Using the Tcl VFS for Encryption
|
|
|
- Gyles Newton
- 10 years ago
- Views:
Transcription
1 Using the Tcl VFS for Encryption By Phil Brooks - Mentor Graphics Corporation & Arman Hunanyan - Mentor Graphics Corporation Presented at the 22 nd annual Tcl/Tk conference, Manassas Virginia, October 2015 Mentor Graphics Corporation 8005 Boeckman Road Wilsonville, Oregon [email protected] [email protected] Abstract: In today's world of constant hacker and security threats, the Tcl VFS Interface provides a mechanism whereby Tcl scripted applications that are previously unaware of security and encryption concerns can transparently access both data files and Tcl modules from an encrypted container file without modifying the application specific file accesses. This mechanism allows data residing on disc to be strongly encrypted while it can be transparently accessed from a Tcl application that has the appropriate decryption keys to access the data transparently through normal Tcl file accesses. We examine CalVFS, an implementation that allows users of Mentor Graphic's Calibre electronic circuit verification tool to encrypt sensitive user information in such a way that it can be transparently accessed by the Calibre application. Motivation Mentor Graphics Calibre product line has a large number of customers and suppliers that provide extensions to our solutions that are specific to various
2 integrated circuit foundries and design technologies. These groups are often providing proprietary extensions in the form of design files, data models, Tcl scripts, and Calibre rules files that their customers use in conjunction with our tools to build complete design solutions. The CalVFS system serves as a mechanism that these intermediate suppliers can use to securely encapsulate their design solutions and deliver them through to end users. Using this system, they build an encapsulated.calzip file that contains encrypted data files and Tcl scripts, deliver that file to end users who can then run the full design solution. The advantage of the CalVFS system and its implementation on top of Tcl s VFS filesystem support is that scripts that were developed independently of any knowledge of the.calzip file or how to get at its contents can seamlessly access data and run Tcl scripts using the system. The.calzip files provide transparent read-only access to their contents within the Calibre runtime process through the Tcl VFS filesystem. There is not a lot of documentation of the Tcl VFS or examples of its usage. As a result, we are providing this paper as a summary of our experiences developing an interface that uses the VFS in a manner that may be compelling to other developers. Tcl VFS Overview The Tcl Virtual File System (VFS) provides a low level C api through which all regular Tcl file mechanisms (things like open, read, and seek as well as higher level commands like source and glob) are routed. This abstraction allows a simple point of access that allows you to make up your own mechanism for supplying the data that any Tcl script can simply view as a bunch of regular file accesses. Tcl_FS* Functions The basic implementation of the Tcl VFS is through the Tcl_Filesystem structure and a group of functions that all start with Tcl_FS. The Tcl_Filesystem structure aggregates a group of functions that provide the underlying functionality of a particular filesystem implementation, and the Tcl_FS* functions allow installation, management and destruction of filesystem implementations as well as safe C level access to VFS filesystem functionality that would be short circuited by direct use of the C filesystem routines like stat(), access(), read() etc. For example, using the stat() function call directly from C will not reflect any VFS filesystems installed,
3 while use of TclFSStat will. The Tcl_FS* functions also provide consistent behavior across platforms (to the extent possible). The Tcl_FS functions provide a wide array of file related functionality. Highlights of the C level function are provided below, a full list of the functions (from the Tcl FileSystem man page) is provided in the appendix: File Access: Direct access and manipulation of a file and its contents is provided by a number of functions like Tcl_FSOpenFileChannel, Tcl_FSStat and Tcl_FSAccess. Directory Manipulation Directories,their contents, symbolic links, etc. can be accessed and manipulated using functions like Tcl_FSMatchInDirectory, Tcl_FSGetCwd, Tcl_FSChdir, Tcl_FSLink, Tcl_FSCreateDirectory and Tcl_FSUtime. File Path manipulation and construction Platform independent construction and manipulation of file paths are provided by functions like Tcl_FSPathSeparator, Tcl_FSNormalizePath, Tcl_FSJoinPath, and Tcl_FSSplitPath. VFS construction, manipulation and maintenance The VFS filesystem implementations themselves use functions like Tcl_FSRegister, TclFSUnregister, Tcl_FSData and TclFSMountsChanged to install and maintain VFS Filesystems. Tcl_Filesystem structure The Tcl_Filesystem structure contains pointers to functions that implement underlying VFS filesystem operations. Many of them correspond directly to Tcl_FS* functions listed above. These functions are called by the underlying Tcl when an installed VFS path is accessed through Tcl commands or the Tcl_FS* interfaces. One important function in the structure is the Tcl_FSPathInFilesystemProc. This function is the key mechanism by which a VFS filesystem identifies files that belong to it. The remaining functions can similarly be grouped according to function. The full structure is presented in the appendix.
4 File Access: Tcl_FSOpenFileChannelProc, TclFSStatProc, and Tcl_FSAccessProc. Tcl_FSOpenFileChannelProc is important to us in that the Tcl channel interface is used to return decrypted data to the end user. Directory Manipulation: TclFSMatchInDirectoryProc, Tcl_FSGetCwdProc, Tcl_FSChdirProc, Tcl_FSLinkProc, Tcl_FSCreateDirectoryProc, and Tcl_FSUtimeProc. File Path manipulation and construction Tcl_FSPathSeparatorProc, Tcl_FSNormalizePathProc. Tcl_FSJoinPath and TclFSSplitPath are algorithmically implemented and does not interact with an installed VFS. vfs:: Active Tcl package Provided with ActiveTcl, or available from SourceForge, the vfs:: package provides a number of vfs implementations. It consists of three parts: 1. vfs the vfs::filesystem commands allow mount, unmounts and manipulation of vfs filesystems. 2. vfs-filesystems: Several useful filesystems: zip, mk4, tar, ftp, ns, webdav, http, urltype 3. vfs-fsapi the interface for creating a filesystem. This allows you to write a command ensemble that supports access to a vfs filesystem Tcl Encryption Overview Many encryption packages are available for Tcl. The following are available with Tcllib: blowfish: aes: des (including triple des): rc4: Here is a des example: package require des set key " "; # Must be 8 bytes long
5 set msg "abcde" ##### ENCRYPTION set encryptedmsg [DES::des -dir encrypt -key $key $msg] # $encryptedmsg is a bunch of bytes; you'll want to send this around... ##### DECRYPTION set decryptedmsg [DES::des -dir decrypt -key $key $encryptedmsg] puts "I got '$decryptedmsg'" Also more complicated, but with a lot of different components and interfaces: Cryptkit - The encryption packages can be coupled with a Tcl Channel. This allows us to build a channel that does decryption and writes to a channel as it reads from an encrypted input channel. For example, the aes, blowfish, DES and rc4 packages all support in <channel> and out <channel> arguments when the channel object is created. Combining VFS and Encryption By building a decryption channel described above in the Tcl_FSOpenFileChannelProc function that is part of the Tcl_Filesystem api, a transparent read capability is created. As a result, Tcl code can transparently access objects in the.calzip filesystem: set fd [ open foo/bar.calzip/text_file.txt ] set buf [ read $fd ] source foo/bar.calzip/datafile.tcl
6 Calibre VFS Limitations of our implementation Since the target usage scenario for CalVFS is a supplier creates an archive, ships it to end users who then have read only access to the archive or write once, read many delivery, the implementation only implements a readonly file system. Also, it does not support symbolic links. While the Tcl_Filesystem interface calls for implementation of more of the filesystem interfaces, we found that a perfectly workable read-only filesystem can be implemented with only the following interfaces: pathinfilesystemproc identifies files that are part of the VFS statproc provides information similar to stat() accessproc - provides information similar to access() openfilechannelproc implements the read channel for files in the filesystem Mounts Anyone? The vfs:: package requires an explicit mount with a directory to enable a filesystem. In our use model, we don t know beforehand where the.calzip files will be. The user simply specifies a path name that may or may not include a.calzip archive. The Virual filesystem API doesn t specifically require a mount point, however. Instead, the CalVFS function that implements Tcl_FSPathInFilesystemProc (part of the Tcl_Filesystem structure) responds to a query signifying whether a particular path name is part of the CalVFS filesystem or not. The files are identified by examining the filepath and looking for.calzip archives along the path. Once a.calzip archive is identified, it is opened by the CalVFS filesystem implementation and its contents are transparently accessed. The automatic mounting mechanism also allows.calzip archives to access other external archives through relative paths. For example: If we have the following files: archive.calzip archive foo/demo1.calzip which contains a directory dir1/dir2 archive foo/demo2.calzip which contains the file dir3/dir4/file a regular file foo/bar/file that is outside of any archive
7 Then automatic mounting will allow to access through arbitrary paths like these: foo/demo1.calzip/dir1/dir2/../../../demo2.calzip/dir3/dir4/file foo/demo1.calzip/dir1/dir2/../../../demo2.calzip/dir3/dir4/../../../bar/file In both cases path access will force automatic mount of both the demo1.calzip and demo2.calzip archives. This will allow inclusion of source Tcl files or data files files from outside VFS. Nesting CalVFS archives can also be contained inside of one another. ACLs and permissions on contained archives can be different from one another. So the above case can also similarly work when the two archives are nested one inside the other: archive.calzip archive foo/demo1.calzip which contains a directory dir1/dir2 archive demo2.calzip which contains the file dir3/dir4/file is contained inside dir1 of demo1.calzip a regular file foo/bar/file that is outside of any archive Then automatic mounting will allow to access through arbitrary paths like these: foo/demo1.calzip/dir1/demo2.calzip/dir3/dir4/file foo/demo1.calzip/dir1/dir2/../demo2.calzip/dir3/dir4/../../../../../bar/file In these cases path access will also force automatic mount of both the demo1.calzip and demo2.calzip archives. Write/Encode Process Files are encoded in a simple serial archival process similar to what Zip or Tar would use. The files are encrypted as they are written into the archive. Contained.calzip files are simply copied into a containing archive.
8 Read/Decode Process Files are decoded in 1064 byte chunks and their decode state is maintained in conjunction with the channel that is currently reading from them. Offsets and intermediate decryption information are also maintained inside of the channel object. Seek Seek functionality is limited and can seeking can have performance implications since the decryption state must be maintained from a known starting point. When seek moves the current position of the channel away from its current point, access must start at a known starting point and continue forward to the seek position. Optimizations are possible if multiple starting points are possible for the encrypted file as in some block based encoding schemes. Access Control As described thus far, any Tcl interpreter running in the calibre process has full access to all of the files in the.calzip archive. One goal of the system is to provide at least some level of protection between the.calzip contents and prying eyes of the end user. (Note that complete protection cannot be provided due to the DVD problem i.e. if you have a well encrypted file and a box that can decode that file and a sufficiently sophisticated user with sufficient access to the insides of the box, the user can discover how to decrypt the file without using the box.) To that end, the CalVFS system uses a system of Access Control Lists to vary what type of access it will allow to which interpreters in the system. That way, a specific vendor s.calzip file can get its own dedicated interpreter that has access to the.calzip contents while other interpreters in the same running process are denied access to the same.calzip file. Development Mode Since the filesystem functionality of the.calzip archive is limited and different from normal file accesses in a regular filesystem, there is a potential debugging issue for developers that intent to deliver.calzip archives: If an application depends upon functionality not available in the CalVFS while they are developing the application using the regular filesystem, they will not discover that dependency until they go to the final stage
9 of creating the.calzip archive and then testing their application in that environment. Examples of functionality that they might depend upon includes erroneously expecting write access, or expecting meaningful symlinks inside of a.calzip archive, there would be no issue with doing that as long as the user was working in the regular filesystem, but when they create the.calzip archive, then the problem would become apparent. In order to facilitate simple development, testing, debugging and deployment, a development mode for the CalVFS filesystem allows the user to tag a development directory as being part of a CalVFS filesystem without actually creating the archive. Then accesses within the directory will carry the same limitations as they would if that directory were actually inside of a.calzip archive. In the final delivery state, the.calzip archive is, by default, very opaque. As a result, there are a number of other debugging features that allow a developer to control for more or less transparency into the contents of the.calzip archive during runtime. Conclusions The Tcl VFS system provides a highly functional interface that allows support for new filesystem functionality in applications that are using regular Tcl file accesses. Encryption libraries present in Tcl can be combined with the VFS filesystem access to provide transparent access to encrypted directories of files by combining elements of a zip or tar archive with encryption and the VFS.
10 Acknowledgements Special thanks to Fedor Pikus for helping develop the underlying filesystem semantics. Tcl_Filesystem and Tcl_FS* functions Full information is available at the following URL: The full list of Tcl_FS* functions available in Tcl 8.6 are: Tcl_FSRegister, Tcl_FSUnregister, Tcl_FSData, Tcl_FSMountsChanged, Tcl_FSGetFileSystemForPath, Tcl_FSGetPathType, Tcl_FSCopyFile, Tcl_FSCopyDirectory, Tcl_FSCreateDirectory, Tcl_FSDeleteFile, Tcl_FSRemoveDirectory, Tcl_FSRenameFile, Tcl_FSListVolumes, Tcl_FSEvalFile, Tcl_FSEvalFileEx, Tcl_FSLoadFile, Tcl_FSUnloadFile, Tcl_FSMatchInDirectory, Tcl_FSLink, Tcl_FSLstat, Tcl_FSUtime, Tcl_FSFileAttrsGet, Tcl_FSFileAttrsSet, Tcl_FSFileAttrStrings, Tcl_FSStat, Tcl_FSAccess, Tcl_FSOpenFileChannel, Tcl_FSGetCwd, Tcl_FSChdir, Tcl_FSPathSeparator, Tcl_FSJoinPath, Tcl_FSSplitPath, Tcl_FSEqualPaths, Tcl_FSGetNormalizedPath, Tcl_FSJoinToPath, Tcl_FSConvertToPathType, Tcl_FSGetInternalRep, Tcl_FSGetTranslatedPath, Tcl_FSGetTranslatedStringPath, Tcl_FSNewNativePath, Tcl_FSGetNativePath, Tcl_FSFileSystemInfo, Tcl_GetAccessTimeFromStat, Tcl_GetBlockSizeFromStat, Tcl_GetBlocksFromStat, Tcl_GetChangeTimeFromStat, Tcl_GetDeviceTypeFromStat, Tcl_GetFSDeviceFromStat, Tcl_GetFSInodeFromStat, Tcl_GetGroupIdFromStat, Tcl_GetLinkCountFromStat, Tcl_GetModeFromStat, Tcl_GetModificationTimeFromStat, Tcl_GetSizeFromStat, Tcl_GetUserIdFromStat, Tcl_AllocStatBuf
11 The Tcl_Filesystem structure: typedef struct Tcl_Filesystem { const char *typename; int structurelength; Tcl_FSVersion version; Tcl_FSPathInFilesystemProc *pathinfilesystemproc; Tcl_FSDupInternalRepProc *dupinternalrepproc; Tcl_FSFreeInternalRepProc *freeinternalrepproc; Tcl_FSInternalToNormalizedProc *internaltonormalizedproc; Tcl_FSCreateInternalRepProc *createinternalrepproc; Tcl_FSNormalizePathProc *normalizepathproc; Tcl_FSFilesystemPathTypeProc *filesystempathtypeproc; Tcl_FSFilesystemSeparatorProc *filesystemseparatorproc; Tcl_FSStatProc *statproc; Tcl_FSAccessProc *accessproc; Tcl_FSOpenFileChannelProc *openfilechannelproc; Tcl_FSMatchInDirectoryProc *matchindirectoryproc; Tcl_FSUtimeProc *utimeproc; Tcl_FSLinkProc *linkproc; Tcl_FSListVolumesProc *listvolumesproc; Tcl_FSFileAttrStringsProc *fileattrstringsproc; Tcl_FSFileAttrsGetProc *fileattrsgetproc; Tcl_FSFileAttrsSetProc *fileattrssetproc; Tcl_FSCreateDirectoryProc *createdirectoryproc; Tcl_FSRemoveDirectoryProc *removedirectoryproc; Tcl_FSDeleteFileProc *deletefileproc; Tcl_FSCopyFileProc *copyfileproc; Tcl_FSRenameFileProc *renamefileproc; Tcl_FSCopyDirectoryProc *copydirectoryproc; Tcl_FSLstatProc *lstatproc; Tcl_FSLoadFileProc *loadfileproc; Tcl_FSGetCwdProc *getcwdproc; Tcl_FSChdirProc *chdirproc; } Tcl_Filesystem;
php-crypto-params Documentation
php-crypto-params Documentation Release 1.0.0 Gian Luca Dalla Torre January 17, 2016 Contents 1 Purpose 3 2 How it works 5 2.1 Documentation.............................................. 5 i ii php-crypto-params
Key Management Interoperability Protocol (KMIP)
www.oasis-open.org Management Interoperability Protocol (KMIP) Storage Developer s Introduction SNIA Fall 2009 Gordon Arnold, [email protected] Chair, Storage Security Industry Forum 1 2009 Insert Copyright
AN11241. AES encryption and decryption software on LPC microcontrollers. Document information
AES encryption and decryption software on LPC microcontrollers Rev. 1 25 July 2012 Application note Document information Info Content Keywords AES, encryption, decryption, FIPS-197, Cortex-M0, Cortex-M3
ProTrack: A Simple Provenance-tracking Filesystem
ProTrack: A Simple Provenance-tracking Filesystem Somak Das Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology [email protected] Abstract Provenance describes a file
Encrypt-FS: A Versatile Cryptographic File System for Linux
Encrypt-FS: A Versatile Cryptographic File System for Linux Abstract Recently, personal sensitive information faces the possibility of unauthorized access or loss of storage devices. Cryptographic technique
MatrixSSL Developer s Guide
MatrixSSL Developer s Guide This document discusses developing with MatrixSSL. It includes instructions on integrating MatrixSSL into an application and a description of the configurable options for modifying
PGP Portable Quick Start Guide Version 10.2
PGP Portable Quick Start Guide Version 10.2 Introduction to PGP Portable Use PGP Portable to distribute encrypted files to users who do not have PGP Desktop software. Use PGP Portable to transport files
Open Source Encrypted Filesystems for Free Unix Systems
Open Source Encrypted Filesystems for Free Unix Systems George Kargiotakis [email protected] Introduction Users seek ways to secure their data with maximum comfort and minimum requirements. No application
Magento Search Extension TECHNICAL DOCUMENTATION
CHAPTER 1... 3 1. INSTALLING PREREQUISITES AND THE MODULE (APACHE SOLR)... 3 1.1 Installation of the search server... 3 1.2 Configure the search server for usage with the search module... 7 Deploy the
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
Password-based encryption in ZIP files
Password-based encryption in ZIP files Dmitri Gabbasov December 15, 2015 Abstract In this report we give an overview of the encryption schemes used in the ZIP file format. We first give an overview of
Practice Fusion API Client Installation Guide for Windows
Practice Fusion API Client Installation Guide for Windows Quickly and easily connect your Results Information System with Practice Fusion s Electronic Health Record (EHR) System Table of Contents Introduction
SMTP-32 Library. Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows. Version 5.2
SMTP-32 Library Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows Version 5.2 Copyright 1994-2003 by Distinct Corporation All rights reserved Table of Contents 1 Overview... 5 1.1
Agent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents
Agent Languages Requirements Overview Java Tcl/Tk Telescript Evaluation Franz J. Kurfess, Cal Poly SLO 211 Requirements for agent Languages distributed programming large-scale (tens of thousands of computers)
Project: Simulated Encrypted File System (SEFS)
Project: Simulated Encrypted File System (SEFS) Omar Chowdhury Fall 2015 CS526: Information Security 1 Motivation Traditionally files are stored in the disk in plaintext. If the disk gets stolen by a perpetrator,
PHP Integration Kit. Version 2.5.1. User Guide
PHP Integration Kit Version 2.5.1 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate PHP Integration Kit User Guide Version 2.5.1 December, 2012 Ping Identity Corporation 1001
About This Document 3. Integration and Automation Capabilities 4. Command-Line Interface (CLI) 8. API RPC Protocol 9.
Parallels Panel Contents About This Document 3 Integration and Automation Capabilities 4 Command-Line Interface (CLI) 8 API RPC Protocol 9 Event Handlers 11 Panel Notifications 13 APS Packages 14 C H A
A Mechanism for VHDL Source Protection
A Mechanism for VHDL Source Protection 1 Overview The intent of this specification is to define the VHDL source protection mechanism. It defines the rules to encrypt the VHDL source. It also defines the
WS_FTP Professional 12. Security Guide
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 2 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...
YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.
YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege. Defend it with Encryption. 1.0 Keeping up with the
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
UNIX File Management (continued)
UNIX File Management (continued) OS storage stack (recap) Application FD table OF table VFS FS Buffer cache Disk scheduler Device driver 2 Virtual File System (VFS) Application FD table OF table VFS FS
Test Automation Integration with Test Management QAComplete
Test Automation Integration with Test Management QAComplete This User's Guide walks you through configuring and using your automated tests with QAComplete's Test Management module SmartBear Software Release
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
VERITAS NetBackup 6.0 Encryption
VERITAS NetBackup 6.0 Encryption System Administrator s Guide for UNIX, Windows, and Linux N15274C September 2005 Disclaimer The information contained in this publication is subject to change without notice.
www.basho.com Technical Overview Simple, Scalable, Object Storage Software
www.basho.com Technical Overview Simple, Scalable, Object Storage Software Table of Contents Table of Contents... 1 Introduction & Overview... 1 Architecture... 2 How it Works... 2 APIs and Interfaces...
Qualtrics Single Sign-On Specification
Qualtrics Single Sign-On Specification Version: 2010-06-25 Contents Introduction... 2 Implementation Considerations... 2 Qualtrics has never been used by the organization... 2 Qualtrics has been used by
EKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise
Global security intelligence YoUR DAtA UnDeR siege: DeFenD it with encryption #enterprisesec kaspersky.com/enterprise Contents Your Data Under Siege: Defend it with Encryption 3 Steps Taken to Minimise
Comodo Disk Encryption
Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3
Protecting Data-at-Rest with SecureZIP for DLP
Protecting Data-at-Rest with SecureZIP for DLP TABLE OF CONTENTS INTRODUCTION 3 PROTECTING DATA WITH DLP 3 FINDING INDIVIDUAL AND SHARED INFORMATION-AT-REST 4 METHODS FOR REMEDIATION 4 ENCRYPTING UNPROTECTED
USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES)
USING STUFFIT DELUXE StuffIt Deluxe provides many ways for you to create zipped file or archives. The benefit of using the New Archive Wizard is that it provides a way to access some of the more powerful
Configuring Backup Settings. Copyright 2009, Oracle. All rights reserved.
Configuring Backup Settings Objectives After completing this lesson, you should be able to: Use Enterprise Manager to configure backup settings Enable control file autobackup Configure backup destinations
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password
Threat Modeling a SharePoint Application: An exploratory exercise in preventing data breaches and theft.
Threat Modeling a SharePoint Application: An exploratory exercise in preventing data breaches and theft. By Tony Graves SharePoint Developer and Consultant February 22. 2015 Threat modeling is about using
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Transparent Cryptographic File System for BSD. A primer. Luigi Catuogno [[email protected]]
Transparent Cryptographic File System for BSD. A primer Luigi Catuogno [[email protected]] April 15, 2000 Abstract This document is a quick and dirty introduction to installation and usage of the Transparent
Java Application Developer Certificate Program Competencies
Java Application Developer Certificate Program Competencies After completing the following units, you will be able to: Basic Programming Logic Explain the steps involved in the program development cycle
Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327
Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327 Mod ule_i D Error _Cod e Error Description 1 1 PROCESSOR_NULLREF_ERROR 1 100 ERROR_PARSE_PAIR Failed
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2
BANDWIDTH METER FOR HYPER-V NEW FEATURES OF 2.0 The Bandwidth Meter is an active application now, not just a passive observer. It can send email notifications if some bandwidth threshold reached, run scripts
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
Using weblock s Servlet Filters for Application-Level Security
Using weblock s Servlet Filters for Application-Level Security September 2006 www.2ab.com Introduction Access management is a simple concept. Every business has information that needs to be protected from
HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity
Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon
Linux LKM Firewall v 0.95 (2/5/2010)
600/650.424 Network Security Linux LKM Firewall 1 1 Overview Linux LKM Firewall v 0.95 (2/5/2010) The learning objective of this project is for you to understand how firewalls work by designing and implementing
Leak Check Version 2.1 for Linux TM
Leak Check Version 2.1 for Linux TM User s Guide Including Leak Analyzer For x86 Servers Document Number DLC20-L-021-1 Copyright 2003-2009 Dynamic Memory Solutions LLC www.dynamic-memory.com Notices Information
SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se
SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se
DiamondStream Data Security Policy Summary
DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers
RECOVER ( 8 ) Maintenance Procedures RECOVER ( 8 )
NAME recover browse and recover NetWorker files SYNOPSIS recover [-f] [-n] [-q] [-u] [-i {nnyyrr}] [-d destination] [-c client] [-t date] [-sserver] [dir] recover [-f] [-n] [-u] [-q] [-i {nnyyrr}] [-I
How To Secure My Data
How To Secure My Data What to Protect??? DATA Data At Rest Data at Rest Examples Lost Infected Easily Used as Backup Lent to others Data Corruptions more common Stolen Left at airports, on trains etc Hard
Design: Metadata Cache Logging
Dana Robinson HDF5 THG 2014-02-24 Document Version 4 As an aid for debugging, the existing ad-hoc metadata cache logging functionality will be made more robust. The improvements will include changes to
AES Crypt User Guide
AES Crypt User Guide Publication Date: 2013-12-26 Original Author: Gary C. Kessler ([email protected]) Revision History Date Contributor Changes 2012-01-17 Gary C. Kessler First version 2013-03-03 Doug
Dove User Guide Copyright 2010-2011 Virgil Trasca
Dove User Guide Dove User Guide Copyright 2010-2011 Virgil Trasca Table of Contents 1. Introduction... 1 2. Distribute reports and documents... 3 Email... 3 Messages and templates... 3 Which message is
Version Control. Luka Milovanov [email protected]
Version Control Luka Milovanov [email protected] Configuration Management Configuration management is the management of system change to software products Version management: consistent scheme of version
Managed Encryption Service
Amethyst Cryptographic Services Ltd Managed Encryption Service An Overview Chris Greengrass March 2011 Encryption and Cryptography The use of encryption/decryption is as old as the art of communication.
Storing Encrypted Plain Text Files Using Google Android
Storing Encrypted Plain Text Files Using Google Android Abstract Jared Hatfield University of Louisville Google Android is an open source operating system that is available on a wide variety of smart phones
Introduction to the. Barracuda Embedded Web-Server
Introduction to the Barracuda Embedded Web-Server This paper covers fundamental concepts of HTTP and how the Barracuda Embedded Web Server can be used in an embedded device. Introduction to HTTP Using
Red Hat Certifications: Red Hat Certified System Administrator (RHCSA)
Red Hat Certifications: Red Hat Certified System Administrator (RHCSA) Overview Red Hat is pleased to announce a new addition to its line of performance-based certifications Red Hat Certified System Administrator
Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
Secure Web Appliance. Reverse Proxy
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
Lecture 11 Web Application Security (part 1)
Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)
Introduction to WebSphere Administration
PH073-Williamson.book Page 1 Thursday, June 17, 2004 3:53 PM C H A P T E R 1 Introduction to WebSphere Administration T his book continues the series on WebSphere Application Server Version 5 by focusing
Course Number: IAC-SOFT-WDAD Web Design and Application Development
Course Number: IAC-SOFT-WDAD Web Design and Application Development Session 1 (10 Hours) Client Side Scripting Session 2 (10 Hours) Server Side Scripting - I Session 3 (10 hours) Database Session 4 (10
CheckPoint FireWall-1 Version 3.0 Highlights Contents
CheckPoint FireWall-1 Version 3.0 Highlights Contents Abstract...2 Active Network Management...3 Accounting... 3 Live Connections Report... 3 Load balancing... 3 Exporting log records to Informix database...
How To Port A Program To Dynamic C (C) (C-Based) (Program) (For A Non Portable Program) (Un Portable) (Permanent) (Non Portable) C-Based (Programs) (Powerpoint)
TN203 Porting a Program to Dynamic C Introduction Dynamic C has a number of improvements and differences compared to many other C compiler systems. This application note gives instructions and suggestions
Overview of Banking Application Security and PCI DSS Compliance for Banking Applications
Overview of Banking Application Security and PCI DSS Compliance for Banking Applications Thought Paper www.infosys.com/finacle Universal Banking Solution Systems Integration Consulting Business Process
COSC 6397 Big Data Analytics. Distributed File Systems (II) Edgar Gabriel Spring 2014. HDFS Basics
COSC 6397 Big Data Analytics Distributed File Systems (II) Edgar Gabriel Spring 2014 HDFS Basics An open-source implementation of Google File System Assume that node failure rate is high Assumes a small
How To Get To A Cloud Storage And Byod System
Maginatics Security Architecture What is the Maginatics Cloud Storage Platform? Enterprise IT organizations are constantly looking for ways to reduce costs and increase operational efficiency. Although
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Database Encryption Design Considerations and Best Practices for ASE 15
Database Encryption Design Considerations and Best Practices for ASE 15 By Jeffrey Garbus, Soaring Eagle Consulting Executive Overview This article will explore best practices and design considerations
Designing a Cloud Storage System
Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes
UniFinger Engine SDK Manual (sample) Version 3.0.0
UniFinger Engine SDK Manual (sample) Version 3.0.0 Copyright (C) 2007 Suprema Inc. Table of Contents Table of Contents... 1 Chapter 1. Introduction... 2 Modules... 3 Products... 3 Licensing... 3 Supported
LSKA 2010 Survey Report I Device Drivers & Cloud Computing
LSKA 2010 Survey Report I Device Drivers & Cloud Computing Yu Huang and Hao-Chung Yang {r98922015, r98944016}@csie.ntu.edu.tw Department of Computer Science and Information Engineering March 31, 2010 Abstract
Exploiting Local File Inclusion in A Co-Hosting Environment
Whitepaper Exploiting Local File Inclusion in A Co-Hosting Environment A Proof-of-Concept Utkarsh Bhatt Anant Kochhar TABLE OF CONTENTS Abstract... 4 Introduction... 4 Upload Modules... 4 Local File Inclusion...
FileBench's Multi-Client feature
FileBench's Multi-Client feature Filebench now includes facilities to synchronize workload execution on a set of clients, allowing higher offered loads to the server. While primarily intended for network
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
Integrating with BarTender Integration Builder
Integrating with BarTender Integration Builder WHITE PAPER Contents Overview 3 Understanding BarTender's Native Integration Platform 4 Integration Builder 4 Administration Console 5 BarTender Integration
How To Install An Aneka Cloud On A Windows 7 Computer (For Free)
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
System Calls Related to File Manipulation
KING FAHD UNIVERSITY OF PETROLEUM AND MINERALS Information and Computer Science Department ICS 431 Operating Systems Lab # 12 System Calls Related to File Manipulation Objective: In this lab we will be
Survey of Filesystems for Embedded Linux. Presented by Gene Sally CELF
Survey of Filesystems for Embedded Linux Presented by Gene Sally CELF Presentation Filesystems In Summary What is a filesystem Kernel and User space filesystems Picking a root filesystem Filesystem Round-up
What is included in the ATRC server support
Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations
The FOSSology Project Overview and Discussion. » The Open Compliance Program. ... By Bob Gobeille, Hewlett-Packard
» The Open Compliance Program The FOSSology Project Overview and Discussion By Bob Gobeille, Hewlett-Packard A White Paper By The Linux Foundation FOSSology (http://fossologyorg) is an open source compliance
Application for Splunk Enterprise
Application for Splunk Enterprise User Guide Document Version 1.77 28 October 2015 10004-01 EN Rev. A 2015 ThreatConnect, Inc. ThreatConnect is a registered trademark of ThreatConnect, Inc. UNIX is a registered
Using EDA Databases: Milkyway & OpenAccess
Using EDA Databases: Milkyway & OpenAccess Enabling and Using Scripting Languages with Milkyway and OpenAccess Don Amundson Khosro Khakzadi 2006 LSI Logic Corporation 1 Outline History Choice Of Scripting
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
SNMP SECURITY A CLOSER LOOK JEFFERY E. HAMMONDS EAST CAROLINA UNIVERSITY ICTN 6865
SNMP SECURITY A CLOSER LOOK JEFFERY E. HAMMONDS EAST CAROLINA UNIVERSITY ICTN 6865 NOVEMBER 25, 2013 SNMP SECURITY 2 ABSTRACT As a Network Monitoring System Administrator I have gained a substantial amount
SafeNet MSSQL EKM Provider User Guide
SafeNet MSSQL EKM Provider User Guide Version 4.8.5 Documentation Version: 20080705 Copyright Information 2009 SafeNet, Inc. All rights reserved All intellectual property is protected by copyright. All
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49
IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security
1. Overview of Nios II Embedded Development
May 2011 NII52001-11.0.0 1. Overview o Nios II Embedded Development NII52001-11.0.0 The Nios II Sotware Developer s Handbook provides the basic inormation needed to develop embedded sotware or the Altera
Online signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08
Online signature API Version 0.20, 2015-04-08 Terms used in this document Onnistuu.fi, the website https://www.onnistuu.fi/ Client, online page or other system using the API provided by Onnistuu.fi. End
