Secure Interaction with an Client
|
|
|
- Kristian Small
- 10 years ago
- Views:
Transcription
1 Secure Interaction with an Client Bernhard Beckert Gerd Beuster Universität Koblenz-Landau June 15th, 2006
2 Verisoft Consortium Beckert Beuster (UKL) Secure Client June 15th, / 32
3 Verisoft Consortium Goal: Pervasively Verified Systems Beckert Beuster (UKL) Secure Client June 15th, / 32
4 Academic System Overview Client (User Interface) Signature Module Application Software Com piler Mail Server (SMTP) TCP/IP Networking / Communication Operating System Micro kernel Memory Manage ment System Software Tools Network Screen Keyboard File System Processor Host System Hardware Beckert Beuster (UKL) Secure Client June 15th, / 32
5 Our Involvement & This Talk Our Involvement Development of a Secure Client PhD thesis about secure user interfaces This talk Demo of the System Formalizing UI security feature Beckert Beuster (UKL) Secure Client June 15th, / 32
6 Verisoft System Demo Demo Beckert Beuster (UKL) Secure Client June 15th, / 32
7 Formalizing HCI Security The user should know what the system is doing. Consistency Correspondence between system state and user s opinion about system state Not guaranteed even if... the system does show the relevant information (state display conformance). the user interprets the information correctly. Asynchronous updates can lead to inconsistencies! Beckert Beuster (UKL) Secure Client June 15th, / 32
8 Formalizing HCI Security The user should know what the system is doing. Consistency Correspondence between system state and user s opinion about system state Not guaranteed even if... the system does show the relevant information (state display conformance). the user interprets the information correctly. Asynchronous updates can lead to inconsistencies! Beckert Beuster (UKL) Secure Client June 15th, / 32
9 Formalizing HCI Security The user should know what the system is doing. Consistency Correspondence between system state and user s opinion about system state Not guaranteed even if... the system does show the relevant information (state display conformance). the user interprets the information correctly. Asynchronous updates can lead to inconsistencies! Beckert Beuster (UKL) Secure Client June 15th, / 32
10 Example: Client Result of latest command: No new arrived foo edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32
11 Example: Client Result of latest command: No new arrived foo edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32
12 How to Guarantee Consistency? We need... a formal method to describe HCI a formal definition of consistency formal model(s) of interaction(s) Beckert Beuster (UKL) Secure Client June 15th, / 32
13 Formal Method Formal Method Describe user and application by IOLTS s σ! s σ! 1 2 s 3 σ? Σ? Σ! s 0 σ? s 4 σ! s 5 σ! s 6 Define security properties by LTL formulae. Beckert Beuster (UKL) Secure Client June 15th, / 32
14 Formal Method Formal Method Describe user and application by IOLTS s σ! s σ! 1 2 s 3 σ? Σ? Σ! s 0 σ? s 4 σ! s 5 σ! s 6 Define security properties by LTL formulae. (see also B. Beckert and G. Beuster, A Method for Formalizing, Analyzing, and Verifying Secure User Interfaces at ICFEM 2006) Beckert Beuster (UKL) Secure Client June 15th, / 32
15 Basic Model Basic Model Application User AppOut CMD Beckert Beuster (UKL) Secure Client June 15th, / 32
16 Formal definition of consistency The user knows what the system is doing. Let... critical hold in all critical states of the application a 0,..., a n represent critical properties of the application u 0,..., u n representing the user s assumptions about these properties Then consistency is defined as... G(critical ((a 0 u 0 ) (a 1 u 1 ) (a n u n ))) Beckert Beuster (UKL) Secure Client June 15th, / 32
17 Formal definition of consistency The user knows what the system is doing. Let... critical hold in all critical states of the application a 0,..., a n represent critical properties of the application u 0,..., u n representing the user s assumptions about these properties Then consistency is defined as... G(critical ((a 0 u 0 ) (a 1 u 1 ) (a n u n ))) Beckert Beuster (UKL) Secure Client June 15th, / 32
18 Formal definition of consistency The user knows what the system is doing. Let... critical hold in all critical states of the application a 0,..., a n represent critical properties of the application u 0,..., u n representing the user s assumptions about these properties Then consistency is defined as... G(critical ((a 0 u 0 ) (a 1 u 1 ) (a n u n ))) Beckert Beuster (UKL) Secure Client June 15th, / 32
19 Application Model Application Model Exit quit [out of memory] Run Mode Command Mode H Send Mode Sent send [SUCCESS] Signed sign H [SUCCESS] insert pub. key Unsigned generate key pair edit view quit viewing quit editing Edit Not Changed Changed typing move cursor Receive Mode Checked H check [SUCCESS] Not Checked edit view quit viewing editing Edit Pub. Key Not Changed Changed poll / new arrived typing move cursor Beckert Beuster (UKL) Secure Client June 15th, / 32
20 Basic Model Basic Model Application User AppOut CMD Beckert Beuster (UKL) Secure Client June 15th, / 32
21 Basic Model with Application Basic Model with Application Application User AppOut Run Mode Command Mode Send Mode H insert pub. key generate key pair Sent [SUCCESS] send Signed sign [SUCCESS] Unsigned quit Receive Mode Checked [SUCCESS] check H Not Checked poll / new arrived H edit view quit viewing quit editing edit view quit viewing editing Exit [out of memory] Edit Not Changed Changed typing move cursor Edit Pub. Key Not Changed Changed typing move cursor CMD Beckert Beuster (UKL) Secure Client June 15th, / 32
22 Basic Model with Main Loops insert pub. key generate key pair send [SUCCESS] sign [SUCCESS] check [SUCCESS] quit poll / new arrived edit view quit viewing quit editing edit view quit viewing editing typing typing [out of memory] move cursor move cursor Application Execution Cycle Get Result Exec. CMD! AppOut AppOut? Show Result CMD? AppOut! Get CMD CMD CMD AppOut Application Logic Run Mode Command Mode Send Mode H Receive Mode H Sent Signed Unsigned Checked Not Checked H Exit Edit Not Changed Changed Edit Pub. Key Not Changed Changed Act CMD? CMD! Wait AppOut? CMD Decide Classify AppOut! User Execution Cycle AppOut User Logic Beckert Beuster (UKL) Secure Client June 15th, / 32
23 Example: Client Result of latest command: No new arrived foo edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32
24 Example: Client Result of latest command: No new arrived foo Problem: How does the user know if command execution is completed? edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32
25 Example: Client Result of latest command: No new arrived foo Problem: How does the user know if command execution is completed? Add a status line! edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32
26 Example: Client System: Waiting for input... Result of latest command: No new arrived edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32
27 Example: Client System: Waiting for input... Result of latest command: No new arrived edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32
28 Example: Client System: Waiting for input... Result of latest command: No new arrived Problem: A status line is not enough... edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32
29 Example: Client System: Waiting for input... Result of latest command: No new arrived Problem: A status line is not enough... Add a status key! edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32
30 Example: Client System: Waiting for input... Result of latest command: No new arrived edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32
31 Example: Client System: Waiting for input... Result of latest command: No new arrived edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32
32 Example: Client System: Ready! Result of latest command: No new arrived edit (m)ail (s)end mail (f)etch mail Beckert Beuster (UKL) Secure Client June 15th, / 32
33 A Better Model Application Execution Cycle Get Result Exec. AppOut Act Decide CMD! AppOut!= Processing CMD? AppOut? CMD! AppOut! Show Result CMD? Status Busy Begin Wait ESC AppOut! User Execution Cycle AppOut!= Ready! AppOut?= Processing Status! Get CMD AppOut?= Ready! Show Status CMD End Wait Classify CMD?= Status AppOut? Processing Application Logic CMD AppOut CMD AppOut User Logic Beckert Beuster (UKL) Secure Client June 15th, / 32
34 Conclusion Summary Developed formal model of HCI describing TTY applications Defined consistency Showed that common implementations are not consistent Proposed a consistent alternative Integrated with other methods (not shown in this presentation) Beckert Beuster (UKL) Secure Client June 15th, / 32
Chapter 11: Input/Output Organisation. Lesson 06: Programmed IO
Chapter 11: Input/Output Organisation Lesson 06: Programmed IO Objective Understand the programmed IO mode of data transfer Learn that the program waits for the ready status by repeatedly testing the status
SiteCount v2.0 Revised: 10/30/2009
SiteCount v2.0 Revised: 10/30/2009 Copyright 2009, Traf-SYS, Inc. Contents Introduction... 4 Requirements... 4 General... 4 Software... 4 Hardware... 4 Fulfilling Software Requirements... 5 Installation
rs-ba1 remote control software quick reference guide
rs-ba1 remote control software quick reference guide Contents Requirements... 2 Firewall Considerations... 3 Connecting to the RS-BA1 Locally... 4 Finding the IP of your Base Station Computer... 4 Setting
M5281/M5283. Serial ATA and Parallel ATA Host Controller. RAID BIOS/Driver/Utility Manual
Serial ATA and Parallel ATA Host Controller Rev. 0.96 December 03, 2003 Copyright 2003 ULi Electronics Inc. All rights reserved. COPYRIGHT NOTICE All information in this document is considered ULi Electronics
Remote PC Guide Series - Volume 2a
Document Version: 2013-03-04 This guide provides hardware model-specific guidance in server configuration, with BIOS and RAID configuration instructions for the Dell R710. This guide is part of a multi-volume
Required Virtual Interface Maps to... mgmt0. virtual network = mgmt0 wan0. virtual network = wan0 mgmt1. network adapter not connected lan0
VXOA VIRTUAL APPLIANCES Microsoft Hyper-V Hypervisor Router Mode (Out-of-Path Deployment) 2013 Silver Peak Systems, Inc. Assumptions Windows 2008 server is installed and Hyper-V server is running. This
USING FILERELICATIONPRO TO REPLICATE SQL SERVER
USING FILERELICATIONPRO TO REPLICATE SQL SERVER Abstract FileReplicationPro (FRP) can be used to backup your SQL Server databases. The replication procedure is not as straight forward as replicating other
CRM Connector Installation & Integration USER GUIDE
CRM Connector Installation & Integration USER GUIDE TABLE OF CONTENTS Table Of Contents Installation... 4 System Tray Icon.... 5 Salesforce.com Integration.... 6 Salesforce Security Token.... 6 Configuration....
Lab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
IBM Tivoli Monitoring V6.2.3, how to debug issues with Windows performance objects issues - overview and tools.
IBM Tivoli Monitoring V6.2.3, how to debug issues with Windows performance objects issues - overview and tools. Page 1 of 13 The module developer assumes that you understand basic IBM Tivoli Monitoring
Outlook Email. User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA 19107 215-503-7500
Outlook Email User Guide IS TRAINING CENTER 833 Chestnut St, Suite 600 Philadelphia, PA 19107 215-503-7500 This page intentionally left blank. TABLE OF CONTENTS Getting Started... 3 Opening Outlook...
CS420: Operating Systems OS Services & System Calls
NK YORK COLLEGE OF PENNSYLVANIA HG OK 2 YORK COLLEGE OF PENNSYLVAN OS Services & System Calls James Moscola Department of Physical Sciences York College of Pennsylvania Based on Operating System Concepts,
CHAPTER 6: CLASSIC CLIENT OPTION
Chapter 6: Classic Client Option CHAPTER 6: CLASSIC CLIENT OPTION Objectives Introduction The objectives are: Discuss the Classic Client software requirements and hardware recommendation. Install the Classic
MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1
MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1 Course Number: 5047B Course Length: 3 Days Certification Exam This course will help you prepare for the following Microsoft
Axapta Object Server MICROSOFT BUSINESS SOLUTIONS AXAPTA
MICROSOFT BUSINESS SOLUTIONS AXAPTA Axapta Object Server Microsoft Business Solutions Axapta Object Server minimises bandwidth requirements and ensures easy, efficient and homogeneous client deployment.
Linux. Installing Linux on Power Systems servers
Linux Installing Linux on Power Systems servers Linux Installing Linux on Power Systems servers Note Before using this information and the product it supports, read the information in Notices on page
Operating System Structures
COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating
User Manual Version 1.25
User Manual Version 1.25 1 INDEX 1 INTRODUCTION... 3 2 INSTALLATION... 3 3 SOFTWARE ACTIVATION... 6 Automatic Registration... 6 Activation by E-mail... 8 Activation by phone call... 9 4 SCALE CONFIGURATION...
I N S T A L L A T I O N M A N U A L
I N S T A L L A T I O N M A N U A L 2015 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA is
PRIMEQUEST Integration
C122-E062-01EN PRIMEQUEST Integration for Microsoft Operations Manager FUJITSU LIMITED Preface Purpose This manual explains the MOM management pack (PRIMEQUEST Server Agent MOM Connector), a function
Remote PC Guide Series - Volume 2b
Document Version: 2013-09-06 R720 This guide provides hardware model-specific guidance in server configuration, with BIOS and RAID configuration instructions for the Dell R720. This guide is part of a
Introduction to Operating Systems. Perspective of the Computer. System Software. Indiana University Chen Yu
Introduction to Operating Systems Indiana University Chen Yu Perspective of the Computer System Software A general piece of software with common functionalities that support many applications. Example:
5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007
5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007 Course Number: 5054A Course Length: 2 Days Course Overview This 2-day course teaches messaging engineers to
Using Actian PSQL as a Data Store with VMware vfabric SQLFire. Actian PSQL White Paper May 2013
Using Actian PSQL as a Data Store with VMware vfabric SQLFire Actian PSQL White Paper May 2013 Contents Introduction... 3 Prerequisites and Assumptions... 4 Disclaimer... 5 Demonstration Steps... 5 1.
Operating Systems. www.fetac.ie. Module Descriptor
The Further Education and Training Awards Council (FETAC) was set up as a statutory body on 11 June 2001 by the Minister for Education and Science. Under the Qualifications (Education & Training) Act,
VisiCount Installation. Revised: 8/28/2012
VisiCount Installation Revised: 8/28/2012 Introduction... 4 Requirements... 4 General... 4 Server Software... 4 Server Hardware... 4 Fulfilling Server Software Requirements... 5 Installation of Microsoft
How To Use The Case Diagnostic Tool On A Computer Or Computer
Trend Micro Case Diagnostic Tool 2.5 Getting Started Guide LEGAL NOTICE: Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Tool Registration and Software Authorization
Tool Registration and Software Authorization Tool Registration Note: All screen displays shown in this document are examples only. Your display will vary from these. A one-time registration is required
Programming and Using the Courier V.Everything Modem for Remote Operation of DDF6000
Programming and Using the Courier V.Everything Modem for Remote Operation of DDF6000 1.0 Introduction A Technical Application Note from Doppler System July 5, 1999 Version 3.x of the DDF6000, running version
Installation and Setup
Installation and Setup Xoom INDEX Xoom Features/Pictures. Page 2 Accessories.. Page 2 Accessing Users Guides... Page 3 itap RDP mouse modes... Page 3 Setup for Xoom use in the office (Office wireless network)
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 What is this document for? This document is a Step-by-Step Guide that can be used to quickly install Spam Marshall SpamWall on Exchange
Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29
Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your
Frequency, definition Modifiability, existence of multiple operations & strategies
Human Computer Interaction Intro HCI 1 HCI's Goal Users Improve Productivity computer users Tasks software engineers Users System Cognitive models of people as information processing systems Knowledge
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
ITA Mail Archive Setup Guide
This version of ITA Mail Archive is optimized to archive emails on both Microsoft Exchange 2000 and 2003 and 2007 servers. It is highly recommended that ITA Mail Archive should run on a server other than
Computer-System Architecture
Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection General System Architecture 2.1 Computer-System Architecture 2.2 Computer-System
[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1
[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1 How to Recover an infiniti/evolution Modem Software Reference idx 3.0.0.0 (12.0.0.0) Updated: November 17 th 2011 Overview Recovery Procedures
Intel DPDK Boosts Server Appliance Performance White Paper
Intel DPDK Boosts Server Appliance Performance Intel DPDK Boosts Server Appliance Performance Introduction As network speeds increase to 40G and above, both in the enterprise and data center, the bottlenecks
FX-BTCVT Bluetooth Commissioning Converter Commissioning Guide
FX-BTCVT Bluetooth Commissioning Converter Commissioning Guide FX-BTCVT-1 (Bluetooth Commissioning Converter) Code No. LIT-12011665 Issued December 5, 2014 Refer to the QuickLIT website for the most up-to-date
AMT Implementation on a UTC RETAIL 3170 POS
AMT Implementation on a UTC RETAIL 3170 POS Controlling POS systems using Intel AMT Features UTC RETAIL 1 November 19, 2012 Scope The document was written for use by UTC RETAIL 3170 POS customers to enable
5.4.8 Optional Lab: Managing System Files with Built-in Utilities in Windows 7
5.4.8 Optional Lab: Managing System Files with Built-in Utilities in Windows 7 Introduction Print and complete this lab. In this lab, you will use Windows built-in utilities to gather information about
Yubico YubiHSM Monitor
Yubico YubiHSM Monitor Test utility for the YubiHSM Document Version: 1.1 May 24, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship
TCP/IP Networking, Part 2: Web-Based Control
TCP/IP Networking, Part 2: Web-Based Control Microchip TCP/IP Stack HTTP2 Module 2007 Microchip Technology Incorporated. All Rights Reserved. Building Embedded Web Applications Slide 1 Welcome to the next
1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router
1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains
Sage Grant Management System Requirements
Sage Grant Management System Requirements You should meet or exceed the following system requirements: One Server - Database/Web Server The following system requirements are for Sage Grant Management to
Configuring a YubiKey for the YubiCloud
Configuring a YubiKey for the YubiCloud With the YubiKey Cross-Platform Personalization Tool April 9, 2013 Configuring a YubiKey for the YubiCloud 2012 Yubico. All rights reserved. Page 1 of 8 Introduction
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Adaptive Log Exporter Users Guide
IBM Security QRadar Version 7.1.0 (MR1) Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page page 119. Copyright IBM Corp. 2012,
Introduction: Implementation of the MVI56-MCM module for modbus communications:
Introduction: Implementation of the MVI56-MCM module for modbus communications: Initial configuration of the module should be done using the sample ladder file for the mvi56mcm module. This can be obtained
Installation and Program Essentials
CS PROFESSIONAL SUITE ACCOUNTING PRODUCTS Installation and Program Essentials version 2010.x.x TL 22538 (5/25/10) Copyright Information Text copyright 1998 2010 by Thomson Reuters/Tax & Accounting. All
Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.
Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures
How To Use Mview On A Powerline 2.2 (Powerline) On A Pc Or Macbook 2 (Powerplst) On An Iphone Or Ipa 2 (Aldo) On Your Iphon 2 (
mview for V8.53 and Later Motion Software mview is an elevator monitoring application. Through 1 Ethernet, the computer running mview may be connected directly to a single Motion 2000 or Motion 4000 controller
Using RAID Admin and Disk Utility
Using RAID Admin and Disk Utility Xserve RAID Includes instructions for creating RAID arrays and monitoring Xserve RAID systems K Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. Under
User Guide. BlackBerry Storm 9530 Smartphone. Version: 4.7
BlackBerry Storm 9530 Smartphone Version: 4.7 SWD-490426-0909090640-001 Contents Shortcuts... 9 BlackBerry basics shortcuts... 9 Phone shortcuts... 9 Camera shortcuts... 9 Media shortcuts... 9 Typing shortcuts...
Virtual DHX Driver Help Virtual DHX Driver for Allen-Bradley Networks
Virtual DHX Driver Help Virtual DHX Driver for Allen-Bradley Networks Version 8 VIRTUAL DHX DRIVER HELP Virtual DHX Driver for Allen-Bradley Networks Version 8 for Windows 8/7/Vista/XP/Server 2012/Server
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Analysis to develop an ISCSI Layer inside Microsoft Windows NT/2K/XP
Analysis to develop an ISCSI Layer inside Microsoft Windows NT/2K/XP Ing. Franco Ometti While1 S.r.l. Description The activity is related to develop a special device driver that implements a SCSI miniport
Image Verification. Finding Feature Information. Restrictions for Image Verification
The feature allows users to automatically verify the integrity of Cisco IOS images. Thus, users can be sure that the image is protected from accidental corruption, which can occur at any time during transit,
How To Write A Profibus Dpl (Profibus) Program
SIMATIC NET DP Base Programming Interface for CP 5613/CP 5614 Manual Preface, Contents Basic Steps in Creating a DP Application 1 Overview of PROFIBUS DP 2 Overview of the DP Base Interface 3 Description
RDM+ Remote Desktop for Mobiles For Blackberry Playbook
RDM+ Remote Desktop for Mobiles For Blackberry Playbook Getting Started Guide RDM+ (Remote Desktop for Mobiles) is an application that makes it possible to control your desktop or laptop remotely from
Intel Server Board Platform Confidence Test Installation and Operating Instructions
Intel Server Board Platform Confidence Test Installation and Operating Instructions i Intel Corporation 2002-2009 Information in this document is provided in connection with Intel products. No license,
ClockSync DAYTIME (RFC867) v9 Module Application Guide
Module Application Guide Description This utility allows a Crestron 2-series processor to synchronize its internal clock with a public NIST Internet time server using an implementation of the DAYTIME protocol.
HotelTV2. Easy Start Guide REV A0.6 D0254. 2014 October. Web : http://support.vestek.com.tr Mail : [email protected] Tel : +90 212 286 01 06
D0254 HotelTV2 Easy Start Guide 2014 October 1. Revision History Date Owner Version Reason & Change 09 May 2012 Görkem Giray Bora Tunçer A0.1 Initial Creation 29 June 2012 Görkem Giray A0.2 Structure changed
Microsoft Access is an outstanding environment for both database users and professional. Introduction to Microsoft Access and Programming SESSION
539752 ch01.qxd 9/9/03 11:38 PM Page 5 SESSION 1 Introduction to Microsoft Access and Programming Session Checklist Understanding what programming is Using the Visual Basic language Programming for the
Quectel Cellular Engine
Cellular Engine GSM FTP AT Commands GSM_FTP_ATC_V1.1 Document Title GSM FTP AT Commands Version 1.1 Date 2010-12-28 Status Document Control ID Release GSM_FTP_ATC_V1.1 General Notes offers this information
CSC 2405: Computer Systems II
CSC 2405: Computer Systems II Spring 2013 (TR 8:30-9:45 in G86) Mirela Damian http://www.csc.villanova.edu/~mdamian/csc2405/ Introductions Mirela Damian Room 167A in the Mendel Science Building [email protected]
Chancery SMS 7.5.0 Database Split
TECHNICAL BULLETIN Microsoft SQL Server replication... 1 Transactional replication... 2 Preparing to set up replication... 3 Setting up replication... 4 Quick Reference...11, 2009 Pearson Education, Inc.
Using Bluetooth-Enabled PosiTector 6000 with Statistical Process Control Software
Using Bluetooth-Enabled PosiTector 6000 with Statistical Process Control Software SPC programs are available from third party vendors that enhance the measurement capabilities of the PosiTector 6000. With
D-Link DAP-1360 Repeater Mode Configuration
D-Link DAP-1360 Repeater Mode Configuration Outline 1. Package Contents 2. System Requirements 3. Hardware Overview Connections LED s WPS LED/Button 4. Default Settings 5. Configuring your LAN Adapter
THE BUSINESS VALUE OF AN ERP SYSTEM
THE BUSINESS VALUE OF AN ERP SYSTEM AJMAL BEG THE BUSINESS VALUE OF AN ERP SYSTEM AJMAL BEG ii Copyright c 2010 by Ajmal Beg. All rights reserved. This technology described in this publication is based
Backup & Restore Guide
The email Integrity Company Sendio Email Security Platform Appliance Backup & Restore Guide Sendio, Inc. 4911 Birch St. Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com 2010 Sendio,
SPAMfighter SMTP Anti Spam Server
SPAMfighter SMTP Anti Spam Server Users Manual Copyright SPAMfighter ApS 2005 Revised 4/27/2006 1 Table of Contents 2 Terminology...3 3 Technology...4 3.1 Tunneling and Interception...4 3.2 Content Classification...5
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating? A collection of software modules to assist programmers in enhancing efficiency, flexibility, and robustness An Extended Machine from the users
SUPER SMC LCD. User's Guide. Revision 1.0
SUPER SMC LCD User's Guide Revision 1.0 The information in this User s Manual has been carefully reviewed and is believed to be accurate. The vendor assumes no responsibility for any inaccuracies that
Linux Driver Devices. Why, When, Which, How?
Bertrand Mermet Sylvain Ract Linux Driver Devices. Why, When, Which, How? Since its creation in the early 1990 s Linux has been installed on millions of computers or embedded systems. These systems may
Getting Started with Ascent Xtrata 1.7
Getting Started with Ascent Xtrata 1.7 10300582-000 Revision A Copyright Copyright 2006 Kofax Image Products, Inc. All Rights Reserved. Printed in USA. The information contained in this document is the
Ways to Use USB in Embedded Systems
Ways to Use USB in Embedded Systems by Yingbo Hu, R&D Embedded Engineer and Ralph Moore, President of Micro Digital Universal Serial Bus (USB) is a connectivity specification that provides ease of use,
The care and feeding of Pythons at the Redmond Zoo. (Using Micro Python and pyboard with Windows)
The care and feeding of Pythons at the Redmond Zoo. (Using Micro Python and pyboard with Windows) Introduction. Pyboard connects to Windows using a standard micro USB cable. It can operate in four different
Technical Manual Fifth Edition
Technical Manual Fifth Edition SPECIAL NOTICE TOLL RESTRICTION The Toll Restriction feature of the Iwatsu Enterprise-CS / ADIX APS is one method of preventing fraud (i.e., the making of unauthorized toll
Archiving with MS Exchange Server
Archiving with MS Exchange Server Copyright 2011 by REDDOXX GmbH REDDOXX GmbH Neue Weilheimer Str. 14 73230 Kirchheim Fon: +49 (0)7021 92846-0 Fax: +49 (0)7021 92846-99 email: [email protected] Internet:
FirewallTM. isecurity. Out-of-the Box. The Network Security Component of. Version 15. Copyright Raz-Lee Security Ltd.
FirewallTM The Network Security Component of isecurity Out-of-the Box Version 15 Copyright Raz-Lee Security Ltd. Updated: 02/09/2011 This guide is intended to provide as a quick beginning to the principal
Lab 4.5.4 Diagramming External Traffic Flows
Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1
International Journal of Software and Web Sciences (IJSWS) www.iasir.net. GPS and GSM Based Database Systems for User Access
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
SNAP Printer Web Server Users Manual
User s Manual SNAP Printer Web Server Users Manual AVERY DENNISON 29 April 2013 Version 1.2 Change List Version Description 1.0 Initial Release 1.1 Updated to add the Batch ID and Batch Count to the main
1. Installing and configuring APC UPS Management
1. Installing and configuring APC UPS Management 1.1. Objectives and Overview In this lab, you will learn how to install and configure the APC UPS power management suite and the Web/SNMP Management Card.
1. Requirements for Network Installation on 840D
Content 1. Requirements for Network Installation on 840D... 1 2. Installing the Network... 2 2.1. Enable IRQ 11 for the 3C509 ISA network card in BIOS... 2 2.2. Configuring the 3COM Etherlink III COMBO
CUSTOMER RELEASE NOTES
RS Switch Router Version 2.0.1.3 January 2002 INTRODUCTION: This document provides specific information for version 2.0.1.3 for the RS Switch Router family of products. It is recommended that one thoroughly
Installation Guide for Workstations
Installation Guide for Workstations Copyright 1998-2005, E-Z Data, Inc. All Rights Reserved. No part of this documentation may be copied, reproduced, or translated in any form without the prior written
73S1215F, 73S1217F Device Firmware Upgrade Host Driver/Application Development User s Guide April 27, 2009 Rev. 1.00 UG_12xxF_029
Simplifying System Integration TM 73S1215F, 73S1217F Device Firmware Upgrade Host Driver/Application Development User s Guide April 27, 2009 Rev. 1.00 UG_12xxF_029 73S1215, 73S1217F DFU Host Driver/Application
EPIC 950 THERMAL TICKET PRINTER
EPIC 950 THERMAL TICKET PRINTER Software Reference Guide www.transac-tech.com 2 Contacting Information / Serial Plate Info TransAct Technologies Incorporated is the manufacturer of Ithaca brand POS, Banking,
EE8205: Embedded Computer System Electrical and Computer Engineering, Ryerson University. Multitasking ARM-Applications with uvision and RTX
EE8205: Embedded Computer System Electrical and Computer Engineering, Ryerson University Multitasking ARM-Applications with uvision and RTX 1. Objectives The purpose of this lab is to lab is to introduce
Embedded Programming in C/C++: Lesson-1: Programming Elements and Programming in C
Embedded Programming in C/C++: Lesson-1: Programming Elements and Programming in C 1 An essential part of any embedded system design Programming 2 Programming in Assembly or HLL Processor and memory-sensitive
MCN Health Monitor. The finger on the pulse of your critical systems. David Tayler Service Engineer, OSISoft
MCN Health Monitor The finger on the pulse of your critical systems David Tayler Service Engineer, OSISoft MCN Health Monitor Today s presentation Introduction Description Interfaces Tag Builders Client
Getting Started 2. Inserting a Digital Signature Field without Signing 3. Signing an Unsigned Digital Signature Field 3
CoSign Quick Guide Signing Microsoft Office 2007/2010 Documents Contents Getting Started 2 Inserting a Digital Signature Field without Signing 3 Signing an Unsigned Digital Signature Field 3 Validating
The Helios Microsoft Windows Server
The Helios Microsoft Windows Server COPYRIGHT This document Copyright 1992 Distributed Software Limited. All rights reserved. This document may not, in whole or in part, be copied, photocopied, reproduced,
