NFCulT. An easy a nice tool that will make you have fun, or... make profit!
|
|
|
- Derrick Henderson
- 10 years ago
- Views:
Transcription
1 NFCulT An easy a nice tool that will make you have fun, or... make profit
2 Matteo Beccaro ( aka bughardy ) Student at Politecnico di Torino Computer Engineering Security Engineer and researcher at Secure Network S.r.l. Contacts: Speaker at: DefCon 21 - «OPT it won t save you from free rides» 30C3 - «How to builda safe NFC ticketing system» BlackHat US 14 s Arsenal DefCon 22 SkyTalks And now here at BlackHat EU 14 s Arsenal Who I am
3 What we are dealing with MIFARE ULTRALIGHT tags as tickets Designed to MHz Manufactured by NXP semiconductors Worldwide largest installed platform More than 50 million MIFARE reader core components More than 5 billion ICs Image source: Google images
4 Use of NFC on transportation systems Ticketing systems that work at very high speeds to reduce queues at tube and train stations Usually, absolutely not safe Why? Image source: Google images
5 Memory Layout 512 bits of memory (64 bytes) arranged in 16 pages of 4 bytes Different memory areas: UID and Internal The s OTP Area Data Area Page Address # DEC HEX x00 UID 1 0x01 UID 2 0x02 UID Internal 3 0x03 OTP From 4 to 15 0x04 to 0x0F Data
6 UID and Internal s 7 bytes for Serial Number SN0 to SN6 1 byte for Internal 2 Check bytes as a result of XOR operations CB0 and CB1 All of them are programmed by the manufacturer: read only Page Address # DEC HEX x00 SN0 SN1 SN2 CB0 1 0x01 SN3 SN4 SN5 SN6 2 0x02 CB1 Internal 3 0x03 OTP From 4 to 15 0x04 to 0x0F Data
7 UID and Internal s How CB0 and CB1 are evaluated? CB0 = 0x88 SN0 SN1 SN2 CB1 = SN3 SN4 SN5 SN6 Page Address # DEC HEX x00 SN0 SN1 SN2 CB0 1 0x01 SN3 SN4 SN5 SN6 2 0x02 CB1 Internal 3 0x03 OTP From 4 to 15 0x04 to 0x0F Data
8 s 2 bytes msb lsb msb lsb L - 7 L - 6 L - 5 L - 4 L - OTP BL-10 to 15 BL 4 to 9 Possibility of making a whole page (4 bytes) read-only Possibility of making the s themselves read-only BL - OTP L - 15 L - 14 L - 13 L - 12 L-11 L - 10 L - 9 L - 8 Page Address # DEC HEX x00 UID 1 0x01 UID 2 0x02 UID Internal 3 0x03 OTP From 4 to 15 0x04 to 0x0F Data
9 s They cannot be edited as you want What you are about to write is simply bitwise ORed with the present data OR One bit in state 1 cannot be turned into 0 anymore Page Address # DEC HEX x00 UID 1 0x01 UID 2 0x02 UID Internal 3 0x03 OTP From 4 to 15 0x04 to 0x0F Data
10 OTP s The only security function in MIFARE ULTRALIGHT tags 4 bytes, 0x00 by default As the s, what you are about to write is ORed with the present data One-Time Programmable Not One-Time Password Page Address # DEC HEX x00 UID 1 0x01 UID 2 0x02 UID Internal 3 0x03 OTP From 4 to 15 0x04 to 0x0F Data
11 Data Sector Largest sector 48 bytes, arranged in 12 pages Read / Write mode For transportation system applications this sector will store Time of last stamp Validator Machine ID Bus line or underground stop Page Address # DEC HEX x00 UID 1 0x01 UID 2 0x02 UID Internal 3 0x03 OTP From 4 to 15 0x04 to 0x0F Data
12 Pros & Cons Pros Cheap Possibility of creating limited tickets Expiration after a finite number of times Good for public transportation systems Cons No hardware encryption Usually not well implemented on public transportation systems: Reset Attack [2012] Attack [2013] Time Attack [2013] Replay Attack [2014] How easily is to exploit the related vulnerabilities? Here comes NFCulT
13 Attack 1 - Attack msb lsb msb lsb L - 7 L - 6 L - 5 L - 4 L - OTP BL-10 to 15 BL 4 to 9 Attack Mostly overcome Extremely easy task to perform Step 1: set the correct lock bit Step 2: have fun BL - OTP L - 15 L - 14 L - 13 L - 12 L-11 L - 10 L - 9 L - 8 Page Address # DEC HEX x00 UID 1 0x01 UID 2 0x02 UID Internal 3 0x03 OTP From 4 to 15 0x04 to 0x0F Data
14 Acting on the lock bits We can make a sector of the ticket readonly Just turn a bit from 0 into 1 (L-OTP) attack with our app just press a button The stamping machine tries to validate the ticket No feedback for the (failed) write operation The number of rides is freezed Attack 1 - Attack
15 Attack 1 - Attack Check if last time stamp is older than n minutes: No the ticket is still valid Type of multiple ride ticket: 5 rides ticket Yes let s stamp the ticket Check if there are rides left: No the ticket is useless Yes let s stamp it» Write Timestamp OK» Write other stuff OK» Write the new number of rides left KO Ticket is valid. 5 Rides left No feedback WIN Do not forget to take one ride off Easily fixable Just check the state of L-OTP bit and decide whether to validate the ticket or not
16 Attack 2 - Time Attack Time Attack Attacker is required to understand the format of the timestamp The location where the timestamp is stored must be identified as well The timestamp is not encrypted Four (4) simple steps to own the ticket system Set the right page Set the starting timestamp s date Set your desired timestamp s time Have fun with your band new ticket OTP WRITE FREE
17 Attack 2 - Time Attack 1 1. Set the date of the timestamp 2. Choose the right data page 4 3. Setting the desired time of timestamp 4. Write data to the ticket 2 3
18 Replay Attack Assumptions No online database of tickets are available Attacker needs a valid source ticket The attacker owns a clone MIFARE Ultralight tag Three (3) simple steps Dump the ticket Edit key information Write to the blank UL tag Attack 3 Reply Attack
19 We love Chinese stuff Perfect clone of UL ticket No read-only pages Just clone your real ticket Add a ride to the cloned ticket Stamp your brand new cloned ticket Clone it back on the real ticket Or directly use the clone Pay attention to the number of rides Have fun Attack 3 Reply Attack
20 Attack 3 Reply Attack Considerations Encrypted ticket Encryption can be circumnavigated by cloning the whole encrypted data It works if the whole data area is encrypted It works if the timestamp is encrypted It works because The stamping machine is validating a cloned ticket, but with a ride more The clone tag has the same number or rides left, but an updated timestamp
21 What if you could simply edit your tag as you prefer?
22 Custom Edit Just write whatever you want wherever you prefer: Fix UID bytes ( if you broke them ) Write arbitrary data to pages Be careful If you are not using a clone UL, you could lock forever some pages
23 Now you can edit your saved dump: For privacy and security reasons dumps are stored in private directory of the app located in /data/data/ org.bughardy.nfcult/files/ Without root permission an external app can not access to those files Now you can edit them within the NFCulT app Why it is useful? This is a must-have features for reply attack, since very often you need to add a ride to your dump You can reply the edited dump directly to your ticket or save it as a new one Dump Edit
24 Base Conversion Now from the Dump Edit tab you can convert values in different bases for a more in-deep understanding of data on the ticket. It supports: Hex > Bin Hex > Dec Bin > Hex Bin > Dec Dec > Hex Dec > Bin
25 Future ready Now NFCulT supports also ART That means it is ready to use also on Android 5.0 smartphones In the next release I ll probably work on a tablet version
26 Where to find Source code and dev build are on github: APK and official signed builds are available on Play Store: id=org.bughardy.nfcult
OTP circumventing in MIFARE ULTRALIGHT: Who says free rides?
OTP circumventing in MIFARE ULTRALIGHT: Who says free rides? bughardy [email protected] Eagle1753 [email protected] Introduction RFID technologies are becoming more and more prevalent in
Electronic Access Control Security. Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016
Electronic Access Control Security Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016 Me Matteo Beccaro Founder & Chief Technology Officer at Opposing Force The first Italian company specialize in
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
Exercise 1: Set up the Environment
RFID Lab Gildas Avoine, 2014 Contact: [email protected] Objective: Learn how much it is easy to read contactless tags, possibly simulate/clone. Requirement: Hardware: Reader SCL3711 or ACR122, Reader
Secure recharge of disposable RFID tickets
Secure recharge of disposable RFID tickets Riccardo Focardi Flaminia Luccio Università Ca Foscari, Venezia {focardi,luccio}@unive.it FAST 2011 15-16 September 2011, Leuven FAST 2011 ()Secure recharge of
RFID MODULE Mifare Reader / Writer SL031 User Manual Version 2.7 Nov 2012 StrongLink
RFID MODULE Mifare Reader / Writer User Manual Version 2.7 Nov 2012 StrongLink CONTENT 1. MAIN FEATURES... 3 2. PINNING INFORMATION... 4 3. BAUD RATE SETTING... 5 4. COMMUNICATION PROTOCOL... 5 4-1. Communication
NACCU 2013. Migrating to Contactless: 2013 1
NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise
RFID MODULE Mifare Reader / Writer SL030 User Manual Version 2.6 Nov 2012 StrongLink
RFID MODULE Mifare Reader / Writer User Manual Version 2.6 Nov 2012 StrongLink CONTENT 1. MAIN FEATURES... 3 2. PINNING INFORMATION... 4 3. DEVICE OPERATION... 5 3-1. Clock and Data Transitions:... 5 3-2.
Security Evaluation of the disposable OV-chipkaart v1.6
Security Evaluation of the disposable OV-chipkaart v1.6 Pieter Siekerman (pjsiekerman at os3.nl) Maurits van der Schee (mvdschee at os3.nl) System and Network Engineering University of Amsterdam July 26,
RFID MODULE Mifare Reader / Writer SL032 User Manual Version 1.5 Nov 2012 StrongLink
RFID MODULE Mifare Reader / Writer User Manual Version 1.5 Nov 2012 StrongLink CONTENT 1. MAIN FEATURES... 3 2. PINNING INFORMATION... 4 3. BAUD RATE SETTING... 5 4. COMMUNICATION PROTOCOL... 5 4-1. Communication
AN 073120. mifare Ultralight Features and Hints. Document information. Multiple ticketing, secured data storage, implementation hints
AN 073120 Rev. 2.0 18 December 2006 Application note Document information Info Keywords Abstract Content Multiple ticketing, secured data storage, implementation hints This document presents features and
RFID MODULE Mifare Reader / Writer SL025B User Manual Version 1.4 Nov 2012 StrongLink
RFID MODULE Mifare Reader / Writer User Manual Version 1.4 Nov 2012 StrongLink CONTENT 1. MAIN FEATURES... 3 2. PINNING INFORMATION... 4 3. BAUD RATE SETTING... 5 4. COMMUNICATION PROTOCOL... 5 4-1. COMMUNICATION
The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses. National Computer Corporation www.nccusa.com
The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses Making the customer payment process convenient,
MTP: Continuous User Authentication on Android Using Face Recognition
MTP: Continuous User Authentication on Android Using Face Recognition Testing of FaceApp Application This experiment is being conducted to find out the accuracy rate of face recognition algorithm used
NTAG213/215/216. The mechanical and electrical specifications of NTAG21x are tailored to meet the requirements of inlay and tag manufacturers.
NFC Forum Type 2 Tag compliant IC with 144/504/888 bytes user memory 265332 1. General description NTAG213, NTAG215 and NTAG216 have been developed by NXP Semiconductors as standard NFC tag ICs to be used
How to Install Applications (APK Files) on Your Android Phone
How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android
AN1305. MIFARE Classic as NFC Type MIFARE Classic Tag. Application note COMPANY PUBLIC. Rev. 1.3 2 October 2012 130513. Document information
MIFARE Classic as NFC Type MIFARE Classic Tag Document information Info Content Keywords NFC Forum, NFC data mapping, MIFARE Classic 1K/4K, MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Plus X/S, NFC Type
Hacking Mifare Classic Cards. Márcio Almeida ([email protected])
Hacking Mifare Classic Cards Márcio Almeida ([email protected]) !! DISCLAIMERS!! Disclaimer 1: The content of this presentation results from independent research conducted by me on my own time and of
IP Card Reader Interface User Manual
IP Card Reader Interface User Manual SB Research 2009-2011 The IP Reader Interface family: Concept: The IP Card Reader Interface allows access control card readers to be connected to a network device,
Client Training Manual
Client Training Manual Contents Quick Summary on How to Open Encrypted Email from Arlington County.2 I. Overview... 4 A. Overview of Email Encryption with Arlington County Government... 4 Link to YouTube
Training MIFARE SDK. Public. MobileKnowledge June 2015
MIFARE SDK Public MobileKnowledge June 2015 Agenda Overview of MIFARE SDK related technologies NFC Technology (Read/Write mode) MIFARE, NTAG and ICODE products NFC in Android MIFARE SDK Introduction to
NFC TagWriter by NXP
Rev. 1.6 27 April 2016 User manual Document information Info Content Keywords User manual Abstract This document describes the features of the TagWriter and steps to setup TagWriter application in smart
Dirty use of USSD codes in cellular networks
.. Dirty use of USSD codes in cellular networks Ravishankar Borgaonkar Security in Telecommunications, Technische Universität Berlin TelcoSecDay, Heidelberg, 12th March 2013 Agenda USSD codes and services
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Business Mobile Banking Features
Business Mobile Banking Features Overview There are two modes of Business Mobile Banking available. Each mode offers a different level of functionality. Business Mobile Banking App o Business Online Banking
MF0ICU2. 1. General description. MIFARE Ultralight C. 1.1 Contactless energy and data transfer. 1.2 Anticollision. Rev. 3.2 19 May 2009 171432
Rev. 3.2 19 May 2009 171432 1. General description NXP Semiconductors has developed MIFARE - - to be used with Proximity Coupling Devices (PCD) according to ISO/IEC 14443A (see Ref. 1 ISO/IEC ). The communication
AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev. 1.3 2 October 2012 130413. Document information
NFC Type MIFARE Classic Tag Operation Document information Info Content Keywords NDEF, NDEF data mapping, NDEF Data Exchange Format MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Classic 1K/4K, MIFARE Plus
Two-Step Authentication FAQ
Two-Step Authentication FAQ General Questions Q: Why is Stanford requiring this additional step? A: Hackers, including foreign state-sponsored entities, are attacking university computer systems with ever-increasing
New Online Banking Guide for FIRST time Login
New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms
Attacking the Traveling Salesman Point-of-sale attacks on airline travelers DEFCON 2014
Attacking the Traveling Salesman Point-of-sale attacks on airline travelers DEFCON 2014 Alex Zacharis Nikos Tsagkarakis [email protected] Census S.A. http://census-labs.com/ Contents Why target travelers?
New Student Orientation Information Technology Packet
New Student Orientation Information Technology Packet Welcome Welcome to the College of Nursing (CoN)! The Information Technology (IT) Department provides technical support to students, faculty, and staff.
RIDICULOUSLY EASY GUIDE TO SOCIAL MEDIA TWITTER
RIDICULOUSLY EASY GUIDE TO SOCIAL MEDIA Alberta s a big place and while you could run round the province telling everyone you see about Change Day AB, it s probably not the best use of your time and could
Novell Filr. Mobile Client
Novell Filr Mobile Client 0 Table of Contents Quick Start 3 Supported Mobile Devices 3 Supported Languages 4 File Viewing Support 4 FILES THAT CANNOT BE VIEWED IN THE FILR APP 4 FILES THAT GIVE A WARNING
UM0853 User manual. 1 Introduction. M24LRxx application software user guide
User manual M24LRxx application software user guide 1 Introduction The purpose of this user manual is to teach how to use the M24LRxx tool kit with the M24LRxx_Application_Software. It describes the M24LRxx_Application_Software
UM0109 USER MANUAL. Public Transport Ticketing Demo
UM0109 USER MANUAL Public Transport Ticketing Demo The purpose of the Public Transport Ticketing Demo is to demonstrate that the STMicroelectronics shortrange product portfolio can be used as public transport
OneNote 2013 Tutorial
VIRGINIA TECH OneNote 2013 Tutorial Getting Started Guide Instructional Technology Team, College of Engineering Last Updated: Spring 2014 Email [email protected] if you need additional assistance after
How to configure Mac OS X Server
How to configure Mac OS X Server By Rob Buckley In the previous article in this series, we showed you how to secure a Mac using the functions built into its operating system, OS X. See photo story here
2015 MDRT Annual Meeting e Handout Material. What is Your Smartphone Leaking?
2015 MDRT Annual Meeting e Handout Material Title: Speaker: What is Your Smartphone Leaking? Anwar Visram, CISSP Presentation Date: Wednesday, June 17, 2015 10:00 11:00 a.m. The Million Dollar Round Table
How to pull content from the PMP into Core Publisher
How to pull content from the PMP into Core Publisher Below you will find step-by-step instructions on how to set up pulling or retrieving content from the Public Media Platform, or PMP, and publish it
ACR122 NFC Contactless Smart Card Reader
Datenblatt / Specifications ACR122 NFC Contactless Smart Card Reader Table of Contents 1. Introduction... 3 1.1. USB Interface... 3 2. Implementation... 4 2.1. Smart Card Reader Interface Overview... 5
GETTING TO KNOW YOUR TELSTRA PRE-PAID 3G WI-FI
GETTING TO KNOW YOUR TELSTRA PRE-PAID 3G WI-FI LET S GET THIS SHOW ON THE ROAD You must be excited about your brand new Telstra Pre-Paid 3G Wi-Fi. This guide will help you get connected as quickly and
How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Email Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For
Email client settings: Incoming Mail (IMAP) Server requires SSL: Outgoing Mail (SMTP) Server requires TLS or SSL: Account Name: Email Address: Password: imap.gmail.com Use SSL: Yes Port: 993 smtp.gmail.com
Moving BidMagic to a new system (Backup / Restore Utility)
Moving BidMagic to a new system (Backup / Restore Utility) Moving BidMagic information from one machine to another is easy; it can be done in a few steps. 1. First backup the old system 2. Copy the backed
Welcome Guide for MP-1 Token for Microsoft Windows
Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made
How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free
Setting Up a Macintosh For Use In The Medical Center The purpose of this document is to provide some assistance and direction to the users of Macintosh computers in The Medical Center network environment.
Handout: Creating Forms in Word 2010
Creating Forms in Word 2010 Table of Contents ABOUT PRINTED FORMS AND FORMS FOR USE IN WORD... 1 KINDS OF FORMS... 2 DESIGNING A FORM... 2 CREATE FORMS THAT USERS COMPLETE IN WORD... 2 STEP 1: SHOW THE
Binary Numbers. Binary Octal Hexadecimal
Binary Numbers Binary Octal Hexadecimal Binary Numbers COUNTING SYSTEMS UNLIMITED... Since you have been using the 10 different digits 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9 all your life, you may wonder how
User s manual for Android Application
Motorised IP Video surveillance camera for smartphones, tablets and PC / MAC. Protect your home and family remotely! User s manual for Android Application Thanks We thank you for choosing Aquila Vizion.
Training. MIFARE4Mobile. Public. MobileKnowledge April 2015
MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture
RFID READER 13.56MHz Reader / Writer SL500 User Manual Version 2.6 Nov 2011 StrongLink
RFID READER 13.56MHz Reader / Writer User Manual Version 2.6 Nov 2011 StrongLink CONTENT 1. GENERAL INFORMATION... 5 2. TYPES AND EXPLANATION... 6 3. CONNECTING TO PC... 6 3.1 -RS232... 6 3.2 -USB... 7
Colorfly Tablet Upgrade Guide
Colorfly Tablet Upgrade Guide (PhoenixSuit) 1. Downloading the Firmware and Upgrade Tool 1. Visit the official website http://www.colorful.cn/, choose 产 品 > 数 码 类 > 平 板 电 脑, and click the product to be
SL2 ICS53/SL2 ICS54. 1. General description I CODE SLI-S/I CODE SLI-S HC. 1.1 Anticollision. 1.2 Contactless energy and data transfer
Rev. 3.0 14 March 2007 Product data sheet 113730 1. General description The IC is a dedicated chip for smart label applications with the need for a higher security level, larger memory and/or a product
Mobile Banking FAQ for Business
Mobile Banking FAQ for Business General Questions 1. What is National Bank of Arizona Business Mobile Banking? Mobile Banking provides anytime access to your eligible account(s) from select mobile phones
Country Club Bank- Mobile Banking FAQs
Country Club Bank- Mobile Banking FAQs GENERAL... 2 MOBILE BANKING- WHAT IS IT?... 2 TEXT BANKING... 3 PHONE ENROLLMENT... 4 MOBILE BILLPAY... 5 TROUBLESHOOTING... 6 General How much does this service
EASTPOINTE SECURE E MAIL SYSTEM SETUP INSTRUCTIONS
EASTPOINTE SECURE E MAIL SYSTEM SETUP INSTRUCTIONS In order to send and receive protected health information (PHI) on consumers between Eastpointe and your provider agency you will need to do the following.
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
Introduction to UNIX and SFTP
Introduction to UNIX and SFTP Introduction to UNIX 1. What is it? 2. Philosophy and issues 3. Using UNIX 4. Files & folder structure 1. What is UNIX? UNIX is an Operating System (OS) All computers require
Device Enrollment Guide
TechReady Are you ready to implement IT solutions? Device Enrollment Guide Mobile Device Management with Enterprise Mobility Suite Created for: TechReady 7 iunie 2016 Version 0.3 Created by: Adrian Stoian
Why should I back up my certificate? How do I create a backup copy of my certificate?
Why should I back up my certificate? You should always keep a backup copy of your ACES Business Certificate on a location external to your computer. Since it s stored locally on your computer, in the Windows
Contents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10
Installation Guide Contents Before You Install... 3 Server Installation... 5 Configuring Print Audit Secure... 10 Configuring Print Audit Secure to use with Print Audit 6... 15 Licensing Print Audit Secure...
CASQUE SNR Presentation 16 th April 2015
Presentation 16 th April 2015 What is it Distributed Management Systems Innovative Methodology from UK owned company with accompanying Protocol that allows Key Generation, Key Distribution and Key Change
Spring Hill State Bank Mobile Banking FAQs
Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an
INTEGRATED CIRCUITS I CODE SLI. Smart Label IC SL2 ICS20. Functional Specification. Product Specification Revision 3.1 Public. Philips Semiconductors
INTEGRATED CIRCUITS I CODE SLI Smart Label IC SL2 ICS20 Product Specification Revision 3.1 February July 2005 2001 Public Philips Semiconductors CONTENTS 1 FEATURES...4 1.1 I CODE SLI RF Interface (ISO/IEC
How to Remotely Track Any Lost Smartphone, Tablet, or PC
How to Remotely Track Any Lost Smartphone, Tablet, or PC Whether your device was stolen or simply lost, you can remotely track, lock, and wipe it. Don t wait until you ve l hardware to think about this
Zimbra to Gmail Migration
Zimbra to Gmail Migration There are two steps that you need to complete prior to having us migrate your email from Zimbra to Gmail. These steps must be completed by November 9, 2012. If you experience
Receiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP
HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP When you install SQL Server you have option to automatically deploy & configure SQL Server Reporting
Setting Up groov Mobile Apps. Introduction. Setting Up groov Mobile Apps. Using the ios Mobile App
Introduction Using the ios Mobile App Opto 22 s free groov View apps for ios and Android allow you to use View for one or more groovs on your smartphone or tablet in full-screen mode without the address
GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual
GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile
ANDROID GUEST GUIDE. Remote Support & Management PC Tablet - Smartphone. 1. An Introduction. Host module on your PC or device
ANDROID GUEST GUIDE Remote Support & Management PC Tablet - Smartphone Remote Desktop Guest module on your Android device Host module on your PC or device 1. An Introduction WiseMo develops software for
INSTRUCTION. The smallest GPS watch locator in the country
Please read the user manual carefully before you use it, so that you can get the correct installation and make quick online activation. Product appearance and color are subject to change. Actual product
Event2CRM Quick Start User Guide
Event2CRM Quick Start User Guide V1.0 Plan. Promote. Track. Any event that requires registration or ticketing. CRM Innovation LLC 8527 Bluejacket Street Lenexa, KS 66214 crminnovation.com Contents Creating
Single Sign-on Frequently Asked Questions
Single Sign-on Frequently Asked Questions Q1. What is Single Sign-on? Q2. How does SSO work? Q3. How do I access the SSO portal? Q4. Where can I find help on how to use the SSO portal? Q5. How do I reset
SQL EXPRESS INSTALLATION...
Contents SQL EXPRESS INSTALLATION... 1 INSTALLING SQL 2012 EXPRESS... 1 SQL EXPRESS CONFIGURATION... 7 BILLQUICK DATABASE... 9 SQL Express Installation The Microsoft SQL Server 2012 Express software is
Generate Android App
Generate Android App This paper describes how someone with no programming experience can generate an Android application in minutes without writing any code. The application, also called an APK file can
Multi Factor Authentication API
GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...
USB Card Reader Configuration Utility. User Manual. Draft!
USB Card Reader Configuration Utility User Manual Draft! SB Research 2009 The Configuration Utility for USB card reader family: Concept: To allow for field programming of the USB card readers a configuration
Creating an e mail list in YahooGroups
Creating an e mail list in YahooGroups Creating an e mail list in Yahoo Groups is easy to do. Just follow the steps below and your group will be created in a matter of minutes. Why use Yahoo Groups? First,
Ciphermail Gateway PDF Encryption Setup Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption
1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5
User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation
Google Drive: Access and organize your files
Google Drive: Access and organize your files Use Google Drive to store and access your files, folders, and Google Docs, Sheets, and Slides anywhere. Change a file on the web, your computer, tablet, or
Using NetCrunch for compliance and security audits
Using NetCrunch for compliance and security audits AdRem NetCrunch 6.x Tutorial 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software
Implementation Guide for protecting
Implementation Guide for protecting Remote Web Workplace (RWW) Outlook Web Access (OWA) 2003 SharePoint 2003 IIS Web Sites with BlackShield ID Copyright 2010 CRYPTOCard Inc. http:// www.cryptocard.com
Password Depot for Android
Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening
Guide to Installing BBL Crystal MIND on Windows 7
Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP
iii. You will not be able to access their iocbc account without a valid OTP token from 1 Nov 2012 onward.
Login using One-Time Password (OTP) i. You can continue to login without the OTP from now till 31 October 2012 so long as you have not activated your token via the iocbc Online platform. ii. Once you have
Country Club Bank- Intro to Mobile Banking- Android & iphone Apps
Country Club Bank- Intro to Mobile Banking- Android & iphone Apps MOBILE APP BANKING (FOR IPHONE AND ANDROID)... 2 SIGN ON PAGE... 4 ACCOUNT SUMMARY PAGE... 4 ACCOUNT ACTIVITY PAGE... 6 SEARCH ACTIVITY
Store & Share Quick Start
Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You
1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
IT Information Packet
IT Information Packet Welcome to the University of Mount Olive! Beginning college is an exciting time where you will be experiencing many new things in a short amount of time. We understand that technology
How to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
Outlook Data File navigate to the PST file that you want to open, select it and choose OK. The file will now appear as a folder in Outlook.
Migrate Archived Outlook Items Outlook includes archiving functionality that is used to free up space on the mail server by moving older items from the mail server to PST files stored on your computer
Karsten Nohl University of Virginia. Henryk Plötz HU Berlin
Karsten Nohl University of Virginia Henryk Plötz HU Berlin Radio Frequency IDentification Tiny computer chips Passively Powered Karsten Nohl, Henryk Plötz - RFID Security 2 Constant monitoring is already
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
