2 Agenda Quick intro into barcodes Encoding and decoding Scanners Simple tricks Backend attacks Selected samples decoded Unsolved cases and an invitation Principles of secure barcode use
3 Disclaimer Dear audience: This talk covers observations made of widely used and well documented systems Trying anything against them may be considered a criminal offense I m not encouraging you to do that Dear law enforcement: you can keep your hacker-tool-laws under the table We only need brains and printers for that Systems Barcode 101 = 202codes Yes, that s you, the one with the Internet printout and attached translation
4 The History of Barcodes Developed 1948 by Silver and Woodland at the Drexel Institute of Technology First usage attempt was the Association of American Railroad to identify the cars in It took until 1967 to develop the system. It took seven years to label 95% of the cars. It never worked. 1966, the National Association of Food Chains required equipment to speed up the checkout process 1969, the same NAFC requested an industry standard, which became Universal Grocery Product Identification Code (later: UPC) in , the US Department of Defense required Code 39 to label all products sold to the military.
5 1D Symbologies Code 39 UPC-A to UPC-E EAN8 EAN13 and EAN13 with supplement RSS-14 CODABAR
6 1D Symbologies Interleaved 2 of 5 Discrete 2 of 5 Code 93 Code 128 EAN/UCC 128
7 1D Symbologies Postnet BPO 4 State Code
8 2D Symbologies PDF417 Data Matrix MAXICODE AZTEC CODE
9 Barcode Decoding Barcode scanners 1D hand scanners are cheap All scanners can be configured to output the barcode type using a type character when decoding Don t get a better scanner that what you plan to attack (more on this later) 2D scanners are still expensive Decoding software Some is free Others can be cracked easily I m lazy and have chosen the capitalist way: Omniplanar SwiftDecoder
10 Barcode Generation There is a lot of barcode generation software out there Free: GNU barcode (1D only) Online: ask your favorite search engine Commercial: uncountable Writing generators is not hard Usually, you have to pay for the specs Most specs are below $20 US (next year that s 3,50)
11 Applications Barcodes are in general used for three purposes: Tags and IDs Data transport and virtual to physical media GGU (Ganz grober Unfug)
12 Configuring Scanners Almost all scanners are configured via barcodes Scan Enter Configuration barcode Scan configuration barcodes Scan Save Configuration barcode
13 Configuring Scanners Find out what vendor s scanner is used Get the configuration sheet Vendor s support web page Dealer s support web page Just call them Reconfigure the scanner Change supported barcode types Change CRLF Change character encoding Most scanners support special key codes like ESC, PageUp, PageDown, DEL, etc. Some scanners support software updates via configuration codes.
14 Copying Barcodes Often, it is sufficient to copy barcodes You don t have to decode them if you know what the code does for you Get a good digital camera Get a printer
15 Barcode was used as authentication against the bar You could load money onto your badge Drink without paying PH-Neutral Stefan Sels successfully copied a b33r badge using his digital camera It worked!
16 Parking Hotel parking garage in Dresden does not enforce correlation between entry ticket and exit ticket Paper tickets with barcode They also have long-term parking tickets They also give you one temporarily if you stay in the hotel Parking for free; forever
17 Recycling Machines You feed bottles into the machine It counts their value It produces a voucher Get your money from the cashier using the voucher
18 Getting paid for drinking Beer There is no connection between the recycling machine and the cashier s system People used to simply copy the vouchers Current versions are printed on watermarked paper The vouchers use a special property of the EAN13 barcode: the leading number code EAN13 codes start with the country of origin Number 2 is reserved for store internal use
19 Getting paid for drinking Beer Leading 2: Store Internal Following 6 digits: Cash register code for money back Following 5 digits: value Last digit: 10 minus the sum of all digits (EAN13 checksum) Generate your own and stick it under some heavy item (sixpack)
20 Access Control Some organizations use barcodes to control physical access More often then expected, the access control system only verifies that the structure of the data is well formed Easy test: show it your pack of cigarettes (or candy bar for nonsmokers) More advanced: get the number of digits and the barcode type right
21 De-Synchronization People read the number printed next to the code Scanners and backend systems read what is encoded on the barcode They don t have to be equal
22 De-Synchronization People play this trick with you as well: The Zoo Berlin The barcode says : , , The barcode decodes to: , ,
23 De-Synchronization: Property Tracking Property must be checked in when entering the building Connects your badge barcode with the property s barcode Checkout works the same way Replace the barcode on your badge temporarily with the barcode on the badge of the legitimate owner Check out with your new property Check in again without anything Remove replaced barcode from your badge Check out and go home
24 De-Synchronization: Property Tracking Works as well with inventory numbers (ever wanted this company laptop to be your own?) Works well with MAC addresses too. MAC Address Serial Number Property Tag
25 Procedure is Key: Video24 Automated DVD rental system Barcode member card, PIN, Biometric authentication (!!1!) Rental Procedure: Swipe card, enter PIN, select movie, logout Can be done via their Web Site Pickup Procedure: Swipe card, get DVD from machine Return Procedure: Swipe card, enter PIN, put DVD in machine
26 Procedure is Key: Video24 Code 38, 5 characters on member card (CCD readers in machine?) Easy to try some If open order, you get a DVD 5 digit code on DVDs Replacing a DVD with an empty one requires PIN Can be verified on the Web Site beforehand Not a good idea: last placement is traceable
27 Injections and Multi-Decoding Most barcode readers are left in their factory configuration Even if they are not, one can reconfigure them The back end application will, in many cases, only expect the barcode type it is written for Usually EAN13 or Interleaved 2o5 Using Code 128, one can inject arbitrary characters as input SQL Injections Separation character injections Format String attacks The newer the system, the better this works!
28 Injections and Multi-Decoding
29 QR-Codes Take a photo of a 2D barcode on your newspaper Commercial (!!!) decoder software will convert it into a HTTP hyperlink The software will send your mobile browser to that URL
30 QR-Codes: Die Welt
31 QR-Codes: Die Welt The codes actually contain a link to a mobile blogging company: wget --20:43:30-- => ` ' Resolving decode.kaywa.com Connecting to decode.kaywa.com :80... connected. HTTP request sent, awaiting response Found wget Location: --20:43:46-- => ` ' li [following] Resolving decode.kaywa.com Connecting to decode.kaywa.com :80... connected. HTTP request sent, awaiting response Found Location: [following]
32 QR-Codes: Injection People can print arbitrary content in newspapers: it s called advertising Most people trust their newspaper (at least the security of it, not necessarily the content) The browser on the mobile phone may already run Active authenticated session cookies? Vulnerable Browser?
33 Cross Zeitung Scripting XSS via a newspaper!!1! How about a link to your control your gmail account? a link to an ICEPACK / MPACK site? a link to a binary for your mobile phone? a link to about: or chrome:? Thanks! Now we need to tell our managers to not click links in their newspaper. OMFG!
34 Length and Decoding The better 1D codes do not specify the amount of characters you can encode The better your printing resolution and the attacked scanner (laser preferred), the more data you can stuff into the code Have you ever noticed that more data than expected is a desired property for people called hackers?
35 Barcode driven Buffer Overflows Yes, they happen. No, it is a lot less common than one may think. Your tool of choice: Code 128 Full 7-Bit ASCII character set Chainable using Function Code FC4 Warning: It s a pain.
36 QR-Code Readers Again.text:10006EB4 athisapplicatio DCD 59.text:10006EB4 unicode 0, <This application is for use only within the >.text:10006eb4 unicode 0, <European Union.>.text:10006F88 a DCD 13.text:10006F88 unicode 0, < >.text:10006FA8 artsps unicode 0, <rtsp://%s>,0.text: unicode 0, < >.text:100071C0 unicode 0, <http://ap.hpl.hp.com/resolve.php?v=1&a=g&d=>.text: unicode 0, <http://activeprint.lavasphere.de/ lava_key_generator/?login=hpglass&pwd=yoc9boon&sis=1&ver=0.9&imei=%s>
37 Things that didn t break
38 Things that didn t break They use Interleaved 2o5 Their scanners accept almost all 1D barcodes Their application doesn t care at all. Well done IKEA! May be we should try again in Moscow, they seem to have a different management.
39 Recreation Attacks If we can predict the meaning of the barcode, we can create our own Yes, it s that simple.
40 Postal Codes Postal services increasingly use 2D barcodes to replace stamps. Automated generation Automated verification Some use their own special barcode types Less decoders are capable of dealing with them Most use DataMatrix But what exactly is verified? Depends on what is in there
41 Postal Codes: Swiss Australia Post ASCII 00, , Interleaved 2 of Interleaved 2 of
42 US Postal Service Labeling System called Intelligent Mail Uses Code 128 labels Specs can be found on the Internet
43 US Postal Service CIN: Element ZIP Code: Label Source Mailer ID: Unique Identifier: Label Type: Digits Purpose and Details Identifies the tray or sack s destination. For 5-digit trays in accordance with the DMM, the destination ZIP Code is the 5- digit ZIP Code. For 3-digit trays in accordance with the DMM, the destination ZIP Code is the 3-digit ZIP Code followed by two zeros. Describes the contents of the tray or sack based on the 3-digit content identifier numbers listed in the DMM. If no listing for the tray contents is found, three zeros are used. Use the value 1 for Automation Compatible, Barcoded, and Machinable Mail. Use the value 7 for all other mail. 1 and 7 are the only acceptable values. A unique, nine-digit number assigned by the Postal Service to each mailer. A unique, five-digit number for each tray or sack. The Label Type is used as a qualifier for systems to recognize and parse the data within this barcode. The value is 8 when used with the 9-digit Mailer ID.
44 US Postal Service To maintain uniqueness of the barcode, the data for these label types must be unique for days. Mailers are asked to check with their Postal Service Marketing representative to confirm the requirement for uniqueness for a specific program.
45 US Postal Service To maintain uniqueness of the barcode, the data for these label types must be unique for days. Mailers are asked to check with their Postal Service Marketing representative to confirm the requirement for uniqueness for a specific program.
46 Boarding Tickets The latest trend: print your boarding pass from the airline s web site Security on Frankfurt/Main airport (FRA) relies on all boarding tickets (Internet or not) to be barcoded The security checkpoint is central, therefore, it is not airline specific This implies that: 1. The security checkpoint may not know all checked in passengers, since it would have to have a backend connections to all airlines represented in FRA. 2. Therefore, the validity must be in the barcode
47 Boarding Tickets
48 censored Boarding Tickets
49 Boarding Tickets
50 Boarding Tickets Everything in the ticket barcode can be either predicted or ignored. We can make arbitrary boarding tickets now. Oops. M1YYYYYYYY YYYYYYY TXLFRAAB C M1LINDNER/FELIXMR E77 MUCTXLLH M021D M1XXXXXXXXX XXXXXXXX TXLFMOAB A M1LINDNER/FMR E3U5XG3 FRATXLLH C1D M1LINDNER/FELIX MR EY2KI8G TXLCGNLH M16C M1LINDNER/FELIX MR EYMZSB3 TXLFRALH C4G M1LINDNER/FELIX MR E3HUYFI FRATXLLH M32C
51 Baggage Tracking Works by logically attaching a 1D barcode to your boarding pass Baggage is routed in the airport delivery systems depending on the barcode on it With online boarding, you connect an piece of baggage to your boarding pass by dropping it off at the counter Assumed it was your boarding pass to begin with
52 Wheelie of Fortune Copy Pass Ernst Agent Abdul bin Scheusal Boarding Pass Brain- and Fearless security (BaFe) X-Ray TERRORIST!!1!
53 Baggage Tracking: Fix Recommendation Evil water bottles are already illegal Not if you buy them for 3,50 after security Simply make Luggage illegal! The infrastructure for the traveler is already there! Frankfurt Airport Shopping
54 Deutsche Post Deutsche Bahn US Immigration Unsolved Cases
55 An Invitation BinID will be released to those interested Please provide feedback I will decode any barcode our commercial software can handle and send you the result If we get swapped, we will automate it
56 Principles of secure barcode applications Consider the barcode like a browser cookie It may be intercepted, copied, modified, lost, etc. If you can only use 1D, make sure it represents an unpredictable internal ID and nothing else. If you can use 2D, use real crypto. It doesn t cost you more. It may provide non-repudiation in both ways. Make sure your process works If your process trusts the barcode, you are toast Make sure the connection between the tag and the item works. There is no browser to cooperate with. Never trust the printed number!
57 Thank you, as always! FX of Phenoelit Shouts: Phenoelit, Fixer, Halvar & Zynamics, Frank Boldewin, David, Manu & Geraffel, twist4, Scusi, CCCB, NoLogin and many many others
QR Codes and Other Symbols Seen in Mobile Commerce This section describes bar code symbols frequently encountered in mobile commerce campaigns. and typical applications for each are listed. One symbology,
: Page 1 : : ANSI/AIM BC2-1995, Uniform Symbology Specification - Interleaved 2 of 5 0 2 of 5 Industrial Interleaved 2 of 5 (also called I-2/5 and ITF) is suitable for encoding general purpose all-numeric
27 BARCODE PRINTING Barcode Printing takes your museum to the next level of inventory control and tracking. Barcoding is a proven technology that can eliminate keyboard data entry errors. There are many
Part of the Best-Practices Handbook Introduction To Barcodes Barco de forma t A barcode is an optical representation of data. Barcodes exist in 1D format (linear) and 2D format (geometric patterns). Barco
21 BARCODE PRINTING The Barcode Printing option can be purchased for an additional cost. You will receive a floppy disk or CD that you can use to activate this feature. SET UP BARCODE PRINTING To start,
CHAPTER I INTRODUCTION 1.1 Introduction Barcodes are machine readable symbols made of patterns and bars. Barcodes are used for automatic identification and usually are used in conjunction with databases.
Barcode Symbology Reference Guide Omni-ID office locations: US UK China India Germany TABLE OF CONTENTS INTRODUCTION...3 CODE 128...4 CODE 39...5 CODE 93...5 CODABAR (USD-4, NW-7 AND 2OF7 CODE)...5 INTERLEAVED
Barcode Comparison Chart Barcode Type Character Set Length Checksum Applications/Comments Australia Postal Code 2-D 4 Includes error correction Aztec Code 2-D Full ASCII; FNC1 and ESI control codes Min
Understanding barcodes This ebook gives an overview of product codes, barcodes, scanners and describes where barcode management could fit in your business. www.brightpearl.com/ca0 to Understanding barcodes
A guide to barcode symbology for the logistics industry Symbology in barcodes Barcode technologies provide fast reliable data collection to ensure item or package traceability, and enhance customer service.
Programming Reference Guide HP USB Barcode Scanner Document Part Number: 430944-002 August 2006 Print this document before setting up the HP USB Barcode Scanner. The document provides the programming bar
Create!form Barcodes User Guide Barcodes User Guide Version 6.3 Copyright Bottomline Technologies, Inc. 2008. All Rights Reserved Printed in the United States of America Information in this document is
Enhanced Bar Code Engine Introduction Access to the Kofax Standard bar code recognition engine is provided through ImageControls-based applications and ISIS-based applications. In addition to the standard
SocketScan Software Advanced Programming Guide A guide to help you program symbology and parameter settings for the following Socket barcode scanning products: Secure Digital Scan Card Series 3 CompactFlash
Laser Barcode Scanner User s Manual FCC Compliance This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are
PrintShop Mail Barcode Plug-in Release Notes Copyright Information Copyright 1994-2010 Objectif Lune Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
INTELLIGENT MAIL BARCODES FREQUENTLY ASKED QUESTIONS: General What is the Intelligent Mail barcode? The Intelligent Mail barcode, formerly referred to as the 4-State Customer barcode, is a new Postal Service
Standard Grade Computing Studies Commercial Data Processing Frank Frame Acknowledgement Thanks to Dorothy Tedman for her contribution to the review of the content. First published 2004 2004 This publication
McKechnie Firstly, What is a bar code? Firstly, What is a bar code? A Series of black bars on an item? By definition, a bar code is a machine-readable representation of information (usually in dark ink
A Barcode Primer for Manufacturers Dr. Peter Green BellHawk Systems Corporation Introduction This document is an introduction to the principles and practice of barcode scanning as it relates to a manufacturing
Avery Personal Label Printer with Automatic Peel Feature Fast, easy, convenient label printing right at your desk. Tips Guide Avery Personal Label Printer with Automatic Peel Feature Print exactly what
Merchant Returns Service User s Guide Document Version 2.0 2015 Version History Version Date of Summary of Additions Addition 1.0 08/07/2014 Document created. 2.0 2/21/2015 Updated based on changes from
Configuring a Random Weight Bar Code Procedure You can set up bar codes for variable weight items, such as prepared foods, and have these bar codes printed on a label or a customer receipt. Note The UPC
Laser Barcode Scanner User s Manual FCC Compliance This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are
S302D 2D Imaging Barcode Scanner Programming Guide 1 Advanced Handheld High-Speed Laser Scanner Revision History Changes to the original manual are listed below: Version Date Description of Version 1.0
White paper Understanding barcodes. Barcodes turn manual product look-ups into an automated process that s efficient and virtually errorfree. In this white paper, you ll learn what they are, when to use
Laser Scanner Programming Guide (SE923 laser engine) CONTENT Technical note... 5 How to recognise the type of the laser barcode engine... 5 How to program the laser barcode reader into default value...
Barcode systems require three elements: Designing a Barcode System Origin: You must have a source of barcodes. These can be preprinted or printed on demand. Reader: You must have a reader to read the barcodes
Advanced Function Presentation Consortium Bar Code Object Content Architecture Frequently Asked AFPC-0011-02 Questions Implementation Tips for Producing Bar Codes with the Bar Code Object Content Architecturee
Register your product and get support at www.philips.com/dictation DPM8500 Barcode scanner configuration guide Table of contents 1 Introduction 5 Operational Parameters 5 Parameter defaults 5 2 Set default
Universal Serial Bus (USB) HID Point of Sale Usage Tables 5 March 2001 Version 1.02 Please send comments via electronic mail to: firstname.lastname@example.org 1998, 1999, 2001 USB Implementers Forum All rights reserved.
Masterclass 2D codes - market applications Maja Stanic, Sanne Tiekstra 1 April 2011 Outline Technology/Design 2D codes technology Types of 2D codes Design of 2D codes and Integration in production/design
BCST-20 Barcode Scanner Instruction Manual www.inateck.com IMPORTANT NOTICE Safety Precaution * DO NOT disassemble the scanner, or place foreign matter into the scanner causing a short circuit or circuit
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
ADVANCED DATA FORMATTING (ADF) PROGRAMMER GUIDE ADVANCED DATA FORMATTING PROGRAMMER GUIDE 72E-69680-04 Revision A April 2015 ii Advanced Data Formatting Programmer Guide No part of this publication may
Scan to Network and Scan to Network Premium Administrator's Guide March 2015 www.lexmark.com Contents 2 Contents Overview...3 Configuring the application...4 Configuring a destination...4 Configuring destination
MATHEMATICAL EXCURSIONS Math and Bar Codes If you examine most consumer products, you will find a small rectangular area with a pattern of black bars and white spaces of various widths on the packaging
ELFRING FONTS UPC BAR CODES This package includes five UPC-A and five UPC-E bar code fonts in both TrueType and PostScript formats, a Windows utility, BarUPC, which helps you make bar codes, and Visual
Barcodes and what can do with ScannerVision Barcodes in ScannerVision can be used as the source of metadata or as document splitters or both. As the source of metadata the data contained in the barcode
About the Author Gary Elfring has worked with bar codes since 1979. His software company, Elfring Fonts, Inc sells programs to print bar codes and licenses bar code technology to other firms. He has created
CT20 Barcode Scanner User Manual IMPORTANT NOTICE Safety Precaution * DO NOT disassemble the scanner, or place foreign matter into the scanner cause a short circuit or circuit damage. * DO NOT expose the
1 Labels: Getting Started Barcode Definitions Overview Barcode definitions contain information for different types of barcodes. You may skip this document if you are not printing barcodes, or if you are
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Let s talk symbology A guide to decoding barcodes Symbology in barcodes Barcode technologies provide fast reliable data collection to ensure part or product traceability, error-proof assembly processes,
Copyright 2012 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY PRODUCTS OR SERVICES ARE BASED ON INFORMATION MADE AVAILABLE
Supported Printer Models All popular bar code printers are supported. (For a complete list go to www.tlashford.com) Simple (Low) Pricing No Tiered Pricing. 2 Dimensional Bar Codes (Included) Graphic Transfer
Successful Strategies for QA- Based Security Testing Rafal Los Enterprise & Cloud Security Strategist HP Software 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject
TABLE OF CONTENTS What Is a Global Trade Item Number?... 3 What Is a GTIN Used For?... 3 Key Attributes of the GTIN... 3 Business Benefits of Using GTINs... 3 How Is the GTIN Formed?... 4 Which GTIN Is
BARCODE READER V 2.1 EN USER MANUAL INSTALLATION OF YOUR DEVICE PS-2 Connection RS-232 Connection (need 5Volts power supply) 1 INSTALLATION OF YOUR DEVICE USB Connection 2 USING THIS MANUAL TO SETUP YOUR
ProfitTool Inventory Control System Bar Code Inventory Control A White Paper on the Key Functions ProfitTool Bar Code Inventory Control Module General Data Systems has developed the ProfitTool Bar Code
NOT ALL CODES ARE CREATED EQUAL Why some serial numbers are better than others. Verify Brand 3033 Campus Drive, Minneapolis MN 55441 email@example.com (763) 235-1400 EXECUTIVE SUMMARY Serial numbers
BAR CODE GUIDELINES Revision 12/18/2015 General Bar Code Guidelines Pep Boys has a commitment to increasing supply chain efficiency. Barcode scanning is a proven way to identify products at the item level.
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
U.S. Default Settings Sequence Reset Scanner Xi2000 Series Configuration Guide Auto-Sense Mode ON UPC-A Convert to EAN-13 OFF UPC-E Lead Zero ON Save Changes POS-X, Inc. 2130 Grant St. Bellingham, WA 98225
STATE-OF-THE-ART IN HIGH SPEED TRACKING AND TRACING S O F T W A R E S O L U T I O N S Smart Track Never Lose Track of an Item Again! SMART TRACK IS THE PERFECT SOLUTION FOR ALL YOUR TRACKING NEEDS Tired
Selecting the Correct Automatic Identification & Data Collection Technologies for your Retail Distribution Center Application Have camera/image-based code readers replaced traditional laser scanners? Has
TAGGIT PRO Q U I C K S T A R T G U I D E Table of Contents Security Key Installation... 1 System Requirements / Installing... 2 Installing a Printer... 3 Creating Tags and Labels... 5 Opening Tag and Label
APPENDIX E COMMAND BARCODES Scan command barcode(s) to quickly configure the Socket Bluetooth Cordless Hand Scanner v3 (1D laser versions). By default, the CHS is in HID mode as a Keyboard device. IMPORTANT!
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
FreeForm Designer FreeForm Designer enables designing smart forms based on industry-standard MS Word editing features. FreeForm Designer does not require any knowledge of or training in programming languages
How To Burp David Brown Senior Security Engineer Security Innovation In case you want to follow along https://portswigger.net/burp/download.html What is Burp? An HTTP Proxy and other things Built by lazy
WineWeb: Point-of-Sale Planning Guide This document provides information on options to consider when establishing a point-of-sale environment for your winery, or when thinking about expanding your winery
POS software: Microsoft Dynamics - Point of Sale FAQ Q: I only have one retail store. I'd like to use a computer and software, but don't know if Microsoft Dynamics Point of Sale is a good fit. A: Point
QR Code US Guideline June 2012 V1.2 9 May 2012, Issue #1 All contents copyright 2009 Page 1 of 15 Document Summary Document Item Current Value Document Title QR CODE Date Last Modified 14 May 2012 Current
METROLOGIC INSTRUMENTS, INC. Area Imaging Bar Code Supplemental Configuration Guide Copyright 2007 by Metrologic Instruments, Inc. All rights reserved. No part of this work may be reproduced, transmitted,
Full-Service Intelligent Mail Answers Meeting Minutes 07/16/10 Sunset of Intelligent Mail Answers Meeting The Intelligent Mail Answers meeting has ended effective July 16. With respect to the customers
User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
Intelligent Mail Barcodes and Placard Solu4ons Lance Bell USPS 2014 National Postal Forum Washington, DC Welcome to Intelligent Male 2 1 Intelligent Mail Barcodes and Placard Solu;ons This workshop will
Achieving 5 Nines Business Process Reliability With Barcodes Michael Salzman, VP Marketing (408) 737-7092 firstname.lastname@example.org Introduction All workflows rely on critical data to trigger and direct
Chapter 5 Understanding Input Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define input and differentiate among a program, command, and user response Identify
Getting Started: Full Service For New Users National PCC Day September 18, 2013 1 XYZ CORPORATION INTERNATIONAL FALLS, MN What is Intelligent Mail Service? Intelligent Mail uses information-rich barcodes
Auto-ID 321 Auto-ID Data-collection needs: What is our WIP? What is productivity or assignment of employees? What is utilization of machines? What is progress of orders? What is our inventory? What must
509509.1.5 Other Services: Address Information System Products 509 Other Services Overview 1.0 Address Information System Services 2.0 Nonpostal Services 1.0 Address Information System Services 1.1 General
Avery DesignPro for PC Frequently Asked Questions General Information Questions Q: What are the system requirements for DesignPro? A: The following is required to run DesignPro: Microsoft Windows VistaTM,
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
Nexus Recycling Management System product summary. Nexus is an unparalleled application designed to automate the daily routine of processing scale transactions, invoicing customers, and managing employees,
The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer