The active use and exploitation of Microsoft's Application Compatibility Framework. Jon Erickson
|
|
- Jasper Hill
- 8 years ago
- Views:
Transcription
1 The active use and exploitation of Microsoft's Application Compatibility Framework Jon Erickson
2 Me Jon Erickson Sr. Labs Engineer at isight Partners
3 Not Me! I m not that Jon Erickson J Although I would be happy to sign your book.
4 isight Partners Best commercial cyber intelligence provider on the planet. Highly Differentiated Forward looking, adversary focused intelligence, actionable advice Intelligence for multiple levels: executive, operational and technical Only vendor with true global intelligence collection presence Copyright 2014, isight Partners, Inc. All Rights Reserved 4
5 Agenda What is Application Compatibility Tools Prior Work EMET Real World Example
6 Background Copyright 2014, isight Partners, Inc. All Rights Reserved 6
7 Why use Application Compatibility Copyright 2014, isight Partners, Inc. All Rights Reserved 7
8 Some Examples Fix s Crash when alt-tab is pressed Copyright 2014, isight Partners, Inc. All Rights Reserved 8
9 Some Examples Fix s Crash when alt-tab is pressed Copyright 2014, isight Partners, Inc. All Rights Reserved 9
10 Agenda What is Application Compatibility Tools Prior Work EMET Real World Example
11 Tools Application Compatibility Toolkit (Microsoft) Sdb2xml (Microsoft) cdd (Alex Ionesceu) sdbinst (Microsoft) sdb-explorer (Jon Erickson) Copyright 2014, isight Partners, Inc. All Rights Reserved 11
12 Application Compatibility Toolkit Used to create and view SDB files Copyright 2014, isight Partners, Inc. All Rights Reserved 12
13 sdb2xml Created by Heath Stewart (2007) Can dump patch_bits information Does not parse in-memory fix its. Copyright 2014, isight Partners, Inc. All Rights Reserved 13
14 Compatibility Database Dumper (CDD) Compatibility Database Dumper (CDD) v1.0 Copyright (C) 2007 Alex Ionescu usage: cdd.exe [-s][-e][-l][-f][-p][-d kernel-mode database file][-a usermode database file] -s Show shims -e Show executables -l Show layers -f Show flags -p Show patches -d Use Blocked Driver Database from this path -a Use Application Compatibility Database from this path Copyright 2014, isight Partners, Inc. All Rights Reserved 14
15 Installing SDB Files sdbinst [-?] [-q] [-u] [-g] [-p] [-n[:win32 WIN64]] myfile.sdb {guid} "name" -? - print this help text. -p - Allow SDBs containing patches. -q - Quiet mode: prompts are auto-accepted. -u - Uninstall. -g {guid} - GUID of file (uninstall only). -n "name" - Internal name of file (uninstall only). NOTE: Requires Administrator privilege Copyright 2014, isight Partners, Inc. All Rights Reserved 15
16 Installing SDB Files Registry Locations HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion \AppCompatFlags\Custom HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion \AppCompatFlags\InstalledSDB Default File Locations C:\Windows\AppPatch\Custom\ C:\Windows\AppPatch\Custom\Custom64\ Copyright 2014, isight Partners, Inc. All Rights Reserved 16
17 Installing SDB Files sdb-explorer.exe -r filename.sdb [-a application.exe] Does NOT show up in Add remove programs Does NOT copy SDB to default location Requires Administrator privileges Note regarding 64bit Patches: The path of the SDB file MUST contain Custom64 Copyright 2014, isight Partners, Inc. All Rights Reserved 17
18 Agenda What is Application Compatibility Tools Prior Work EMET Real World Example
19 Prior Work Alex Ionesceu Secrets of the Application Compatibility Database (SDB) Mark Baggett Windows Own3d by Default Jon Erickson Persist-It Using and Abusing Microsoft Fix It Patches Chris Graham Shimming Your Way Past UAC Copyright 2014, isight Partners, Inc. All Rights Reserved 19
20 Prior/ Related Work Secrets of the Application Compatibility Database (SDB) - Alex Ionesceu 1 ) Introduction 2 ) System Shims The Most Interesting Ones 3 ) The Private Shim Engine Interface With The PE Loader 4 ) Built-in Shimmed Applications and Specific Shims A Sample Never Released: 5 ) Tool 1 CDD Compatibility Database Dumper 6 ) Flag Shims LUA and Installer Flags 7 ) The Run-Time In-Memory Patching Behavior and Analysis 8 ) The System Blocked Driver Database The Kernel Side of SDB 9 ) Conclusion and Tool 2 Copyright 2014, isight Partners, Inc. All Rights Reserved 20
21 System Shims C:\Windows\AppPatch\ sysmain.sdb drvmain.sdb msimain.sdb pcamain.sdb Copyright 2014, isight Partners, Inc. All Rights Reserved 21
22 System Shims sdb-explorer t sysmain.sdb Copyright 2014, isight Partners, Inc. All Rights Reserved 22
23 System Shims %WINDIR%\AppPatch\en-US\AcRes.dll.mui has descriptions in its string table , "Shim which intercepts the ShowWindow API call and fixes the problem due to tabbed browsing architecture changes in IE. The window an application finds is not the top level window any more, but the child tab window. Caught the ShowWindow API which checks if the class and process name of the window is IE's tab window. And then calls the real ShowWindow on the top level parent window." 60193, "This compatibility fix fixes problems with any application that uses the Shrinker resource compression library. This library hacks resource functions in ntdll and kernel32 and redirect calls into their own function routines. But Ntdll code has different opcodes in Windows XP. The program failed to find the opcode signature and decided to cancel WriteProcessMemory call to write their redirection. Because of this, the necessary decompression of program code and resources were not executed and caused access violation. Shrinker compatibility fix resolves this by providing necessary opcode signature so the app could write those redirection into ntdll." Copyright 2014, isight Partners, Inc. All Rights Reserved 23
24 System Shims %WINDIR%\AppPatch\ja-JP\AcRes.dll.mui has descriptions in its string table , " ShowWindow API 呼 び 出 しを 途 中 で 取 得 し IE のタブ ブラウズ アーキテクチャ 変 更 による 問 題 を 修 正 する shim です アプリケーションが 検 索 するウィンドウは 最 上 位 ウィンドウではなく 子 タブの ウィンドウになります ウィンドウのクラスとプロセス 名 が IE のタブ ウィンドウであるかどうかを 確 認 する ShowWindow API をキャッチしました 次 に 最 上 位 の 親 ウィンドウで 実 際 の ShowWindow を 呼 び 出 し ます , "この 互 換 性 修 正 プログラムは Shrinker リソース 圧 縮 ライブラリを 使 用 するアプリケーションの 問 題 を 修 正 します このライブラリは ntdll と kernel32 のリソース 関 数 をハッキングし 呼 び 出 しをリソー ス 関 数 の 関 数 ルーチンにリダイレクトします ただし Windows XP では Ntdll コードに 異 なるオペコード があります プログラムはオペコード 署 名 の 確 認 に 失 敗 し リダイレクトを 書 き 込 むための WriteProcessMemory 呼 び 出 しの 取 り 消 しを 決 定 しました このため プログラム コードとリソースの 圧 縮 解 除 が 実 行 されず アクセス 違 反 が 発 生 しました Shrinker 互 換 性 修 正 プログラムは アプリケーショ ンがリダイレクトを ntdll に 書 き 込 めるように 必 要 なオペコード 署 名 を 提 供 して この 問 題 を 解 決 します Copyright 2014, isight Partners, Inc. All Rights Reserved 24
25 Prior Work Alex Ionesceu Secrets of the Application Compatibility Database (SDB) Mark Baggett Windows Own3d by Default Jon Erickson Persist-It Using and Abusing Microsoft Fix It Patches Chris Graham Shimming Your Way Past UAC Copyright 2014, isight Partners, Inc. All Rights Reserved 25
26 Prior/ Related Work Mark Baggett Windows - Owned By Default! (DerbyCon 2013) Process Execution Redirection API Hooking Hiding in the File System Hiding in the Registry Disable Security Features of the OS Execute Backdoors Copyright 2014, isight Partners, Inc. All Rights Reserved 26
27 InjectDll Details 2524a TAG SHIM TAG NAME: InjectDll TAG 600a - DLLFILE: AcGenral.DLL 2525c TAG FIX_ID: {GUID} TAG GENERAL TAG DESCRIPTION_RC_ID: (0xeafb) AcGenral.dll NS_InjectDll::NotifyFn() LoadLibraryW() Copyright 2014, isight Partners, Inc. All Rights Reserved 27
28 RedirectEXE 26dbc TAG 7004 SHIM 26dc2 TAG NAME: RedirectEXE 26dc8 TAG 600a - DLLFILE: AcGenral.DLL 26dce TAG FIX_ID: {GUID} 26de4 TAG GENERAL 26de6 TAG DESCRIPTION_RC_ID: (0xeb10) AcGenral.dll NS_RedirectEXE::NotifyFn() CreateProcessA() CloseHandle(hProcess) CloseHandle(hThread) ExitProcess() Copyright 2014, isight Partners, Inc. All Rights Reserved 28
29 Prior Work Alex Ionesceu Secrets of the Application Compatibility Database (SDB) Mark Baggett Windows Own3d by Default Jon Erickson Persist-It Using and Abusing Microsoft Fix It Patches Chris Graham Shimming Your Way Past UAC Copyright 2014, isight Partners, Inc. All Rights Reserved 29
30 Fix-It Patch Analysis How is this different from patches released on patch Tuesday? BinDiff mshtml.dll from MS vs. MS Different matched functions 16 unmatched functions Fix It Patch for CVE Changes Copyright 2014, isight Partners, Inc. All Rights Reserved 30
31 Preventing 0-Day Exploitation CVE / CVE (October/November 2014) OLE Packager Vulnerability CVE (February 2014) IE Use After Free CVE (September 2013) IE Memory Corruption CVE (December 2012) IE Use After Free CVE (June 2012) XML Core Services
32 Sandworm CVE InfDefaultInstall.exe EVIL.inf
33 Sandworm CVE InfDefaultInstall.exe EVIL.inf
34 Sandworm CVE InfDefaultInstall.exe EVIL.inf Steps: PowerPoint Loads packager.dll to handle Packager Object Packager.dll copies evil.inf to Temp folder PowerPoint Animation invokes packager.dll DoVerb command DoVerb command performs right click context menu action for install. Packager.dll launches InfDefaultInstall to handle install action. Copyright 2014, isight Partners, Inc. All Rights Reserved 34
35 Sandworm CVE Fix InfDefaultInstall.exe EVIL.inf FIXED October 2014 Steps: PowerPoint Loads packager.dll to handle Packager Object Packager.dll copies evil.inf to Temp folder - Mark file unsafe PowerPoint Animation invokes packager.dll DoVerb command DoVerb command performs right click context menu action for install. Packager.dll launches InfDefaultInstall to handle install action. - Checks for unsafe flag - Prompts Users Copyright 2014, isight Partners, Inc. All Rights Reserved 35
36 Sandworm CVE Fix InfDefaultInstall.exe EVIL.inf Copyright 2014, isight Partners, Inc. All Rights Reserved 36
37 CVE CVE Bypasses Google found in the wild IDLE starts Executing special.py file Haifei Li found and notified Microsoft Copyright 2014, isight Partners, Inc. All Rights Reserved 37
38 CVE CVE Bypasses Google found in the wild IDLE starts And executes special.py file (Haifei Li found) Copyright 2014, isight Partners, Inc. All Rights Reserved 38
39 Sandworm Bypass Fix-It 1cae TAG EXE 1cb4 TAG NAME: POWERPNT.exe 1cba TAG APP_NAME: POWERPNT.exe 1cc0 TAG VENDOR: Microsoft 1cc6 TAG EXE_ID: {D82187EB-A66D-4A6A-B6BA-0F5738B5D08E} 1cdc TAG APP_ID: {F503FB56-18CF-4B58-80D0-02AC0D38D698} 1cf2 TAG MATCHING_FILE 1cf8 TAG NAME: * 1cfe TAG COMPANY_NAME: Microsoft Corporation 1d04 TAG MATCHING_FILE 1d0a TAG NAME: %windir%\system32\packager.dll 1d10 TAG BIN_FILE_VERSION: d1a TAG 400b - PE_CHECKSUM: (0x13541) 1d20 TAG 700a - PATCH_REF 1d26 TAG NAME: ef1de1e8-f d-819c f7eb22 1d2c TAG PATCH_TAGID: 972 (0x3cc) Copyright 2014, isight Partners, Inc. All Rights Reserved 39
40 Sandworm Bypass Fix-It Output from sdb-explorer Copyright 2014, isight Partners, Inc. All Rights Reserved 40
41 Sandworm Bypass Fix-It With Fix It Copyright 2014, isight Partners, Inc. All Rights Reserved 41
42 CVE Fix IDLE starts Executing evil2.py FIXED November 2014 Steps: PowerPoint Loads packager.dll to handle Packager Object. Packager.dll copies evil.inf to Temp folder. - Mark file unsafe (from CVE Fix). PowerPoint Animation invokes packager.dll DoVerb command. DoVerb command performs right click context menu action for edit. Prompts User Packager.dll launches IDLE to handle Edit with IDLE action. IDLE Looks for python file with specific name and executes it. Doesn t care about unsafe flag. Copyright 2014, isight Partners, Inc. All Rights Reserved 42
43 CVE Fix IDLE starts Executing evil2.py Copyright 2014, isight Partners, Inc. All Rights Reserved 43
44 CVE Fix IDLE starts Executing evil2.py Copyright 2014, isight Partners, Inc. All Rights Reserved 44
45 In-Memory Patches Application Compatibility Toolkit has no concept of in-memory patches Copyright 2014, isight Partners, Inc. All Rights Reserved 45
46 Analyzing CVE Fix-It October 21 st, 1 week after CVE was patched. Targets: (sdb-explorer.exe -d CVE bit-Shim.sdb) %windir%\system32\packager.dll ( ) Checksum = (0x1708a) %windir%\system32\packager.dll ( ) Checksum = (0x1a612) %windir%\system32\packager.dll ( ) Checksum = (0x13541) %windir%\system32\packager.dll ( ) Checksum = (0x171ab) %windir%\system32\packager.dll ( ) Checksum = (0x14f94) %windir%\system32\packager.dll ( ) Checksum = (0x17675) %windir%\system32\packager.dll ( ) Checksum = (0x173b6) %windir%\syswow64\packager.dll ( ) Checksum = (0x1708a) %windir%\syswow64\packager.dll ( ) Checksum = (0x1a612) %windir%\syswow64\packager.dll ( ) Checksum = (0x13541) %windir%\syswow64\packager.dll ( ) Checksum = (0x171ab) %windir%\syswow64\packager.dll ( ) Checksum = (0x14f94) %windir%\syswow64\packager.dll ( ) Checksum = (0x17675) %windir%\syswow64\packager.dll ( ) Checksum = (0x173b6) Copyright 2014, isight Partners, Inc. All Rights Reserved 46
47 Analyzing CVE (sdb-explorer) sdb-explorer.exe -t my.sdb Prints Tree View, similar to sdb2xml Copyright 2014, isight Partners, Inc. All Rights Reserved 47
48 Analyzing CVE (sdb2xml) sdb2xml my.sdb Copyright 2014, isight Partners, Inc. All Rights Reserved 48
49 Patch Details patch, patchbits, patchref, patch_tag_id, checksum Copyright 2014, isight Partners, Inc. All Rights Reserved 49
50 Patch Details sdb-explorer.exe -p CVE bit-Shim.sdb 0x2ea Copyright 2014, isight Partners, Inc. All Rights Reserved 50
51 IDAPython Script sdb-explorer.exe -i -p CVE bit-Shim.sdb 0x2ea Copyright 2014, isight Partners, Inc. All Rights Reserved 51
52 Persist-It sdb-explorer Explanation of in-memory patch file format. Lots of details Shows how to analyze fix-it patches Showed how to create your own in-memory patches. Copyright 2014, isight Partners, Inc. All Rights Reserved 52
53 Prior Work Alex Ionesceu Secrets of the Application Compatibility Database (SDB) Mark Baggett Windows Own3d by Default Jon Erickson Persist-It Using and Abusing Microsoft Fix It Patches Chris Graham Shimming Your Way Past UAC Copyright 2014, isight Partners, Inc. All Rights Reserved 53
54 Shimming Your Way Past UAC Windows signed files with AutoElevate permission. Example: SndVol.exe Uses RedirectEXE shim type. Steps: Create Shim for SndVol.exe that does RedirectEXE to evil.exe Register Shim Start SndVol.exe Copyright 2014, isight Partners, Inc. All Rights Reserved 54
55 Agenda What is Application Compatibility Tools Prior Work EMET Real World Example
56 EMET The Enhanced Mitigation Experience Toolkit DEP SEHOP Null Page Heap Spray Protection EAF Mandatory ASLR ROP Detection Attack Surface Reduction Copyright 2014, isight Partners, Inc. All Rights Reserved 56
57 EMET %WINDIR%\AppPatch\EMET.dll %WINDIR%\AppPatch\AppPatch64\EMET.dll Copyright 2014, isight Partners, Inc. All Rights Reserved 57
58 EMET EMET Shim Copyright 2014, isight Partners, Inc. All Rights Reserved 58
59 Agenda What is Application Compatibility Tools Prior Work EMET Real World Example
60 Real World Examples Search Protect BlackEnergy Win32/Farfli.BEK Copyright 2014, isight Partners, Inc. All Rights Reserved 60
61 Search Protect Potentially unwanted program (PUP) Adware Now using Application Compatibility to persist Uses InjectDll Shim Loads Search Protect library into browsers Copyright 2014, isight Partners, Inc. All Rights Reserved 61
62 BlackEnergy/Quedagh Recently targeting Ukrainian Government. Uses UAC Bypass. Same technique as Chris Graham Driver Signing Bypass Shim? To patch user32.dll-mui
63 Win32/Farfli.BEK Persistence Anton Cherepanov ESET Reported at ZeroNights 2014 Win32/Farfli.BEK drops following files: %WINDIR%\AppPatch\msimain.mui raw code %WINDIR%\AppPatch\AcProtect.dll Drops Shim DataBase & registers it: %WINDIR%\AppPatch\Custom\%GUID%.sdb Copyright 2014, isight Partners, Inc. All Rights Reserved 63
64 Win32/Farfli.BEK Persistence EMET-Style sdb Copyright 2014, isight Partners, Inc. All Rights Reserved 64
65 What Can You Do? Disable the Shim Engine I do NOT recommend this Breaks EMET Disables 0day Fix-Its GPEdit.msc Administrative Templates \ Windows Components \ Application Compatibility \ Turn off Application Compatibility Engine Copyright 2014, isight Partners, Inc. All Rights Reserved 65
66 Recommendations Search your registry and File System Your system will have SDB Files, there are defaults Use the knowledge you gained AutoRuns (SysInternals) does not consider Application Compatibility Fixes They are aware and are working on it J Add signatures to SDB files (Microsoft) Notification of non-signed SDB files running, or about to run (Microsoft) Copyright 2014, isight Partners, Inc. All Rights Reserved 66
67 Summary Application Compatibility Toolkit is a new method attackers are using today. This is not a vulnerability This is a feature that attackers are abusing Defenders should start looking for this on the machines in their networks. SDB File requires Administrator privilege to install Copyright 2014, isight Partners, Inc. All Rights Reserved 67
68 References Baggett, M. (2013, February 23) Posts and Publications. Retrieved October 23, 2013, from In Depth Defense: Ionescu, A. (2007, May 20). Secrets of the Application Compatilibity Database (SDB) Part 1. Retrieved September 5, 2013, from Alex Ionescu's Blog: Ionescu, A. (2007, May 26). Secrets of the Application Compatilibity Database (SDB) Part 3. Retrieved September 5, 2013, from Alex Ionescu s Blog: Mark Russinovich, B. C. (2013, August 1). Autoruns for Windows v Retrieved September 5, 2013, from Windows Sysinternals: sysinternals/bb aspx Microsoft. (2013, September 6).!chkimg. Retrieved October 2, 2013, from Dev Center: 85%29.aspx Microsoft. (2013, October 1). Application Compatibility Database. Retrieved October 23, 2013, from Microsoft Developer Network: bb aspx Microsoft. (2013). Fix it Solution Center. Retrieved October from Microsoft Support: Microsoft. (2012, October 1). Microsoft Security Advisory: Vulnerability in Microsoft XML Core Services could allow remote code execution. Retrieved September 5, 2013, from Microsoft Support: Microsoft. (2012, December 7). Shim Database Types. Retrieved September 5, 2013, from Microsoft Developer Network: bb432483%28v=vs.85%29.aspx Sikka, N. (2013, September 17). CVE : Fix it workaround available. Retrieved October 02, 2013, from Security Research & Defense: srd/archive/2013/09/17/cve fix-it-workaround-available.aspx Stewart, H. (2007, November 3). Shim Database to XML. Retrieved September 5, 2013, from Setup & Install by Heath Stewart: /11/02/sdb2xml.aspx ddilabs.blogspot.com/2014/05/shimming-your-way-past-uac.html Copyright 2014, isight Partners, Inc. All Rights Reserved 68
69 Thanks Kat, Josh, Sam, zen, Mac, Mike, Dave, Sean, Darel, Brad A., Matt G., Mark B., Chris G, Mark R., Microsoft, isight Partners, and all others who will remain nameless.
70 Questions jerickson isightpartners.com Source Code:
Using and Abusing Microsoft Fix It Patches Jon Erickson
Persist It Using and Abusing Microsoft Fix It Patches Jon Erickson About Me Jon Erickson (@2130706433) Engineer @isight Partners 2 isight Partners isight Partners Best commercial cyber threat intelligence
More informationPersist It Using and Abusing Microsoft s Fix It Patches
Persist It Using and Abusing Microsoft s Fix It Patches Jon Erickson : isight Partners : jerickson@isightpartners.com Abstract: Microsoft has often used Fix it patches, which are a subset of Application
More informationMalicious Application Compatibility Shims
Malicious Application Compatibility Shims Table of Contents Introduction... 2 Background... 2 How the Windows Image Loader works with the Shim Engine... 6 Prior Work... 7 In the wild... 9 Other Offensive
More informationレッドハット 製 品 プライスリスト Red Hat Enterprise Linux2013 新 製 品 (ベースサブスクリプション) 更 新 :2015 年 4 22
Red Hat Enterprise Linux2013 新 製 品 (ベースサブスクリプション) 更 新 :2015 年 4 22 薄 紫 :3 年 型 番 :5 年 型 番 字 : 新 規 追 加 変 更 新 規 新 規 SKU 製 品 名 ソケット ゲストOS サポート 期 間 標 準 価 格 備 考 Server RH00001 Red Hat Enterprise Linux for Virtual
More informationCost Accounting 1. B r e a k e v e n A n a l y s i s. S t r a t e g y I m p l e m e n t a t i o n B a l a n c e d S c o r e c a r d s
Cost Accounting 1 B r e a k e v e n A n a l y s i s S t r a t e g y I m p l e m e n t a t i o n B a l a n c e d S c o r e c a r d s S t r a t e g y M o n i t o r i n g R e s p o n s i b i l i t y S e g
More informationHow To Run A Server On A Microsoft Cloud Server (For A Small Amount Of Money)
1SoftLayer 2WindowsServer2003 0 2013 8 t-sasaki@bit-surf.co.jp t-sasaki@bit-isle.co.jp BOE SoftLayer ID desktomo --- --- IT ISPDC CC ADSL3 SIer DC 5 ERP 2015 1 IT IT idc IT 200 140-0002 2-2-28 T 8F TEL
More informationDocument and entity information
Company information Company information FASF member mark Document name Document and entity information Aug 2015 第 3 四 半 期 決 算 短 信 日 本 基 準 ( 連 結 ) Filing date 20150710 Company name TRANSACTION CO., Ltd.
More informationこの 外 国 弁 護 士 による 法 律 事 務 の 取 扱 いに 関 する 特 別 措 置 法 施 行 規 則 の 翻 訳 は 平
この 外 国 弁 護 士 による 法 律 事 務 の 取 扱 いに 関 する 特 別 措 置 法 施 行 規 則 の 翻 訳 は 平 成 十 六 年 法 務 省 令 第 6 号 までの 改 正 ( 平 成 16 年 4 月 1 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 18 年 3 月 版 )に 準 拠 して 作 成 したものです なお この 法 令 の 翻
More informationレッドハット 製 品 プライスリスト Red Hat Enterprise Linux 製 品 (RHEL for HPC) 更 新 :2015 年 4 22
レッドハット 製 品 プライスリスト Red Hat Enterprise Linux 製 品 (RHEL for HPC) 更 新 :2015 年 4 22 薄 紫 :3 年 型 番 :5 年 型 番 字 : 新 規 追 加 変 更 当 価 格 表 は 予 告 なしに 変 更 する 場 合 がございますので ご 了 承 ください 価 格 は 全 て 税 抜 きでの 掲 載 となっております 新 規
More informationTS-3GB-S.R0125-505-0v1.0 VoIP Supplementary Services Descriptions: Call Forwarding - Unconditional
TS-GB-S.R0--0v.0 VoIP Supplementary Services Descriptions: Call Forwarding - Unconditional 0 年 月 日 制 定 社 団 法 人 情 報 通 信 技 術 委 員 会 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE 本 書 は ( 社 ) 情 報 通 信 技 術 委 員 会
More informationEDB-Report. 最 新 Web 脆 弱 性 トレンドレポート(2014.11) 2014.11.01~2014.11.30 Exploit-DB(http://exploit-db.com)より 公 開 されている 内 容 に 基 づいた 脆 弱 性 トレンド 情 報 です
04. 最 新 Web トレンドレポート(04.) 04..0~04..30 Exploit-DB(http://exploit-db.com)より 公 開 されている 内 容 に 基 づいた トレンド 情 報 です サマリー ペンタセキュリティシステムズ 株 式 会 社 R&Dセンター データセキュリティチーム 04 年 月 は Exploit-DBより 公 開 されている の 中 SQLインジェクション(SQL
More informationElectricity Business Act ( Act No. 170 of July 11, 1964)
この 電 気 事 業 法 の 翻 訳 は 平 成 十 七 年 法 律 第 八 十 七 号 までの 改 正 ( 平 成 18 年 5 月 1 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 18 年 3 月 版 )に 準 拠 して 作 成 したものです なお この 法 令 の 翻 訳 は 公 定 訳 ではありません 法 的 効 力 を 有 するのは 日 本 語 の
More informationPanasonic AC-DC Power Supply Design Support Service
Panasonic AC-DC Power Supply Design Support Service The best solution to design your AC-DC power supply (how to design a switching power supply, order a transformer, prevent EMI, etc.) Panasonic s IPD
More information育 デジ (Iku-Digi) Promoting further evolution of digital promotion
育 デジ (Iku-Digi) Promoting further evolution of digital promotion Abstract Digital promotion has established its presence and become a commodity in the pharmaceutical industry. In the last few years, use
More informationレッドハット 製 品 プライスリスト 標 準 価 格. Red Hat Enterprise Linux 製 品 (RHEL Server)
レッドハット 製 品 プライスリスト Red Hat Enterprise Linux 製 品 (RHEL Server) 新 価 格 は6 月 1 日 から 適 用 開 始 と 致 します 薄 紫 :3 年 型 番 水 色 :5 年 型 番 赤 文 字 : 新 規 追 加 変 更 当 価 格 表 は 予 告 なしに 変 更 する 場 合 がございますので ご 了 承 ください 税 込 価 格 は
More informationDirect Marketing Production Printing & Value-Added Services: A strategy for growth
2015 年 12 月 Direct Marketing Production Printing & Value-Added Services: A strategy for growth 完 成 のご 案 内 ダイレクトマーケティングにおける 印 刷 物 & 付 加 価 値 サービス : 成 長 への 戦 略 とは? 印 刷 物 を 活 用 したダイレクトマーケティングが 成 長 しており デジタル
More informationGraduate Program in Japanese Language and Culture (Master s Program) Application Instructions
Graduate Program in Japanese Language and Culture (Master s Program) Application Instructions For FY 2016 1. Objectives This program is designed to provide teachers of the Japanese-language working abroad
More informationData Mining for Risk Management in Hospital Information Systems
Data Mining for Risk Management in Hospital Information Systems Shusaku Tsumoto and Shoji Hirano Department of Medical Informatics, Shimane University, School of Medicine, 89-1 Enya-cho, Izumo 693-8501
More informationAdvanced Training Program for Teachers of the Japanese-Language Application Instructions For FY 2016
Advanced Training Program for Teachers of the Japanese-Language Application Instructions For FY 2016 1. Objectives The Advanced Training Program at the Japan Foundation Japanese-Language Institute, Urawa
More informationLinux Foundation Automotive Summit - Yokohama, Japan
It s not an embedded Linux distribution It creates a custom one for you. The Yocto Project Linux Foundation Automotive Summit - Yokohama, Japan Tracey M. Erway The Yocto Project Advocacy and Communications
More informationAUTOMOBILE LIABILITY SECURITY ACT
AUTOMOBILE LIABILITY SECURITY ACT & RELATED CABINET ORDER, MINISTERIAL ORDINANCE AND NOTIFICATION Including: Policy Conditions for Automobile Liability Insurance As of May 2, 2011 Translated and published
More information<HNAS_SNMP 監 視 取 扱 説 明 書 別 紙 2 イベントリスト> Event ID
Event 1004 ServiceNotStarted Severe %s services have not been started as failed to start last time The service was not started due to a problem starting it previously
More informationMy experience of Ruby Education in Taiwan
My experience of Ruby Education in Taiwan ~ 台 湾 にRuby 教 育 で 得 た 知 見 Mu-Fan Teng(@ryudoawaru) Ruby World Conference はじめに 発 表 する 機 会 をいただき ありがとうございます 自 己 紹 介 鄧 慕 凡 (Mu-Fan Teng) a.k.a: 竜 堂 終 両 方 どもある 小 説
More informationCurrent Situation of Research Nurse Education and Future Perspectives in Japan
Current Situation of Research Nurse Education and Future Perspectives in Japan Eriko Aotani Clinical Trials Coordinating Center The Kitasato Institute 1 Who are involved in Clinical Trials? Patients. Others
More informationGreen Solution with Simegy
要 旨 オフィス 環 境 における 複 合 機 やプリンターの 消 費 電 力 の 見 える 化 や 消 費 電 力 の 削 減 のためのグリーン ソリューションが 近 年 強 く 求 められている 富 士 ゼ ロックスは 複 合 機 やプリンターを 管 理 / 活 用 するた めの ApeosWare Management Suite のようなソフ トウェアに 対 して ゼロックスの Simegy
More information医 学 生 物 学 一 般 問 題 ( 問 題 用 紙 1 枚 解 答 用 紙 2 枚 )
平 成 26 年 度 大 学 院 医 学 研 究 科 博 士 課 程 入 学 試 験 (1 回 目 ) 医 学 生 物 学 一 般 問 題 ( 問 題 用 紙 1 枚 解 答 用 紙 2 枚 ) 以 下 の 問 題 1 問 題 4のうち 二 つの 問 題 を 選 択 して 解 答 しなさい 一 つの 問 題 につき1 枚 の 解 答 用 紙 を 使 用 しなさい 紙 面 不 足 の 場 合 は 裏
More informationBushido: Way of the Samurai. Golden Screens. Chokuo TAMURA Hawks with pine and plum blossom 163.6 x 376.0 cm each
Bushido: Way of the Samurai Golden Screens Chokuo TAMURA Hawks with pine and plum blossom 163.6 x 376.0 cm each 金 Noh 屏 Theatre 風 robes teacher s notes Kin Byōbu Golden Screen teacher s notes Decorative
More informationDiscover the power of reading for university learners of Japanese in New Zealand. Mitsue Tabata-Sandom Victoria University of Wellington
Discover the power of reading for university learners of Japanese in New Zealand Mitsue Tabata-Sandom Victoria University of Wellington The power of reading The power of reading is claimed by Krashen (2004).
More informationPublic Financial Assistance for Formal Education in Japan
Public Financial Assistance for Formal Education in Japan In Japan, households bear a particularly high proportion of the costs of pre-primary and tertiary education compared with other OECD countries
More informationWhy today? What s next?
Closing PhUSE Single Day Events, Tokyo, 31 st Oct 2014 Why today? What & why PhUSE? What s next? Link to Prezi http://prezi.com/p77zfstdrzfs/present/?auth_key=4d37wvn&follow=cdxkkrg_3vlu&kw=present p77zfstdrzfs&rc=ref
More informationこの 育 児 休 業 介 護 休 業 等 育 児 又 は 家 族 介 護 を 行 う 労 働 者 の 福 祉 に 関 する 法 律 の 翻 訳 は 平 成 十 六 年 法 律 第 百 六 十 号 までの 改 正 ( 平 成 17 年 4 月 1 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 18 年 3 月 版 )に 準 拠 して 作 成 したものです なお この
More informationUtilization & Promotion Activities of Cloud in Japan
CloudAsia Utilization & Promotion Activities of Cloud in Japan 28th, October, 2015 ASP-SaaS-Cloud Consortium (ASPIC) http://www.aspicjapan.org/en/index.html 1 Agenda Current situation in Japan Cloud promotion
More informationWicket. 2013.09.12 Hiroto Yamakawa
Wicket 2013.09.12 Hiroto Yamakawa @gishi_yama yamakawa@photon.chitose.ac.jp Apache Wicket 6 Wicket Wicket-Sapporo New! "...Wicket Java " Java Apache Wicket, "Apache Wicket Web ",, pp.17 "...Apache Wicket
More informationPosting and Reading Messages (PC version) 1/4
Posting and Reading Messages (PC version) 1/4 3-1 TOP page Display a message board on which to post messages. Enter the phone number where you wish to post a message and press Post button. Phone number
More informationAbbreviations. Learning Goals and Objectives 学 習 到 達 目 標. Structure of Presentation
Learning Goals and Objectives 学 習 到 達 目 標 Accrediting Medical Schools: Lessons learned from Liaison Committee on Medical Education (LCME) process in the United States 医 学 部 の 認 証 評 価 : 米 国 LCMEの 認 証 評
More informationAct on Special Measures Concerning Nuclear Emergency Preparedness (Act No. 156 of December 17, 1999)
この 原 子 力 災 害 対 策 特 別 措 置 法 の 翻 訳 は 平 成 18 年 法 律 第 118 号 までの 改 正 ( 平 成 19 年 1 月 9 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 19 年 3 月 版 )に 準 拠 して 作 成 したものです なお この 法 令 の 翻 訳 は 公 定 訳 ではありません 法 的 効 力 を 有 するのは
More informationオープンソース NFV プラットフォーム の 取 り 組 み
オープンソース NFV プラットフォーム の 取 り 組 み 平 成 27 年 4 月 レッドハット アジア 太 平 洋 地 域 事 業 開 発 戦 略 本 部 テレコム & NFV チーフ テクノロジスト 杉 山 秀 次 自 己 紹 介 ネットワーク 業 界 歴 27 年 現 在 レッドハットアジア 太 平 洋 地 域 において NFVチーフテクノロジストとして 活 動 前 職 はジュニパーネットワークスにてR&Dサポート
More informationHow Should Remote Monitoring Sensor Be Accurate?
CS27 Laboratory How Should Remote Monitoring Sensor Be Accurate? Seiki Tokunaga Shinsuke Matsumoto Sachio Saiki Masahide Nakamura Graduate School of System Informatics Kobe University, Japan 1 Remote Monitoring
More informationHow To Teach English At Kumon
English Education at Kumon 1 Running Head: ENGLISH EDUCATION AT KUMON English Education at KUMON ~ A Case Study of Two Children and their Mothers ~ by Yukiko Kawabata A graduation thesis submitted to the
More information第 9 回 仮 想 政 府 セミナー Introduction Shared Servicesを 考 える ~Old but New Challenge~ 東 京 大 学 公 共 政 策 大 学 院 奥 村 裕 一 2014 年 2 月 21 日
第 9 回 仮 想 政 府 セミナー Introduction Shared Servicesを 考 える ~Old but New Challenge~ 東 京 大 学 公 共 政 策 大 学 院 奥 村 裕 一 2014 年 2 月 21 日 シェアードサービス(SS) ~Definition( 定 義 )~ 複 数 部 門 で 行 っている 同 類 の 業 務 を 一 つの 部 門 に 集 約
More informationTeacher Training and Certificate System
Teacher Training and Certificate System 1. Teacher Training Teacher training in Japan started with the establishment of normal schools (schools for teacher training) in 1872. In 1886, a higher normal school
More informationUsing the Moodle Reader Module to Facilitate an Extensive. Reading Program
RESEARCH NOTE 41 Using the Moodle Reader Module to Facilitate an Extensive Reading Program Wayne Pennington Introduction Early attempts to incorporate Extensive Reading as a teaching technique can be traced
More informationEFL Information Gap Activities for Architecture Majors
東 洋 大 学 人 間 科 学 総 合 研 究 所 紀 要 第 10 号 (2009) 11-20 11 EFL Information Gap Activities for Architecture Majors Michael SCHULMAN * A large body of literature supports the notion that information gap activities,
More informationFor victims of traffic accidents
For victims of traffic accidents 交 通 事 故 に 遭 われた 方 へ (Guideline for victims) ( 被 害 者 の 手 引 ) Name( 名 前 ) Police Station( 警 察 署 ) Contact( 担 当 者 ) Telephone Number( 電 話 番 号 ) Preface This leaflet has been
More informationDC DC φ φ DC φ φ AC φ φ φ φ φ φ φ 24V DC Class2 This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1 ) this device may not cause harmful interference,and
More informationSPECIFICATION. Not recommend for new design. MS6M00814. Power Integrated Module 7MBR15UF060 MS6M00814. Fuji Electric Device Technology Co.,Ltd.
SPECIFICATION Device Name : Power Integrated Module Type Name : Spec. No. : 7MBR15UF6 MS6M814 D R A W N CHECKED CHECKED D A T E N A M E A P P R O V E D Dec.-- '4 Dec.-- '4 K. Komatsu O. Ikawa K. Yamada
More informationAPPLICATION VIRTUALIZATION TECHNOLOGIES WHITEPAPER
APPLICATION VIRTUALIZATION TECHNOLOGIES WHITEPAPER Oct 2013 INTRODUCTION TWO TECHNOLOGY CATEGORIES Application virtualization technologies can be divided into two main categories: those that require an
More informationResearch on Support for Persons with Mental Disability to Make Transition to Regular Employment
Research on Support for Persons with Mental Disability to Make Transition to Regular Employment (Research Report No.108) Summary Key Words Persons with Mental Disabilities, Step-Up Employment Program for
More informationManaging HKU author reputations, enhancing HKU's reputation. Creative Commons: Attribution 3.0 Hong Kong License
Title Managing HKU author reputations, enhancing HKU's reputation Author(s) Palmer, DT Citation The World 100 Conference: Managing University Reputation in a Competitive World, Hong Kong, 22-23 June 2010.
More informationCash, Receivables & Marketable Securities
KK Cash, Receivables & Marketable Securities CURRENT ASSETS ( 流 動 資 産 ) 代 表 的 な 資 産 は Cash ( 現 金 ) Marketable Securities ( 有 価 証 券 ) Accounts Receivable ( 売 掛 金 ) Notes Receivable ( 手 形 ) Inventories
More informationTN 024 - Installing PV4E 6.0 under Windows Server 2008 (R2) (3264 Bit) and Remote DB Support
TN 024 - Installing PV4E 6.0 under Windows Server 2008 (R2) (3264 Bit) and Remote DB Support Issue Date: 28.07.2013 Revision Date: 28.07.2013 Product (configuration) CenterMind PV4E PV4E 6.0 PV4E 6.0 SP1
More informationChiba Institute of Technology Graduate School
Academic Year 2015 Chiba Institute of Technology Graduate School Fall Enrollment: September Examination International Student Admission Examination Application Guidelines Graduate School of Engineering
More informationMicrosoft Update Management. Sam Youness Microsoft
Microsoft Update Management Sam Youness Microsoft Microsoft s Areas of Focus for ICS Risk Management Secure Development Device and Network Security Identity and Access Management Operational Response Get
More informationXF Extracellular Flux Analyzer. Installation and Troubleshooting Guide
Installation and Troubleshooting Guide February 24, 2014 2 TABLE OF CONTENTS XF Client System and File Requirements 4 Frequently Asked Questions. 4 Installation.. 5 Installing XF Software.. 5 Resolving
More informationUpper Secondary Education in Japan
Upper Secondary Education in Japan The role of upper secondary education in Japan is to provide higher general education and specialized education according to students mental and physical development
More informationMost EFL teachers in Japan find that there are groups of verbs which consistently
Results of a Corpus Study of LOOK, SEE, and WATCH Gregory C. Anthony Hachinohe University Reference Data: Anthony, G. C. (2012). Results of a Corpus Study of LOOK, SEE, and WATCH. In A. Stewart & N. Sonda
More informationMicrosoft Security Bulletin MS09-053 - Important
Microsoft Security Bulletin MS09-053 - : Vulnerabilities in FTP Service for...page 1 of 28 TechNet Home > TechNet Security > Bulletins Microsoft Security Bulletin MS09-053 - Vulnerabilities in FTP Service
More informationMPLS Configration 事 例
MPLS Configration 事 例 JANOG6 MPLSパネル グローバルワン 株 式 会 社 06/16/2000 JANOG6 MPLS Pannel 1 MPLS Configration なにが 必 要?(Ciscoしかわかりません) IOSは12.0(7) T 以 上 がいい PEは3600, 4500, 7200, and 7500 PはCisco LS1010, 7200,
More information第 2 回 Linux-HA Japan 勉 強 会
第 2 回 Linux-HA Japan 勉 強 会 2011 年 6 月 3 日 NTTデータ 先 端 技 術 株 式 会 社 池 田 淳 子 本 日 のお 題 crm の 歩 き 方 目 次 1.crm シェルとは 2.crm シェルのインストール 3.crm シェルでリソースを 設 定 する 4.crm シェルでクラスタを 管 理 する 1. crm シェルとは crm シェルとは acemakerに
More information7 myths about cars and free trade agreements
ECIPE PRESENTATION» 7 myths about cars and free trade agreements Hosuk Lee-Makiyama Co-Director, European Centre for International Political Economy (ECIPE) Myth #1 作 り 話 #1 Mythe #1 Foreign imports are
More information外 部 委 託 が 進 む 中 での 地 方 自 治 体 職 員 の 雇 用 の 保 護 PROTECTION OF EMPLOYMENT FOR LOCAL GOVERNMENT WORKERS UNDER OUTSOURCING
外 部 委 託 が 進 む 中 での 地 方 自 治 体 職 員 の 雇 用 の 保 護 PROTECTION OF EMPLOYMENT FOR LOCAL GOVERNMENT WORKERS UNDER OUTSOURCING 概 要 保 守 党 のサッチャー 政 権 は 1980 年 地 方 自 治 体 計 画 土 地 法 と 1988 年 地 方 自 治 法 を 通 して UKでの 公 共
More informationGetting Started. A guide for newly qualified translators
Getting Started A guide for newly qualified translators 1 GETTING STARTED WITH GENGO Gengo is an online, crowdsourced translation service. This guide is designed for newly qualified Gengo Translators and
More informationA Content- Specific Task-Based Language Program for Online Business English Instruction
A Content- Specific Task-Based Language Program for Online Business English Instruction M. Michael Hadas BBT Online University Reference Data: Hadas, M. M., (2014). A content-specific task-based language
More informationSystem Planning, Deployment, and Best Practices Guide
www.novell.com/documentation System Planning, Deployment, and Best Practices Guide ZENworks Application Virtualization 9.0 February 22, 2012 Legal Notices Novell, Inc., makes no representations or warranties
More informationEMET 4.0 PKI MITIGATION. Neil Sikka DefCon 21
EMET 4.0 PKI MITIGATION Neil Sikka DefCon 21 ABOUT ME Security Engineer on MSRC (Microsoft Security Response Center) I look at 0Days EMET Developer I enjoy doing security research on my free time too:
More informationIHS Technology. IHS Technology Business Intelligence Enabling market leadership through research, analysis and strategy
2015 年 8 月 13 日 改 訂 IHS IHS Business Intelligence Enabling market leadership through research, analysis and strategy 世 界 に 誇 る 圧 倒 的 な 調 査 領 域 で お 客 様 のあらゆる 課 題 解 決 を サポートいたします IHS - Leading information,
More informationAdobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
More informationDesign Act ( Act No. 125 of 1959)
この 意 匠 法 の 翻 訳 は 平 成 十 八 年 法 律 第 五 十 五 号 までの 改 正 ( 平 成 19 年 4 月 1 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 18 年 3 月 版 )に 準 拠 して 作 成 したものです なお この 法 令 の 翻 訳 は 公 定 訳 ではありません 法 的 効 力 を 有 するのは 日 本 語 の 法 令
More informationBackground. How much does EMET cost? What is the license fee? EMET is freely available from Microsoft without material cost.
Microsoft s Enhanced Mitigation Experience Toolkit (EMET) is an enhancement to the Windows operating system that stops broad classes of malware from executing. EMET implements a set of anti-exploitation
More informationInternal USB port kit installation
Internal USB port kit installation Introduction The internal USB port kit provides a Type A female USB port compatible with Type A USB devices internal to the computer chassis. This document describes
More informationOutpost Network Security
Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It
More informationEmployment Security Act (Act No. 141 of 1947)
この 職 業 安 定 法 の 翻 訳 は 平 成 十 九 年 法 律 第 七 十 九 号 までの 改 正 ( 平 成 19 年 10 月 1 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 19 年 3 月 版 )に 準 拠 して 作 成 し たものです なお この 法 令 の 翻 訳 は 公 定 訳 ではありません 法 的 効 力 を 有 するのは 日 本 語
More informationChiba Institute of Technology Graduate School
Academic Year 2016 Chiba Institute of Technology Graduate School Spring Enrollment: September and March International Student Admission Application Guidelines Graduate School of Engineering Graduate School
More informationApplication Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions
Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions 1 Agenda What is Application Whitelisting (AWL) Protection provided by Application
More informationSalesnet CRM Documents
Salesnet CRM Documents Outlook Add-In for Salesnet CRM Requirements Installation Instructions Add-in Overview Release Notes 2001-2012 Salesnet. All Rights Reserved. Document History Salesnet CRM Documents
More informationさくらインターネット 研 究 所 上 級 研 究 員 日 本 Vyattaユーザー 会 運 営 委 員 松 本 直 人
2011 年 08 月 18 日 さくらインターネット 研 究 所 上 級 研 究 員 日 本 Vyattaユーザー 会 運 営 委 員 松 本 直 人 (C)Copyright 1996-2010 SAKURA Internet Inc. 現 在 起 こっているコト 従 来 のコンピューティング クラウド コンピューティング パブリック プライベートの 区 別 なくクラウドへ 移 行 中 仮 想
More informationPROJECTIONS SUITE. Database Setup Utility (and Prerequisites) Installation and General Instructions. v0.9 draft prepared by David Weinstein
PROJECTIONS SUITE Database Setup Utility (and Prerequisites) Installation and General Instructions v0.9 draft prepared by David Weinstein Introduction These are the instructions for installing, updating,
More informationHardware Recommendations
Hardware Recommendations Alpha Anywhere is a Windows based system that will run on various Windows versions. The minimum requirement is Windows XP SP3 or Server 2003. However, it is recommended that at
More informationEclipse installation, configuration and operation
Eclipse installation, configuration and operation This document aims to walk through the procedures to setup eclipse on different platforms for java programming and to load in the course libraries for
More informationOptimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices
350 PIERS Proceedings, Cambridge, USA, July 5 8, 2010 Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices Dung Vu Pham 1, Malka N. Halgamuge 2, Ali Syed 1, and Priyan
More informationPatent Act ( Act No. 121 of 1959)
この 特 許 法 の 翻 訳 は 平 成 十 八 年 法 律 第 百 九 号 までの 改 正 ( 平 成 19 年 9 月 30 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 19 年 3 月 版 )に 準 拠 して 作 成 したも のです なお この 法 令 の 翻 訳 は 公 定 訳 ではありません 法 的 効 力 を 有 するのは 日 本 語 の 法 令
More informationPreschool Education and Care in Japan
Preschool Education and Care in Japan Preschool education is called pre-primary education in the ISCED (International Standard Classification of Education, designed by UNESCO) and classified as level 0.
More informationPRACTICE. Field Trial against Cyber-attacks through International Collaboration ISPs Effort to Establish Quick Response Scheme. September 24th, 2013
PRACTICE Field Trial against Cyber-attacks through International Collaboration ISPs Effort to Establish Quick Response Scheme September 24th, 2013 Satoshi NORITAKE NTT Communications / Telecom-ISAC Japan
More informationAs the use of computers is becoming a more integral part of learning environments,
JALT2009 Conference Proceedings 506 Online multifunctional gradebook for busy teachers Raymond Wong Kinki University Nathan Krug Saitama University Frank Tucker Kansai Gaidai University Patrick Rates Ritsumeikan
More informationCalifornia Subject Examinations for Teachers
California Subject Examinations for Teachers TEST GUIDE JAPANESE SUBTEST I Sample Questions and Responses and Scoring Information Copyright 2015 Pearson Education, Inc. or its affiliate(s). All rights
More informationThe Course of Study is the series of guidelines for subject
The Language Teacher Feature Article 3 Behind MEXT s new Course of Study Guidelines Keywords Course of Study Guidelines, MEXT, Communicative Language Teaching (CLT) in Japan The new Course of Study Guidelines
More informationTrend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
More informationApplication Manager. Installation and Upgrade Guide. Version 8 FR6
Application Manager Installation and Upgrade Guide Version 8 FR6 APPLICATION MANAGER INSTALLATION AND UPGRADE GUIDE ii AppSense Limited, 2012 All rights reserved. No part of this document may be produced
More informationWhat's New in ADP Reporting?
What's New in ADP Reporting? Welcome to the latest version of ADP Reporting! This release includes the following new features and enhancements. Use the links below to learn more about each one. What's
More informationNVIDIA CUDA GETTING STARTED GUIDE FOR MICROSOFT WINDOWS
NVIDIA CUDA GETTING STARTED GUIDE FOR MICROSOFT WINDOWS DU-05349-001_v6.0 February 2014 Installation and Verification on TABLE OF CONTENTS Chapter 1. Introduction...1 1.1. System Requirements... 1 1.2.
More informationIbaraki University. Graduate School of Agriculture. (Master s Program)
Ibaraki University 茨 城 大 学 Graduate School of Agriculture 大 学 院 農 学 研 究 科 (Master s Program) 修 士 課 程 Application Guidelines for Academic Year 2015 平 成 27 年 度 学 生 募 集 要 項 (October Admissions) 10 月 入 学 Special
More informationCode Estimation Tools Directions for a Services Engagement
Code Estimation Tools Directions for a Services Engagement Summary Black Duck software provides two tools to calculate size, number, and category of files in a code base. This information is necessary
More informationRedline Users Guide. Version 1.12
Redline Users Guide Version 1.12 Contents Contents 1 About Redline 5 Timeline 5 Malware Risk Index (MRI) Score 5 Indicators of Compromise (IOCs) 5 Whitelists 5 Installation 6 System Requirements 6 Install
More informationKaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
More informationWINDOWS PROCESSES AND SERVICES
OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.
More informationWindows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
More informationNew Features in XE8. Marco Cantù RAD Studio Product Manager
New Features in XE8 Marco Cantù RAD Studio Product Manager Marco Cantù RAD Studio Product Manager Email: marco.cantu@embarcadero.com @marcocantu Book author and Delphi guru blog.marcocantu.com 2 Agenda
More informationAgenda. About Gengo. Our PostgreSQL usage. pgpool-ii. Lessons
Agenda About Gengo Our PostgreSQL usage pgpool-ii Lessons Agenda About Gengo Our PostgreSQL usage pgpool-ii Lessons Who I am 冨 田 陽 介 Backend and Ops Engineer Experience Ops role for the first time at Gengo,
More information