Profiling Model. Chapter Introduction
|
|
- Dorothy York
- 8 years ago
- Views:
Transcription
1 Chapter 4 Profiling Model This chapter discusses various aspects of profiling that include personality indicators, profile types and its generation methodology etc. The psychological and social sciences views about profiling have also been presented. An agent based profiling model has been developed on.net and recognized agent platform of JADE. Many problems have been identified and resolved during study and development. The major components of the profiling model suggested are Honeypot, software agents and profile attributes. The major focus in the model was on the problems of profile compatibility, profile publishing, profile matching and internet resource rating. The purpose of the model was to create a social community of the peoples having common interests and guard and guide the internet users. The model was tested and results have also been presented. 4.1 Introduction Profiling is the process of collecting information about a specific individual or category of individuals (Martin et al, 2003). The increasing usage of cyber resources like forums, chat groups, browsing, demands the modeling of a framework that may use an individual s personality profile for simulating actual personality in the cyberspace and acting as a guard and guide for the respective user by determining internet resource suitability. This also aims to monitor and analyze users social interactions with other users on the web. The purpose is not to develop a complete model but just a milestone towards profiling for network security. There are many other indicators that are used to know the actual personality or interests of the internet user that have been mentioned in Honeypot section. On the basis of interests in games, music, and other indicators the age, sex, ethnicity, country have been tried to detect. Though the more focus is on interests but parallel to that work has also been proposed for other attributes as well that are discussed in the proposed model. 43
2 The objective is to exploit some concepts of psychology and cognitive theories to present a model of an agent framework where agents, having social capability, will monitor the activities of internet users to build and update profiles to build socioculture community of the similar interests in the cyberspace. Framework also guides the users what is good and what is bad for them on the internet according to their profile. This model is the milestone towards a big task of the development of an agent framework to build profiles of the users to monitor activities against insider threat, discussed in the earlier chapter. 4.2 Justification and Background study In the cyberspace people hide their personality attributes such as age, ethnicity, culture, religion, interests, etc. Therefore a clear difference always remains there between interactions that occur in cyberspace and in real life. There is need to monitor internet user activities through various indicators. For example recording browsing history of an internet user will help to identify the interests of the user, to know the age and the gender some random questions may be asked and keep their track to know the actual personality (John Suler, 2005; Michael Pazzani and Daniel Billsus, 2004). The major steps to achieve the target are: Create, maintain and update the profile of Internet users to use it as control and guide the user s internet experience. Closely monitor and observe the internet usage pattern of users that will help to update users generated profiles. Provide decision support for profile compatibility with certain internet resources and other profiles. 4.3 Honeypot and personality indicators Honeypot is a tool that is used to collect information about a user passing through monitored area. Honeypot can log the activities of the monitored user or a hacker. Hacker could be fooled with the feeling about the access of a corporate network. Unlike firewalls or intrusion detection system, Honeypot does not solve a specific problem. The importance of Honeypot is in its ability to follow the movements (Lance 44
3 Spitzner, 2002). Using the concept of Honeypot, a website will be designed that will attract the users. It will track internet usage patterns of the users. The number and type of Honeypot website resources are not fixed. Five basic components, to be discussed later, have been selected that are commonly accessed by internet users. Honeypot administrator can change components at any time. Various researchers have identified many indicators to know actual personality of the internet users (J. Goecks and J. Shavlik, 2000). Few of them are discussed and implemented in the proposed model. Website access total time is a good predictor that signs that if a user stays more time on a webpage it shows level of interest of that user. It is usually known as the moment length from user s visit to leaving the website that is calculated in unit of time. The Honeypot website records all activities including webpage reading time etc. Many issues are identified that are to be addressed in the targeted framework. The second indicator is movement of the mouse that is calculated through x and y coordinates on the active Honeypot website. Mostly users take interest in movement of the mouse during window text reading or take interest to look at attractive objects on the webpage. Some users are interested in movement of the mouse only to click on appealing links. Here it is assumed that mouse movement has directly proportion to the interest of the user with webpage. The third indicator is the scrollbar movement, where it is assumed that distance of scrollbar movement has directly proportion to the interest of the users. Users do not access the contents regularly and they search the page for interesting links. Sometimes scrolling by just clicking on the scroll bar is used and sometimes clicking and dragging the scrollbar is opted. The distance is summated on Honeypot website when user scrolls horizontal and vertical scrollbars. The fourth indicator is the mouse clicks, where it is assumed that if number of clicks on mouse on the webpage is greater that reflects that a user is more interested in it. A variable that counts mouse clicks will be incremented by 1 whenever mouse button is pressed. Text highlighting is assumed when button of mouse is pressed at some position and released at different position on the webpage. The fifth indicator is highlighting the text, where it is assumed that the user highlights the text in the interesting webpage. 45
4 The sixth indicator is the number of visits on a webpage, where it is assumed that user visits interesting webpage again and again. The seventh indicator is the recently visited webpage, where it is assumed that the user is more interested in the recently visited webpage. The score will always be higher than the other pages if a user recently visited the website. The eighth indicator is the use of buttons/ctrl key button, where it is assumed that operations of bookmarking, copy/paste, etc will be performed in the interesting webpage. Buttons with the combination of Ctrl presents interests of the users. Likewise, many other indicators have been explored by researchers to identify the actual activity of the internet users. Few of the indicators have been implemented in the model according to the need. 4.4 Profile Generation A user will be represented in cyberspace with a profile. Therefore the existence of profile is pre-requisite in digital persona (Silvia Schiaffinol and Analía Amandi, 2000). Psychologists and cognitive scientists accord to the fact that behaviors are related to individual s personality patterns that include age group, gender, education, personal interests etc. Age group, country, ethnicity, gender, and interests are identified as basic personality profile elements. The specification is not restrictive in terms of these elements. More personality profile elements can be employed when identified (Angleman, S., 2001; Malle, B. F. and Knobe, S., 1998) Types of Profiles Two different types of personality profiles are being maintained, each of which comprises of psychological factors identified above. Manual Profile: The information that user provides while registering with Honeypot is added to the knowledge base. The user is trusted one and the profile is manual. 46
5 Generated Profile: The profile is built through Honeypot website when a user performs certain activities. These activities include browsing, visiting chat rooms, news groups and playing games Profile Generation Methodology Mapping of the Honeypot resources with psychological factors must be maintained to identify the actual personality. For example, a user visiting a link which includes political news is quite possibly relating to a mature age group. The detailed indicators have been discussed earlier. 4.5 Software agent Framework Software agents are computational systems that live in a dynamic environment; sense and act independently to achieve the objective for which they are designed (P. Maes, 2004). Agent platforms provide supporting execution environment to the agents. JADE has been selected to employ the proposed model (Zhao and Zhiming, 2007). Honeypot website is linked with an agent framework as agent may play their part behind the scene. While implementation, it was identified that web servers do not support agent frameworks for the reason of their synchronous communication nature (figure 18). After a detailed survey and investigation, Java applets were considered to be appropriate web application interface. Figure 18: A typical synchronous model 47
6 4.6 Proposed Model As formerly pointed out, agent-oriented approach has been employed to address the problem. The specification includes three basic components: Honeypot website, Agents, and Profiles (figure 19). Following steps are needed to develop the model. A honeypot website is used to monitor user activities and provide them controlled internet access. The monitoring capability of the honeypot will be used to generate persistent user personality profiles. The personality profiles are then used to take decisions which include internet resource suitability and profile compatibility. A web monitor needed to track and record the internet usage pattern of the users. The complete browsing history of the users will be maintained. A rating system will offer evaluation for a web resource on certain parameters. Figure 19: Components of the proposed model JADE was chosen to incorporate the appropriate agent framework. Proxy agent at the web server will be generated for each request or session. The actual agent (social agent) resides in the JADE container. Whenever an http request of the user arrives to 48
7 the web server, the proxy agent sends a message to the social agent. Since each user is identified with the social agent. To ease the absolute routing of the message to the correct social agent the intermediate agent, Bridge agent, is developed that receives message from the proxy agent forwards to the concerned social agent. Because of this bridge agent resides in the main container and acts as a bridge between the social agent and the proxy agent (figure 20). When a new user registers and logs in the system, a social agent will be created. There will be a separate social agent for every registered user. Two proxy agents, ProxyCreatorAgent and ProxyMessageAgent, are used where ProxyCreatorAgent will send message to bridge agent to create a social agent for newly registered user, while ProxyMessageAgent will just pass message request to bridge agent for particular social agent. 49
8 Figure 20: Communication model 4.7 Identified problems and their solution These are the problems that were faced during implementation and their proposed solutions Profile Compatibility The issue of profile compatibility requires attention to determine the parameters of benevolence. Principle of maximum expected utility concept (Katia Sycara and Seth Widoff, 2002) is applied to address this issue. It works in the following way. Social agent A s utility maximizes upon interaction with social agent B, when the quantum of profile compatibility is high. By high means that utility of A must reach a utility-minimum when it interacts with B. 50
9 4.7.2 Publishing Profiles It is not feasible to continue the process of matching profiles at user request time. As result it would fall in unbearable response time. The proposed strategy is to maintain a list of matching profiles in the knowledge base. On the next stage, whenever compatibility is to be determined, the list can be consulted. Nevertheless, to put away the list from producing obsolete results, the matching list must be updated periodically. The list is needed to be continuously updated because the generated profiles are dynamic in nature. Since agent A is the only one having access to its profile, or for that matter, profile of the user with whom agent A has been associated, agent A periodically publishes a summary of its profile. That summary is received by each agent in the agent population and hence is used for updating the matching list Matching Profiles After obtaining one more agent s profile by a certain agent, the question at hand is that of making the decision of profile compatibility. As previously mentioned, the proposed methodology is maximum expected utility (Eric Jacquier, 2005). The concept of Decision Networks has been employed to answer this question. If personality profile of an agent is considered as a decision node and psychological factors as chance nodes, then all that required is an appropriate utility function to calculate the maximum expected utility. Figure 21 illustrates the concept. 51
10 Figure 21: Maximum Expected Utility Since probabilistic data is dealt with, therefore the most appropriate utility function, additive value function is implemented. The additive value function is as follows. The calculated utility will always remain between 0 and Internet Resource Ratings The existing rating systems have many limitations, such as limited attributes, hidden database of keywords, restricted to the culture of specific community, etc. To overcome all these limitations a rating system has been developed that is according to the culture, regional ethics, and the own defined attributes (MIR, 2006; ICRA, 2006). Detailed architecture and the tables are given as appendix. The rating system uses the growing database technique that follows the dynamic algorithm which is given as under. First time execution: Find all keywords Find respective category of keywords Rate the document on the basis of found category 52
11 Add remaining words in same category, with minimum weight Next time execution: Rate the document and get %age Increase the weight of all words according to that %age Weight should be in the range of Discussion An agent framework has been proposed that observes the activities especially browsing experience of a user in cyberspace. User signs up with basic information, manual profile, and signs-in to the Honeypot website to use the internet resources. The social agents working at backend will be generated or triggered to record user s activities. On the completion of the maturity period, users manual and generated profile will be matched and evaluated critically to identify actual profile of the user. The framework helps to create virtual social community in the cyberspace where users are guarded and guided to use internet resources according to their actual profiles and the interests. There are many limitations to the proposed model because the proposed model is just a milestone to the final objective. The first limitation of the model is that there are many psychological issues that have not been addressed. The other main problem of the model is that the proposed rating system does not provide ratings for all types of internet resources like forums, languages other than English, multimedia content sites etc. The social agents in the proposed model cannot immediately start producing results which can be said to reflect the preferences or personality profile attributes of the corresponding user. Initially the agent will be guided by only the manual profile of the user. The learning curve of the agent is dynamic and dependent upon the user s amount of interaction with it. 4.9 Summary The summary of the proposed models is shown in table 3 whereas results screenshots are given in appendices. Vulnerability Assessment (VA) model and profiling model have been implemented in two different ways. VA model and profiling model are implemented in agent framework (Jade and Aglets) and.net 53
12 framework. As this is qualitative research therefore their results cannot be compared quantitatively whereas qualitatively it can be concluded that standardized agent platform is appropriate approach to design agent based model. Table 3: Development of Models through different technology Hence it is concluded that.net framework supports many advanced tools and technologies therefore and agent platform on the top of the.net framework is proposed to develop agent based projects. 54
Pass Through Proxy. How-to. Overview:..1 Why PTP?...1
Pass Through Proxy How-to Overview:..1 Why PTP?...1 Via an SA port...1 Via external DNS resolution...1 Examples of Using Passthrough Proxy...2 Example configuration using virtual host name:...3 Example
More informationDigifort Mobile Manual Version 1.0 Rev. A
Digifort Mobile Manual Version 1.0 Rev. A 2 Digifort Mobile - Versão 1.0 Índice Parte I Welcome to the Manual of Digifort Mobile 1.0 5 1 Screen... Shots 5 2 To whom... this manual is intended 5 3 How to...
More informationRepeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.
Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.
More informationHONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
More informationPrognoCIS Improved Support Ticket Guide
PrognoCIS Improved Support Ticket Guide Do you have a question about PrognoCIS? Our support team is always ready to help. Submitting a support ticket through the Resource Center is the fastest way to have
More informationecollege AU Release Notes - ClassLive ClassLive
Release Notes - 10200 A. East Girard Ave. Denver, CO 80213 Phone 303.873.7400 Fax 303.873.7449 Table of Contents INTRODUCTION...3 Entry... 4 Feature Overview... 5 Graphing Calculator... 7 TECHNICAL REQUIREMENTS...8
More informationWeb Tap: Detecting Covert Web Traffic. Presented By: Adam Anthony
Web Tap: Detecting Covert Web Traffic Presented By: Adam Anthony Outline Problem Description Web Tap's Goals Web Tap's Significance Threat Model Implementation Evaluation Future Work Conclusion Typical
More informationDevelopment of a personal agenda and a distributed meeting scheduler based on JADE agents
Development of a personal agenda and a distributed meeting scheduler based on JADE agents Miguel Ángel Sánchez Álvaro Rayón Alonso Grupo de Sistemas Inteligentes Departamento de Ingeniería Telemática Universidad
More informationHow to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
More informationINFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR. User Guide for the RightFax Fax Service. Web Utility
INFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR User Guide for the RightFax Fax Service Web Utility August 2011 CONTENTS 1. Accessing the Web Utility 2. Change Password 3. Web Utility:
More information2. More Use of the Mouse in Windows 7
65 2. More Use of the Mouse in Windows 7 The mouse has become an essential part of the computer. But it is actually a relatively new addition. The mouse did not become a standard part of the PC until Windows
More informationNSFOCUS Web Vulnerability Scanning System
NSFOCUS Web Vulnerability Scanning System Overview Most Web application systems are tailor-made and delivered in source codes by Customer Benefits Accurate Analysis on Website Vulnerabilities Fast scan
More informationWindows 7 for beginners
Windows 7 for beginners Hardware Hardware: the physical parts of a computer. What s in the computer? CPU: the central processing unit processes information (the brain) Hard drive: where all of your software
More informationSimple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015
Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015 Table of Contents Logging into the Drive Application 4 Log In Sign Up Access the Drive Application
More informationYou must have at least Editor access to your own mail database to run archiving.
Archiving An archive is a copy of a database you can create to store information no longer in use. Like a replica, an archive contains all documents and design elements in the original database, but unlike
More informationWelcome to EMP Monitor (Employee monitoring system):
Welcome to EMP Monitor (Employee monitoring system): Overview: Admin End. User End. 1.0 Admin End: Introduction to Admin panel. Admin panel log in. Introduction to UI. Adding an Employee. Getting and editing
More informationOANDA FXTrade Platform: User Interface Reference Manual
User Manual Home OANDA FXTrade Platform: User Interface Reference Manual Login/Logout Procedure FX Platform (Main Window) Action Buttons Pull-down Menus Transaction History Account Summary Tables Trades
More informationAccessing the Technology Help Desk Self-Service site:
Technology Help Desk Self-Service Site Find Technology Solutions and Manage Work Ordersfor all current faculty, staff and students of Philadelphia University Requirements a personal computer connected
More informationAn Instructional Aid System for Driving Schools Based on Visual Simulation
An Instructional Aid System for Driving Schools Based on Visual Simulation Salvador Bayarri, Rafael Garcia, Pedro Valero, Ignacio Pareja, Institute of Traffic and Road Safety (INTRAS), Marcos Fernandez
More informationStep-by-Step Help Guide for Freegal Movies and Television
Step-by-Step Help Guide for Freegal Movies and Television 0 Table of Contents Welcome 2 What is Freegal Movies and Television 2 Freegal Music Offerings to Patrons 2 Freegal Movies and Television Homepage
More informationEnhancing Mobile Browsing and Reading
Enhancing Mobile Browsing and Reading Chen-Hsiang Yu MIT CSAIL 32 Vassar St Cambridge, MA 02139 chyu@mit.edu Robert C. Miller MIT CSAIL 32 Vassar St Cambridge, MA 02139 rcm@mit.edu Abstract Although the
More informationHomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
More informationSecond-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they
More informationUsage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas
More informationNote: Make sure the.pst file is stored in your U: drive, this drive is protected by backups.
Email Management Best Practices I. Introduction: The School Board Network Infrastructure that we use daily is a huge investment involving workstations, servers, storage, software and backup equipment.
More informationChecking Browser Settings, and Basic System Requirements for QuestionPoint
Checking Browser Settings, and Basic System Requirements for QuestionPoint This document covers basic IE settings and system requirements necessary for QuestionPoint. These settings and requirements apply
More informationNext Generation Clickjacking
Next Generation Clickjacking New attacks against framed web pages Black Hat Europe, 14 th April 2010 Paul Stone paul.stone@contextis.co.uk Coming Up Quick Introduction to Clickjacking Four New Cross-Browser
More informationBuilding and Using Web Services With JDeveloper 11g
Building and Using Web Services With JDeveloper 11g Purpose In this tutorial, you create a series of simple web service scenarios in JDeveloper. This is intended as a light introduction to some of the
More informationSelf Service - Personal Information Guide for Users Updated on 5 May 2015
Updated on 5 May 2015 Contents Getting Help... iii Supported Browsers... iii Self Service - Personal Information... Error! Bookmark not defined. Personal Information... 1 Update Your Emergency Contact...
More informationForm Builder in Agile CRM
Form Builder in Agile CRM Agile CRM pulls in visitor information entered, through the web forms on your website & creates a contact with all the given attributes, in the CRM. It integrates with various
More informationSyncLockStatus Evaluator s Guide
SyncLockStatus Evaluator s Guide 2011 Table of Contents Introduction... 2 System Requirements... 2 Required Microsoft Components... 2 Contact Information... 3 SyncLockStatus Architecture... 3 SyncLockStatus
More informationClient Side Filter Enhancement using Web Proxy
Client Side Filter Enhancement using Web Proxy Santosh Kumar Singh 1, Rahul Shrivastava 2 1 M Tech Scholar, Computer Technology (CSE) RCET, Bhilai (CG) India, 2 Assistant Professor, CSE Department, RCET
More informationChecking IE Settings, and Basic System Requirements for QuestionPoint
Checking IE Settings, and Basic System Requirements for QuestionPoint This document covers basic IE settings and system requirements necessary for QuestionPoint. These settings and requirements apply to
More informationUser Guide. Chapter 6. Teacher Pages
User Guide Chapter 6 s Table of Contents 1. Introduction... 4 I. Enhancements... 5 II. Tips... 6 2. Key Information... 7 3. How to Add a... 8 4. How to Edit... 10 I. SharpSchool s WYSIWYG Editor... 11
More informationPassword Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Last revised: November 12, 2014 Table of Contents Table of Contents... 2 I. Introduction... 4 A. ASP.NET Website... 4 B.
More informationCyber Security Education: My Personal Thoughts. Bharat Doshi bharat.doshi@jhuapl.edu
Cyber Security Education: My Personal Thoughts Bharat Doshi bharat.doshi@jhuapl.edu Topics Personal Background Other situations: Similarities and Differences Cyber Vulnerabilities Student Types and Education/Training
More informationTeamViewer 8 Manual Remote Control
TeamViewer 8 Manual Remote Control Rev 8.1-12/2012 TeamViewer GmbH Kuhnbergstraße 16 D-73037 Göppingen www.teamviewer.com Table of Contents 1 About TeamViewer... 6 1.1 About the software... 6 1.2 About
More informationDYNAMIC PROJECT MANAGEMENT WITH COST AND SCHEDULE RISK
DYNAMIC PROJECT MANAGEMENT WITH COST AND SCHEDULE RISK In the world of project management, there are essentially two major sources of risks: schedule risk and cost risk. In other words, will the project
More informationBanking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai smchaware@gmail.com Abstract New threats are constantly emerging to the security of organization s information
More informationQUIT MACSCHOOL AND DRAG YOUR SERVER ICONS TO THE TRASH OR HIT THE DISCONNECT BUTTON BESIDE THE SERVER ICON IN THE TOP SIDEBAR
Macintosh Operating System OSX 10.3.x STARTING YOUR COMPUTER Logging in Whenever you start your computer, you will need to enter your computer password at the log in screen. When the log in screen appears,
More informationModules... 4 Plugins... 30
;] CHAT USER MANUAL Modules... 4 Home... 4 Chatroom... 4 Lobby:... 5 Create Chatroom... 6 Invite User... 12 Leave room... 13 Popout... 14 Kick... 15 Ban... 16 Unban... 17 Chat History for Chatroom... 19
More informationInternet-based remote support for help desks
Internet-based remote support for help desks White Paper Published: October 2005 Contents Introduction...1 Advantages of Internet-based Remote Support...1 Reduced Support Costs through Increased Productivity...2
More informationIntroduction to Microsoft Outlook Web Access Faculty/Staff e-mail Tutorial
Introduction to Microsoft Outlook Web Access Faculty/Staff e-mail Tutorial Accessing Outlook Web Mail First, you ll need to be in a browser such as Microsoft Internet Explorer or Netscape Communicator.
More informationChoose a topic from the left to get help for CmapTools.
Using CmapTools Create a Cmap Add a Concept Create a Proposition from One Concept Create a Proposition from Existing Concepts Save a Cmap Open a Cmap Create a Folder Drag in Resources Import Resources
More informationVisualisation in the Google Cloud
Visualisation in the Google Cloud by Kieran Barker, 1 School of Computing, Faculty of Engineering ABSTRACT Providing software as a service is an emerging trend in the computing world. This paper explores
More informationUser Interface Design
User Interface Design Winter term 2005/2006 Thursdays, 14-16 c.t., Raum 228 Prof. Dr. Antonio Krüger Institut für Geoinformatik Universität Münster 20. Februar 06 IfGi Universität Münster User Interface
More informationBusiness Banking Co-Browse Live Help
Business Banking Co-Browse Live Help User Guide Effective Date: September 2007 Version 1.0 Digital Insight Confidential The information contained in this publication is the property of Digital Insight.
More informationSUREedge Software Appliance (vmware) Installation Guide
SUREedge Software Appliance (vmware) Installation Guide Thank you for choosing SUREedge This guide describes the procedure to obtain and install SUREedge software appliance on a vmware server. The steps
More informationTeamViewer & DynGate Manual V 2.0
TeamViewer & DynGate Manual V 2.0 i Table Of Contents 1. OVERVIEW... 1 1.1. INTRODUCTION... 1 1.2. TEAMVIEWER RELATED DOWNLOADS... 2 1.3. ABOUT THIS MANUAL... 4 2. INSTALLATION... 5 2.1. CLIENT- AND HOST
More informationUSER GUIDE. General Information... 2. The BeAnywhere Service... 2. BeAnywhere Server... 2. BeAnywhere DRIVE... 2. Security... 2
USER GUIDE TABLE OF CONTENTS General Information... 2 The BeAnywhere Service... 2 BeAnywhere Server... 2 BeAnywhere DRIVE... 2 Security... 2 Level 1 User Security... 3 Level 2 Communications Security...
More informationSSL VPN Service. To get started using the NASA IV&V/WVU SSL VPN service, you must verify that you meet all required criteria specified here:
SSL VPN Service Note: This guide was written using Windows 7 with Internet Explorer 8. The same principles and techniques are applicable to new versions of Internet Explorer as well as Firefox. Any significant
More informationAction settings and interactivity
Interactivity in Powerpoint Powerpoint includes a small set of actions that can be set to occur when the user clicks, or simply moves the cursor over an object. These actions consist of links to other
More informationWHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION
WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION Cloud Computing can provide great flexibility for the Estate Master user. You can access your feasibilities, manage you projects
More informationRepresentative Guide for Electronic Records Express Sending Individual Case Responses by Secure Website
Representative Guide for Electronic Records Express Sending Individual Case Responses by Secure Website Office of Disability Adjudication and Review October 2011 Representative Guide for Electronic Records
More informationHow To Run A Factory I/O On A Microsoft Gpu 2.5 (Sdk) On A Computer Or Microsoft Powerbook 2.3 (Powerpoint) On An Android Computer Or Macbook 2 (Powerstation) On
User Guide November 19, 2014 Contents 3 Welcome 3 What Is FACTORY I/O 3 How Does It Work 4 I/O Drivers: Connecting To External Technologies 5 System Requirements 6 Run Mode And Edit Mode 7 Controls 8 Cameras
More informationHow To Block Unauthorized Internet Access through Proxies
How To - Block Unauthorized Internet Access through Proxies How To Block Unauthorized Internet Access through Proxies Applicable Version: 10.00 onwards Overview A Proxy is a tool that attempts to make
More informationHacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking
Hacking Book 1: Attack Phases Chapter 1: Introduction to Ethical Hacking Objectives Understand the importance of information security in today s world Understand the elements of security Identify the phases
More informationSection 8.1: Sundry Invoice Approval
Section 8.1: Sundry Invoice Approval The purpose of this section is to introduce the user how to approve a Sundry Invoice. If the Invoice Approval task is approved it will proceed to be paid by the. If
More informationConnectIT. How to Connect and End a Remote Support Session. (for Windows & IE / Firefox)
Information Technology Services Page 1 of 7 ConnectIT How to Connect and End a Remote Support Session (for Windows & IE / Firefox) This document shows how to respond to a remote support request from ITS
More informationWindows File Management A Hands-on Class Presented by Edith Einhorn
Windows File Management A Hands-on Class Presented by Edith Einhorn Author s Notes: 1. The information in this document is written for the Windows XP operating system. However, even though some of the
More informationArchiCAD Tutorial Getting started. Dr. Benny Raphael Dept. of Building National University of Singapore (NUS)
ArchiCAD Tutorial Getting started Dr. Benny Raphael Dept. of Building National University of Singapore (NUS) Launch ArchiCAD You can either create a new project or open an existing (previously saved) project.
More informationGAZETRACKERrM: SOFTWARE DESIGNED TO FACILITATE EYE MOVEMENT ANALYSIS
GAZETRACKERrM: SOFTWARE DESIGNED TO FACILITATE EYE MOVEMENT ANALYSIS Chris kankford Dept. of Systems Engineering Olsson Hall, University of Virginia Charlottesville, VA 22903 804-296-3846 cpl2b@virginia.edu
More informationSemantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
More informationWebsite Communication
Communication Handbook - Factsheet 6 Version 2 June 2013 Website Communication What design to use for your website How to structure your website to make people stay longer Differences in how people read
More informationHoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
More informationc360 SharePoint Integration User Guide Microsoft Dynamics CRM 4.0 compatible c360 Solutions, Inc. Products@c360.com www.c360.com
c360 SharePoint Integration User Guide Microsoft Dynamics CRM 4.0 compatible c360 Solutions, Inc. Products@c360.com www.c360.com c360 Solutions All Rights Reserved Contents c360 SharePoint Integration...
More informationInstantAtlas TM Server Data Transfer Tools User Guide
InstantAtlas TM Server Data Transfer Tools User Guide Author: GeoWise User Support Released: 06/11/2012 Version: 6.5.1 InstantAtlas Server Data Transfer Tools Table of Contents 1. Introduction... 1 2.
More informationCONFERENCE NOW. with WebConnect
CONFERENCE NOW with WebConnect I. WebConnect Overview 2 A. Conference Center 2 B. Conference Controls II. Log in (Chairperson) 3 III. Join a Meeting (Participant) 5 IV. Conference Controls 6 A. Participants
More informationProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs
ProxyCap Help 2015 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and
More informationUniversity of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
More informationMyMathLab / MyStatLab Beginning Interactive Training Guide
MyMathLab / MyStatLab Beginning Interactive Training Guide MYMATHLAB/MYSTATLAB BEGINNING Lesson 1 Set Up Your First Course... 5 Lesson 2 Explore Your Course... 13 Lesson 3 Customize the Home Page... 24
More informationIIS Web Server Configuration Guide
EventTracker v8x Publication Date: Feb. 26, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About the document The purpose of this document is to help users install or customize
More informationNorthern Arizona University
Enterprise Reporting Supported Operating Systems and Internet Browsers BusinessObjects Enterprise XI 3.1.7.1 Documentation Version 1.4 Supported Operating Systems and Internet Browsers Multiple choices
More informationExtreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
More informationInfinity Web Viewer Reference Guide
Infinity Web Viewer Reference Guide Table of Contents Overview... 1 Security Considerations... 1 System Setup... 1 Infinity Configuration... 1 Workstation Prerequisites... 2 Configuring Internet Security...
More informationCricut Design Space Reference Guide & Glossary
Cricut Design Space Reference Guide & Glossary Top Menu Bar Grid On/Off button Panel Menu Side Menu Bar 1 Cricut logo click the Cricut logo at any time to return to the Cricut Design Space landing page.
More informationWISE Sampling Distribution of the Mean Tutorial
Name Date Class WISE Sampling Distribution of the Mean Tutorial Exercise 1: How accurate is a sample mean? Overview A friend of yours developed a scale to measure Life Satisfaction. For the population
More informationE-Mail Campaign Manager 2.0 for Sitecore CMS 6.6
E-Mail Campaign Manager 2.0 Marketer's Guide Rev: 2014-06-11 E-Mail Campaign Manager 2.0 for Sitecore CMS 6.6 Marketer's Guide User guide for marketing analysts and business users Table of Contents Chapter
More informationProject Orwell: Distributed Document Integrity Verification
1 Project Orwell: Distributed Document Integrity Verification Tommy MacWilliam tmacwilliam@cs.harvard.edu Abstract Project Orwell is a client and server application designed to facilitate the preservation
More informationwww.mvatcybernet.com PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008
PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008 With Forefront Threat Management Gateway 2010 now discontinued, we sought a suitable reverse proxy solution that works with Lync
More informationGOOGLE DOCS APPLICATION WORK WITH GOOGLE DOCUMENTS
GOOGLE DOCS APPLICATION WORK WITH GOOGLE DOCUMENTS Last Edited: 2012-07-09 1 Navigate the document interface... 4 Create and Name a new document... 5 Create a new Google document... 5 Name Google documents...
More informationDEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Microsoft Windows Server 2008 R2 Remote Desktop Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with Microsoft Windows Server 2008 R2 Remote Desktop Services Deploying the BIG-IP LTM with Microsoft Windows Server 2008 R2 Remote Desktop Services
More informationPopupProtect User Guide
Having the power to block or allow popup and popunder advertising www.contentwatch.com 2004 All rights reserved. 2369 West Orton Circle, Salt Lake City, UT 84119 Table of Contents Welcome and Installation
More informationOracle Service Bus Examples and Tutorials
March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan
More informationNTT R&D s anti-malware technologies
NTT R&D s anti-malware technologies Jan. 21, 2015 NTT Secure Platform Laboratories Takeo HARIU Threats causes most of cyber attacks Major infection routes are web browsing, URL links in email messages,
More informationSystem Configuration Guide For Desktop Originator /Desktop Underwriter July 2013
System Configuration Guide For Desktop Originator /Desktop Underwriter July 2013 2013 Fannie Mae. Trademarks of Fannie Mae. DO/DU System Configuration Guide 1 2003-2013 Fannie Mae. All Rights Reserved.
More informationInternet Explorer 7 and Internet Explorer 8 Browser Security Settings
Internet Explorer 7 and Internet Explorer 8 Browser Security Settings From either the Menu Bar or the Tool Bar in your browser click on Tools. Select Internet Options which is the last item on the drop
More informationLab 1: Evaluating Internet Connection Choices for a Small Home PC Network
Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network Objective This lab teaches the basics of using OPNET IT Guru. We investigate application performance and capacity planning, by
More informationecfshome-ts Terminal Server How to Use
ecfshome-ts Terminal Server How to Use Connect to VPN Connect to Terminal Server, Set Options to Use Personal Computer Files, Printers, Clipboard Use Network Folders Copy Files from Network Folders to
More informationAlerts. Some Alerts give you unique options for customizing the messages you receive. Calendar events, for instance, allow you to set how far in
Alerts, RSS and ical feeds Alerts and feeds are both methods of keeping current on site content that changes or updates frequently. The primary difference between them is that Alerts are active: whenever
More informationHOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS
HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS Overview of Oracle JInitiator Oracle JInitiator enables users to run Oracle Forms applications using Netscape Navigator or Internet Explorer. It
More informationRDM+ Desktop for Windows Getting Started Guide
RDM+ Remote Desktop for Mobiles RDM+ Desktop for Windows Getting Started Guide Introduction... 3 1. Installing RDM+ Desktop on a computer... 3 2. Preparing for remote connection... 4 3. RDM+ Desktop window...
More informationMcAfee Family Protection
User Guide The Easiest, Most Complete Way to Keep Your Children Safe Online Quick Start Easy CD Installation STEP 1: First, ensure that your computer meets or exceeds the minimum systems requirements listed
More informationA Web Tour also can be opened up in an external browser: this is called a Web Push. (See Web Push below.)
WEB TOUR The Web Tour feature enables session participants to share web pages with others in the session. Web Tour is a type of content that, like the Whiteboard and Application Sharing, appears in the
More informationDEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services
DEPLOYMENT GUIDE Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the BIG-IP
More informationReplication. Training Division New Delhi
Replication Training Division New Delhi Replication Allows you to make duplicate copies of your data Move the copies to different locations, and synchronize the data automatically so that all the copies
More information1.0-Scratch Interface 1.1. Valuable Information
1.0-Scratch Interface 1.1 Valuable Information The Scratch Interface is divided to three: 1. Stage 2. Sprite/background properties 3. Scratch Action Blocks Building the game by designing the sprites and
More informationPENETRATION TESTING GUIDE. www.tbgsecurity.com 1
PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a
More informationStock Trader System. Architecture Description
Stock Trader System Architecture Description Michael Stevens mike@mestevens.com http://www.mestevens.com Table of Contents 1. Purpose of Document 2 2. System Synopsis 2 3. Current Situation and Environment
More informationSecurity from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.
eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as
More information