PyModel Model-based testing in Python
|
|
|
- Dominick George
- 10 years ago
- Views:
Transcription
1 PyModel University of Washington
2 Model-based testing Unit testing: code each test case, including an assertion that checks whether the test passed Model-based testing: code a model that generates as many test cases as desired, and also acts as the oracle that checks whether any case passed A model-based testing project is a programming project! In PyModel the models are coded in Python. It is convenient when the implementation under test is also in Python (but this is not required).
3 Model-based testing What problem does model-based testing solve? Testing behavior: ongoing activities that may exhibit history-dependence and nondeterminism. Many variations (data values, interleavings, etc.) should be tested for each scenario (or use case). So many test cases are needed that it is not feasible to code them all by hand. Examples: communication protocols, web applications, control systems, user interfaces,...
4 Behavior We need to test behavior: ongoing activities that may exhibit history dependence and nondeterminism. We represent behavior with traces: sequences of actions with arguments. Specify a system by describing which traces are allowed, and which are forbidden. Example: alternating bit protocol Allowed Send() Ack() Send() Ack() Allowed Send() Send() Ack() Send() Ack() Ack() Send() Ack() Allowed Send() Send() Ack() Send() Ack() Send() Allowed Send() Ack() Send() Ack() Ack() Send() Ack() Forbidden Send() Ack() Send() Ack() Forbidden Send() Ack() Send() Ack()
5 Finite State Machines Finite State Machines (FSMs) can represent finite behaviors. Every path through the graph represents an allowed trace. Ack() Send() Send() Ack() Send() Ack() Ack() Send() Ack() Send() Ack() Ack() Send() Allowed Send() Ack() Send() Ack() Allowed Send() Send() Ack() Send() Ack() Ack() Send() Ack() Allowed Send() Send() Ack() Send() Ack() Send() Allowed Send() Ack() Send() Ack() Ack() Send() Ack() Forbidden Send() Ack() Send() Ack() Forbidden Send() Ack() Send() Ack()
6 Finite State Machines FSMs are one kind of model in PyModel, coded as follows: Ack() Send() Send() Ack() Send() Ack() Ack() Send() Ack() Send() Ack() Ack() Send() graph = ((, (Send, (,), None), ), (, (Ack, (,), None), ), (, (Send, (,), None), ), (, (Ack, (,), None), ),... etc.... (, (Send, (,), None), )) The PyModel Graphics program pmg generates graphics from an FSM in this form.
7 Generating tests The PyModel Tester pmt generates traces from a model. Each trace describes a test run, including the expected test results. Offline testing: pmt saves the traces in a test suite. On-the-fly testing: pmt executes the traces as they are generated. C:\Users\jon\Documents\mbt\samples\abp>pmt.py -n ABP Send(,) Send(,) Ack(,) Send(,) Ack(,) Send(,) Ack(,) Send(,) Ack(,) Ack(,) Finished at step, reached accepting state
8 Model programs Model programs are another kind of model in PyModel. They can describe behaviors where the action arguments can have an infinite (very large) number of values. A model program consists of state variables, action functions and enabling conditions. stack = list() # State def Push(x): # Push is always enabled global stack stack.insert(,x) def Pop(): # Pop requires an enabling condition global stack result = stack[] del stack[] return result def PopEnabled(): return stack # Pop is enabled when the stack is not empty
9 Exploration The PyModel Analyzer pma generates an FSM from a model program by a process called Exploration.
10 Exploration The PyModel Analyzer pma generates an FSM from a model program by a process called Exploration.
11 Exploration The PyModel Analyzer pma generates an FSM from a model program by a process called Exploration. Push() Push()
12 Exploration The PyModel Analyzer pma generates an FSM from a model program by a process called Exploration. Push() Push() Push() Pop() Push() Push() Push() 5 6
13 Exploration The PyModel Analyzer pma generates an FSM from a model program by a process called Exploration. Push() Push() etc... Push() Pop() Push() Push() Pop() Push() Pop() Push() Push() Push() Push() Push() Push()
14 Exploration We must limit exploration of infinite programs. Here we define a finite domain to limit the width of the graph, and a state filter to limit its depth. domains = { Push: { x :[,]} } def StateFilter(): return len(stack) < Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push() Pop() 5 6 Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push() Pop()
15 Strategies Test generation can select the next enabled action at random, or use an optional strategy to select an action that increases coverage according to some measure. > pmt.py Stack Push(,) Push(,) Push(,) Push(,) Pop(), Pop(), Pop(), Push(,) Push(,) Push(,) > pmt.py Stack -g ActionNameCoverage Push(,) Pop(), Push(,) Pop(), Push(,) Pop(), Push(,) Pop(), Push(,) Pop(), > pmt.py Stack -g StateCoverage Push(,) Push(,) Push(,) Push(,) Push(,) Push(,) Push(,) Push(,) Push(,) Push(,) ActionNameCoverage and StateCoverage are included in PyModel. You can also code your own custom strategy.
16 Composition We need scenario control to limit test runs to scenarios of interest. PyModel uses composition, a versatile technique combines two or more models to form a new model, the product. M M = P Usually we combine a contract model program (with action functions, etc.) with a scenario machine, an FSM. Contract Scenario = Product Composition can also be used for validation, program structuring, etc....
17 Composition Composition synchronizes shared actions. Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push() Pop() 9
18 Composition Composition synchronizes shared actions. Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push()Pop() 9 Push()
19 Composition Composition synchronizes shared actions. Push() Pop() Push() Pop() Push()Pop() = Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push()Pop() Push()Pop() 9 Push() This usually has the effect of restricting behavior.
20 Composition Composition interleaves unshared actions. PowerOn()PowerOff()
21 Composition Composition interleaves unshared actions. PowerOn()PowerOff() IncrementSpeed() IncrementSpeed() IncrementSpeed()
22 Composition Composition interleaves unshared actions. PowerOff() PowerOn() IncrementSpeed() IncrementSpeed() IncrementSpeed() PowerOn()PowerOff() IncrementSpeed() = IncrementSpeed() IncrementSpeed() IncrementSpeed() PowerOn() PowerOff() IncrementSpeed() IncrementSpeed() PowerOn() PowerOff() 5 This usually has the effect of adding behavior.
23 Validation Composition with a scenario can help validate a model program. Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push() Pop() 9
24 Validation Composition with a scenario can help validate a model program. Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push()Pop() 9
25 Validation Composition with a scenario can help validate a model program. Push() Pop() Push() Pop() = Push() Pop() Push() Pop() Push() Pop() Push() Pop() Push()Pop() Push() 9 The product shows whether the model program can execute the complete scenario. Does the product reach an accepting state?
26 Scenario Control In this example we compose the model program with a scenario machine to eliminate redundant startup and shutdown paths. ServerSocket() ClientSocket() ServerBind() ClientSocket() ServerSocket() 5 ServerListen() ClientSocket() ServerBind() 6 7 ClientSocket() ServerListen() 8 ClientSocket() ClientConnect() 9 ServerAccept() ClientSend() ServerReceive() ServerSend(double("")) ServerSend(double("99.9")) ClientClose() 5 7 ClientReceive_Finish(double("")) 6 ClientReceive_Finish(double("99.9")) ServerCloseConnection() ClientReceive_Start() ServerCloseConnection() ClientReceive_Start() 8 9 ServerCloseConnection() ClientReceive_Start() ClientReceive_Start() ServerCloseConnection() ServerCloseConnection() ClientReceive_Start() ClientReceive_Finish(double("")) ClientReceive_Finish(double("99.9")) ClientReceive_Start() 5 ClientReceive_Finish(double("")) ClientSend() ClientClose() ClientReceive_Finish(double("99.9")) 8 6 ClientSend() ClientClose() 9 7
27 Scenario Control In this example we compose the model program with a scenario machine to eliminate redundant startup and shutdown paths. ServerSocket() ClientSocket() ServerSocket() ServerBind() ClientSocket() ServerSocket() 5 ServerBind() ServerListen() ClientSocket() ServerBind() 6 7 ClientSocket() ServerListen() ServerListen() 8 ClientSocket() ClientConnect() ClientSend() ServerReceive() ServerSend(double("")) 9 ServerAccept() ServerSend(double("99.9")) 5 7 ClientReceive_Finish(double("")) 6 ClientClose() ClientReceive_Finish(double("99.9")) ClientSocket() ClientConnect() 5 ServerCloseConnection() ClientReceive_Start() ServerCloseConnection() ClientReceive_Start() ServerAccept() 8 9 ServerCloseConnection() 6 ClientReceive_Start() ClientReceive_Start() ClientClose() ServerCloseConnection() ClientReceive_Start() ClientReceive_Finish(double("")) ClientReceive_Finish(double("99.9")) ClientReceive_Start() ServerCloseConnection() 7 5 ServerCloseConnection() ClientReceive_Finish(double("")) ClientSend() ClientClose() ClientReceive_Finish(double("99.9")) 8 6 ClientSend() ClientClose()
28 Scenario Control In this example we compose the model program with a scenario machine to eliminate redundant startup and shutdown paths. ServerSocket() ClientSocket() ServerSocket() ServerSocket() ServerBind() ClientSocket() ServerSocket() 5 ServerBind() ServerBind() ServerListen() ClientSocket() ServerBind() 6 7 ClientSocket() ServerListen() ServerListen() ServerListen() 8 ClientSocket() ClientConnect() ClientSend() ServerReceive() ServerSend(double("")) 9 ServerAccept() ServerSend(double("99.9")) 5 7 ClientReceive_Finish(double("")) 6 ClientClose() ClientReceive_Finish(double("99.9")) ClientSocket() ClientConnect() 5 = ClientSocket() ClientConnect() 5 ServerCloseConnection() ClientReceive_Start() ServerCloseConnection() ClientReceive_Start() ServerAccept() ServerAccept() 8 9 ServerCloseConnection() 6 6 ClientReceive_Start() ClientReceive_Start() ClientClose() ClientSend() ServerReceive() ClientClose() ServerSend(double("99.9")) ClientReceive() / double("99.9") ServerSend(double("")) ClientReceive() / double("") ServerCloseConnection() ServerCloseConnection() ClientReceive_Start() ClientReceive_Finish(double("")) ClientReceive_Finish(double("99.9")) ClientReceive_Start() 5 ServerCloseConnection() ServerCloseConnection() ClientReceive_Finish(double("")) ClientSend() ClientClose() ClientReceive_Finish(double("99.9")) ClientSend() ClientClose() Now the product will only generate interesting traces.
29 Test Harness Executing tests requires a harness (or adapter) to connect the model to the implementation. In PyModel a test harness is called a stepper. Its core TestAction function contains a branch for each action in the model. def TestAction(aname, args, modelresult):... if aname == Initialize : session = dict() # clear out cookies/session IDs from previous session elif aname == Login : user = users[args[]]... password = passwords[user] if args[] == Correct else wrongpassword postargs = urllib.urlencode({ username :user, password :password}) page = session[user].opener.open(webappurl).read() # GET login page... if result!= modelresult: return received Login %s, expected %s % (result, modelresult) elif aname == Logout :...
30 On-the-fly Testing On-the-fly testing generates test cases as the test run executes. It overcomes some disadvantages of offline test generation. No FSM is generated, needn t finitize Test runs can be indefinitely long, nonrepeating Especially Handles nondeterminism responds to the nondeterministic choice that the implementation actually made! This last requires an asynchronous stepper that distinguishes between controllable actions (functions the stepper can call) and observable actions (events the stepper can detect).
31 Implications Model-based testing can encourage different approaches to testing. Encourages on-the-fly testing but test runs may not be reproducible. Extends testing to noninvasive monitoring or run time verification if the harness supports observable actions, the tester can check log files or monitor network traffic for conformance violations. Enables better integration of design analysis with testing exploration is like model checking, can check for safety, liveness, and temporal properties. A rational workflow might be to write the model before writing the implementation, analyze and tweak the design, then implement and test.
32 Download PyModel PyModel is an open-source model-based testing framework.
Model-Based Testing of Web Applications using NModel
Model-Based Testing of Web Applications using NModel Juhan Ernits 1, Rivo Roo 2, Jonathan Jacky 3, and Margus Veanes 4 1 University of Birmingham, UK [email protected] 2 Reach-U Ltd,Tartu, Estonia
Welcome to PowerClaim Net Services!
Welcome to PowerClaim Net Services! PowerClaim Net Services provides a convenient means to manage your claims over the internet and provides detailed reporting services. You can access PowerClaim Net Services
NAS 253 Introduction to Backup Plan
NAS 253 Introduction to Backup Plan Create backup jobs using Backup Plan in Windows A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Create backup
Test Case 3 Active Directory Integration
April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of
Algorithmic Software Verification
Algorithmic Software Verification (LTL Model Checking) Azadeh Farzan What is Verification Anyway? Proving (in a formal way) that program satisfies a specification written in a logical language. Formal
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
Techniques and Tools for Rich Internet Applications Testing
Techniques and Tools for Rich Internet Applications Testing Domenico Amalfitano Anna Rita Fasolino Porfirio Tramontana Dipartimento di Informatica e Sistemistica University of Naples Federico II, Italy
Secure Messaging Service
Human Resources Secure Messaging Service Receiving Secure Emails from West Berkshire Council Table of Contents What are Secure Messaging notifications?... 3 How do I set up my Secure Messaging account?...
WebSphere Business Monitor V7.0: Clustering Single cluster deployment environment pattern
Copyright IBM Corporation 2010 All rights reserved WebSphere Business Monitor V7.0: Clustering Single cluster deployment environment pattern What this exercise is about... 2 Exercise requirements... 2
How To Install A New Database On A 2008 R2 System With A New Version Of Aql Server 2008 R 2 On A Windows Xp Server 2008 (Windows) R2 (Windows Xp) (Windows 8) (Powerpoint) (Mysql
Microsoft SQL Server Express 2008 R2 Install on Windows Server 2008 r2 for HoleBASE SI The following guide covers setting up a SQL server Express 2008 R2 system and adding a new database and user for HoleBASE
CentreWare for Microsoft Operations Manager. User Guide
CentreWare for Microsoft Operations Manager User Guide Copyright 2006 by Xerox Corporation. All rights reserved. Copyright protection claimed includes all forms and matters of copyright material and information
Outlook Connector Installation & Configuration groupwaresolution.net Hosted MS Exchange Alternative On Linux
Outlook Connector Installation & Configuration groupwaresolution.net Hosted MS Exchange Alternative On Linux Page 1 of 5 DOWNLOAD Please download the connector installer msi file and save it to your computer.
TTCN-3, Qtronic and SIP
TTCN-3, Qtronic and SIP 1 (8) TTCN-3, Qtronic and SIP The Model-Based Testing of a Protocol Stack a TTCN-3 Integrated Approach Technical Whitepaper EXECUTIVE SUMMARY TTCN-3 (Test and Test Control Notation
Adobe Digital Publishing Security FAQ
Adobe Digital Publishing Suite Security FAQ Adobe Digital Publishing Security FAQ Table of contents DPS Security Overview Network Service Topology Folio ProducerService Network Diagram Fulfillment Server
EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8
EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 External Users Decrypting Secure Messages The following sections describe how users external to EJGH receive and decrypt secure messages. Reading
Application. 1.1 About This Tutorial. 1.1.1 Tutorial Requirements. 1.1.2 Provided Files
About This Tutorial 1Creating an End-to-End HL7 Over MLLP Application 1.1 About This Tutorial 1.1.1 Tutorial Requirements 1.1.2 Provided Files This tutorial takes you through the steps of creating an end-to-end
Active Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered
MANUAL USER GUIDE FOR EMR PRIMARY HEALTH CARE SYSTEM
MANUAL USER GUIDE FOR EMR PRIMARY HEALTH CARE SYSTEM By Faustin GASHAYIJA Version 1.0 1 Table of contents Contents Table of contents... 2 Browser... 4 Log in openmrs website... 4 OpenMRS welcome page...
OCS Virtual image. User guide. Version: 1.3.1 Viking Edition
OCS Virtual image User guide Version: 1.3.1 Viking Edition Publication date: 30/12/2012 Table of Contents 1. Introduction... 2 2. The OCS virtualized environment composition... 2 3. What do you need?...
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide
How to remotely access your Virtual Desktop from outside the college using VMware View Client How to guide Author: ICT Services Version: 1.0 Date: November 2015 Contents What is the VMware View Client?...
MSSQL quick start guide
C u s t o m e r S u p p o r t MSSQL quick start guide This guide will help you: Add a MS SQL database to your account. Find your database. Add additional users. Set your user permissions Upload your database
Replication on Virtual Machines
Replication on Virtual Machines Siggi Cherem CS 717 November 23rd, 2004 Outline 1 Introduction The Java Virtual Machine 2 Napper, Alvisi, Vin - DSN 2003 Introduction JVM as state machine Addressing non-determinism
PhoneCrypt Desktop. Phone Encryption Software. PhoneCrypt Manual Mobile phone encryption for Windows Platforms
PhoneCrypt Desktop Phone Encryption Software PhoneCrypt Manual Mobile phone encryption for Windows Platforms Introduction Contents http:// www. securstar.com [email protected] 2009 by SecurStar GmbH,
Configuring and Integrating Oracle
Configuring and Integrating Oracle The Basics of Oracle 3 Configuring SAM to Monitor an Oracle Database Server 4 This document includes basic information about Oracle and its role with SolarWinds SAM Adding
How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
FIRST HOPE BANK BUSINESS ONLINE BANKING DIRECT CONNECT WITH QUICKBOOKS
FIRST HOPE BANK BUSINESS ONLINE BANKING DIRECT CONNECT WITH QUICKBOOKS Turning Hope Into Reality 2 Contents Set Up: Configuring Quickbooks for Online Services... 4 Set Up: Adding Bill Payments to an Existing
IBM Aspera Add-in for Microsoft Outlook 1.3.2
IBM Aspera Add-in for Microsoft Outlook 1.3.2 Windows: 7, 8 Revision: 1.3.2.100253 Generated: 02/12/2015 10:58 Contents 2 Contents Introduction... 3 System Requirements... 5 Setting Up... 6 Account Credentials...6
Quick Start : i-fax User Guide
Quick Start : i-fax User Guide Introduction Welcome to the i-fax System User Guide! This manual will help new users navigate i-fax System and perform common tasks. This manual is task-oriented. You will
How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On
Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files
How To Install Ru-Vpn On A Pc Or Macbook Or Ipad (For Macbook) With A Microsoft Macbook (For Pc) With An Ipad Or Ipa (For A Macbook). Pc (For An
RU-VPN Installation Instructions (Windows Vista and Windows 7) An RU-VPN id allows authorized users to access Ryerson s Administrative Systems via the internet. RU-VPN utilizes a digital certificate that
Windows Clients and GoPrint Print Queues
Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup
How to create additional email accounts. Click on the Email Accounts icon. From here the rest is pretty straight forward to Add a New Email Account.
How to access cpanel, create new email accounts in cpanel, setup email accounts in your email client program on your computer, IPhone/IPad, access emails via gmail and check emails via webmail & check
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
Model-based Testing: Next Generation Functional Software Testing
Model-based Testing: Next Generation Functional Software Testing By Dr. Bruno Legeard Model-based testing (MBT) is an increasingly widely-used technique for automating the generation and execution of tests.
Egnyte App for Android Quick Start Guide
Egnyte App for Android Quick Start Guide Introduction Welcome to the Quick Start Guide for the Egnyte App for Android. This guide will explain how to: Access files. Download content for offline access.
Diagonalization. Ahto Buldas. Lecture 3 of Complexity Theory October 8, 2009. Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach.
Diagonalization Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Ahto Buldas [email protected] Background One basic goal in complexity theory is to separate interesting complexity
Creating a DUO MFA Service in AWS
Amazon AWS is a cloud based development environment with a goal to provide many options to companies wishing to leverage the power and convenience of cloud computing within their organisation. In 2013
Step 1 : Remove Old Versions of Java
VPN (Banner Home Access) Pellissippi State Community College Home Installation Instructions Please Read Entire Instructions Before Installation!! Step 1 : Remove Old Versions of Java Warning!!: The Performance
SNMP Manager User s Manual
SNMP Manager User s Manual Table of Contents 1. Introduction...2 2. SNMP Manager Install, Quick Start and Uninstall...2 2.1. Software Installation...2 2.2. Software Quick Start...2 2.3. Software Uninstall...2
Check current version of Remote Desktop Connection for Mac.. Page 2. Remove Old Version Remote Desktop Connection..Page 8
CONTENTS SECTION 1 Check current version of Remote Desktop Connection for Mac.. Page 2 SECTION 2 Remove Old Version Remote Desktop Connection..Page 8 SECTION 3 Download and Install Remote Desktop Connection
SMock A Test Platform for the Evaluation of Monitoring Tools
SMock A Test Platform for the Evaluation of Monitoring Tools User Manual Ruth Mizzi Faculty of ICT University of Malta June 20, 2013 Contents 1 Introduction 3 1.1 The Architecture and Design of SMock................
Comodo LoginPro Software Version 1.5
Comodo LoginPro Software Version 1.5 User Guide Guide Version 1.5.030513 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System
HP Business Process Monitor
HP Business Process Monitor For the Windows operating system Software Version: 9.23 BPM Monitoring Solutions Best Practices Document Release Date: December 2013 Software Release Date: December 2013 Legal
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
How To Set Up An Openfire With Libap On A Cdd (Dns) On A Pc Or Mac Or Ipad (Dnt) On An Ipad Or Ipa (Dn) On Your Pc Or Ipo (D
1 of 8 2/6/2012 8:52 AM Home OpenFire XMPP (Jabber) Server OpenFire Active Directory LDAP integration Sat, 01/05/2010-09:49 uvigii Contents 1. Scenario 2. A brief introduction to LDAP protocol 3. Configure
Users Guide. SelenioFlex File. Version 2.10.0
SelenioFlex File Version 2.10.0 August 2015 Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document and its contents to be
Formal Verification by Model Checking
Formal Verification by Model Checking Natasha Sharygina Carnegie Mellon University Guest Lectures at the Analysis of Software Artifacts Class, Spring 2005 1 Outline Lecture 1: Overview of Model Checking
Provincial Email User Manual
PROVINCIAL DIRECTOR OF HEALTH SERVICES, WESTERN PROVINCE Provincial Email User Manual Version 1.0.2 Planning Unit, PDHS & RDHS (Colombo) 5/2/2013 Revisions in 1.0.2: Corrected spelling errors Contents
my.airproducts.com Windows Vista Client Configuration
my.airproducts.com Windows Vista Client Configuration To successfully connect to the Air Products my.airproducts.com website, the client computer needs to have the following three pieces of software installed
Oracle EXAM - 1Z0-102. Oracle Weblogic Server 11g: System Administration I. Buy Full Product. http://www.examskey.com/1z0-102.html
Oracle EXAM - 1Z0-102 Oracle Weblogic Server 11g: System Administration I Buy Full Product http://www.examskey.com/1z0-102.html Examskey Oracle 1Z0-102 exam demo product is here for you to test the quality
HP Operations Orchestration Software
HP Operations Orchestration Software Software Version: 9.00 Citrix XenServer Integration Guide Document Release Date: June 2010 Software Release Date: June 2010 Legal Notices Warranty The only warranties
Integrating Webalo with LDAP or Active Directory
Integrating Webalo with LDAP or Active Directory Webalo can be integrated with an external directory to identify valid Webalo users and then authenticate them to the Webalo appliance. Integration with
Intrusion Detection via Static Analysis
Intrusion Detection via Static Analysis IEEE Symposium on Security & Privacy 01 David Wagner Drew Dean Presented by Yongjian Hu Outline Introduction Motivation Models Trivial model Callgraph model Abstract
Hosted Voice Product Training Automatic Call Distributor (ACD)
Hosted Voice Product Training Automatic Call Distributor (ACD) 1 Agenda 1. Customer Resource Center 2. Logging In 3. Main Screen 4. Search Calls 5. Download Reports 6. Queues 8. Monitor 9. Whisper 10.
PrestoFax User Guide Version 3.0
PrestoFax User Guide Version 3.0 Page 1 of 12 PrestoFax User Guide Table of Contents Incoming Faxes... 3 Outgoing Faxes... 3 PrestoFax Web Interface Instructions... 4 Logging into the PrestoFax Web Interface...
NETASQ ACTIVE DIRECTORY INTEGRATION
NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION RUNNING THE DIRECTORY CONFIGURATION WIZARD 2 VALIDATING LDAP CONNECTION 5 AUTHENTICATION SETTINGS 6 User authentication 6 Kerberos
Using MailStore to Archive MDaemon Email
Using MailStore to Archive MDaemon Email This guide details how to archive all inbound and outbound email using MailStore, as well as archiving any emails currently found in the users accounts in MDaemon.
Deployment of Keepit for Windows
Deployment of Keepit for Windows Keepit A/S October 13, 2010 1 Introduction When deploying Keepit in larger setups with many desktops and servers, installing Keepit individually on each computer is cumbersome
How To Create A Diagram On Rational Software Development Platform
Homework 7: Use Cases, Sequence Diagram, Activity Diagram, State Diagram Name : Student Number : Laboratory Time : Objectives Create a Use Case Diagram in Rational Software Development Platform Create
Zimbra Connector for Outlook User Guide. Release 6.0
Zimbra Connector for Outlook User Guide Release 6.0 Network Edition August 2010 Legal Notices Copyright 2005-2010 Zimbra, Inc. All rights reserved. Zimbra and the Zimbra logo are trademarks of Zimbra.
Department of Veterans Affairs VistA Integration Adapter Release 1.0.5.0 Enhancement Manual
Department of Veterans Affairs VistA Integration Adapter Release 1.0.5.0 Enhancement Manual Version 1.1 September 2014 Revision History Date Version Description Author 09/28/2014 1.0 Updates associated
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Remote PC Guide for Standalone PC Implementation
Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.
Project management integrated into Outlook
Project management integrated into Outlook InLoox PM 7.x off-line operation An InLoox Whitepaper Published: October 2011 Copyright: 2011 InLoox GmbH. You can find up-to-date information at http://www.inloox.com
Simulation of wireless ad-hoc sensor networks with QualNet
Advanced Seminar Embedded Systems 2008/2009 Simulation of wireless ad-hoc sensor networks with QualNet Documentation by Tobias Doerffel Chemnitz, April 9, 2009 Contents Contents 1 Introduction 3 1.1 The
Introduction to SPIN. Acknowledgments. Parts of the slides are based on an earlier lecture by Radu Iosif, Verimag. Ralf Huuck. Features PROMELA/SPIN
Acknowledgments Introduction to SPIN Parts of the slides are based on an earlier lecture by Radu Iosif, Verimag. Ralf Huuck Ralf Huuck COMP 4152 1 Ralf Huuck COMP 4152 2 PROMELA/SPIN PROMELA (PROcess MEta
How to train your Browser Controller
How to train your Browser Controller Table of Contents ABOUT 3 TOP BAR SETTINGS 3 CHILD LOCK 3 SPYDERWEB 3 PERSONAL PRIVACY EXPOSURE 4 KEY & STATS 4 GRAPH VIEW 4 AUTO-REFRESH 5 DOMAIN GEO-LOCATION INFO
CLIENT SERVER BASED FILE SHARING SYSTEM
CLIENT SERVER BASED FILE SHARING SYSTEM Rajni Krishna Gandhar, Viram Shah, J N V Naveen Teja School of Engineering, Santa Clara University Santa Clara University {1} School of Engineering ACKNOWLEDGEMENTS
Voice Call Addon for Ozeki NG SMS Gateway
Voice Call Addon for Ozeki NG SMS Gateway Document version v.1.0.0.0 Copyright 2000-2011 Ozeki Informatics Ltd. All rights reserved 1 Table of Contents Voice Call Addon for Ozeki NG SMS Gateway Introduction
FTP Use. Internal NPS FTP site instructions using Internet Explorer:
FTP Use File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP), which transfers
Mini User Guide. Updating your contact details..2. Setting your Security Questions..4. Changing your password..5. Forgotten password...
Mini User Guide Contents: Updating your contact details..2 Setting your Security Questions..4 Changing your password..5 Forgotten password......6 Accessing Virgin Care Webmail..9 Sending an Encrypted Email.....12
Campus VPN. Version 1.0 September 22, 2008
Campus VPN Version 1.0 September 22, 2008 University of North Texas 1 9/22/2008 Introduction This is a guide on the different ways to connect to the University of North Texas Campus VPN. There are several
E-mail Listeners. E-mail Formats. Free Form. Formatted
E-mail Listeners 6 E-mail Formats You use the E-mail Listeners application to receive and process Service Requests and other types of tickets through e-mail in the form of e-mail messages. Using E- mail
About Node Manager and the WebLogic Scripting Tool
Controlling the P6 EPPM WebLogic Domain Using Node Manager And WebLogic Scripting Release 8.4 September 2014 Contents About Node Manager and the WebLogic Scripting Tool... 5 Prerequisites... 5 Starting
Database Selection Guide
DriveRight Fleet Management Software Database Selection Guide Use this guide to help you select the right database to use with your DriveRight Fleet Management Software (FMS), and to help you perform any
Configuring Email Notification for Business Glossary
Configuring Email Notification for Business Glossary 1993-2016 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Getting Started with StoreGrid Cloud
Getting Started with StoreGrid Cloud This document describes the steps to quickly sign up and start backing up your data to StoreGrid Cloud. I. Signing Up 1. Go to http://storegridcloud.vembu.com and select
Data Domain Profiling and Data Masking for Hadoop
Data Domain Profiling and Data Masking for Hadoop 1993-2015 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or
Remote Web Access (vpn)
Remote Web Access (vpn) Features Connect via vpn Login to Remote Desktop Web Bookmarks Access Whitireia Intranet Access Ātea from the Remote Desktop Logout from Remote Desktop Copyright 2012 Whitireia
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
OneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
Model based testing tools. Olli Pekka Puolitaival
Model based testing tools Olli Pekka Puolitaival Index 1. Software testing evolution 2. model based testing (MBT): main idea 3. MBT: step by step 4. MBT: tools 5. Questions Software testing evolution model
Communications Software Engineering Design Model
Communications Software Engineering Design Model Wolfgang Emmerich 1 Lecture Overview Relationship between analysis and design Stages of design Impact of implementation environment Definition of sequence
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
Preparing your Domain to transfer from Go Daddy
Preparing your Domain to transfer from Go Daddy Before you can transfer a domain: Getting Started Disable domain privacy. If the privacy service forwards incoming email, check the ʻforward toʼ contact
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
Default configuration for the Workstation service and the Server service
Article ID: 887429 - Last Review: November 30, 2007 - Revision: 2.4 Overview of Message Block signing INTRODUCTION This article describes Message Block (SMB) signing. SMB signing is a security mechanism
