Dependency Checker Tool Overview and Discussion. » The Open Compliance Program. ... By Stew Benedict and Jeff Licquia, The Linux Foundation
|
|
|
- Christina King
- 10 years ago
- Views:
Transcription
1 » The Open Compliance Program Dependency Checker Tool Overview and Discussion By Stew Benedict and Jeff Licquia, The Linux Foundation A White Paper By The Linux Foundation
2 Introduction In the past two months, the Linux Foundation has published several papers (available from wwwlinuxfoundationorg/publications) on the topic Free and Open Source Software Compliance in preparation of the launch of the Open Compliance Program This paper is the fourth in the same series and provides an overview of the Dependency Checker Tool, an open source project initiated by the Linux Foundation as part of the Open Compliance Program, aimed at providing a tool to support FOSS compliance due diligence activities The paper is divided into two main parts: The first part provides a discussion on the role of tools in ensuring FOSS compliance with a listing of tools used in the compliance end-to-end management process, and the second part is dedicated to the Dependency Checker Tool design and implementation details Figure 1 provides a sample end-to-end compliance management process that includes the following steps: 1 Identification: All incoming software is identified and entered into the compliance process 2 Audit: software is scanned and audited and an audit report is generated identifying origins and licenses of source code 3 Resolve Issues: Any pending issues from the audit are worked on and resolved 4 Reviews: compliance ticket is reviewed by the compliance team 5 Approvals: compliance ticket is approved by the compliance team 6 Registration: software component is added to the inventory of approved components for use in a specific product/version 7 Notices: all notices are compiled and sent to documentation team for publishing 8 Verifications: pre-distribution verification steps 9 Distributions: source code is published 10 Verifications: post-distribution verification steps 1
3 Figure 1: Example of a compliance process For the purpose of this article, we do not discuss in detail the compliance process The goal is to illustrate a sample process and discuss which tools are being used in which steps in the process Tools and Automation Tools are an essential building block in a compliance program that can assist companies with their compliance activities as efficiently and accurately as possible There are a number of tools that can be very useful in a FOSS compliance program: Project management tool Source code scanning and license identification tool Linkage analysis tool Bill of material difference tool Source code review tool Linguistic review tool Figure 2 illustrates a sample compliance end-to-end process and displays in which phases of the compliance process the tools are being used In addition, the figures points out the three tools that the Linux Foundation is initiating as open source tools to help companies with their compliance efforts In the following sub-sections we describe briefly these tools and how they contribute to the compliance activities It is worth mentioning that there exist in the market several commercial and 2
4 open source tools that provide the various functionalities described below Figure 2: Example of tools used in compliance management Project Management Tool A project management tool is essential to manage and track the compliance activities Some companies use their bug tracking tools that are already in place with a customized compliance workflow; other companies rely on specific project management tools or even in-house solutions Whatever your preference is, you would want the tool to reflect the workflow of your compliance process, allowing you to move compliance tickets from one phase of the process to another, providing you with task and resources management, time tracking, notifications, project statistic and reporting capabilities Bill of Material (BoM) Difference Checker The goal of the BoM difference checker is to compute the difference between two BoM and produce a list of changes This will enable efficient incremental compliance on the BoM delta on two versions of the same product The inputs to the BoM difference checker are two BoM files that represent the list of components available on two different version of the product For instance BoM_v10 represents version 10 and BoM_v11 represents version 11 The output of the BoM difference checker would be the list of new components, retired components, and modified components 3
5 Source Code and License Identification Tool The source code and license identification tool provides recognition and analysis capabilities for both source code and binaries and assists the user of the tool in identifying the origin of the source code and the associated licenses Dependency Checker Tool The goal of the dependency checker is to flag problematic code combinations at the dynamic and static link level The tool identifies a linkage conflict between binaries and libraries based on predefined license policies that the user of the tool has already defined The Dependency Checker Tool is discussed in full in the second half of the paper Software Inventory Tool It is critical to keep track of approved software components, the products in which they are deployed, and specific information such as version numbers, licensing and compliance information Such data is usually stored in a software inventory tool that maintains information about all software components, not just FOSS assets The software inventory tool provides significant advantages in cases such as compliance audits or corporate mergers and acquisitions Source Code Peer Review Tool As part of the distribution process, some companies elect to review the source code changes they applied to existing FOSS components before making the components available for download from their web site A source code review tool is very useful in this context to allow developers to review the changes made to the original source code Code Janitor Tool Before releasing source code to the public, companies often perform a linguistic review to make sure that developers did not leave any comments about future products, product code names, mention of competitors, or any inappropriate comments The Code Janitor tool was initiated by the Linux Foundation as an Open Source project and it allows its users to create a database of inappropriate words (or keywords) the tool will use in a brute force scan of the code The result is a list of files that contains the offending keywords The Code Janitor tool is available from linuxfoundationorg/?p=janitorgit Binary Analysis Tool The Binary Analysis Tool is a modular framework that assists with auditing the contents of compiled software It allows the discovery of software components that were used to create compiled code The tool supports the automated extraction of the version and configuration of BusyBox, extraction of file system information, automated checking for the Linux kernel, and a capability for brute force scanning of firmware The binary analysis tool is available from binaryanalysisorg/ 4
6 Note In some cases, a single tool can fulfill more than one of the roles described above Dependency Checker Tool The Dependency Checker Tool is the first tool released by the Linux Foundation (under the MIT license) as a part of the Open Compliance Program to help companies and individuals with their compliance due diligence Like any other open source project, the project is open (open mailing list, open git repository, open bugzilla) and governed by open source development processes The tool in its initial release (discussed in a later section) provides a number of features and capabilities that will grow with time The tool is to be used as a platform to innovate and enable easy compliance Such tools provide no product differentiation for companies and our hope is that companies, individuals, and open source developers will join the effort and contribute in building solid tools that help everyone using open source software Problem Description There are various legal opinions on how linkage methods (static versus dynamic) may or may not affect your compliance with FOSS licenses Companies often define policies that govern what is acceptable from a linkage/licensing perspective For instance, sample policies may look as follows: Components/binaries licensed under license A can link statically or dynamically to libraries licensed under license B Components/binaries licensed under license C can link dynamically only to libraries licensed under license D and E Components/binaries licensed under license F can not link statically or dynamically to libraries licensed under license H Therefore, there is a need for a tool that offers capabilities to: 1 Discover linkages occurring between a given binary and any given library 2 Discover the type of linkage (static or dynamic)linkage analysis tool 3 Offer a license framework to allow companies to define their policies 4 Alert users anytime there is a linkage/license conflict discovered by the tool Goal The goal of the tool is to flag problematic code combinations at the dynamic and static link level based on predefined linkage/license policies Inputs and Outputs There are 2 major inputs to the tool: 1 Location of the root file system that you want to scan The tool then crawls the root file system looking for binaries and works to identify to which libraries they link and how 2 Linkages/license policies that are defined in the tool and correspond to any specific company policies (examples were provided earlier) 5
7 For any given binary, the output is the list of libraries it links to, linkage method and a flag that illustrates if the linkage/license combination is: (Red flag) Not allowed by the defined policies (Orange flag) a new combination of linkage method and license that it not available in the defined policies Discovering Dynamic Linkages The software takes either a path, or a path and a filename, as input The path may be to a single file or to a directory If the path is a directory, the directory is searched recursively, either for any ELF files or for the additional filename given We only consider ELF files for analysis Once an ELF file is discovered, we find the dynamically linked libraries using an equivalent of the command: readelf -a file grep NEEDED awk {print $5} This gives us a list of the SONAMES of the libraries this binary depends on If recursion is requested, we run ldd on the original file to get the library paths, and resolve any symbolic links to the actual file We then repeat the sequence on each library to find its dependencies, and continue to repeat up to the recursion level or until no more recursion is possible Discovering Static Linkages First, for each ELF file found, we gather a list of all interfaces linked into it from any source, using the equivalent of this shell command: readelf -s file grep FUNC awk { print $8 } Second, we read a list of all interfaces that have debugging information available This is done using readelf -wi and parsing the output, looking for all entries of type DW_TAG_subprogram and storing the DW_AT_name attribute Once we have these two lists, we look for symbol names that appear in the first list but not in the second list These are functions embedded in the executable, but without debugging information The linking of static libraries is the most common cause for the presence of symbols like this To determine the actual library involved, we consult a table that contains all of the symbols in a number of libraries Rather than ship an embedded (and possibly stale) table of symbols, we generate the table by reading the symbol tables from the dynamic libraries provided on the system Initially, the table is empty; we provide both a command-line tool and a button in the user interface (under the Settings tab) for analyzing the system and showing fresh data We show warnings if the table is empty when a scan is done This process is not as exact as the process for finding dynamic libraries See the Limitations section below for a discussion of the constraints and reliability of this method 6
8 Using the Command Line Interface (CLI) The command line program is called readelfpy, and it resides in /opt/ linuxfoundation/bin (or in dep-checker/bin for a git checkout): ~/dep-checker/bin$ /readelfpy --help Usage: readelfpy [options] <file/dir tree to examine> [recursion depth] Options: -c output in csv format -d write the output into the results database -s DIR directory tree to search --comments=comments test comments (when writing to database) --project=project project name (when writing to database) --no-static don t look for static dependencies --version show program s version number and exit -h, --help show this help message and exit -c Option The -c option is primarily used to pass data to the GUI The format without this argument is more human-readable if you are using the command line directly -d Option The -d option forces -c style output and writes the data to the same database used by the GUI You can use project and comments to fill these fields in the test record The username is acquired from the environment Using -d allows unattended test runs via cron or other means that can be later reviewed in the GUI -s DIR Option The -s option expects a directory as an argument If you specify this option, the program will attempt to drill down through the directory mentioned to find only files with the name specified by the next argument to analyze: /opt/linuxfoundation/bin/readelfpy -s /foo bar The program will search everything under /foo, for ELF files named bar Specifying only a directory will search and report on every ELF file in that directory tree: /opt/linuxfoundation/bin/readelfpy /foo Specifying only a file will attempt to test only the specified file: /opt/linuxfoundation/bin/readelfpy /foo/bar/baz The recursion level is an optional argument, that will attempt to not only report the direct dependencies, but also report the dependencies of each library used by the target file: /opt/linuxfoundation/bin/readelfpy /foo/bar/baz 4 This would attempt to recurse down 4 levels from the target file, giving output something like this: 7
9 [1]/foo/bar/baz: libtermcapso2 [2]/lib/libtermcapso208: libcso6 [3]/lib/i686/libc-2101so: ld-linuxso2 [1]/foo/bar/baz: libdlso2 [2]/lib/libdl-2101so: libcso6 [3]/lib/i686/libc-2101so: ld-linuxso2 [2]/lib/libdl-2101so: ld-linuxso2 [1]/foo/bar/baz: libcso6 [2]/lib/i686/libc-2101so: ld-linuxso2 You will note that even though we asked for a recursion level of 4, the test stopped at level 3, as the program detects when no further recursion is possible Static library dependencies will appear with (static) appended to the SONAME: libncursesso5 (static) --comments=comments The comments option is used to populate the comments field in the test record when using -d If the comment is multiple words, it should be quoted: --comments= this is a comment --project=project The project option is used to populate the project field in the test record when using -d If the comment is multiple words, it should be quoted: --project= my FOSS project --no-static Option The --no-static option suppresses trying to resolve statically linked dependencies 8
10 --version The version option reports the version of the command line program -h, --help The -h, --help option returns the usage/options as listed earlier Overview of the Graphical User Interface The GUI interface is simple by design with tabs to access various aspects of program: Check Dependencies Test entry, initiate form Review Results Tabular list of test results Licenses License name/version/alias entry tab License Bindings Define license bindings for targets (test files) and libraries License Policies Define linkage license policies to be flagged during testing Settings View and change settings, load/reload the static database Documentation User documentation The final page, which isn t visible in the tabs, is the test results detail page, brought up by either running a test, or clicking on the link in the results page Check Dependencies Figure 3 provides an illustration of the home page of the Dependency Checker Tool once launched in a web browser This is also known as the Check Dependencies tab When running the Dependency Checker for the very first time, you should start by loading the static symbol tables If this has not been done, the page will include a reminder to do this See below, under the Settings tab, for instructions on how to do this Once this has been done, a test sequence would typically start at the Check Dependencies page, where you enter the test criteria This setup parallels the operation of the command line program, where you select whether to search for a file under a directory, test a whole directory, or just a single file There is also a drop-down to select the recursion level You can disable checking for static dependencies via a checkbox The user field is pre-populated with the compliance user, but can be overridden The project and comments fields are optional for your use in tracking tests Once you enter the test criteria, click on the Run Dependency Check button After the test runs you will be presented with the detailed test results in tabular form Depending on the number of files to be tested and the recursion level, the test can take a few minutes, so be patient A status box will replace the form on the screen to show the progression of the test 9
11 Figure 3: Main screen of Dependency Checker Until there are licenses and bindings defined, the results detail will show TBD for both the target and dependency licenses Now that there is data in the system, you can go back and define these relationships and update the test data There is a Print Results button on the detail page that should open the browser print dialog to print to a physical printer or to a file Some parts of the GUI are hidden in the printed output so that only the test results show up in the printed report Review Results Figure 4 illustrates how users of the tool can access the test results via the Review Results page This is a tabular list of all the test runs, sorted by test id/date The far-right column has the information entered from the Check Dependencies tab Clicking on the link for the target file or directory will open the detail tab If you want to delete test results, you can select the checkboxes and delete them from here, using the Delete Selected Tests button 10
12 Licenses Figure 4: Review results screen The License tab lets you enter license names, versions, abbreviations and aliases For example, the GNU General Public License v 20: Long name = GNU General Public License Abbreviation = GPL Version number = 20 Possible aliases = GPL20 GPL v2 GPL 2 GPL v2 You can add as many aliases as you need for any given license This information is needed when importing license information from a third party tool Since we are unaware of how the license name and version will be reported, we have the facility to define various aliases for any given License Name / License Version combination and still link that to the license policies Following this approach, if we have a policy that states, Binaries licensed under license A v10 can link statically or dynamically to libraries licensed under license B v20 we will still be able to discover and flag the combination even if the license are imported differently than what is stated in the policy You can select a abbreviation/version from the system and then provide up to 9 alternate names (aliases) that will be considered equivalent when examining test results for policy violations Additional aliases can be added to an existing list by simply selecting the license, entering just the new alias and clicking Add again Alias entries must be unique, and you ll be warned when trying to add an alias that already exists Figure 5 is an illustration of the License tab and shows the default open source licenses (OSI approved) licenses that are pre-loaded by default in the tool 11
13 Figure 5: License screen License Bindings 12
14 Since the module to import license information from third party tools is not available yet, we needed a way to test the tool and the defined policy The solution was to create a way to attach license information to binaries and libraries This solution, described below, is a temporary fix until we are able to import license information attached to binaries and libraries from other tools The License Bindings tab illustrated in Figure 6 allows the user to define the license binding for the target files (ie the files that are being tested for dependencies) The same type of bindings can be done for the dependency libraries (ie the libraries linked to by the binaries) The drop down under Target will show all the files captured in the target directory scanned The drop down under License will show all the licenses defined in the License tab If there is no test-data or no licenses, the drop-downs will be empty If there is test data in the system, you can update the license information for current data using the Update Target Test Data button Figure 6: License binding screen The drop down under Library will show all libraries in the test data The drop down under License will show all the licenses defined in the License tab The License selector does not differentiate between static and dynamic versions; both will be treated the same If there are no test data or no licenses, the drop-downs will be empty If there are test data in the system, you can update the license information for current data using the Update Library Test Data button The bindings will also get updated as part of the next test run License Policies The License Policies, shown in Figure 7, allow the user to define pairing of target/library licenses that could have potential issues You select the Target License and Library License from the drop downs and then select the relationship, either Static, Dynamic, or both When a test is run, violations of these policy settings will appear in the report printed in red with a red flag after the License name Like the other tabs, you can select and delete policies using the check-boxes and the Delete Selected Policies button If the target (file) or library is using a license naming convention that is not defined in the application licenses tab, but has a naming convention defined as equivalent in the aliases table, the license violation will look like: alias name (real name) [graphical flag] Undefined license relationships will be flagged with orange text and an orange flag 13
15 Settings Figure 7: License policies screen The Settings tab provides settings for managing the static symbol data used for detecting static library dependencies The Reload Static Data button clears out any data in the static symbol tables, and loads new data into them based on the libraries available on the system It should be activated at least once: when running the Dependency Checker for the first time Both this page and the Check Dependencies page warn you when no static symbol data is present If a job is being run, such as a dependency check or a symbol data reload, the status for that job will be displayed instead of the Reload Static Data button When the job is finished and it is possible to reload the data again, the button will return By default, when loading symbol data, only libraries found in the common system paths are considered You can change this by adding or removing paths from the list under the Reload Static Data button, and then clicking Save Changes Once the paths have been changed, click the Reload Static Data button to reload the data from the new paths Figure 8: Settings screen Figure 8 shows the Settings tab as it might look when the static data is in the process of being reloaded Installation 14
16 From Packages The program is packaged as an rpm package, with dependencies on python-django If your system does not provide django, or it s named differently, you may need to install using --nodeps: rpm -Uvh dep-checker-005-1noarchrpm --nodeps Note: If you had to use --nodeps, then you must make sure django is installed and functional on your system Both the command line program and the GUI depend on django The installation creates a compliance user/group and should create a desktop menu entry to launch the server and open the GUI in your web browser From Git You can also checkout the project from git and run it in place: git clone cd dep-checker Alternately, you can get the latest tarball from the git web page by clicking on the snapshot link in the upper right-hand part of the page Once you have the tarball, unpack it (example, the numbers of your download may differ): tar -xf dep-checker-3af829ae0cc5aba33192c000ef0365ef6bced843targz cd dep-checker Create the application database and the documentation (you will need w3m to create README txt): make Running the Tool Usage: dep-checkerpy [options] start stop Options: --force-root --server-only --interface=interface -h, --help allow running as root don t open a browser listen on network interface (port or ip:port) show this help message and exit Step 1 The first step in running the tool is to: ~/dep-checker$ make You will see output something like this: 15
17 cd package && make clean make[1]: Entering directory `/home/stew/git/dep-checker/package make[1]: Leaving directory `/home/stew/git/dep-checker/package cd compliance/media/docs && make clean make[1]: Entering directory `/home/stew/git/dep-checker/compliance/media/docs rm -f indexhtml indexhtmladdons make[1]: Leaving directory `/home/stew/git/dep-checker/compliance/media/docs rm -f READMEtxt rm -f compliance/compliance rm -f compliance/compliance cd compliance && python managepy syncdb --noinput Creating table auth_permission Creating table auth_group_permissions Creating table auth_group Creating table auth_user_user_permissions Creating table auth_user_groups Creating table auth_user Creating table auth_message Creating table django_content_type Creating table django_session Creating table django_site Creating table django_admin_log Creating table linkage_test Creating table linkage_file Creating table linkage_lib Creating table linkage_license Creating table linkage_aliases Creating table linkage_liblicense Creating table linkage_filelicense Creating table linkage_policy Creating table linkage_staticsymbol Creating table linkage_staticlibsearchpath 16
18 Creating table linkage_meta Installing index for authpermission model Installing index for authgroup_permissions model Installing index for authuser_user_permissions model Installing index for authuser_groups model Installing index for authmessage model Installing index for adminlogentry model Installing index for linkagefile model Installing index for linkagelib model Installing index for linkagestaticsymbol model Installing index for linkagemeta model Installing xml fixture initial_data from /home/stew/git/dep-checker/compliance//compliance/linkage/ fixtures Installed 202 object(s) from 1 fixture(s) cd compliance/media/docs && make make[1]: Entering directory `/home/stew/git/dep-checker/compliance/media/docs /text-docs-to-html > indexhtmladdons cat indexhtmlbase indexhtmladdons indexhtmlfooter > indexhtml make[1]: Leaving directory `/home/stew/git/dep-checker/compliance/media/docs w3m -dump compliance/media/docs/indexhtml > READMEtxt If you ve already been using the tool, you do not want to make clean, as it will destroy your existing data Step 2 The second step in running the tool is to: ~/dep-checker$ /bin/dep-checkerpy start Waiting for the server to start Starting a web browser Created a new window in existing browser session Stopping the Server /bin/dep-checkerpy stop Known Limitations and Areas to Improve 17
19 Debugging Information The process of detecting statically linked libraries has some limitations because the normal build process does not embed any information about symbols linked from static libraries, as it does for symbols linked from dynamic libraries The process is therefore less about gathering the data already embedded in the application, and more about attempting to derive the data using hints in the application that are not directly relevant to the linking process The process of detecting statically linked libraries assumes that no deliberate deception is being attempted A malicious developer could easily tweak a build to avoid detection of certain static libraries The process relies absolutely on the presence of debugging information If a software provider strip out debugging information, the tool cannot detect static library usage in most released code Therefore, we recommend incorporating the tool at an earlier phase of the project s lifecycle, and verifying that debugging information is available when running the tool to ensure all statically linked libraries are discovered Software Development Practices Static library detection also relies on common developer and distribution vendor practices Developers tend to create debugging information in anything they build themselves, and to not care about debugging information in libraries not being built by the developer Distribution vendors tend to ship debugging libraries for dynamic libraries only These are trends, not absolute rules; developers and distribution vendors may change their practices for perfectly valid reasons A compliance engineer relying on this tool s static library analysis should be familiar with the common practices of both the company s own developers and their preferred distribution Accuracy Detection of actual libraries depends on a table of symbols that maps symbol names found to the library the symbol comes from Accuracy in detection depends on having high-quality data in this table Because of this, the tool generates the data from the system actually running the tests, instead of shipping a canonical database that can become stale Ideally, the tool would be running on the same system used to build the software under test If this is not possible, the tool should be run on a system set up to match the build system as closely as possible Additionally, if the development team builds static libraries of their own, those static libraries should also be reflected in the table of symbols Make sure that the search paths for libraries in the tool include the directories where those libraries are installed Either static or dynamic versions of the libraries will work Recursion Because dynamic library linkage is much more explicit, the tool reports dynamic dependencies with high confidence The limitation comes when using recursion, because this will often result in an examination of libraries shipped by the distribution vendor In many cases, the dependencies uncovered may not be relevant to the compliance/legal status of the application under test For 18
20 example, if an application dynamically links to library A on the system, and that library is shipped by the distribution to itself link to library B for some optional functionality not used by the application, the legal status of the application may be different than if the application linked to both libraries A and B directly The tool provides the mechanism to uncover such relationship through recursion, but does not make any statement regarding the compliance status Further, dependencies of system libraries can change between distributions and even between versions of the same distribution Thus, the recursive dependencies as reported by the tool can be different depending on which distribution the test is being run under Areas for Contributions Being a first release, there are several areas that can be improved or augmented with additional functionalities The listing below (in random order) provides a TO DO list for the next phase of the tool development: Plugin import license information from source code scanning tools Improve the GUI Improve detection of static linkages Improve the CLI to provide similar functionalities to those available through the GUI Improve the speed of load table of symbols Improve the speed of running the dependency checker Provide the application as a web application Availability and Participation You can view the development source from git at git;a=summary, or check it out using standard git commands: % git clone To file bugs or request features, go to (under the Compliance product) To subscribe to the mailing list or view the archives: listinfo/dep-checker-dev Conclusion The Dependency Checker Tool is an Open Source project initiated by the Linux Foundation to help companies with their compliance efforts Please consider this article as an invitation to learn more about the project and to consider contributing to it About the Authors Stew Benedict is a Member of Technical Staff at the Linux Foundation He previously worked as a Distribution Developer for Mandrake/Mandriva, working on PPC/IA64 ports and various security initiatives Prior to that, he held several roles with an automotive parts manufacturer in Cleveland, Ohio, and with GE Lighting as part of their Electronic Products group He has written several Linux and Solaris articles for Linux Journal and TechRepublic Jeff Licquia is a Member of Technical Staff at the Linux Foundation Previously, he worked at Progeny Linux Systems, and was the project lead for the Progeny Debian distribution He is also a member of the Debian project, and has contributed to several books on Linux software development 19
21 Over his career, he has worked on a diverse set of problems, from industrial automation to system administration, and on platforms ranging from MS-DOS and Ultrix to Windows and Linux About the Open Compliance Program The Linux Foundation s Open Compliance Program is the industry s only neutral, comprehensive software compliance initiative By marshaling the resources of its members and leaders in the compliance community, the Linux Foundation brings together the individuals, companies and legal entities needed to expand the use of open source software while decreasing legal costs and FUD The Open Compliance Program offers comprehensive training and informational materials, open source tools, an online community (FOSSBazaar), a best practices checklist, a rapid alert directory of company s compliance officers and a standard to help companies uniformly tag and report software used in their products The Open Compliance Program is led by experts in the compliance industry and backed by such organizations as the Adobe, AMD, ARM Limited, Cisco Systems, Google, HP, IBM, Intel, Motorola, NEC, Novell, Samsung, Software Freedom Law Center, Sony Electronics and many more More information can be found at /programs/legal/compliance 20
22 The Linux Foundation promotes, protects and standardizes Linux by providing unified resources and services needed for open source to successfully compete with closed platforms To learn more about The Linux Foundation, the Open Compliance Program or our other initiatives please visit us at /
The FOSSology Project Overview and Discussion. » The Open Compliance Program. ... By Bob Gobeille, Hewlett-Packard
» The Open Compliance Program The FOSSology Project Overview and Discussion By Bob Gobeille, Hewlett-Packard A White Paper By The Linux Foundation FOSSology (http://fossologyorg) is an open source compliance
Novell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
Attix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.
Hypercosm. Studio. www.hypercosm.com
Hypercosm Studio www.hypercosm.com Hypercosm Studio Guide 3 Revision: November 2005 Copyright 2005 Hypercosm LLC All rights reserved. Hypercosm, OMAR, Hypercosm 3D Player, and Hypercosm Studio are trademarks
Xcode Project Management Guide. (Legacy)
Xcode Project Management Guide (Legacy) Contents Introduction 10 Organization of This Document 10 See Also 11 Part I: Project Organization 12 Overview of an Xcode Project 13 Components of an Xcode Project
The Linux Foundation Open Compliance Training Data Sheet. » The Open Compliance Program
» The Open Compliance Program The Linux Foundation Open Compliance Training Data Sheet Produced By The Linux Foundation Background Free and open source software enables companies to accelerate product
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Site Configuration SETUP GUIDE. Windows Hosts Single Workstation Installation. May08. May 08
Site Configuration SETUP GUIDE Windows Hosts Single Workstation Installation May08 May 08 Copyright 2008 Wind River Systems, Inc. All rights reserved. No part of this publication may be reproduced or transmitted
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
TAO Installation Guide v0.1. September 2012
TAO Installation Guide v0.1 September 2012 TAO installation guide v0.1 page 2/22 This installation guide provides instructions for installing TAO. For all other aspects of using TAO, please see the user
Zoom Plug-ins for Adobe
= Zoom Plug-ins for Adobe User Guide Copyright 2010 Evolphin Software. All rights reserved. Table of Contents Table of Contents Chapter 1 Preface... 4 1.1 Document Revision... 4 1.2 Audience... 4 1.3 Pre-requisite...
Configuring MailArchiva with Insight Server
Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any
Version Control with Subversion and Xcode
Version Control with Subversion and Xcode Author: Mark Szymczyk Last Update: June 21, 2006 This article shows you how to place your source code files under version control using Subversion and Xcode. By
Mercury User Guide v1.1
Mercury User Guide v1.1 Tyrone Erasmus 2012-09-03 Index Index 1. Introduction... 3 2. Getting started... 4 2.1. Recommended requirements... 4 2.2. Download locations... 4 2.3. Setting it up... 4 2.3.1.
Yocto Project Eclipse plug-in and Developer Tools Hands-on Lab
Yocto Project Eclipse plug-in and Developer Tools Hands-on Lab Yocto Project Developer Day San Francisco, 2013 Jessica Zhang Introduction Welcome to the Yocto Project Eclipse plug-in
Brocade Network Advisor: CLI Configuration Manager
Brocade Network Advisor: CLI Configuration Manager Brocade Network Advisor is a unified network management platform to manage the entire Brocade network, including both SAN and IP products. This technical
Version Control with. Ben Morgan
Version Control with Ben Morgan Developer Workflow Log what we did: Add foo support Edit Sources Add Files Compile and Test Logbook ======= 1. Initial version Logbook ======= 1. Initial version 2. Remove
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
McAfee VirusScan Enterprise for Linux 1.7.0 Software
Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
TIBCO Fulfillment Provisioning Session Layer for FTP Installation
TIBCO Fulfillment Provisioning Session Layer for FTP Installation Software Release 3.8.1 August 2015 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
User Manual for Web. Help Desk Authority 9.0
User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
Moxa Device Manager 2.3 User s Manual
User s Manual Third Edition, March 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
Commander. The World's Leading Software for Label, Barcode, RFID & Card Printing
The World's Leading Software for Label, Barcode, RFID & Card Printing Commander Middleware for Automatically Printing in Response to User-Defined Events Contents Overview of How Commander Works 4 Triggers
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
Tracking Network Changes Using Change Audit
CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and
Avaya Network Configuration Manager User Guide
Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information
Administrator's Guide
Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere
Installation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L
Installation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L Introduction: This guide is written to help any person with little knowledge in AIX V5.3L to prepare the P Server
Apparo Fast Edit. Excel data import via email 1 / 19
Apparo Fast Edit Excel data import via email 1 / 19 1 2 3 4 5 Definition 3 Benefits at a glance 3 Example 4 3.1 Use Case 4 3.2 How users experience this feature 4 Email ImportBusiness Case 6 4.1 Creating
Net Services: File System Monitor
Net Services: File System Monitor Settings for ExtremeZ-IP file server volumes...1 Setup of the Net Services server...2 Configuring and testing the Net Services server...3 Installing File System Monitor...4
10 STEPS TO YOUR FIRST QNX PROGRAM. QUICKSTART GUIDE Second Edition
10 STEPS TO YOUR FIRST QNX PROGRAM QUICKSTART GUIDE Second Edition QNX QUICKSTART GUIDE A guide to help you install and configure the QNX Momentics tools and the QNX Neutrino operating system, so you can
JBoss Developer Studio 6.0
JBoss Developer Studio 6.0 OpenShift Tools Reference Guide 1 JBoss Developer Studio 6.0 OpenShift Tools Reference Guide Provides information about the use of the JBoss Developer Studio with the Red Hat
User Guide - escan for Linux File Server
1 User Guide - escan for Linux File Server 2 I. Required escan for Linux RPMS / Debian packages RPM Package Name File name mwadmin mwav escan escan-rtm mwadmin-x.x-x..i386.rpm mwav-x.x-x.
Bitrix Site Manager ASP.NET. Installation Guide
Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary
DocAve 6 Service Pack 1 Job Monitor
DocAve 6 Service Pack 1 Job Monitor Reference Guide Revision C Issued September 2012 1 Table of Contents About Job Monitor... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin... 5
User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1
User's Manual Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 VirusBarrier Server 2 and VirusBarrier Mail Gateway 2 for Macintosh 2008 Intego. All Rights Reserved Intego
Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users
Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...
Manual Password Depot Server 8
Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................
Network Shutdown Module V3 Extension of the User Manual for IBM BladeCenter architecture
Network Shutdown Module V3 Extension of the User Manual for IBM BladeCenter architecture Network Shutdown Module V3 Extension for IBM BladeCenter Architecture- 34 022 272 XU / AC Contents 1 Introduction...3
Novell ZENworks Asset Management
Novell ZENworks Asset Management Administrative Best Practices and Troubleshooting www.novell.com APRIL 19, 2005 2 GETTING THE MOST OUT OF NOVELL ZENWORKS ASSET MANAGEMENT The award-winning asset tracking
Sonatype CLM Enforcement Points - Continuous Integration (CI) Sonatype CLM Enforcement Points - Continuous Integration (CI)
Sonatype CLM Enforcement Points - Continuous Integration (CI) i Sonatype CLM Enforcement Points - Continuous Integration (CI) Sonatype CLM Enforcement Points - Continuous Integration (CI) ii Contents 1
Installation Guide for FTMS 1.6.0 and Node Manager 1.6.0
Installation Guide for FTMS 1.6.0 and Node Manager 1.6.0 Table of Contents Overview... 2 FTMS Server Hardware Requirements... 2 Tested Operating Systems... 2 Node Manager... 2 User Interfaces... 3 License
Practice Fusion API Client Installation Guide for Windows
Practice Fusion API Client Installation Guide for Windows Quickly and easily connect your Results Information System with Practice Fusion s Electronic Health Record (EHR) System Table of Contents Introduction
CommandCenter Secure Gateway
CommandCenter Secure Gateway Quick Setup Guide for CC-SG Virtual Appliance and lmadmin License Server Management This Quick Setup Guide explains how to install and configure the CommandCenter Secure Gateway.
RecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
Source Code Management for Continuous Integration and Deployment. Version 1.0 DO NOT DISTRIBUTE
Source Code Management for Continuous Integration and Deployment Version 1.0 Copyright 2013, 2014 Amazon Web Services, Inc. and its affiliates. All rights reserved. This work may not be reproduced or redistributed,
Code Estimation Tools Directions for a Services Engagement
Code Estimation Tools Directions for a Services Engagement Summary Black Duck software provides two tools to calculate size, number, and category of files in a code base. This information is necessary
Discover the best keywords for your online marketing campaign
Discover the best keywords for your online marketing campaign Index n... 3 Keyword discovery using manual methodology... 5 Step 1: Keyword analysis and search... 6 Step 2... 10 Additional tools... 11 Competitors...
AXIGEN Mail Server. Quick Installation and Configuration Guide. Product version: 6.1 Document version: 1.0
AXIGEN Mail Server Quick Installation and Configuration Guide Product version: 6.1 Document version: 1.0 Last Updated on: May 28, 2008 Chapter 1: Introduction... 3 Welcome... 3 Purpose of this document...
DCA. Document Control & Archiving USER S GUIDE
DCA Document Control & Archiving USER S GUIDE Decision Management International, Inc. 1111 Third Street West Suite 250 Bradenton, FL 34205 Phone 800-530-0803 FAX 941-744-0314 www.dmius.com Copyright 2002,
WebSphere Business Monitor V6.2 KPI history and prediction lab
Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 KPI history and prediction lab What this exercise is about... 1 Lab requirements...
IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide
IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
NETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
Online Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
Sophos Anti-Virus for Linux user manual
Sophos Anti-Virus for Linux user manual Product version: 7 Document date: January 2011 Contents 1 About this manual...3 2 About Sophos Anti-Virus for Linux...4 3 On-access scanning...7 4 On-demand scanning...10
PCRecruiter Internal Email Client
PCRecruiter Internal Email Client The standard email buttons on contact record screens and lists allow PCRecruiter users to send email out to any contact in the database. However, if you are using PCRecruiter
Team Foundation Server 2012 Installation Guide
Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day [email protected] v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation
Network Probe User Guide
Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5
Online Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
EMC Documentum Composer
EMC Documentum Composer Version 6.5 User Guide P/N 300 007 217 A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 2008 EMC Corporation. All rights
AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts
AlienVault Unified Security Management (USM) 4.x-5.x Deploying HIDS Agents to Linux Hosts USM 4.x-5.x Deploying HIDS Agents to Linux Hosts, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. AlienVault,
Actualtests.C2010-508.40 questions
Actualtests.C2010-508.40 questions Number: C2010-508 Passing Score: 800 Time Limit: 120 min File Version: 5.6 http://www.gratisexam.com/ C2010-508 IBM Endpoint Manager V9.0 Fundamentals Finally, I got
Microsoft Dynamics NAV Connector. User Guide
Microsoft Dynamics NAV Connector User Guide Microsoft Dynamics NAV Connector, version 1.0 Copyright Bottomline Technologies, Inc. 2008. All Rights Reserved Information in this document is subject to change
Load testing with. WAPT Cloud. Quick Start Guide
Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica
Sophos Anti-Virus for Mac OS X: Home Edition Help
Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
ScheduleOne - Help Guide
ScheduleOne - Help Guide Only from MeetingOne 501 South Cherry Street Suite 500 Denver, Colorado 80246 Tel: 303.623.2530 Fax: 303.623.1294 Table of Contents ScheduleOne Installation Instructions 2 Basic
SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore
SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in
NYS OCFS CMS Contractor Manual
NYS OCFS CMS Contractor Manual C O N T E N T S CHAPTER 1... 1-1 Chapter 1: Introduction to the Contract Management System... 1-2 CHAPTER 2... 2-1 Accessing the Contract Management System... 2-2 Shortcuts
QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014
QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault
EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...
Getting Started using the SQuirreL SQL Client
Getting Started using the SQuirreL SQL Client The SQuirreL SQL Client is a graphical program written in the Java programming language that will allow you to view the structure of a JDBC-compliant database,
Using Git for Project Management with µvision
MDK Version 5 Tutorial AN279, Spring 2015, V 1.0 Abstract Teamwork is the basis of many modern microcontroller development projects. Often teams are distributed all over the world and over various time
TIBCO Hawk SNMP Adapter Installation
TIBCO Hawk SNMP Adapter Installation Software Release 4.9.0 November 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR
Getting Started Guide - Desktop
Getting Started Guide - Desktop 1. Sign Up PERSONAL OPENTEXT CORE ACCOUNT To get started sharing and collaborating on your files from a Mac or Windows browser, you ll need to sign up for your OpenText
Admin Reference Guide. PinPoint Document Management System
Admin Reference Guide PinPoint Document Management System 1 Contents Introduction... 2 Managing Departments... 3 Managing Languages... 4 Managing Users... 5 Managing User Groups... 7 Managing Tags... 9
Q N X S O F T W A R E D E V E L O P M E N T P L A T F O R M v 6. 4. 10 Steps to Developing a QNX Program Quickstart Guide
Q N X S O F T W A R E D E V E L O P M E N T P L A T F O R M v 6. 4 10 Steps to Developing a QNX Program Quickstart Guide 2008, QNX Software Systems GmbH & Co. KG. A Harman International Company. All rights
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
Install guide for Websphere 7.0
DOCUMENTATION Install guide for Websphere 7.0 Jahia EE v6.6.1.0 Jahia s next-generation, open source CMS stems from a widely acknowledged vision of enterprise application convergence web, document, search,
Chapter 25 Backup and Restore
System 800xA Training Chapter 25 Backup and Restore TABLE OF CONTENTS Chapter 25 Backup and Restore... 1 25.1 General Information... 2 25.1.1 Objectives... 2 25.1.2 Legend... 2 25.1.3 Reference Documentation...
How To Backup In Cisco Uk Central And Cisco Cusd (Cisco) Cusm (Custodian) (Cusd) (Uk) (Usd).Com) (Ucs) (Cyse
This chapter includes the following sections: Backup and Import in Cisco UCS Central, page 1 Backing up and Restoring Cisco UCS Central, page 4 Backing up and Restoring Cisco UCS Domains, page 8 Import
Honeywell Internet Connection Module
Honeywell Internet Connection Module Setup Guide Version 1.0 - Page 1 of 18 - ICM Setup Guide Technical Support Setup - Guide Table of Contents Introduction... 3 Network Setup and Configuration... 4 Setting
XStream Remote Control: Configuring DCOM Connectivity
XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation
Asset Managers Guide. LANDesk Asset Lifecycle Manager
Asset Managers Guide LANDesk Asset Lifecycle Manager ASSET MANAGER'S GUIDE Copyright 2011 LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Integrating with BarTender Integration Builder
Integrating with BarTender Integration Builder WHITE PAPER Contents Overview 3 Understanding BarTender's Native Integration Platform 4 Integration Builder 4 Administration Console 5 BarTender Integration
Online Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
Hadoop Basics with InfoSphere BigInsights
An IBM Proof of Technology Hadoop Basics with InfoSphere BigInsights Part: 1 Exploring Hadoop Distributed File System An IBM Proof of Technology Catalog Number Copyright IBM Corporation, 2013 US Government
HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide
HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide Abstract This guide describes the Virtualization Monitor (vmon), an add-on service module of the HP Intelligent Management
PUBLIC Model Manager User Guide
SAP Predictive Analytics 2.4 2015-11-23 PUBLIC Content 1 Introduction....4 2 Concepts....5 2.1 Roles....5 2.2 Rights....6 2.3 Schedules....7 2.4 Tasks.... 7 3....8 3.1 My Model Manager....8 Overview....
DiskBoss. File & Disk Manager. Version 2.0. Dec 2011. Flexense Ltd. www.flexense.com [email protected]. File Integrity Monitor
DiskBoss File & Disk Manager File Integrity Monitor Version 2.0 Dec 2011 www.flexense.com [email protected] 1 Product Overview DiskBoss is an automated, rule-based file and disk manager allowing one to
Test Automation Integration with Test Management QAComplete
Test Automation Integration with Test Management QAComplete This User's Guide walks you through configuring and using your automated tests with QAComplete's Test Management module SmartBear Software Release
Acronis Backup & Recovery 10 Server for Linux. Update 5. Installation Guide
Acronis Backup & Recovery 10 Server for Linux Update 5 Installation Guide Table of contents 1 Before installation...3 1.1 Acronis Backup & Recovery 10 components... 3 1.1.1 Agent for Linux... 3 1.1.2 Management
User Guidance. CimTrak Integrity & Compliance Suite 2.0.6.19
CimTrak Integrity & Compliance Suite 2.0.6.19 Master Repository Management Console File System Agent Network Device Agent Command Line Utility Ping Utility Proxy Utility FTP Repository Interface User Guidance
SWsoft, Inc. Plesk File Server. Administrator's Guide. Plesk 7.5 Reloaded
SWsoft, Inc. Plesk File Server Administrator's Guide Plesk 7.5 Reloaded (c) 1999-2005 ISBN: N/A SWsoft Inc 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Tel: +1 (703) 815 5670 Fax: +1 (703)
Backup Solutions for Domino on Linux
e-promag.com web exclusive Backup Solutions for Domino on Linux B Y R E E D G E S T E L A N D The search is on to find a solution for running online backups for Domino on Linux. Lotus has been supporting
Discovery Guide. Secret Server. Table of Contents
Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...
