. to be your Internet service provider. This guide

More information

Team Foundation Server 2012 Installation Guide

Team Foundation Server 2012 Installation Guide Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day benday@benday.com v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation

More information

Implementation Guide. Implementation set up: Configure your channel. Implementation customization: Enable your social profiles

Implementation Guide. Implementation set up: Configure your channel. Implementation customization: Enable your social profiles Implementation Guide Welcome to the Buddy Media social marketing suite! Now that your channel and admin account have been created, this guide walks through the steps to configure your channel, users and

More information

Cisco IPS Tuning Overview

Cisco IPS Tuning Overview Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Getting the most from Contracts Finder

Getting the most from Contracts Finder Getting the most from Contracts Finder A guide for businesses and the public May 2012 What s in this guide What s this guide for?...2 What s on Contracts Finder...2 Searching for notices the basics...2

More information

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices

More information

User Guide. Introduction to 3M Digital Designs. User Guide Contents: Installing 3M Digital Designs Software. Setting up a Plotter

User Guide. Introduction to 3M Digital Designs. User Guide Contents: Installing 3M Digital Designs Software. Setting up a Plotter User Guide June 2008 Introduction to 3M Digital Designs 3M Digital Designs provides you with a convenient system for precision cutting of paint protection film kits. When these cut pieces are applied to

More information

Customer admin guide. UC Management Centre

Customer admin guide. UC Management Centre Customer admin guide UC Management Centre June 2013 Contents 1. Introduction 1.1 Logging into the UC Management Centre 1.2 Language Options 1.3 Navigating Around the UC Management Centre 4 4 5 5 2. Customers

More information

User s Manual for Fingerprint Door Control Software

User s Manual for Fingerprint Door Control Software User s Manual for Fingerprint Door Control Software Foreword The naissance of F7 indicated that fingerprint reader enters into professional door control domain. That s why we developed this software to

More information

Configuring user provisioning for Amazon Web Services (Amazon Specific)

Configuring user provisioning for Amazon Web Services (Amazon Specific) Chapter 2 Configuring user provisioning for Amazon Web Services (Amazon Specific) Note If you re trying to configure provisioning for the Amazon Web Services: Amazon Specific + Provisioning app, you re

More information

VoIP Intercom and Elastix Server

VoIP Intercom and Elastix Server VoIP Intercom and Elastix Server Setup Guide http://www.elastix.org 1.0 Setup Diagram Figure 1-1 is a setup diagram for a single VoIP Intercom configuration. In this configuration, the VoIP Intercom acts

More information

eservice Portal Overview

eservice Portal Overview eservice Portal Overview About this Guide Purpose The eservice Portal Overview Guide provides a differences overview of Support Online to eservice Portal migration. The new eservice portal provides the

More information

VidyoDesktop Media Player Quick Reference Guide

VidyoDesktop Media Player Quick Reference Guide Quick Reference Guide 2010 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoRouter, VidyoPortal, VidyoGateway, VidyoRoom, and VidyoDesktop are trademarks of Vidyo, Inc.

More information

Encrypting a USB Drive Using TrueCrypt

Encrypting a USB Drive Using TrueCrypt Encrypting a USB Drive Using TrueCrypt This document details the steps to encrypt a USB Pen drive using TrueCrypt. TrueCrypt is free and open-source security software allowing encryption of documents and

More information

Malwarebytes Anti-Malware 1.42

Malwarebytes Anti-Malware 1.42 Downloading Installing And First-Time Use Updating and Scanning Malwarebytes Anti-Malware 1.42 DOWNLOADING Download the latest version of Malwarebytes Anti-Malware (currently 1.42) from http://www.download.com.

More information

Fusion. User s Guide: Updating the Fusion s Image

Fusion. User s Guide: Updating the Fusion s Image Fusion User s Guide: Updating the Fusion s Image The Fusion s operating system and sound-set (called the image for short) are upgradeable and allow us to make many improvements even after the Fusion has

More information

SQL Server 2008 R2 Express Edition Installation Guide

SQL Server 2008 R2 Express Edition Installation Guide Hardware, Software & System Requirements for SQL Server 2008 R2 Express Edition To get the overview of SQL Server 2008 R2 Express Edition, click here. Please refer links given below for all the details

More information

ONLINE BANKING - INTERNET BROWSER SETTINGS: COOKIES

ONLINE BANKING - INTERNET BROWSER SETTINGS: COOKIES One of the biggest challenges in today s online banking landscape is the process to prevent unauthorized parties from accessing your personal online banking information. Because mal-ware, spy-ware, and

More information