Secure Interaction with an Client

Size: px
Start display at page:

Download "Secure Interaction with an Email Client"

Transcription

1 Secure Interaction with an Client Bernhard Beckert Gerd Beuster Universität Koblenz-Landau June 15th, 2006

2 Verisoft Consortium Beckert Beuster (UKL) Secure Client June 15th, / 32

3 Verisoft Consortium Goal: Pervasively Verified Systems Beckert Beuster (UKL) Secure Client June 15th, / 32

4 Academic System Overview Client (User Interface) Signature Module Application Software Com piler Mail Server (SMTP) TCP/IP Networking / Communication Operating System Micro kernel Memory Manage ment System Software Tools Network Screen Keyboard File System Processor Host System Hardware Beckert Beuster (UKL) Secure Client June 15th, / 32

5 Our Involvement & This Talk Our Involvement Development of a Secure Client PhD thesis about secure user interfaces This talk Demo of the System Formalizing UI security feature Beckert Beuster (UKL) Secure Client June 15th, / 32

6 Verisoft System Demo Demo Beckert Beuster (UKL) Secure Client June 15th, / 32

7 Formalizing HCI Security The user should know what the system is doing. Consistency Correspondence between system state and user s opinion about system state Not guaranteed even if... the system does show the relevant information (state display conformance). the user interprets the information correctly. Asynchronous updates can lead to inconsistencies! Beckert Beuster (UKL) Secure Client June 15th, / 32

8 Formalizing HCI Security The user should know what the system is doing. Consistency Correspondence between system state and user s opinion about system state Not guaranteed even if... the system does show the relevant information (state display conformance). the user interprets the information correctly. Asynchronous updates can lead to inconsistencies! Beckert Beuster (UKL) Secure Client June 15th, / 32

9 Formalizing HCI Security The user should know what the system is doing. Consistency Correspondence between system state and user s opinion about system state Not guaranteed even if... the system does show the relevant information (state display conformance). the user interprets the information correctly. Asynchronous updates can lead to inconsistencies! Beckert Beuster (UKL) Secure Client June 15th, / 32

10 Example: Client Result of latest command: No new arrived foo edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32

11 Example: Client Result of latest command: No new arrived foo edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32

12 How to Guarantee Consistency? We need... a formal method to describe HCI a formal definition of consistency formal model(s) of interaction(s) Beckert Beuster (UKL) Secure Client June 15th, / 32

13 Formal Method Formal Method Describe user and application by IOLTS s σ! s σ! 1 2 s 3 σ? Σ? Σ! s 0 σ? s 4 σ! s 5 σ! s 6 Define security properties by LTL formulae. Beckert Beuster (UKL) Secure Client June 15th, / 32

14 Formal Method Formal Method Describe user and application by IOLTS s σ! s σ! 1 2 s 3 σ? Σ? Σ! s 0 σ? s 4 σ! s 5 σ! s 6 Define security properties by LTL formulae. (see also B. Beckert and G. Beuster, A Method for Formalizing, Analyzing, and Verifying Secure User Interfaces at ICFEM 2006) Beckert Beuster (UKL) Secure Client June 15th, / 32

15 Basic Model Basic Model Application User AppOut CMD Beckert Beuster (UKL) Secure Client June 15th, / 32

16 Formal definition of consistency The user knows what the system is doing. Let... critical hold in all critical states of the application a 0,..., a n represent critical properties of the application u 0,..., u n representing the user s assumptions about these properties Then consistency is defined as... G(critical ((a 0 u 0 ) (a 1 u 1 ) (a n u n ))) Beckert Beuster (UKL) Secure Client June 15th, / 32

17 Formal definition of consistency The user knows what the system is doing. Let... critical hold in all critical states of the application a 0,..., a n represent critical properties of the application u 0,..., u n representing the user s assumptions about these properties Then consistency is defined as... G(critical ((a 0 u 0 ) (a 1 u 1 ) (a n u n ))) Beckert Beuster (UKL) Secure Client June 15th, / 32

18 Formal definition of consistency The user knows what the system is doing. Let... critical hold in all critical states of the application a 0,..., a n represent critical properties of the application u 0,..., u n representing the user s assumptions about these properties Then consistency is defined as... G(critical ((a 0 u 0 ) (a 1 u 1 ) (a n u n ))) Beckert Beuster (UKL) Secure Client June 15th, / 32

19 Application Model Application Model Exit quit [out of memory] Run Mode Command Mode H Send Mode Sent send [SUCCESS] Signed sign H [SUCCESS] insert pub. key Unsigned generate key pair edit view quit viewing quit editing Edit Not Changed Changed typing move cursor Receive Mode Checked H check [SUCCESS] Not Checked edit view quit viewing editing Edit Pub. Key Not Changed Changed poll / new arrived typing move cursor Beckert Beuster (UKL) Secure Client June 15th, / 32

20 Basic Model Basic Model Application User AppOut CMD Beckert Beuster (UKL) Secure Client June 15th, / 32

21 Basic Model with Application Basic Model with Application Application User AppOut Run Mode Command Mode Send Mode H insert pub. key generate key pair Sent [SUCCESS] send Signed sign [SUCCESS] Unsigned quit Receive Mode Checked [SUCCESS] check H Not Checked poll / new arrived H edit view quit viewing quit editing edit view quit viewing editing Exit [out of memory] Edit Not Changed Changed typing move cursor Edit Pub. Key Not Changed Changed typing move cursor CMD Beckert Beuster (UKL) Secure Client June 15th, / 32

22 Basic Model with Main Loops insert pub. key generate key pair send [SUCCESS] sign [SUCCESS] check [SUCCESS] quit poll / new arrived edit view quit viewing quit editing edit view quit viewing editing typing typing [out of memory] move cursor move cursor Application Execution Cycle Get Result Exec. CMD! AppOut AppOut? Show Result CMD? AppOut! Get CMD CMD CMD AppOut Application Logic Run Mode Command Mode Send Mode H Receive Mode H Sent Signed Unsigned Checked Not Checked H Exit Edit Not Changed Changed Edit Pub. Key Not Changed Changed Act CMD? CMD! Wait AppOut? CMD Decide Classify AppOut! User Execution Cycle AppOut User Logic Beckert Beuster (UKL) Secure Client June 15th, / 32

23 Example: Client Result of latest command: No new arrived foo edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32

24 Example: Client Result of latest command: No new arrived foo Problem: How does the user know if command execution is completed? edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32

25 Example: Client Result of latest command: No new arrived foo Problem: How does the user know if command execution is completed? Add a status line! edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32

26 Example: Client System: Waiting for input... Result of latest command: No new arrived edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32

27 Example: Client System: Waiting for input... Result of latest command: No new arrived edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32

28 Example: Client System: Waiting for input... Result of latest command: No new arrived Problem: A status line is not enough... edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32

29 Example: Client System: Waiting for input... Result of latest command: No new arrived Problem: A status line is not enough... Add a status key! edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32

30 Example: Client System: Waiting for input... Result of latest command: No new arrived edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32

31 Example: Client System: Waiting for input... Result of latest command: No new arrived edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32

32 Example: Client System: Ready! Result of latest command: No new arrived edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32

33 A Better Model Application Execution Cycle Get Result Exec. AppOut Act Decide CMD! AppOut!= Processing CMD? AppOut? CMD! AppOut! Show Result CMD? Status Busy Begin Wait ESC AppOut! User Execution Cycle AppOut!= Ready! AppOut?= Processing Status! Get CMD AppOut?= Ready! Show Status CMD End Wait Classify CMD?= Status AppOut? Processing Application Logic CMD AppOut CMD AppOut User Logic Beckert Beuster (UKL) Secure Client June 15th, / 32

34 Conclusion Summary Developed formal model of HCI describing TTY applications Defined consistency Showed that common implementations are not consistent Proposed a consistent alternative Integrated with other methods (not shown in this presentation) Beckert Beuster (UKL) Secure Client June 15th, / 32

Chapter 11: Input/Output Organisation. Lesson 06: Programmed IO

Chapter 11: Input/Output Organisation. Lesson 06: Programmed IO Chapter 11: Input/Output Organisation Lesson 06: Programmed IO Objective Understand the programmed IO mode of data transfer Learn that the program waits for the ready status by repeatedly testing the status

More information

SiteCount v2.0 Revised: 10/30/2009

SiteCount v2.0 Revised: 10/30/2009 SiteCount v2.0 Revised: 10/30/2009 Copyright 2009, Traf-SYS, Inc. Contents Introduction... 4 Requirements... 4 General... 4 Software... 4 Hardware... 4 Fulfilling Software Requirements... 5 Installation

More information

rs-ba1 remote control software quick reference guide

rs-ba1 remote control software quick reference guide rs-ba1 remote control software quick reference guide Contents Requirements... 2 Firewall Considerations... 3 Connecting to the RS-BA1 Locally... 4 Finding the IP of your Base Station Computer... 4 Setting

More information

M5281/M5283. Serial ATA and Parallel ATA Host Controller. RAID BIOS/Driver/Utility Manual

M5281/M5283. Serial ATA and Parallel ATA Host Controller. RAID BIOS/Driver/Utility Manual Serial ATA and Parallel ATA Host Controller Rev. 0.96 December 03, 2003 Copyright 2003 ULi Electronics Inc. All rights reserved. COPYRIGHT NOTICE All information in this document is considered ULi Electronics

More information

Remote PC Guide Series - Volume 2a

Remote PC Guide Series - Volume 2a Document Version: 2013-03-04 This guide provides hardware model-specific guidance in server configuration, with BIOS and RAID configuration instructions for the Dell R710. This guide is part of a multi-volume

More information

Required Virtual Interface Maps to... mgmt0. virtual network = mgmt0 wan0. virtual network = wan0 mgmt1. network adapter not connected lan0

Required Virtual Interface Maps to... mgmt0. virtual network = mgmt0 wan0. virtual network = wan0 mgmt1. network adapter not connected lan0 VXOA VIRTUAL APPLIANCES Microsoft Hyper-V Hypervisor Router Mode (Out-of-Path Deployment) 2013 Silver Peak Systems, Inc. Assumptions Windows 2008 server is installed and Hyper-V server is running. This

More information

USING FILERELICATIONPRO TO REPLICATE SQL SERVER

USING FILERELICATIONPRO TO REPLICATE SQL SERVER USING FILERELICATIONPRO TO REPLICATE SQL SERVER Abstract FileReplicationPro (FRP) can be used to backup your SQL Server databases. The replication procedure is not as straight forward as replicating other

More information

CRM Connector Installation & Integration USER GUIDE

CRM Connector Installation & Integration USER GUIDE CRM Connector Installation & Integration USER GUIDE TABLE OF CONTENTS Table Of Contents Installation... 4 System Tray Icon.... 5 Salesforce.com Integration.... 6 Salesforce Security Token.... 6 Configuration....

More information

Lab 4.5.2 Diagramming Intranet Traffic Flows

Lab 4.5.2 Diagramming Intranet Traffic Flows Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1

More information

IBM Tivoli Monitoring V6.2.3, how to debug issues with Windows performance objects issues - overview and tools.

IBM Tivoli Monitoring V6.2.3, how to debug issues with Windows performance objects issues - overview and tools. IBM Tivoli Monitoring V6.2.3, how to debug issues with Windows performance objects issues - overview and tools. Page 1 of 13 The module developer assumes that you understand basic IBM Tivoli Monitoring

More information

Outlook Email. User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA 19107 215-503-7500

Outlook Email. User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA 19107 215-503-7500 Outlook Email User Guide IS TRAINING CENTER 833 Chestnut St, Suite 600 Philadelphia, PA 19107 215-503-7500 This page intentionally left blank. TABLE OF CONTENTS Getting Started... 3 Opening Outlook...

More information

CS420: Operating Systems OS Services & System Calls

CS420: Operating Systems OS Services & System Calls NK YORK COLLEGE OF PENNSYLVANIA HG OK 2 YORK COLLEGE OF PENNSYLVAN OS Services & System Calls James Moscola Department of Physical Sciences York College of Pennsylvania Based on Operating System Concepts,

More information

CHAPTER 6: CLASSIC CLIENT OPTION

CHAPTER 6: CLASSIC CLIENT OPTION Chapter 6: Classic Client Option CHAPTER 6: CLASSIC CLIENT OPTION Objectives Introduction The objectives are: Discuss the Classic Client software requirements and hardware recommendation. Install the Classic

More information

MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1

MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1 MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1 Course Number: 5047B Course Length: 3 Days Certification Exam This course will help you prepare for the following Microsoft

More information

Axapta Object Server MICROSOFT BUSINESS SOLUTIONS AXAPTA

Axapta Object Server MICROSOFT BUSINESS SOLUTIONS AXAPTA MICROSOFT BUSINESS SOLUTIONS AXAPTA Axapta Object Server Microsoft Business Solutions Axapta Object Server minimises bandwidth requirements and ensures easy, efficient and homogeneous client deployment.

More information

Linux. Installing Linux on Power Systems servers

Linux. Installing Linux on Power Systems servers Linux Installing Linux on Power Systems servers Linux Installing Linux on Power Systems servers Note Before using this information and the product it supports, read the information in Notices on page

More information

Operating System Structures

Operating System Structures COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating

More information

User Manual Version 1.25

User Manual Version 1.25 User Manual Version 1.25 1 INDEX 1 INTRODUCTION... 3 2 INSTALLATION... 3 3 SOFTWARE ACTIVATION... 6 Automatic Registration... 6 Activation by E-mail... 8 Activation by phone call... 9 4 SCALE CONFIGURATION...

More information

I N S T A L L A T I O N M A N U A L

I N S T A L L A T I O N M A N U A L I N S T A L L A T I O N M A N U A L 2015 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA is

More information

PRIMEQUEST Integration

PRIMEQUEST Integration C122-E062-01EN PRIMEQUEST Integration for Microsoft Operations Manager FUJITSU LIMITED Preface Purpose This manual explains the MOM management pack (PRIMEQUEST Server Agent MOM Connector), a function

More information

Remote PC Guide Series - Volume 2b

Remote PC Guide Series - Volume 2b Document Version: 2013-09-06 R720 This guide provides hardware model-specific guidance in server configuration, with BIOS and RAID configuration instructions for the Dell R720. This guide is part of a

More information

Introduction to Operating Systems. Perspective of the Computer. System Software. Indiana University Chen Yu

Introduction to Operating Systems. Perspective of the Computer. System Software. Indiana University Chen Yu Introduction to Operating Systems Indiana University Chen Yu Perspective of the Computer System Software A general piece of software with common functionalities that support many applications. Example:

More information

5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007

5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007 5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007 Course Number: 5054A Course Length: 2 Days Course Overview This 2-day course teaches messaging engineers to

More information

Using Actian PSQL as a Data Store with VMware vfabric SQLFire. Actian PSQL White Paper May 2013

Using Actian PSQL as a Data Store with VMware vfabric SQLFire. Actian PSQL White Paper May 2013 Using Actian PSQL as a Data Store with VMware vfabric SQLFire Actian PSQL White Paper May 2013 Contents Introduction... 3 Prerequisites and Assumptions... 4 Disclaimer... 5 Demonstration Steps... 5 1.

More information

Operating Systems. www.fetac.ie. Module Descriptor

Operating Systems. www.fetac.ie. Module Descriptor The Further Education and Training Awards Council (FETAC) was set up as a statutory body on 11 June 2001 by the Minister for Education and Science. Under the Qualifications (Education & Training) Act,

More information

VisiCount Installation. Revised: 8/28/2012

VisiCount Installation. Revised: 8/28/2012 VisiCount Installation Revised: 8/28/2012 Introduction... 4 Requirements... 4 General... 4 Server Software... 4 Server Hardware... 4 Fulfilling Server Software Requirements... 5 Installation of Microsoft

More information

How To Use The Case Diagnostic Tool On A Computer Or Computer

How To Use The Case Diagnostic Tool On A Computer Or Computer Trend Micro Case Diagnostic Tool 2.5 Getting Started Guide LEGAL NOTICE: Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

More information

Tool Registration and Software Authorization

Tool Registration and Software Authorization Tool Registration and Software Authorization Tool Registration Note: All screen displays shown in this document are examples only. Your display will vary from these. A one-time registration is required

More information

Programming and Using the Courier V.Everything Modem for Remote Operation of DDF6000

Programming and Using the Courier V.Everything Modem for Remote Operation of DDF6000 Programming and Using the Courier V.Everything Modem for Remote Operation of DDF6000 1.0 Introduction A Technical Application Note from Doppler System July 5, 1999 Version 3.x of the DDF6000, running version

More information

Installation and Setup

Installation and Setup Installation and Setup Xoom INDEX Xoom Features/Pictures. Page 2 Accessories.. Page 2 Accessing Users Guides... Page 3 itap RDP mouse modes... Page 3 Setup for Xoom use in the office (Office wireless network)

More information

Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5

Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 What is this document for? This document is a Step-by-Step Guide that can be used to quickly install Spam Marshall SpamWall on Exchange

More information

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29 Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your

More information

Frequency, definition Modifiability, existence of multiple operations & strategies

Frequency, definition Modifiability, existence of multiple operations & strategies Human Computer Interaction Intro HCI 1 HCI's Goal Users Improve Productivity computer users Tasks software engineers Users System Cognitive models of people as information processing systems Knowledge

More information

Example of Standard API

Example of Standard API 16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface

More information

ITA Mail Archive Setup Guide

ITA Mail Archive Setup Guide This version of ITA Mail Archive is optimized to archive emails on both Microsoft Exchange 2000 and 2003 and 2007 servers. It is highly recommended that ITA Mail Archive should run on a server other than

More information

Computer-System Architecture

Computer-System Architecture Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection General System Architecture 2.1 Computer-System Architecture 2.2 Computer-System

More information

[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1

[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1 [HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1 How to Recover an infiniti/evolution Modem Software Reference idx 3.0.0.0 (12.0.0.0) Updated: November 17 th 2011 Overview Recovery Procedures

More information

Intel DPDK Boosts Server Appliance Performance White Paper

Intel DPDK Boosts Server Appliance Performance White Paper Intel DPDK Boosts Server Appliance Performance Intel DPDK Boosts Server Appliance Performance Introduction As network speeds increase to 40G and above, both in the enterprise and data center, the bottlenecks

More information

FX-BTCVT Bluetooth Commissioning Converter Commissioning Guide

FX-BTCVT Bluetooth Commissioning Converter Commissioning Guide FX-BTCVT Bluetooth Commissioning Converter Commissioning Guide FX-BTCVT-1 (Bluetooth Commissioning Converter) Code No. LIT-12011665 Issued December 5, 2014 Refer to the QuickLIT website for the most up-to-date

More information

AMT Implementation on a UTC RETAIL 3170 POS

AMT Implementation on a UTC RETAIL 3170 POS AMT Implementation on a UTC RETAIL 3170 POS Controlling POS systems using Intel AMT Features UTC RETAIL 1 November 19, 2012 Scope The document was written for use by UTC RETAIL 3170 POS customers to enable

More information

5.4.8 Optional Lab: Managing System Files with Built-in Utilities in Windows 7

5.4.8 Optional Lab: Managing System Files with Built-in Utilities in Windows 7 5.4.8 Optional Lab: Managing System Files with Built-in Utilities in Windows 7 Introduction Print and complete this lab. In this lab, you will use Windows built-in utilities to gather information about

More information

Yubico YubiHSM Monitor

Yubico YubiHSM Monitor Yubico YubiHSM Monitor Test utility for the YubiHSM Document Version: 1.1 May 24, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship

More information

TCP/IP Networking, Part 2: Web-Based Control

TCP/IP Networking, Part 2: Web-Based Control TCP/IP Networking, Part 2: Web-Based Control Microchip TCP/IP Stack HTTP2 Module 2007 Microchip Technology Incorporated. All Rights Reserved. Building Embedded Web Applications Slide 1 Welcome to the next

More information

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router 1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains

More information

Sage Grant Management System Requirements

Sage Grant Management System Requirements Sage Grant Management System Requirements You should meet or exceed the following system requirements: One Server - Database/Web Server The following system requirements are for Sage Grant Management to

More information

Configuring a YubiKey for the YubiCloud

Configuring a YubiKey for the YubiCloud Configuring a YubiKey for the YubiCloud With the YubiKey Cross-Platform Personalization Tool April 9, 2013 Configuring a YubiKey for the YubiCloud 2012 Yubico. All rights reserved. Page 1 of 8 Introduction

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Adaptive Log Exporter Users Guide

Adaptive Log Exporter Users Guide IBM Security QRadar Version 7.1.0 (MR1) Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page page 119. Copyright IBM Corp. 2012,

More information

Introduction: Implementation of the MVI56-MCM module for modbus communications:

Introduction: Implementation of the MVI56-MCM module for modbus communications: Introduction: Implementation of the MVI56-MCM module for modbus communications: Initial configuration of the module should be done using the sample ladder file for the mvi56mcm module. This can be obtained

More information

Installation and Program Essentials

Installation and Program Essentials CS PROFESSIONAL SUITE ACCOUNTING PRODUCTS Installation and Program Essentials version 2010.x.x TL 22538 (5/25/10) Copyright Information Text copyright 1998 2010 by Thomson Reuters/Tax & Accounting. All

More information

Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.

Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont. Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures

More information

How To Use Mview On A Powerline 2.2 (Powerline) On A Pc Or Macbook 2 (Powerplst) On An Iphone Or Ipa 2 (Aldo) On Your Iphon 2 (

How To Use Mview On A Powerline 2.2 (Powerline) On A Pc Or Macbook 2 (Powerplst) On An Iphone Or Ipa 2 (Aldo) On Your Iphon 2 ( mview for V8.53 and Later Motion Software mview is an elevator monitoring application. Through 1 Ethernet, the computer running mview may be connected directly to a single Motion 2000 or Motion 4000 controller

More information

Using RAID Admin and Disk Utility

Using RAID Admin and Disk Utility Using RAID Admin and Disk Utility Xserve RAID Includes instructions for creating RAID arrays and monitoring Xserve RAID systems K Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. Under

More information

User Guide. BlackBerry Storm 9530 Smartphone. Version: 4.7

User Guide. BlackBerry Storm 9530 Smartphone. Version: 4.7 BlackBerry Storm 9530 Smartphone Version: 4.7 SWD-490426-0909090640-001 Contents Shortcuts... 9 BlackBerry basics shortcuts... 9 Phone shortcuts... 9 Camera shortcuts... 9 Media shortcuts... 9 Typing shortcuts...

More information

Virtual DHX Driver Help Virtual DHX Driver for Allen-Bradley Networks

Virtual DHX Driver Help Virtual DHX Driver for Allen-Bradley Networks Virtual DHX Driver Help Virtual DHX Driver for Allen-Bradley Networks Version 8 VIRTUAL DHX DRIVER HELP Virtual DHX Driver for Allen-Bradley Networks Version 8 for Windows 8/7/Vista/XP/Server 2012/Server

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Analysis to develop an ISCSI Layer inside Microsoft Windows NT/2K/XP

Analysis to develop an ISCSI Layer inside Microsoft Windows NT/2K/XP Analysis to develop an ISCSI Layer inside Microsoft Windows NT/2K/XP Ing. Franco Ometti While1 S.r.l. Description The activity is related to develop a special device driver that implements a SCSI miniport

More information

Image Verification. Finding Feature Information. Restrictions for Image Verification

Image Verification. Finding Feature Information. Restrictions for Image Verification The feature allows users to automatically verify the integrity of Cisco IOS images. Thus, users can be sure that the image is protected from accidental corruption, which can occur at any time during transit,

More information

How To Write A Profibus Dpl (Profibus) Program

How To Write A Profibus Dpl (Profibus) Program SIMATIC NET DP Base Programming Interface for CP 5613/CP 5614 Manual Preface, Contents Basic Steps in Creating a DP Application 1 Overview of PROFIBUS DP 2 Overview of the DP Base Interface 3 Description

More information

RDM+ Remote Desktop for Mobiles For Blackberry Playbook

RDM+ Remote Desktop for Mobiles For Blackberry Playbook RDM+ Remote Desktop for Mobiles For Blackberry Playbook Getting Started Guide RDM+ (Remote Desktop for Mobiles) is an application that makes it possible to control your desktop or laptop remotely from

More information

Intel Server Board Platform Confidence Test Installation and Operating Instructions

Intel Server Board Platform Confidence Test Installation and Operating Instructions Intel Server Board Platform Confidence Test Installation and Operating Instructions i Intel Corporation 2002-2009 Information in this document is provided in connection with Intel products. No license,

More information

ClockSync DAYTIME (RFC867) v9 Module Application Guide

ClockSync DAYTIME (RFC867) v9 Module Application Guide Module Application Guide Description This utility allows a Crestron 2-series processor to synchronize its internal clock with a public NIST Internet time server using an implementation of the DAYTIME protocol.

More information

HotelTV2. Easy Start Guide REV A0.6 D0254. 2014 October. Web : http://support.vestek.com.tr Mail : [email protected] Tel : +90 212 286 01 06

HotelTV2. Easy Start Guide REV A0.6 D0254. 2014 October. Web : http://support.vestek.com.tr Mail : support@vestek.com.tr Tel : +90 212 286 01 06 D0254 HotelTV2 Easy Start Guide 2014 October 1. Revision History Date Owner Version Reason & Change 09 May 2012 Görkem Giray Bora Tunçer A0.1 Initial Creation 29 June 2012 Görkem Giray A0.2 Structure changed

More information

Microsoft Access is an outstanding environment for both database users and professional. Introduction to Microsoft Access and Programming SESSION

Microsoft Access is an outstanding environment for both database users and professional. Introduction to Microsoft Access and Programming SESSION 539752 ch01.qxd 9/9/03 11:38 PM Page 5 SESSION 1 Introduction to Microsoft Access and Programming Session Checklist Understanding what programming is Using the Visual Basic language Programming for the

More information

Quectel Cellular Engine

Quectel Cellular Engine Cellular Engine GSM FTP AT Commands GSM_FTP_ATC_V1.1 Document Title GSM FTP AT Commands Version 1.1 Date 2010-12-28 Status Document Control ID Release GSM_FTP_ATC_V1.1 General Notes offers this information

More information

CSC 2405: Computer Systems II

CSC 2405: Computer Systems II CSC 2405: Computer Systems II Spring 2013 (TR 8:30-9:45 in G86) Mirela Damian http://www.csc.villanova.edu/~mdamian/csc2405/ Introductions Mirela Damian Room 167A in the Mendel Science Building [email protected]

More information

Chancery SMS 7.5.0 Database Split

Chancery SMS 7.5.0 Database Split TECHNICAL BULLETIN Microsoft SQL Server replication... 1 Transactional replication... 2 Preparing to set up replication... 3 Setting up replication... 4 Quick Reference...11, 2009 Pearson Education, Inc.

More information

Using Bluetooth-Enabled PosiTector 6000 with Statistical Process Control Software

Using Bluetooth-Enabled PosiTector 6000 with Statistical Process Control Software Using Bluetooth-Enabled PosiTector 6000 with Statistical Process Control Software SPC programs are available from third party vendors that enhance the measurement capabilities of the PosiTector 6000. With

More information

D-Link DAP-1360 Repeater Mode Configuration

D-Link DAP-1360 Repeater Mode Configuration D-Link DAP-1360 Repeater Mode Configuration Outline 1. Package Contents 2. System Requirements 3. Hardware Overview Connections LED s WPS LED/Button 4. Default Settings 5. Configuring your LAN Adapter

More information

THE BUSINESS VALUE OF AN ERP SYSTEM

THE BUSINESS VALUE OF AN ERP SYSTEM THE BUSINESS VALUE OF AN ERP SYSTEM AJMAL BEG THE BUSINESS VALUE OF AN ERP SYSTEM AJMAL BEG ii Copyright c 2010 by Ajmal Beg. All rights reserved. This technology described in this publication is based

More information

Backup & Restore Guide

Backup & Restore Guide The email Integrity Company Sendio Email Security Platform Appliance Backup & Restore Guide Sendio, Inc. 4911 Birch St. Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com 2010 Sendio,

More information

SPAMfighter SMTP Anti Spam Server

SPAMfighter SMTP Anti Spam Server SPAMfighter SMTP Anti Spam Server Users Manual Copyright SPAMfighter ApS 2005 Revised 4/27/2006 1 Table of Contents 2 Terminology...3 3 Technology...4 3.1 Tunneling and Interception...4 3.2 Content Classification...5

More information

CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS

CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating? A collection of software modules to assist programmers in enhancing efficiency, flexibility, and robustness An Extended Machine from the users

More information

SUPER SMC LCD. User's Guide. Revision 1.0

SUPER SMC LCD. User's Guide. Revision 1.0 SUPER SMC LCD User's Guide Revision 1.0 The information in this User s Manual has been carefully reviewed and is believed to be accurate. The vendor assumes no responsibility for any inaccuracies that

More information

Linux Driver Devices. Why, When, Which, How?

Linux Driver Devices. Why, When, Which, How? Bertrand Mermet Sylvain Ract Linux Driver Devices. Why, When, Which, How? Since its creation in the early 1990 s Linux has been installed on millions of computers or embedded systems. These systems may

More information

Getting Started with Ascent Xtrata 1.7

Getting Started with Ascent Xtrata 1.7 Getting Started with Ascent Xtrata 1.7 10300582-000 Revision A Copyright Copyright 2006 Kofax Image Products, Inc. All Rights Reserved. Printed in USA. The information contained in this document is the

More information

Ways to Use USB in Embedded Systems

Ways to Use USB in Embedded Systems Ways to Use USB in Embedded Systems by Yingbo Hu, R&D Embedded Engineer and Ralph Moore, President of Micro Digital Universal Serial Bus (USB) is a connectivity specification that provides ease of use,

More information

The care and feeding of Pythons at the Redmond Zoo. (Using Micro Python and pyboard with Windows)

The care and feeding of Pythons at the Redmond Zoo. (Using Micro Python and pyboard with Windows) The care and feeding of Pythons at the Redmond Zoo. (Using Micro Python and pyboard with Windows) Introduction. Pyboard connects to Windows using a standard micro USB cable. It can operate in four different

More information

Technical Manual Fifth Edition

Technical Manual Fifth Edition Technical Manual Fifth Edition SPECIAL NOTICE TOLL RESTRICTION The Toll Restriction feature of the Iwatsu Enterprise-CS / ADIX APS is one method of preventing fraud (i.e., the making of unauthorized toll

More information

Archiving with MS Exchange Server

Archiving with MS Exchange Server Archiving with MS Exchange Server Copyright 2011 by REDDOXX GmbH REDDOXX GmbH Neue Weilheimer Str. 14 73230 Kirchheim Fon: +49 (0)7021 92846-0 Fax: +49 (0)7021 92846-99 email: [email protected] Internet:

More information

FirewallTM. isecurity. Out-of-the Box. The Network Security Component of. Version 15. Copyright Raz-Lee Security Ltd.

FirewallTM. isecurity. Out-of-the Box. The Network Security Component of. Version 15. Copyright Raz-Lee Security Ltd. FirewallTM The Network Security Component of isecurity Out-of-the Box Version 15 Copyright Raz-Lee Security Ltd. Updated: 02/09/2011 This guide is intended to provide as a quick beginning to the principal

More information

Lab 4.5.4 Diagramming External Traffic Flows

Lab 4.5.4 Diagramming External Traffic Flows Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1

More information

International Journal of Software and Web Sciences (IJSWS) www.iasir.net. GPS and GSM Based Database Systems for User Access

International Journal of Software and Web Sciences (IJSWS) www.iasir.net. GPS and GSM Based Database Systems for User Access International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

SNAP Printer Web Server Users Manual

SNAP Printer Web Server Users Manual User s Manual SNAP Printer Web Server Users Manual AVERY DENNISON 29 April 2013 Version 1.2 Change List Version Description 1.0 Initial Release 1.1 Updated to add the Batch ID and Batch Count to the main

More information

1. Installing and configuring APC UPS Management

1. Installing and configuring APC UPS Management 1. Installing and configuring APC UPS Management 1.1. Objectives and Overview In this lab, you will learn how to install and configure the APC UPS power management suite and the Web/SNMP Management Card.

More information

1. Requirements for Network Installation on 840D

1. Requirements for Network Installation on 840D Content 1. Requirements for Network Installation on 840D... 1 2. Installing the Network... 2 2.1. Enable IRQ 11 for the 3C509 ISA network card in BIOS... 2 2.2. Configuring the 3COM Etherlink III COMBO

More information

CUSTOMER RELEASE NOTES

CUSTOMER RELEASE NOTES RS Switch Router Version 2.0.1.3 January 2002 INTRODUCTION: This document provides specific information for version 2.0.1.3 for the RS Switch Router family of products. It is recommended that one thoroughly

More information

Installation Guide for Workstations

Installation Guide for Workstations Installation Guide for Workstations Copyright 1998-2005, E-Z Data, Inc. All Rights Reserved. No part of this documentation may be copied, reproduced, or translated in any form without the prior written

More information

73S1215F, 73S1217F Device Firmware Upgrade Host Driver/Application Development User s Guide April 27, 2009 Rev. 1.00 UG_12xxF_029

73S1215F, 73S1217F Device Firmware Upgrade Host Driver/Application Development User s Guide April 27, 2009 Rev. 1.00 UG_12xxF_029 Simplifying System Integration TM 73S1215F, 73S1217F Device Firmware Upgrade Host Driver/Application Development User s Guide April 27, 2009 Rev. 1.00 UG_12xxF_029 73S1215, 73S1217F DFU Host Driver/Application

More information

EPIC 950 THERMAL TICKET PRINTER

EPIC 950 THERMAL TICKET PRINTER EPIC 950 THERMAL TICKET PRINTER Software Reference Guide www.transac-tech.com 2 Contacting Information / Serial Plate Info TransAct Technologies Incorporated is the manufacturer of Ithaca brand POS, Banking,

More information

EE8205: Embedded Computer System Electrical and Computer Engineering, Ryerson University. Multitasking ARM-Applications with uvision and RTX

EE8205: Embedded Computer System Electrical and Computer Engineering, Ryerson University. Multitasking ARM-Applications with uvision and RTX EE8205: Embedded Computer System Electrical and Computer Engineering, Ryerson University Multitasking ARM-Applications with uvision and RTX 1. Objectives The purpose of this lab is to lab is to introduce

More information

Embedded Programming in C/C++: Lesson-1: Programming Elements and Programming in C

Embedded Programming in C/C++: Lesson-1: Programming Elements and Programming in C Embedded Programming in C/C++: Lesson-1: Programming Elements and Programming in C 1 An essential part of any embedded system design Programming 2 Programming in Assembly or HLL Processor and memory-sensitive

More information

MCN Health Monitor. The finger on the pulse of your critical systems. David Tayler Service Engineer, OSISoft

MCN Health Monitor. The finger on the pulse of your critical systems. David Tayler Service Engineer, OSISoft MCN Health Monitor The finger on the pulse of your critical systems David Tayler Service Engineer, OSISoft MCN Health Monitor Today s presentation Introduction Description Interfaces Tag Builders Client

More information

Getting Started 2. Inserting a Digital Signature Field without Signing 3. Signing an Unsigned Digital Signature Field 3

Getting Started 2. Inserting a Digital Signature Field without Signing 3. Signing an Unsigned Digital Signature Field 3 CoSign Quick Guide Signing Microsoft Office 2007/2010 Documents Contents Getting Started 2 Inserting a Digital Signature Field without Signing 3 Signing an Unsigned Digital Signature Field 3 Validating

More information

The Helios Microsoft Windows Server

The Helios Microsoft Windows Server The Helios Microsoft Windows Server COPYRIGHT This document Copyright 1992 Distributed Software Limited. All rights reserved. This document may not, in whole or in part, be copied, photocopied, reproduced,

More information