Remote Administrative Trojan/Tool (RAT)
|
|
|
- Ross Daniels
- 10 years ago
- Views:
Transcription
1 Available Online at International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN X IJCSMC, Vol. 3, Issue. 3, March 2014, pg RESEARCH ARTICLE Remote Administrative Trojan/Tool (RAT) Manjeri N. Kondalwar [1], Prof. C.J. Shelke [2] 1 M.E. [C.S.E.] Ist year, P. R. Patil College of Engineering, Amravati 2 Head of the Department, Information Technology, P. R. Patil College of Engineering, Amravati 1 [email protected] 2 [email protected] Abstract- Remote Administration Tool (RAT) allowing a potentially malicious user to remotely control the system. A Remote Administration Tool is remote control software that when installed on a computer it allows a remote computer to take control of it. A Remote Administration Trojan (RAT) allows an attacker to remotely control a computing system and typically consists of a server invisibly running and listening to specific TCP/UDP ports on a victim machine as well as a client acting as the interface between the server and the attacker. The most common means of infection is through attachments. The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting users. Malware developers use chat software as another method to spread their Trojan horse viruses such as Yahoo Messenger and Skype. Remote Administration Trojans (RATs) are malicious pieces of code often embedded in lawful programs through RAT-sanction procedures. They are stealthily planted and help gain access of victim machines, through patches, games, attachments, or even in legitimate-looking binaries. Once installed, RATs perform their unexpected or even unauthorized operations and use an array of techniques to hide their traces to remain invisible and stay on victim systems for the long haul. Keywords- Remote Administration Tool; Trojan; attachments; malicious; Compromised System , IJCSMC All Rights Reserved 482
2 I. INTRODUCTION Remote administration refers to any method of controlling a computer from a remote location. Remote administration is becoming increasingly common and is often used when it is difficult or impractical to be physically near a system in order to use it, or in order to access web material that is not available in one's location. Any computer with an Internet connection, TCP/IP or on a Local Area Network (LAN) can be remotely administered. Remote administration can be used for any cluster of activities and can span multiple categories of servers, such as database servers, middleware servers, etc. Today, providing remote and mobile workers with secure remote access to corporate networks is no longer luxury; it has become a business necessity. Letting employees tap into the office local area network LAN from customer sites, hotels, internet cafe and airport kiosks can greatly increase business efficiency, productivity and job satisfaction. But mobile empowerment has a price, measured in IT administration and network security. As more Information Technology departments centralize and consolidate to reduce cost, many remote sites are left with no on-site IT support. Remote administration of computers is common because of the significant cost benefits; many tasks can be automated, and the administrator does not have to physically visit each computer. Remote control software provides businesses the ability to login and access computers remotely. Utilizing remote control software enables personnel to transfer files or folders quickly and easily, and communicate by instant message, text chat, or voice intercom from any PC, cell phone, wireless PDA. This fast, reliable, easy-to-use pc remote control software saves you hours of running up and down stairs between computers. The remote administrator software allows you to take control of another PC on a LAN, WAN or dial-up connection so you see the remote computer's screen on your monitor and all your mouse movements and keystrokes are directly transferred to the remote machine. These softwares provide fast secure access to remote PC s on Windows platforms. Many remote administrator tools exist in the market and it is difficult to choose what you need. As you are an IT support, you need to choose the software which leads your IT skills. After you determine how much you want to manage remotely, the next step is to select the tools and supporting components you need to accomplish your remote management tasks. II. REMOTE ADMINISTRATION PROGRAMS (TOOL) It is used to remotely connect and manage a single or multiple computers with a variety of tools, such as: 1.Screen/camera capture or control 2. File management (download/upload/execute/etc.) 3. Computer control (power off/on/log off) 4. Registry management (query/add/delete/modify) 5. Shell control (usually piped from command prompt) We have two kind of connection: 1. Direct Connection A direct-connect RAT is a simple set-up where the client connects to a single or multiple servers directly. Stable servers are multithreaded, allowing for multiple clients to be connected, along with increased reliability. 2. Reverse Connection A few advantages of a reverse-connection: 1. No problems with routers blocking incoming data, because the connection is started outgoing for a server 2. Allows for mass-updating of servers by broadcasting commands, because many servers can easily connect to a single client III. CHARACTERISTICS OF RATS As RATs can essentially capture every screen and keystroke, intruders may obtain account information, passwords, and sensitive computing system data. RATs can also spawn arbitrary numbers of processes on specific TCP/UDP ports, impersonate victims, redirect traffic for specific services to other systems, and launch distributed denial of service (DDoS) attacks. RAT Trojans can generally do the following: 1. Download, upload, delete, and rename Files. 2. Format drives 3. Open CD-ROM tray 4. Drop viruses and worms 2014, IJCSMC All Rights Reserved 483
3 5. Log keystrokes 6. Hack passwords, credit card no. 7. View, kill, and start tasks in task Manager. 8. Print text, Play sounds 9. Randomly move and click mouse Some RAT Trojans are pranks that are most likely being controlled by a friend. RATS are generally not harmful, and won't log keystrokes or hack. They usually do whimsical things like flip the screen upside-down, open the CD-ROM tray, and swap mouse buttons. IV. FUNCTIONALITIES OF RATS RATs typically provide attackers with comprehensive command repertoires for file management, process scheduling, and system configuration manipulation. File management features include potentially destructive operations such as delete/move a file or directory on victim systems. The process scheduling component in a RAT permits intruders to create, view, and/or terminate running processes at will. The configuration manipulation element allows RATs to alter the behavior of the victim system by for instance disabling its security features after modifying the Windows Registry. RATs can often operate as device controllers being able to open/close CD-ROMs, disable the mouse and network cards, intercept keystrokes and/or screen snapshots, flip the victim s screen or change its resolution, monitor password dialog boxes and clipboards, capture audio/video of the victim s environment, and finally, crash the victim. The re-direct feature of RATs allows an attacker to chain various services together and ultimately forward the results to a specified destination, making it trivial for intruders to hijack network connections, intercept private data, and inject fake messages. By functioning as packet sniffers, RATs can also monitor a victim s network activities and determine its topology. Furthermore, by scanning the entire system of the victim machine, including its garbage bin, a number of RATs can collect personal information such as user accounts, passwords, credit cards, and addresses. V. DIFFERENT TECHNIQUES USED IN REMOTE ADMINISTRATION TOOLS The purpose of this section is to present the different methods and tools frequently used to administer remote Windows systems, and which let you able to access a command prompt and perform basic system administration, such as view and/or start/kill processes or services, reboot machines and view system logs, observe what is happening on the display, and even run GUI based programs all remotely, that depends on each features of these remote administrator softwares A. MSRPC Win32 legacy management APIs The traditional method to administer remote Windows systems is to use Win32 legacy management APIs. These APIs can be easily identified because they take a server name as one of their parameters, when the server name is empty NULL, the API operates on the local server, and when a server name is specified, the API operates on the specified remote server. For instance, all APIs with names starting with Net such as NetShareEnum() belong to this class of APIs. When used to administer a remote server, these APIs use the MSRPC protocol, Microsoft implementation of the DCE RPC standard with the SMB transport. SMB is the core protocol of Windows networks and operates on both port 139/tcp and 445/tcp. When used as a transport for MSRPC, named pipes inside the IPC$ share are used as RPC services endpoints. Microsoft Remote Procedure Call RPC is an interprocess communication IPC mechanism that enables data exchange and invocation of functionality residing in a different process. That process can be on the same computer, on the local area network LAN, or across the Internet. The Microsoft RPC mechanism uses other IPC mechanisms, such as named pipes, NetBIOS, or Winsock, to establish communications between the client and the server. With RPC, essential program logic and related procedure code can exist on different computers, which is important for distributed applications. B. WMI Windows Management Instrumentation WMI Windows Management Instrumentation is the management framework available in recent Windows systems. WMI is built on the COM Component Object Model infrastructure and can thus operate remotely, using DCOM Distributed COM. In addition, several WMI-based administration tools are available by default on Windows systems to administer remote systems using WMI. Windows Management Instrumentation is an infrastructure that enables you to access and modify standards-based 2014, IJCSMC All Rights Reserved 484
4 information about objects, such as computers, applications, and network components, in your enterprise environment. Using WMI, you can create powerful administration applications to monitor and respond to specific events in your environment. For example, you can create applications to check CPU usage on your Windows Server 2003, based servers and warn you when it exceeds a specified level. Although WMI is a powerful tool for building customized applications, it does require a certain amount of developing time and expertise. Windows Management Instrumentation Command-line WMIC provides a simplified interface to WMI. By using WMIC, you can access WMI based information using the command line or scripts. You can use WMIC from any computer where WMIC is enabled to manage any remote computer. WMIC does not have to be available on the remote computer. Currently, testers of the Windows Management Instrumentation WMI conduct tests through a proprietary GUI interface, which does not allow for negative testing or the logging of events and methods. C. GUI-oriented tools build in windows Many Windows system administrators tend to use graphical remote administration tools that allow access to Windows GUI. Recent Windows systems Windows 2000, Windows XP, Windows Server 2003 natively support Terminal Services, the feature of Windows NT that allow multiple concurrent interactive logon sessions. The network protocol used by Terminal Services is RDP, Remote Desktop Protocol, and operates by default on TCP port Terminal Services rely on Windows authentication to authenticate users establishing remote sessions. In addition, applicative permissions are supported by Terminal Services to restrict the category of users allowed to establish Terminal Services sessions, Permissions tab in the Properties of the RDP-Tcp transport in Terminal Services Configuration MMC snapin. Remote Desktop, included with Windows XP Professional, enables you to connect to your computer across the Internet from virtually any computer, Pocket PC, or Smartphone. Once connected, Remote Desktop gives you mouse and keyboard control over your computer while showing you everything that is happening on the screen. With Remote Desktop, you can leave your computer at the office without losing access to your files, applications, and . Your sales force will be able to access the latest pricing sheet from on the road by using Remote Desktop in Windows XP Professional. With Remote Desktop, you can connect to your work computer from home and access all of your programs, files, and network resources as though you were actually sitting in front of your computer at work. D. CLI-oriented tools CLI Command Line remote administration tools are sometimes needed, for instance to execute non-interactively system administration scripts. PsExec is a convenient tool for Windows systems administrators because it allows to execute processes on a remote system, provided the server service is available TCP ports 445 or 139 and that you have local administrator credentials on the remote system. PsExec first copies its executable, psexesvc.exe, contained in the psexec.exe binary, using SMB, under %systemroot%\system32\, installs the service and starts it. These steps require administrator credentials. If you are logged on with local credentials that also correspond to local administrator credentials, with a domain administrator account or with an account with username and password identical to a local administrator account on the remote system, additional credentials are not needed. Rcmd is a Windows NT 4.0 Resource Kit tool composed of a Windows service and a command line client that supports remote process execution. The Rcmd service opens a named pipe, \pipe\rcmdsvc. The Rcmd client establishes an SMB session to the IPC$ share, authenticated with an account that needs to have the SeInteractiveLogonRight logon right "Allow log on locally". E. Web based tools One of the major issues confronting information systems IS managers today is how to provide secure access to corporate IS resources to people who are physically located outside of the corporate network. In today's increasingly connected society, traveling salespeople, telecommuters and staff working extra hours all need real-time access to resources on corporate networks. For security reasons, these resources, such as databases, sales tools and are usually protected by firewalls so that users outside the corporation cannot access them. Companies are looking for ways to provide cost-effective network access to their remote and mobile employees. Many Remote-control solutions are one way to provide this access. The Web based remote administration tools like GoToMyPC is a hosted service that enables secure browser-based access to any Internet-connected Microsoft Windows-based PC. Features include a screen-sharing Viewer, drag-and-drop File Transfer, Remote Printing, Guest Invite and Chat. Corporate administrators have access to extensive management and reporting tools that enable central control over these remoteaccess services. While choosing a Windows remote administration tool, the following characteristics have to be considered the TCP ports required to use the remote administration feature the supported authentication mechanisms, system authentication implemented by Windows, application level authentication only. 2014, IJCSMC All Rights Reserved 485
5 VI. WORKING MECHANISMS OF RATS Before their installation, RAT-servers can be customized via RAT-provided configuration packages termed binders. This customization includes the setting of the default TCP/UDP ports utilized by RAT servers, definition of auto-start methods, encryption algorithms and designation of initial login passwords. For instance, EditServer and bo2kcfg are the binders for SubSeven v2.2 and Back Orifice 2000 (BO2K) respectively. Prior to being delivered, RAT-servers may be named as software patches or games with the corresponding binders, tricking users into downloading, un-bundling, and finally, executing such malicious programs. During their installation, RAT-servers may piggyback themselves to other legitimate programs, termed hosts, so that they are executed every time their hosts are invoked. In this way, a BO2K-server can install itself as a thread to the host programiexplore.exe. RAT-servers typically run in the background and listen on designated network ports waiting for attackerissued instructions, leaving victims unaware of their damaging activity. There is a multitude of avenues to spread Trojans to victim machines; the most notable for the time being are Instant Messengers (IM) and peer to- peer (P2P) systems. With the help of either MSN-messenger or KaZaA, an attacker may freely visit chat-rooms, scan buddy-lists, or even randomly select candidate victims among encountered active users, and subsequently deliver RATs to victims. Additional delivery options include HTTP servers especially created to disseminate Trojans along with regular web-pages, opening attachments, execution of malware and distributions for software patches, freewares, and/or games. Hence, anti- Trojan systems are easily defeated if their RAT-detection methods cover only a small portion of such propagation channels. The IP addresses, TCP/UDP ports, access passwords, and other information of RATservers can be obtained by intruders through feedback channels. IM/P2P systems, services, and shared folders can even provide auto-notifications between RAT-servers and clients. In Guptachar for example, an attacker may set up an IRCserver via its IRCBOT function by providing a login account nickname; every time a compromised system is activated, it connects to the above IRC-server using nickname to upload the victim s IP-address and port number. Furthermore, most RATs resort to multiple methods to outlive system crashes or reboots and evade AVs/IPSs/IDSs. By editing Registry entries, modifying system files such as win.ini, system.ini and autoexec.bat as well as inserting items on the startup folders, RATs can easily hide and be transparently triggered on every reboot. In this regard, host-based detection methods are inferior to their network-based counterparts as far as RAT detection is concerned. On Windows computers, three tools commonly used by intruders to gain remote access to your computer are 1. BackOrifice Back Orifice (often shortened to BO) is a controversial computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location. The name is a pun on Microsoft BackOffice Server software. 2. Netbus NetBus or Netbus is a software program for remotely controlling a Microsoft Windows computer system over a network. It was created in 1998 and has been very controversial for its potential of being used as a backdoor. 3. Sub Seven (help to hack other pc's). Sub7, or Sub Seven, is the name of a popular Trojan or backdoor program. It is mainly used by script kiddies for causing mischief, such as hiding the computer cursor, changing system settings or loading up pornographic websites. However, it can also be used for more serious criminal applications, such as stealing credit card details with a keystroke logger. These back door or remote administration programs, once installed, allow other people to access and control your computer. Check if any unwanted program found in your system using the process monitor from remote administration programs Tools, you will see whether any foreign programs are running on your computer. If you find some unwanted program, you can terminate it by clicking the 'Terminate Process' button on the Toolbar, so you can find out what programs are started behind your back. VII. CONCLUSION Using remote administrator tools for remote administration of computers running can greatly reduce the administrative overhead. Administrators can access the servers from anywhere, be it inside the computer room. They can start time-consuming administrative jobs, disconnect, a later time to check the progress. Server application and operating system upgrades can be completed remotely, as well tasks that are not usually possible unless the administrator is sitting at the console. Server file system tasks such as copying large files and virus scanning are much more efficient when performed within a remote tools session, rather than using utilities that are executed on a PC client. Remote administrator tool is an affordable tool that any small business owner can purchase without 2014, IJCSMC All Rights Reserved 486
6 having to consult his accountant. Companies offer very flexible licensing policies for Remote administrator tool that cover multiple computers at minimal expense. Remote administrator tool has no special hardware requirements. Even if your old home computer is what you use for running your business, it s fast enough for Remote administrator tool. If the computer runs Windows, Remote administrator tool will run on it, and it will run faster than any other remote control software you can buy. An evaluation is being built on existing remote administrator tools of the availability of features and is expected to be one of the important evaluations used by major high-energy research. This evaluation let customers choose their need of remote administrator tools carefully. REFERENCES [1]. Remote administration tools: A comparative study Anis Ismail, Mohammad Hajjar, Haissam Hajjar Department of Computer Network andtelecommunications Engineering University Institute of Technology Saida, Lebanese University. [2] A Single Interface Remote Administration Tool: Rajesh Ratnala July 2011 [3]. Catching Remote Administration Trojans (RATs) by Zhongqiang Chen, Peter Wei and Alex Delis. [4]. Trojan Horse program Back door and remote administration programs: Ibrahim Al qarout New York Institute of Technology Institute (NYIT)-Jordan. 2014, IJCSMC All Rights Reserved 487
REMOTE ADMINISTRATION TOOLS: A COMPARATIVE STUDY
- 8 JATIT. All rights reserved. REMOTE ADMINISTRATION TOOLS: A COMPARATIVE STUDY Anis Ismail, Mohammad Hajjar, Haissam Hajjar Department of Computer Network and Telecommunications Engineering University
By:XÇzA A TÅÅtÜ ]A `t{åééw
By:XÇzA A TÅÅtÜ ]A `t{åééw By: Supervised By:Dr.. Lo ai Tawalbeh 1 New York Institute of Technology (NYIT)-Jordan s Campus Eng. Ammar Mahmood Introduction A backdoor in a computer system (or cryptosystem
GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop
Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Contents: Executive Summary... 1
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition
Remote Access Technologies: A Comparison of Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition Contents: Executive Summary...1 Remote Access Overview...2 Intended Application... 2 Revolutionary
GoToMyPC and. pcanywhere. expertcity.com. Remote-Access Technologies: A Comparison of
Remote-Access Technologies: A Comparison of GoToMyPC and pcanywhere expertcity.com 1 Table of Contents 1. Executive Summary Remote Control Solutions Revolutionary Solution: Expertcity's GoToMyPC 2. Comparison
Terminal Services Tools and Settings - Terminal Services: %PRODUCT%
Page 1 of 10 Terminal Services Tools and Settings In this section Terminal Services Tools Terminal Services Registry Entries Terminal Services Group Policy Settings Terminal Services WMI Classes Network
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
Spyware Doctor Enterprise Technical Data Sheet
Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
Windows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of
Outpost Network Security
Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It
McAfee.com Personal Firewall
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
Worms, Trojan Horses and Root Kits
Worms, Trojan Horses and Root Kits Worms A worm is a type of Virus that is capable of spreading and replicating itself autonomously over the internet. Famous Worms Morris Internet worm (1988) Currently:
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
Unicenter Remote Control r11
Data Sheet Unicenter Remote Control r11 Unicenter Remote Control TM is a highly reliable and secure application for controlling and supporting remote Windows and Linux systems. It delivers all of the features
Spyware. Summary. Overview of Spyware. Who Is Spying?
Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it
Setting up VPN and Remote Desktop for Home Use
Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3-4 IV. Remote Connect to Your Work Computer...
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Enterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Maximize the Productivity of Your Help Desk With Proxy Networks Remote Support Software
FAST, RELIABLE, & JUST WORKS! White Paper Maximize the Productivity of Your Help Desk With Proxy Networks Remote Support Software Proxy Networks, Inc. 877-PROXY-US or 617-453-2700 www.proxynetworks.com
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
When you listen to the news, you hear about many different forms of computer infection(s). The most common are:
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
Timbuktu Pro for Windows, version 8
Timbuktu Pro for Windows, version 8 Release Notes, version 8.6.8 May 2010 This document contains important information about Timbuktu Pro for Windows, version 8. If you have additional questions, consult
User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
Getting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK
HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK Prepared By: Raghda Zahran, Msc. NYIT-Jordan campus. Supervised By: Dr. Lo ai Tawalbeh. November 2006 Page 1 of 8 THE WAR AGAINST BEING AN INTERMEDIARY
ecopy ShareScan v4.3 Pre-Installation Checklist
ecopy ShareScan v4.3 Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication section describes
Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version.
Release notes version 7.01 Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version. It s available as a free downloadable upgrade to existing version 7.0 customers
6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated IIS Web Servers Group The policies shipped with StormWatch address both application-specific
Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
GoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
Remote Administration of Windows Servers Using Remote Desktop for Administration
Microsoft Windows Server 2003 Technical White Paper Remote Administration of Windows Servers Using Remote Desktop for Administration Microsoft Corporation Published: March 2003 Abstract Remote Desktop
Label Gallery Software for Microsoft Windows Terminal Services and Citrix MetaFrame
Label Gallery Software for Microsoft Windows Terminal Services and Citrix MetaFrame White Paper Version 20100716 2009 SATO CORPORATION. All rights reserved. http://www.satoworldwide.com [email protected]
Setting up VPN and Remote Desktop for Home Use
Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3 IV. Remote Connect to Your Work Computer... 4
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and
Windows PCs & Servers are often the life-blood of your IT investment. Monitoring them is key, especially in today s 24 hour world!
+ Welcome to The Sentry-go Monitoring System v6 Monitoring made quick & easy! Be Proactive, Not Reactive! 3Ds (UK) Limited http://www.sentry-go.com Welcome to Sentry-go Sentry-go is a quick & easy to use
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000
English imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000 Version 1.0.1 731-01873A-EN Contents Overview... 1 Network... 2 Network Environments...2
Jetico Central Manager. Administrator Guide
Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number
How to easily clean an infected computer (Malware Removal Guide)
How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather
NetSupport Manager v11
Remote Support For Any Environment NetSupport Manager v11 NetSupport Manager has been helping organizations optimize the delivery of their IT support services since 1989 and while the use of Remote Control
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Kepware Technologies Remote OPC DA Quick Start Guide (DCOM)
Kepware Technologies Remote OPC DA Quick Start Guide (DCOM) March, 2013 Ref. 03.10 Kepware Technologies Table of Contents 1. Overview... 1 1.1 What is DCOM?... 1 1.2 What is OPCEnum?... 1 2. Users and
Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005
Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department
Using Rsync for NAS-to-NAS Backups
READYNAS INSTANT STORAGE Using Rsync for NAS-to-NAS Backups Infrant Technologies 3065 Skyway Court, Fremont CA 94539 www.infrant.com Using Rsync For NAS-To-NAS Backups You ve heard it before, but it s
Vine Server. v3.1. Manual
Vine Server v3.1 Manual Copyright 2009 TestPlant Inc. Vine Server Manual Trademarks Vine, Vine Viewer, Vine Server, the Vine logo, TestPlant, and the TestPlant logo are trademarks or registered trademarks
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Using TS-ACCESS for Remote Desktop Access
Using TS-ACCESS for Remote Desktop Access Introduction TS-ACCESS is a remote desktop access feature available to CUA faculty and staff who need to access administrative systems or other computing resources
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
Paul McFedries. Home Server 2011 LEASHE. Third Edition. 800 East 96th Street, Indianapolis, Indiana 46240 USA
Paul McFedries Microsoft Windows9 Home Server 2011 LEASHE Third Edition 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of Contents Introduction 1 Part I Unleashing Windows Home Server Configuration
Security in DSL Networks. Issues and Solutions for Small-to-Medium Sized Enterprises
Security in DSL Networks Issues and Solutions for Small-to-Medium Sized Enterprises T E C H N I C A L P A P E R Security in DSL Networks The High Cost of Internet Security Breaches.... 1 Who is Most at
2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual
2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X VirtualDesktopServer Contents 1 2X VirtualDesktopServer Contents 2 URL: www.2x.com E-mail: [email protected] Information in this document
visionapp Remote Desktop 2010 (vrd 2010)
visionapp Remote Desktop 2010 (vrd 2010) Convenient System Management P roduct Information www.vrd2010.com Inhalt 1 Introduction... 1 2 Overview of Administration Tools... 1 2.1 RDP Administration Tools...
How To - Implement Clientless Single Sign On Authentication with Active Directory
How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:
SECURING INFORMATION SYSTEMS
SECURING INFORMATION SYSTEMS (November 9, 2015) BUS3500 - Abdou Illia - Fall 2015 1 LEARNING GOALS Understand security attacks preps Discuss the major threats to information systems. Discuss protection
Airtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
Installation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
WinConnect Server ES User Manual
THINSOFT PTE LTD 23 Tai Seng Drive, #06-00, Singapore 535224, Fax (65) 6289-7308 www.thinsoftinc.com WinConnect Server ES User Manual Document Version 1.0 1 WinConnect Server ES User Manual Copyright 2007
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide
Direct Storage Access Using NetApp SnapDrive Installation & Administration Guide SnapDrive overview... 3 What SnapDrive does... 3 What SnapDrive does not do... 3 Recommendations for using SnapDrive...
GoToMyPC Technology Making Life Simpler for Remote and Mobile Workers
Technology Making Life Simpler for Remote and Mobile Workers Learn why is the most secure, cost-effective and easy-to-use solution for providing remote access to the desktop. www.gotomypc.com Today, secure
Installation and Connection Guide to the simulation environment GLOBAL VISION
Installation and Connection Guide to the simulation environment GLOBAL VISION Hardware and Software Requirements The following hardware specification is recommended for client machines: 2 GHz Pentium class
Table of Contents 1. Introduction... 3 2. Installing Sxblue Server... 4 3. Principle of Operation... 6 4. Server Configuration... 7 4.
SXBlue Server Table of Contents 1. Introduction... 3 2. Installing Sxblue Server... 4 3. Principle of Operation... 6 4. Server Configuration... 7 4.1 Server Status... 7 4.1.1 Info Clients... 8 4.1.2 Infos
for Windows 7 Laplink Software, Inc. Quick Start Guide h t t p : / / w w w. l a p l i n k. c o m / h e l p MN-LLG-EN-15 (REV.
1 for Windows 7 Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/help E-mail: [email protected] Laplink Software, Inc. 14335 NE 24th Street, Suite 201 Bellevue,
NewNet 66 Network Security
NewNet 66 Network Security Spyware... Understanding the Threat What is Spyware? Spyware is an evolved term. In the mid 90s, it was used to refer to high-tech espionage gadgets. By the late 90s, it became
Table of Contents. FleetSoft Installation Guide
FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating
Corporate Account Takeover & Information Security Awareness. Customer Training
Corporate Account Takeover & Information Security Awareness Customer Training No computer system can provide absolute security under all conditions. NO SECURITY MEASURE OR LIST OF SECURITY MEASURES CAN
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
RemotelyAnywhere Getting Started Guide
April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...
RemotelyAnywhere. Security Considerations
RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks
Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information
Getting started Symantec AntiVirus Business Pack Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 Symantec and the Symantec logo are U.S. registered trademarks of Symantec
Remote Support Jumpoint Guide: Unattended Access to Computers in a Network 3. Requirements and Considerations to Install a Jumpoint 4.
Jumpoint Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective owners.
2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies,
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
Installation Guide - Client. Rev 1.5.0
Installation Guide - Client Rev 1.5.0 15 th September 2006 Introduction IntraNomic requires components to be installed on each PC that will use IntraNomic. These IntraNomic Client Controls provide advanced
Remote Administration
Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over
Connecting to Another PC with Remote Assistance
NOTE: ALL OF THE MATERIAL IN THIS DOCUMENT IS FROM WINDOWS XP INSIDE OUT by ED BOTT & CARL SIECHERT PUBLISHED by MICROSOFT PRESS Connecting to Another PC with Remote Assistance If you ve ever tried to
WEB CONFIGURATION. Configuring and monitoring your VIP-101T from web browser. PLANET VIP-101T Web Configuration Guide
WEB CONFIGURATION Configuring and monitoring your VIP-101T from web browser The VIP-101T integrates a web-based graphical user interface that can cover most configurations and machine status monitoring.
Codes of Connection for Devices Connected to Newcastle University ICT Network
Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes
