The active use and exploitation of Microsoft's Application Compatibility Framework. Jon Erickson

Size: px
Start display at page:

Download "The active use and exploitation of Microsoft's Application Compatibility Framework. Jon Erickson"

Transcription

1 The active use and exploitation of Microsoft's Application Compatibility Framework Jon Erickson

2 Me Jon Erickson Sr. Labs Engineer at isight Partners

3 Not Me! I m not that Jon Erickson J Although I would be happy to sign your book.

4 isight Partners Best commercial cyber intelligence provider on the planet. Highly Differentiated Forward looking, adversary focused intelligence, actionable advice Intelligence for multiple levels: executive, operational and technical Only vendor with true global intelligence collection presence Copyright 2014, isight Partners, Inc. All Rights Reserved 4

5 Agenda What is Application Compatibility Tools Prior Work EMET Real World Example

6 Background Copyright 2014, isight Partners, Inc. All Rights Reserved 6

7 Why use Application Compatibility Copyright 2014, isight Partners, Inc. All Rights Reserved 7

8 Some Examples Fix s Crash when alt-tab is pressed Copyright 2014, isight Partners, Inc. All Rights Reserved 8

9 Some Examples Fix s Crash when alt-tab is pressed Copyright 2014, isight Partners, Inc. All Rights Reserved 9

10 Agenda What is Application Compatibility Tools Prior Work EMET Real World Example

11 Tools Application Compatibility Toolkit (Microsoft) Sdb2xml (Microsoft) cdd (Alex Ionesceu) sdbinst (Microsoft) sdb-explorer (Jon Erickson) Copyright 2014, isight Partners, Inc. All Rights Reserved 11

12 Application Compatibility Toolkit Used to create and view SDB files Copyright 2014, isight Partners, Inc. All Rights Reserved 12

13 sdb2xml Created by Heath Stewart (2007) Can dump patch_bits information Does not parse in-memory fix its. Copyright 2014, isight Partners, Inc. All Rights Reserved 13

14 Compatibility Database Dumper (CDD) Compatibility Database Dumper (CDD) v1.0 Copyright (C) 2007 Alex Ionescu usage: cdd.exe [-s][-e][-l][-f][-p][-d kernel-mode database file][-a usermode database file] -s Show shims -e Show executables -l Show layers -f Show flags -p Show patches -d Use Blocked Driver Database from this path -a Use Application Compatibility Database from this path Copyright 2014, isight Partners, Inc. All Rights Reserved 14

15 Installing SDB Files sdbinst [-?] [-q] [-u] [-g] [-p] [-n[:win32 WIN64]] myfile.sdb {guid} "name" -? - print this help text. -p - Allow SDBs containing patches. -q - Quiet mode: prompts are auto-accepted. -u - Uninstall. -g {guid} - GUID of file (uninstall only). -n "name" - Internal name of file (uninstall only). NOTE: Requires Administrator privilege Copyright 2014, isight Partners, Inc. All Rights Reserved 15

16 Installing SDB Files Registry Locations HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion \AppCompatFlags\Custom HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion \AppCompatFlags\InstalledSDB Default File Locations C:\Windows\AppPatch\Custom\ C:\Windows\AppPatch\Custom\Custom64\ Copyright 2014, isight Partners, Inc. All Rights Reserved 16

17 Installing SDB Files sdb-explorer.exe -r filename.sdb [-a application.exe] Does NOT show up in Add remove programs Does NOT copy SDB to default location Requires Administrator privileges Note regarding 64bit Patches: The path of the SDB file MUST contain Custom64 Copyright 2014, isight Partners, Inc. All Rights Reserved 17

18 Agenda What is Application Compatibility Tools Prior Work EMET Real World Example

19 Prior Work Alex Ionesceu Secrets of the Application Compatibility Database (SDB) Mark Baggett Windows Own3d by Default Jon Erickson Persist-It Using and Abusing Microsoft Fix It Patches Chris Graham Shimming Your Way Past UAC Copyright 2014, isight Partners, Inc. All Rights Reserved 19

20 Prior/ Related Work Secrets of the Application Compatibility Database (SDB) - Alex Ionesceu 1 ) Introduction 2 ) System Shims The Most Interesting Ones 3 ) The Private Shim Engine Interface With The PE Loader 4 ) Built-in Shimmed Applications and Specific Shims A Sample Never Released: 5 ) Tool 1 CDD Compatibility Database Dumper 6 ) Flag Shims LUA and Installer Flags 7 ) The Run-Time In-Memory Patching Behavior and Analysis 8 ) The System Blocked Driver Database The Kernel Side of SDB 9 ) Conclusion and Tool 2 Copyright 2014, isight Partners, Inc. All Rights Reserved 20

21 System Shims C:\Windows\AppPatch\ sysmain.sdb drvmain.sdb msimain.sdb pcamain.sdb Copyright 2014, isight Partners, Inc. All Rights Reserved 21

22 System Shims sdb-explorer t sysmain.sdb Copyright 2014, isight Partners, Inc. All Rights Reserved 22

23 System Shims %WINDIR%\AppPatch\en-US\AcRes.dll.mui has descriptions in its string table , "Shim which intercepts the ShowWindow API call and fixes the problem due to tabbed browsing architecture changes in IE. The window an application finds is not the top level window any more, but the child tab window. Caught the ShowWindow API which checks if the class and process name of the window is IE's tab window. And then calls the real ShowWindow on the top level parent window." 60193, "This compatibility fix fixes problems with any application that uses the Shrinker resource compression library. This library hacks resource functions in ntdll and kernel32 and redirect calls into their own function routines. But Ntdll code has different opcodes in Windows XP. The program failed to find the opcode signature and decided to cancel WriteProcessMemory call to write their redirection. Because of this, the necessary decompression of program code and resources were not executed and caused access violation. Shrinker compatibility fix resolves this by providing necessary opcode signature so the app could write those redirection into ntdll." Copyright 2014, isight Partners, Inc. All Rights Reserved 23

24 System Shims %WINDIR%\AppPatch\ja-JP\AcRes.dll.mui has descriptions in its string table , " ShowWindow API 呼 び 出 しを 途 中 で 取 得 し IE のタブ ブラウズ アーキテクチャ 変 更 による 問 題 を 修 正 する shim です アプリケーションが 検 索 するウィンドウは 最 上 位 ウィンドウではなく 子 タブの ウィンドウになります ウィンドウのクラスとプロセス 名 が IE のタブ ウィンドウであるかどうかを 確 認 する ShowWindow API をキャッチしました 次 に 最 上 位 の 親 ウィンドウで 実 際 の ShowWindow を 呼 び 出 し ます , "この 互 換 性 修 正 プログラムは Shrinker リソース 圧 縮 ライブラリを 使 用 するアプリケーションの 問 題 を 修 正 します このライブラリは ntdll と kernel32 のリソース 関 数 をハッキングし 呼 び 出 しをリソー ス 関 数 の 関 数 ルーチンにリダイレクトします ただし Windows XP では Ntdll コードに 異 なるオペコード があります プログラムはオペコード 署 名 の 確 認 に 失 敗 し リダイレクトを 書 き 込 むための WriteProcessMemory 呼 び 出 しの 取 り 消 しを 決 定 しました このため プログラム コードとリソースの 圧 縮 解 除 が 実 行 されず アクセス 違 反 が 発 生 しました Shrinker 互 換 性 修 正 プログラムは アプリケーショ ンがリダイレクトを ntdll に 書 き 込 めるように 必 要 なオペコード 署 名 を 提 供 して この 問 題 を 解 決 します Copyright 2014, isight Partners, Inc. All Rights Reserved 24

25 Prior Work Alex Ionesceu Secrets of the Application Compatibility Database (SDB) Mark Baggett Windows Own3d by Default Jon Erickson Persist-It Using and Abusing Microsoft Fix It Patches Chris Graham Shimming Your Way Past UAC Copyright 2014, isight Partners, Inc. All Rights Reserved 25

26 Prior/ Related Work Mark Baggett Windows - Owned By Default! (DerbyCon 2013) Process Execution Redirection API Hooking Hiding in the File System Hiding in the Registry Disable Security Features of the OS Execute Backdoors Copyright 2014, isight Partners, Inc. All Rights Reserved 26

27 InjectDll Details 2524a TAG SHIM TAG NAME: InjectDll TAG 600a - DLLFILE: AcGenral.DLL 2525c TAG FIX_ID: {GUID} TAG GENERAL TAG DESCRIPTION_RC_ID: (0xeafb) AcGenral.dll NS_InjectDll::NotifyFn() LoadLibraryW() Copyright 2014, isight Partners, Inc. All Rights Reserved 27

28 RedirectEXE 26dbc TAG 7004 SHIM 26dc2 TAG NAME: RedirectEXE 26dc8 TAG 600a - DLLFILE: AcGenral.DLL 26dce TAG FIX_ID: {GUID} 26de4 TAG GENERAL 26de6 TAG DESCRIPTION_RC_ID: (0xeb10) AcGenral.dll NS_RedirectEXE::NotifyFn() CreateProcessA() CloseHandle(hProcess) CloseHandle(hThread) ExitProcess() Copyright 2014, isight Partners, Inc. All Rights Reserved 28

29 Prior Work Alex Ionesceu Secrets of the Application Compatibility Database (SDB) Mark Baggett Windows Own3d by Default Jon Erickson Persist-It Using and Abusing Microsoft Fix It Patches Chris Graham Shimming Your Way Past UAC Copyright 2014, isight Partners, Inc. All Rights Reserved 29

30 Fix-It Patch Analysis How is this different from patches released on patch Tuesday? BinDiff mshtml.dll from MS vs. MS Different matched functions 16 unmatched functions Fix It Patch for CVE Changes Copyright 2014, isight Partners, Inc. All Rights Reserved 30

31 Preventing 0-Day Exploitation CVE / CVE (October/November 2014) OLE Packager Vulnerability CVE (February 2014) IE Use After Free CVE (September 2013) IE Memory Corruption CVE (December 2012) IE Use After Free CVE (June 2012) XML Core Services

32 Sandworm CVE InfDefaultInstall.exe EVIL.inf

33 Sandworm CVE InfDefaultInstall.exe EVIL.inf

34 Sandworm CVE InfDefaultInstall.exe EVIL.inf Steps: PowerPoint Loads packager.dll to handle Packager Object Packager.dll copies evil.inf to Temp folder PowerPoint Animation invokes packager.dll DoVerb command DoVerb command performs right click context menu action for install. Packager.dll launches InfDefaultInstall to handle install action. Copyright 2014, isight Partners, Inc. All Rights Reserved 34

35 Sandworm CVE Fix InfDefaultInstall.exe EVIL.inf FIXED October 2014 Steps: PowerPoint Loads packager.dll to handle Packager Object Packager.dll copies evil.inf to Temp folder - Mark file unsafe PowerPoint Animation invokes packager.dll DoVerb command DoVerb command performs right click context menu action for install. Packager.dll launches InfDefaultInstall to handle install action. - Checks for unsafe flag - Prompts Users Copyright 2014, isight Partners, Inc. All Rights Reserved 35

36 Sandworm CVE Fix InfDefaultInstall.exe EVIL.inf Copyright 2014, isight Partners, Inc. All Rights Reserved 36

37 CVE CVE Bypasses Google found in the wild IDLE starts Executing special.py file Haifei Li found and notified Microsoft Copyright 2014, isight Partners, Inc. All Rights Reserved 37

38 CVE CVE Bypasses Google found in the wild IDLE starts And executes special.py file (Haifei Li found) Copyright 2014, isight Partners, Inc. All Rights Reserved 38

39 Sandworm Bypass Fix-It 1cae TAG EXE 1cb4 TAG NAME: POWERPNT.exe 1cba TAG APP_NAME: POWERPNT.exe 1cc0 TAG VENDOR: Microsoft 1cc6 TAG EXE_ID: {D82187EB-A66D-4A6A-B6BA-0F5738B5D08E} 1cdc TAG APP_ID: {F503FB56-18CF-4B58-80D0-02AC0D38D698} 1cf2 TAG MATCHING_FILE 1cf8 TAG NAME: * 1cfe TAG COMPANY_NAME: Microsoft Corporation 1d04 TAG MATCHING_FILE 1d0a TAG NAME: %windir%\system32\packager.dll 1d10 TAG BIN_FILE_VERSION: d1a TAG 400b - PE_CHECKSUM: (0x13541) 1d20 TAG 700a - PATCH_REF 1d26 TAG NAME: ef1de1e8-f d-819c f7eb22 1d2c TAG PATCH_TAGID: 972 (0x3cc) Copyright 2014, isight Partners, Inc. All Rights Reserved 39

40 Sandworm Bypass Fix-It Output from sdb-explorer Copyright 2014, isight Partners, Inc. All Rights Reserved 40

41 Sandworm Bypass Fix-It With Fix It Copyright 2014, isight Partners, Inc. All Rights Reserved 41

42 CVE Fix IDLE starts Executing evil2.py FIXED November 2014 Steps: PowerPoint Loads packager.dll to handle Packager Object. Packager.dll copies evil.inf to Temp folder. - Mark file unsafe (from CVE Fix). PowerPoint Animation invokes packager.dll DoVerb command. DoVerb command performs right click context menu action for edit. Prompts User Packager.dll launches IDLE to handle Edit with IDLE action. IDLE Looks for python file with specific name and executes it. Doesn t care about unsafe flag. Copyright 2014, isight Partners, Inc. All Rights Reserved 42

43 CVE Fix IDLE starts Executing evil2.py Copyright 2014, isight Partners, Inc. All Rights Reserved 43

44 CVE Fix IDLE starts Executing evil2.py Copyright 2014, isight Partners, Inc. All Rights Reserved 44

45 In-Memory Patches Application Compatibility Toolkit has no concept of in-memory patches Copyright 2014, isight Partners, Inc. All Rights Reserved 45

46 Analyzing CVE Fix-It October 21 st, 1 week after CVE was patched. Targets: (sdb-explorer.exe -d CVE bit-Shim.sdb) %windir%\system32\packager.dll ( ) Checksum = (0x1708a) %windir%\system32\packager.dll ( ) Checksum = (0x1a612) %windir%\system32\packager.dll ( ) Checksum = (0x13541) %windir%\system32\packager.dll ( ) Checksum = (0x171ab) %windir%\system32\packager.dll ( ) Checksum = (0x14f94) %windir%\system32\packager.dll ( ) Checksum = (0x17675) %windir%\system32\packager.dll ( ) Checksum = (0x173b6) %windir%\syswow64\packager.dll ( ) Checksum = (0x1708a) %windir%\syswow64\packager.dll ( ) Checksum = (0x1a612) %windir%\syswow64\packager.dll ( ) Checksum = (0x13541) %windir%\syswow64\packager.dll ( ) Checksum = (0x171ab) %windir%\syswow64\packager.dll ( ) Checksum = (0x14f94) %windir%\syswow64\packager.dll ( ) Checksum = (0x17675) %windir%\syswow64\packager.dll ( ) Checksum = (0x173b6) Copyright 2014, isight Partners, Inc. All Rights Reserved 46

47 Analyzing CVE (sdb-explorer) sdb-explorer.exe -t my.sdb Prints Tree View, similar to sdb2xml Copyright 2014, isight Partners, Inc. All Rights Reserved 47

48 Analyzing CVE (sdb2xml) sdb2xml my.sdb Copyright 2014, isight Partners, Inc. All Rights Reserved 48

49 Patch Details patch, patchbits, patchref, patch_tag_id, checksum Copyright 2014, isight Partners, Inc. All Rights Reserved 49

50 Patch Details sdb-explorer.exe -p CVE bit-Shim.sdb 0x2ea Copyright 2014, isight Partners, Inc. All Rights Reserved 50

51 IDAPython Script sdb-explorer.exe -i -p CVE bit-Shim.sdb 0x2ea Copyright 2014, isight Partners, Inc. All Rights Reserved 51

52 Persist-It sdb-explorer Explanation of in-memory patch file format. Lots of details Shows how to analyze fix-it patches Showed how to create your own in-memory patches. Copyright 2014, isight Partners, Inc. All Rights Reserved 52

53 Prior Work Alex Ionesceu Secrets of the Application Compatibility Database (SDB) Mark Baggett Windows Own3d by Default Jon Erickson Persist-It Using and Abusing Microsoft Fix It Patches Chris Graham Shimming Your Way Past UAC Copyright 2014, isight Partners, Inc. All Rights Reserved 53

54 Shimming Your Way Past UAC Windows signed files with AutoElevate permission. Example: SndVol.exe Uses RedirectEXE shim type. Steps: Create Shim for SndVol.exe that does RedirectEXE to evil.exe Register Shim Start SndVol.exe Copyright 2014, isight Partners, Inc. All Rights Reserved 54

55 Agenda What is Application Compatibility Tools Prior Work EMET Real World Example

56 EMET The Enhanced Mitigation Experience Toolkit DEP SEHOP Null Page Heap Spray Protection EAF Mandatory ASLR ROP Detection Attack Surface Reduction Copyright 2014, isight Partners, Inc. All Rights Reserved 56

57 EMET %WINDIR%\AppPatch\EMET.dll %WINDIR%\AppPatch\AppPatch64\EMET.dll Copyright 2014, isight Partners, Inc. All Rights Reserved 57

58 EMET EMET Shim Copyright 2014, isight Partners, Inc. All Rights Reserved 58

59 Agenda What is Application Compatibility Tools Prior Work EMET Real World Example

60 Real World Examples Search Protect BlackEnergy Win32/Farfli.BEK Copyright 2014, isight Partners, Inc. All Rights Reserved 60

61 Search Protect Potentially unwanted program (PUP) Adware Now using Application Compatibility to persist Uses InjectDll Shim Loads Search Protect library into browsers Copyright 2014, isight Partners, Inc. All Rights Reserved 61

62 BlackEnergy/Quedagh Recently targeting Ukrainian Government. Uses UAC Bypass. Same technique as Chris Graham Driver Signing Bypass Shim? To patch user32.dll-mui

63 Win32/Farfli.BEK Persistence Anton Cherepanov ESET Reported at ZeroNights 2014 Win32/Farfli.BEK drops following files: %WINDIR%\AppPatch\msimain.mui raw code %WINDIR%\AppPatch\AcProtect.dll Drops Shim DataBase & registers it: %WINDIR%\AppPatch\Custom\%GUID%.sdb Copyright 2014, isight Partners, Inc. All Rights Reserved 63

64 Win32/Farfli.BEK Persistence EMET-Style sdb Copyright 2014, isight Partners, Inc. All Rights Reserved 64

65 What Can You Do? Disable the Shim Engine I do NOT recommend this Breaks EMET Disables 0day Fix-Its GPEdit.msc Administrative Templates \ Windows Components \ Application Compatibility \ Turn off Application Compatibility Engine Copyright 2014, isight Partners, Inc. All Rights Reserved 65

66 Recommendations Search your registry and File System Your system will have SDB Files, there are defaults Use the knowledge you gained AutoRuns (SysInternals) does not consider Application Compatibility Fixes They are aware and are working on it J Add signatures to SDB files (Microsoft) Notification of non-signed SDB files running, or about to run (Microsoft) Copyright 2014, isight Partners, Inc. All Rights Reserved 66

67 Summary Application Compatibility Toolkit is a new method attackers are using today. This is not a vulnerability This is a feature that attackers are abusing Defenders should start looking for this on the machines in their networks. SDB File requires Administrator privilege to install Copyright 2014, isight Partners, Inc. All Rights Reserved 67

68 References Baggett, M. (2013, February 23) Posts and Publications. Retrieved October 23, 2013, from In Depth Defense: Ionescu, A. (2007, May 20). Secrets of the Application Compatilibity Database (SDB) Part 1. Retrieved September 5, 2013, from Alex Ionescu's Blog: Ionescu, A. (2007, May 26). Secrets of the Application Compatilibity Database (SDB) Part 3. Retrieved September 5, 2013, from Alex Ionescu s Blog: Mark Russinovich, B. C. (2013, August 1). Autoruns for Windows v Retrieved September 5, 2013, from Windows Sysinternals: sysinternals/bb aspx Microsoft. (2013, September 6).!chkimg. Retrieved October 2, 2013, from Dev Center: 85%29.aspx Microsoft. (2013, October 1). Application Compatibility Database. Retrieved October 23, 2013, from Microsoft Developer Network: bb aspx Microsoft. (2013). Fix it Solution Center. Retrieved October from Microsoft Support: Microsoft. (2012, October 1). Microsoft Security Advisory: Vulnerability in Microsoft XML Core Services could allow remote code execution. Retrieved September 5, 2013, from Microsoft Support: Microsoft. (2012, December 7). Shim Database Types. Retrieved September 5, 2013, from Microsoft Developer Network: bb432483%28v=vs.85%29.aspx Sikka, N. (2013, September 17). CVE : Fix it workaround available. Retrieved October 02, 2013, from Security Research & Defense: srd/archive/2013/09/17/cve fix-it-workaround-available.aspx Stewart, H. (2007, November 3). Shim Database to XML. Retrieved September 5, 2013, from Setup & Install by Heath Stewart: /11/02/sdb2xml.aspx ddilabs.blogspot.com/2014/05/shimming-your-way-past-uac.html Copyright 2014, isight Partners, Inc. All Rights Reserved 68

69 Thanks Kat, Josh, Sam, zen, Mac, Mike, Dave, Sean, Darel, Brad A., Matt G., Mark B., Chris G, Mark R., Microsoft, isight Partners, and all others who will remain nameless.

70 Questions jerickson isightpartners.com Source Code:

Using and Abusing Microsoft Fix It Patches Jon Erickson

Using and Abusing Microsoft Fix It Patches Jon Erickson Persist It Using and Abusing Microsoft Fix It Patches Jon Erickson About Me Jon Erickson (@2130706433) Engineer @isight Partners 2 isight Partners isight Partners Best commercial cyber threat intelligence

More information

Persist It Using and Abusing Microsoft s Fix It Patches

Persist It Using and Abusing Microsoft s Fix It Patches Persist It Using and Abusing Microsoft s Fix It Patches Jon Erickson : isight Partners : jerickson@isightpartners.com Abstract: Microsoft has often used Fix it patches, which are a subset of Application

More information

Malicious Application Compatibility Shims

Malicious Application Compatibility Shims Malicious Application Compatibility Shims Table of Contents Introduction... 2 Background... 2 How the Windows Image Loader works with the Shim Engine... 6 Prior Work... 7 In the wild... 9 Other Offensive

More information

レッドハット 製 品 プライスリスト Red Hat Enterprise Linux2013 新 製 品 (ベースサブスクリプション) 更 新 :2015 年 4 22

レッドハット 製 品 プライスリスト Red Hat Enterprise Linux2013 新 製 品 (ベースサブスクリプション) 更 新 :2015 年 4 22 Red Hat Enterprise Linux2013 新 製 品 (ベースサブスクリプション) 更 新 :2015 年 4 22 薄 紫 :3 年 型 番 :5 年 型 番 字 : 新 規 追 加 変 更 新 規 新 規 SKU 製 品 名 ソケット ゲストOS サポート 期 間 標 準 価 格 備 考 Server RH00001 Red Hat Enterprise Linux for Virtual

More information

Cost Accounting 1. B r e a k e v e n A n a l y s i s. S t r a t e g y I m p l e m e n t a t i o n B a l a n c e d S c o r e c a r d s

Cost Accounting 1. B r e a k e v e n A n a l y s i s. S t r a t e g y I m p l e m e n t a t i o n B a l a n c e d S c o r e c a r d s Cost Accounting 1 B r e a k e v e n A n a l y s i s S t r a t e g y I m p l e m e n t a t i o n B a l a n c e d S c o r e c a r d s S t r a t e g y M o n i t o r i n g R e s p o n s i b i l i t y S e g

More information

How To Run A Server On A Microsoft Cloud Server (For A Small Amount Of Money)

How To Run A Server On A Microsoft Cloud Server (For A Small Amount Of Money) 1SoftLayer 2WindowsServer2003 0 2013 8 t-sasaki@bit-surf.co.jp t-sasaki@bit-isle.co.jp BOE SoftLayer ID desktomo --- --- IT ISPDC CC ADSL3 SIer DC 5 ERP 2015 1 IT IT idc IT 200 140-0002 2-2-28 T 8F TEL

More information

Document and entity information

Document and entity information Company information Company information FASF member mark Document name Document and entity information Aug 2015 第 3 四 半 期 決 算 短 信 日 本 基 準 ( 連 結 ) Filing date 20150710 Company name TRANSACTION CO., Ltd.

More information

この 外 国 弁 護 士 による 法 律 事 務 の 取 扱 いに 関 する 特 別 措 置 法 施 行 規 則 の 翻 訳 は 平

この 外 国 弁 護 士 による 法 律 事 務 の 取 扱 いに 関 する 特 別 措 置 法 施 行 規 則 の 翻 訳 は 平 この 外 国 弁 護 士 による 法 律 事 務 の 取 扱 いに 関 する 特 別 措 置 法 施 行 規 則 の 翻 訳 は 平 成 十 六 年 法 務 省 令 第 6 号 までの 改 正 ( 平 成 16 年 4 月 1 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 18 年 3 月 版 )に 準 拠 して 作 成 したものです なお この 法 令 の 翻

More information

レッドハット 製 品 プライスリスト Red Hat Enterprise Linux 製 品 (RHEL for HPC) 更 新 :2015 年 4 22

レッドハット 製 品 プライスリスト Red Hat Enterprise Linux 製 品 (RHEL for HPC) 更 新 :2015 年 4 22 レッドハット 製 品 プライスリスト Red Hat Enterprise Linux 製 品 (RHEL for HPC) 更 新 :2015 年 4 22 薄 紫 :3 年 型 番 :5 年 型 番 字 : 新 規 追 加 変 更 当 価 格 表 は 予 告 なしに 変 更 する 場 合 がございますので ご 了 承 ください 価 格 は 全 て 税 抜 きでの 掲 載 となっております 新 規

More information

TS-3GB-S.R0125-505-0v1.0 VoIP Supplementary Services Descriptions: Call Forwarding - Unconditional

TS-3GB-S.R0125-505-0v1.0 VoIP Supplementary Services Descriptions: Call Forwarding - Unconditional TS-GB-S.R0--0v.0 VoIP Supplementary Services Descriptions: Call Forwarding - Unconditional 0 年 月 日 制 定 社 団 法 人 情 報 通 信 技 術 委 員 会 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE 本 書 は ( 社 ) 情 報 通 信 技 術 委 員 会

More information

EDB-Report. 最 新 Web 脆 弱 性 トレンドレポート(2014.11) 2014.11.01~2014.11.30 Exploit-DB(http://exploit-db.com)より 公 開 されている 内 容 に 基 づいた 脆 弱 性 トレンド 情 報 です

EDB-Report. 最 新 Web 脆 弱 性 トレンドレポート(2014.11) 2014.11.01~2014.11.30 Exploit-DB(http://exploit-db.com)より 公 開 されている 内 容 に 基 づいた 脆 弱 性 トレンド 情 報 です 04. 最 新 Web トレンドレポート(04.) 04..0~04..30 Exploit-DB(http://exploit-db.com)より 公 開 されている 内 容 に 基 づいた トレンド 情 報 です サマリー ペンタセキュリティシステムズ 株 式 会 社 R&Dセンター データセキュリティチーム 04 年 月 は Exploit-DBより 公 開 されている の 中 SQLインジェクション(SQL

More information

Electricity Business Act ( Act No. 170 of July 11, 1964)

Electricity Business Act ( Act No. 170 of July 11, 1964) この 電 気 事 業 法 の 翻 訳 は 平 成 十 七 年 法 律 第 八 十 七 号 までの 改 正 ( 平 成 18 年 5 月 1 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 18 年 3 月 版 )に 準 拠 して 作 成 したものです なお この 法 令 の 翻 訳 は 公 定 訳 ではありません 法 的 効 力 を 有 するのは 日 本 語 の

More information

Panasonic AC-DC Power Supply Design Support Service

Panasonic AC-DC Power Supply Design Support Service Panasonic AC-DC Power Supply Design Support Service The best solution to design your AC-DC power supply (how to design a switching power supply, order a transformer, prevent EMI, etc.) Panasonic s IPD

More information

育 デジ (Iku-Digi) Promoting further evolution of digital promotion

育 デジ (Iku-Digi) Promoting further evolution of digital promotion 育 デジ (Iku-Digi) Promoting further evolution of digital promotion Abstract Digital promotion has established its presence and become a commodity in the pharmaceutical industry. In the last few years, use

More information

レッドハット 製 品 プライスリスト 標 準 価 格. Red Hat Enterprise Linux 製 品 (RHEL Server)

レッドハット 製 品 プライスリスト 標 準 価 格. Red Hat Enterprise Linux 製 品 (RHEL Server) レッドハット 製 品 プライスリスト Red Hat Enterprise Linux 製 品 (RHEL Server) 新 価 格 は6 月 1 日 から 適 用 開 始 と 致 します 薄 紫 :3 年 型 番 水 色 :5 年 型 番 赤 文 字 : 新 規 追 加 変 更 当 価 格 表 は 予 告 なしに 変 更 する 場 合 がございますので ご 了 承 ください 税 込 価 格 は

More information

Direct Marketing Production Printing & Value-Added Services: A strategy for growth

Direct Marketing Production Printing & Value-Added Services: A strategy for growth 2015 年 12 月 Direct Marketing Production Printing & Value-Added Services: A strategy for growth 完 成 のご 案 内 ダイレクトマーケティングにおける 印 刷 物 & 付 加 価 値 サービス : 成 長 への 戦 略 とは? 印 刷 物 を 活 用 したダイレクトマーケティングが 成 長 しており デジタル

More information

Graduate Program in Japanese Language and Culture (Master s Program) Application Instructions

Graduate Program in Japanese Language and Culture (Master s Program) Application Instructions Graduate Program in Japanese Language and Culture (Master s Program) Application Instructions For FY 2016 1. Objectives This program is designed to provide teachers of the Japanese-language working abroad

More information

Data Mining for Risk Management in Hospital Information Systems

Data Mining for Risk Management in Hospital Information Systems Data Mining for Risk Management in Hospital Information Systems Shusaku Tsumoto and Shoji Hirano Department of Medical Informatics, Shimane University, School of Medicine, 89-1 Enya-cho, Izumo 693-8501

More information

Advanced Training Program for Teachers of the Japanese-Language Application Instructions For FY 2016

Advanced Training Program for Teachers of the Japanese-Language Application Instructions For FY 2016 Advanced Training Program for Teachers of the Japanese-Language Application Instructions For FY 2016 1. Objectives The Advanced Training Program at the Japan Foundation Japanese-Language Institute, Urawa

More information

Linux Foundation Automotive Summit - Yokohama, Japan

Linux Foundation Automotive Summit - Yokohama, Japan It s not an embedded Linux distribution It creates a custom one for you. The Yocto Project Linux Foundation Automotive Summit - Yokohama, Japan Tracey M. Erway The Yocto Project Advocacy and Communications

More information

AUTOMOBILE LIABILITY SECURITY ACT

AUTOMOBILE LIABILITY SECURITY ACT AUTOMOBILE LIABILITY SECURITY ACT & RELATED CABINET ORDER, MINISTERIAL ORDINANCE AND NOTIFICATION Including: Policy Conditions for Automobile Liability Insurance As of May 2, 2011 Translated and published

More information

<HNAS_SNMP 監 視 取 扱 説 明 書 別 紙 2 イベントリスト> Event ID

<HNAS_SNMP 監 視 取 扱 説 明 書 別 紙 2 イベントリスト> Event ID Event 1004 ServiceNotStarted Severe %s services have not been started as failed to start last time The service was not started due to a problem starting it previously

More information

My experience of Ruby Education in Taiwan

My experience of Ruby Education in Taiwan My experience of Ruby Education in Taiwan ~ 台 湾 にRuby 教 育 で 得 た 知 見 Mu-Fan Teng(@ryudoawaru) Ruby World Conference はじめに 発 表 する 機 会 をいただき ありがとうございます 自 己 紹 介 鄧 慕 凡 (Mu-Fan Teng) a.k.a: 竜 堂 終 両 方 どもある 小 説

More information

Current Situation of Research Nurse Education and Future Perspectives in Japan

Current Situation of Research Nurse Education and Future Perspectives in Japan Current Situation of Research Nurse Education and Future Perspectives in Japan Eriko Aotani Clinical Trials Coordinating Center The Kitasato Institute 1 Who are involved in Clinical Trials? Patients. Others

More information

Green Solution with Simegy

Green Solution with Simegy 要 旨 オフィス 環 境 における 複 合 機 やプリンターの 消 費 電 力 の 見 える 化 や 消 費 電 力 の 削 減 のためのグリーン ソリューションが 近 年 強 く 求 められている 富 士 ゼ ロックスは 複 合 機 やプリンターを 管 理 / 活 用 するた めの ApeosWare Management Suite のようなソフ トウェアに 対 して ゼロックスの Simegy

More information

医 学 生 物 学 一 般 問 題 ( 問 題 用 紙 1 枚 解 答 用 紙 2 枚 )

医 学 生 物 学 一 般 問 題 ( 問 題 用 紙 1 枚 解 答 用 紙 2 枚 ) 平 成 26 年 度 大 学 院 医 学 研 究 科 博 士 課 程 入 学 試 験 (1 回 目 ) 医 学 生 物 学 一 般 問 題 ( 問 題 用 紙 1 枚 解 答 用 紙 2 枚 ) 以 下 の 問 題 1 問 題 4のうち 二 つの 問 題 を 選 択 して 解 答 しなさい 一 つの 問 題 につき1 枚 の 解 答 用 紙 を 使 用 しなさい 紙 面 不 足 の 場 合 は 裏

More information

Bushido: Way of the Samurai. Golden Screens. Chokuo TAMURA Hawks with pine and plum blossom 163.6 x 376.0 cm each

Bushido: Way of the Samurai. Golden Screens. Chokuo TAMURA Hawks with pine and plum blossom 163.6 x 376.0 cm each Bushido: Way of the Samurai Golden Screens Chokuo TAMURA Hawks with pine and plum blossom 163.6 x 376.0 cm each 金 Noh 屏 Theatre 風 robes teacher s notes Kin Byōbu Golden Screen teacher s notes Decorative

More information

Discover the power of reading for university learners of Japanese in New Zealand. Mitsue Tabata-Sandom Victoria University of Wellington

Discover the power of reading for university learners of Japanese in New Zealand. Mitsue Tabata-Sandom Victoria University of Wellington Discover the power of reading for university learners of Japanese in New Zealand Mitsue Tabata-Sandom Victoria University of Wellington The power of reading The power of reading is claimed by Krashen (2004).

More information

Public Financial Assistance for Formal Education in Japan

Public Financial Assistance for Formal Education in Japan Public Financial Assistance for Formal Education in Japan In Japan, households bear a particularly high proportion of the costs of pre-primary and tertiary education compared with other OECD countries

More information

Why today? What s next?

Why today? What s next? Closing PhUSE Single Day Events, Tokyo, 31 st Oct 2014 Why today? What & why PhUSE? What s next? Link to Prezi http://prezi.com/p77zfstdrzfs/present/?auth_key=4d37wvn&follow=cdxkkrg_3vlu&kw=present p77zfstdrzfs&rc=ref

More information

この 育 児 休 業 介 護 休 業 等 育 児 又 は 家 族 介 護 を 行 う 労 働 者 の 福 祉 に 関 する 法 律 の 翻 訳 は 平 成 十 六 年 法 律 第 百 六 十 号 までの 改 正 ( 平 成 17 年 4 月 1 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 18 年 3 月 版 )に 準 拠 して 作 成 したものです なお この

More information

Utilization & Promotion Activities of Cloud in Japan

Utilization & Promotion Activities of Cloud in Japan CloudAsia Utilization & Promotion Activities of Cloud in Japan 28th, October, 2015 ASP-SaaS-Cloud Consortium (ASPIC) http://www.aspicjapan.org/en/index.html 1 Agenda Current situation in Japan Cloud promotion

More information

Wicket. 2013.09.12 Hiroto Yamakawa

Wicket. 2013.09.12 Hiroto Yamakawa Wicket 2013.09.12 Hiroto Yamakawa @gishi_yama yamakawa@photon.chitose.ac.jp Apache Wicket 6 Wicket Wicket-Sapporo New! "...Wicket Java " Java Apache Wicket, "Apache Wicket Web ",, pp.17 "...Apache Wicket

More information

Posting and Reading Messages (PC version) 1/4

Posting and Reading Messages (PC version) 1/4 Posting and Reading Messages (PC version) 1/4 3-1 TOP page Display a message board on which to post messages. Enter the phone number where you wish to post a message and press Post button. Phone number

More information

Abbreviations. Learning Goals and Objectives 学 習 到 達 目 標. Structure of Presentation

Abbreviations. Learning Goals and Objectives 学 習 到 達 目 標. Structure of Presentation Learning Goals and Objectives 学 習 到 達 目 標 Accrediting Medical Schools: Lessons learned from Liaison Committee on Medical Education (LCME) process in the United States 医 学 部 の 認 証 評 価 : 米 国 LCMEの 認 証 評

More information

Act on Special Measures Concerning Nuclear Emergency Preparedness (Act No. 156 of December 17, 1999)

Act on Special Measures Concerning Nuclear Emergency Preparedness (Act No. 156 of December 17, 1999) この 原 子 力 災 害 対 策 特 別 措 置 法 の 翻 訳 は 平 成 18 年 法 律 第 118 号 までの 改 正 ( 平 成 19 年 1 月 9 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 19 年 3 月 版 )に 準 拠 して 作 成 したものです なお この 法 令 の 翻 訳 は 公 定 訳 ではありません 法 的 効 力 を 有 するのは

More information

オープンソース NFV プラットフォーム の 取 り 組 み

オープンソース NFV プラットフォーム の 取 り 組 み オープンソース NFV プラットフォーム の 取 り 組 み 平 成 27 年 4 月 レッドハット アジア 太 平 洋 地 域 事 業 開 発 戦 略 本 部 テレコム & NFV チーフ テクノロジスト 杉 山 秀 次 自 己 紹 介 ネットワーク 業 界 歴 27 年 現 在 レッドハットアジア 太 平 洋 地 域 において NFVチーフテクノロジストとして 活 動 前 職 はジュニパーネットワークスにてR&Dサポート

More information

How Should Remote Monitoring Sensor Be Accurate?

How Should Remote Monitoring Sensor Be Accurate? CS27 Laboratory How Should Remote Monitoring Sensor Be Accurate? Seiki Tokunaga Shinsuke Matsumoto Sachio Saiki Masahide Nakamura Graduate School of System Informatics Kobe University, Japan 1 Remote Monitoring

More information

How To Teach English At Kumon

How To Teach English At Kumon English Education at Kumon 1 Running Head: ENGLISH EDUCATION AT KUMON English Education at KUMON ~ A Case Study of Two Children and their Mothers ~ by Yukiko Kawabata A graduation thesis submitted to the

More information

第 9 回 仮 想 政 府 セミナー Introduction Shared Servicesを 考 える ~Old but New Challenge~ 東 京 大 学 公 共 政 策 大 学 院 奥 村 裕 一 2014 年 2 月 21 日

第 9 回 仮 想 政 府 セミナー Introduction Shared Servicesを 考 える ~Old but New Challenge~ 東 京 大 学 公 共 政 策 大 学 院 奥 村 裕 一 2014 年 2 月 21 日 第 9 回 仮 想 政 府 セミナー Introduction Shared Servicesを 考 える ~Old but New Challenge~ 東 京 大 学 公 共 政 策 大 学 院 奥 村 裕 一 2014 年 2 月 21 日 シェアードサービス(SS) ~Definition( 定 義 )~ 複 数 部 門 で 行 っている 同 類 の 業 務 を 一 つの 部 門 に 集 約

More information

Teacher Training and Certificate System

Teacher Training and Certificate System Teacher Training and Certificate System 1. Teacher Training Teacher training in Japan started with the establishment of normal schools (schools for teacher training) in 1872. In 1886, a higher normal school

More information

Using the Moodle Reader Module to Facilitate an Extensive. Reading Program

Using the Moodle Reader Module to Facilitate an Extensive. Reading Program RESEARCH NOTE 41 Using the Moodle Reader Module to Facilitate an Extensive Reading Program Wayne Pennington Introduction Early attempts to incorporate Extensive Reading as a teaching technique can be traced

More information

EFL Information Gap Activities for Architecture Majors

EFL Information Gap Activities for Architecture Majors 東 洋 大 学 人 間 科 学 総 合 研 究 所 紀 要 第 10 号 (2009) 11-20 11 EFL Information Gap Activities for Architecture Majors Michael SCHULMAN * A large body of literature supports the notion that information gap activities,

More information

For victims of traffic accidents

For victims of traffic accidents For victims of traffic accidents 交 通 事 故 に 遭 われた 方 へ (Guideline for victims) ( 被 害 者 の 手 引 ) Name( 名 前 ) Police Station( 警 察 署 ) Contact( 担 当 者 ) Telephone Number( 電 話 番 号 ) Preface This leaflet has been

More information

DC DC φ φ DC φ φ AC φ φ φ φ φ φ φ 24V DC Class2 This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1 ) this device may not cause harmful interference,and

More information

SPECIFICATION. Not recommend for new design. MS6M00814. Power Integrated Module 7MBR15UF060 MS6M00814. Fuji Electric Device Technology Co.,Ltd.

SPECIFICATION. Not recommend for new design. MS6M00814. Power Integrated Module 7MBR15UF060 MS6M00814. Fuji Electric Device Technology Co.,Ltd. SPECIFICATION Device Name : Power Integrated Module Type Name : Spec. No. : 7MBR15UF6 MS6M814 D R A W N CHECKED CHECKED D A T E N A M E A P P R O V E D Dec.-- '4 Dec.-- '4 K. Komatsu O. Ikawa K. Yamada

More information

APPLICATION VIRTUALIZATION TECHNOLOGIES WHITEPAPER

APPLICATION VIRTUALIZATION TECHNOLOGIES WHITEPAPER APPLICATION VIRTUALIZATION TECHNOLOGIES WHITEPAPER Oct 2013 INTRODUCTION TWO TECHNOLOGY CATEGORIES Application virtualization technologies can be divided into two main categories: those that require an

More information

Research on Support for Persons with Mental Disability to Make Transition to Regular Employment

Research on Support for Persons with Mental Disability to Make Transition to Regular Employment Research on Support for Persons with Mental Disability to Make Transition to Regular Employment (Research Report No.108) Summary Key Words Persons with Mental Disabilities, Step-Up Employment Program for

More information

Managing HKU author reputations, enhancing HKU's reputation. Creative Commons: Attribution 3.0 Hong Kong License

Managing HKU author reputations, enhancing HKU's reputation. Creative Commons: Attribution 3.0 Hong Kong License Title Managing HKU author reputations, enhancing HKU's reputation Author(s) Palmer, DT Citation The World 100 Conference: Managing University Reputation in a Competitive World, Hong Kong, 22-23 June 2010.

More information

Cash, Receivables & Marketable Securities

Cash, Receivables & Marketable Securities KK Cash, Receivables & Marketable Securities CURRENT ASSETS ( 流 動 資 産 ) 代 表 的 な 資 産 は Cash ( 現 金 ) Marketable Securities ( 有 価 証 券 ) Accounts Receivable ( 売 掛 金 ) Notes Receivable ( 手 形 ) Inventories

More information

TN 024 - Installing PV4E 6.0 under Windows Server 2008 (R2) (3264 Bit) and Remote DB Support

TN 024 - Installing PV4E 6.0 under Windows Server 2008 (R2) (3264 Bit) and Remote DB Support TN 024 - Installing PV4E 6.0 under Windows Server 2008 (R2) (3264 Bit) and Remote DB Support Issue Date: 28.07.2013 Revision Date: 28.07.2013 Product (configuration) CenterMind PV4E PV4E 6.0 PV4E 6.0 SP1

More information

Chiba Institute of Technology Graduate School

Chiba Institute of Technology Graduate School Academic Year 2015 Chiba Institute of Technology Graduate School Fall Enrollment: September Examination International Student Admission Examination Application Guidelines Graduate School of Engineering

More information

Microsoft Update Management. Sam Youness Microsoft

Microsoft Update Management. Sam Youness Microsoft Microsoft Update Management Sam Youness Microsoft Microsoft s Areas of Focus for ICS Risk Management Secure Development Device and Network Security Identity and Access Management Operational Response Get

More information

XF Extracellular Flux Analyzer. Installation and Troubleshooting Guide

XF Extracellular Flux Analyzer. Installation and Troubleshooting Guide Installation and Troubleshooting Guide February 24, 2014 2 TABLE OF CONTENTS XF Client System and File Requirements 4 Frequently Asked Questions. 4 Installation.. 5 Installing XF Software.. 5 Resolving

More information

Upper Secondary Education in Japan

Upper Secondary Education in Japan Upper Secondary Education in Japan The role of upper secondary education in Japan is to provide higher general education and specialized education according to students mental and physical development

More information

Most EFL teachers in Japan find that there are groups of verbs which consistently

Most EFL teachers in Japan find that there are groups of verbs which consistently Results of a Corpus Study of LOOK, SEE, and WATCH Gregory C. Anthony Hachinohe University Reference Data: Anthony, G. C. (2012). Results of a Corpus Study of LOOK, SEE, and WATCH. In A. Stewart & N. Sonda

More information

Microsoft Security Bulletin MS09-053 - Important

Microsoft Security Bulletin MS09-053 - Important Microsoft Security Bulletin MS09-053 - : Vulnerabilities in FTP Service for...page 1 of 28 TechNet Home > TechNet Security > Bulletins Microsoft Security Bulletin MS09-053 - Vulnerabilities in FTP Service

More information

MPLS Configration 事 例

MPLS Configration 事 例 MPLS Configration 事 例 JANOG6 MPLSパネル グローバルワン 株 式 会 社 06/16/2000 JANOG6 MPLS Pannel 1 MPLS Configration なにが 必 要?(Ciscoしかわかりません) IOSは12.0(7) T 以 上 がいい PEは3600, 4500, 7200, and 7500 PはCisco LS1010, 7200,

More information

第 2 回 Linux-HA Japan 勉 強 会

第 2 回 Linux-HA Japan 勉 強 会 第 2 回 Linux-HA Japan 勉 強 会 2011 年 6 月 3 日 NTTデータ 先 端 技 術 株 式 会 社 池 田 淳 子 本 日 のお 題 crm の 歩 き 方 目 次 1.crm シェルとは 2.crm シェルのインストール 3.crm シェルでリソースを 設 定 する 4.crm シェルでクラスタを 管 理 する 1. crm シェルとは crm シェルとは acemakerに

More information

7 myths about cars and free trade agreements

7 myths about cars and free trade agreements ECIPE PRESENTATION» 7 myths about cars and free trade agreements Hosuk Lee-Makiyama Co-Director, European Centre for International Political Economy (ECIPE) Myth #1 作 り 話 #1 Mythe #1 Foreign imports are

More information

外 部 委 託 が 進 む 中 での 地 方 自 治 体 職 員 の 雇 用 の 保 護 PROTECTION OF EMPLOYMENT FOR LOCAL GOVERNMENT WORKERS UNDER OUTSOURCING

外 部 委 託 が 進 む 中 での 地 方 自 治 体 職 員 の 雇 用 の 保 護 PROTECTION OF EMPLOYMENT FOR LOCAL GOVERNMENT WORKERS UNDER OUTSOURCING 外 部 委 託 が 進 む 中 での 地 方 自 治 体 職 員 の 雇 用 の 保 護 PROTECTION OF EMPLOYMENT FOR LOCAL GOVERNMENT WORKERS UNDER OUTSOURCING 概 要 保 守 党 のサッチャー 政 権 は 1980 年 地 方 自 治 体 計 画 土 地 法 と 1988 年 地 方 自 治 法 を 通 して UKでの 公 共

More information

Getting Started. A guide for newly qualified translators

Getting Started. A guide for newly qualified translators Getting Started A guide for newly qualified translators 1 GETTING STARTED WITH GENGO Gengo is an online, crowdsourced translation service. This guide is designed for newly qualified Gengo Translators and

More information

A Content- Specific Task-Based Language Program for Online Business English Instruction

A Content- Specific Task-Based Language Program for Online Business English Instruction A Content- Specific Task-Based Language Program for Online Business English Instruction M. Michael Hadas BBT Online University Reference Data: Hadas, M. M., (2014). A content-specific task-based language

More information

System Planning, Deployment, and Best Practices Guide

System Planning, Deployment, and Best Practices Guide www.novell.com/documentation System Planning, Deployment, and Best Practices Guide ZENworks Application Virtualization 9.0 February 22, 2012 Legal Notices Novell, Inc., makes no representations or warranties

More information

EMET 4.0 PKI MITIGATION. Neil Sikka DefCon 21

EMET 4.0 PKI MITIGATION. Neil Sikka DefCon 21 EMET 4.0 PKI MITIGATION Neil Sikka DefCon 21 ABOUT ME Security Engineer on MSRC (Microsoft Security Response Center) I look at 0Days EMET Developer I enjoy doing security research on my free time too:

More information

IHS Technology. IHS Technology Business Intelligence Enabling market leadership through research, analysis and strategy

IHS Technology. IHS Technology Business Intelligence Enabling market leadership through research, analysis and strategy 2015 年 8 月 13 日 改 訂 IHS IHS Business Intelligence Enabling market leadership through research, analysis and strategy 世 界 に 誇 る 圧 倒 的 な 調 査 領 域 で お 客 様 のあらゆる 課 題 解 決 を サポートいたします IHS - Leading information,

More information

Adobe Flash Player and Adobe AIR security

Adobe Flash Player and Adobe AIR security Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,

More information

Design Act ( Act No. 125 of 1959)

Design Act ( Act No. 125 of 1959) この 意 匠 法 の 翻 訳 は 平 成 十 八 年 法 律 第 五 十 五 号 までの 改 正 ( 平 成 19 年 4 月 1 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 18 年 3 月 版 )に 準 拠 して 作 成 したものです なお この 法 令 の 翻 訳 は 公 定 訳 ではありません 法 的 効 力 を 有 するのは 日 本 語 の 法 令

More information

Background. How much does EMET cost? What is the license fee? EMET is freely available from Microsoft without material cost.

Background. How much does EMET cost? What is the license fee? EMET is freely available from Microsoft without material cost. Microsoft s Enhanced Mitigation Experience Toolkit (EMET) is an enhancement to the Windows operating system that stops broad classes of malware from executing. EMET implements a set of anti-exploitation

More information

Internal USB port kit installation

Internal USB port kit installation Internal USB port kit installation Introduction The internal USB port kit provides a Type A female USB port compatible with Type A USB devices internal to the computer chassis. This document describes

More information

Outpost Network Security

Outpost Network Security Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It

More information

Employment Security Act (Act No. 141 of 1947)

Employment Security Act (Act No. 141 of 1947) この 職 業 安 定 法 の 翻 訳 は 平 成 十 九 年 法 律 第 七 十 九 号 までの 改 正 ( 平 成 19 年 10 月 1 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 19 年 3 月 版 )に 準 拠 して 作 成 し たものです なお この 法 令 の 翻 訳 は 公 定 訳 ではありません 法 的 効 力 を 有 するのは 日 本 語

More information

Chiba Institute of Technology Graduate School

Chiba Institute of Technology Graduate School Academic Year 2016 Chiba Institute of Technology Graduate School Spring Enrollment: September and March International Student Admission Application Guidelines Graduate School of Engineering Graduate School

More information

Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions

Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions 1 Agenda What is Application Whitelisting (AWL) Protection provided by Application

More information

Salesnet CRM Documents

Salesnet CRM Documents Salesnet CRM Documents Outlook Add-In for Salesnet CRM Requirements Installation Instructions Add-in Overview Release Notes 2001-2012 Salesnet. All Rights Reserved. Document History Salesnet CRM Documents

More information

さくらインターネット 研 究 所 上 級 研 究 員 日 本 Vyattaユーザー 会 運 営 委 員 松 本 直 人

さくらインターネット 研 究 所 上 級 研 究 員 日 本 Vyattaユーザー 会 運 営 委 員 松 本 直 人 2011 年 08 月 18 日 さくらインターネット 研 究 所 上 級 研 究 員 日 本 Vyattaユーザー 会 運 営 委 員 松 本 直 人 (C)Copyright 1996-2010 SAKURA Internet Inc. 現 在 起 こっているコト 従 来 のコンピューティング クラウド コンピューティング パブリック プライベートの 区 別 なくクラウドへ 移 行 中 仮 想

More information

PROJECTIONS SUITE. Database Setup Utility (and Prerequisites) Installation and General Instructions. v0.9 draft prepared by David Weinstein

PROJECTIONS SUITE. Database Setup Utility (and Prerequisites) Installation and General Instructions. v0.9 draft prepared by David Weinstein PROJECTIONS SUITE Database Setup Utility (and Prerequisites) Installation and General Instructions v0.9 draft prepared by David Weinstein Introduction These are the instructions for installing, updating,

More information

Hardware Recommendations

Hardware Recommendations Hardware Recommendations Alpha Anywhere is a Windows based system that will run on various Windows versions. The minimum requirement is Windows XP SP3 or Server 2003. However, it is recommended that at

More information

Eclipse installation, configuration and operation

Eclipse installation, configuration and operation Eclipse installation, configuration and operation This document aims to walk through the procedures to setup eclipse on different platforms for java programming and to load in the course libraries for

More information

Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices

Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices 350 PIERS Proceedings, Cambridge, USA, July 5 8, 2010 Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices Dung Vu Pham 1, Malka N. Halgamuge 2, Ali Syed 1, and Priyan

More information

Patent Act ( Act No. 121 of 1959)

Patent Act ( Act No. 121 of 1959) この 特 許 法 の 翻 訳 は 平 成 十 八 年 法 律 第 百 九 号 までの 改 正 ( 平 成 19 年 9 月 30 日 施 行 )について 法 令 用 語 日 英 標 準 対 訳 辞 書 ( 平 成 19 年 3 月 版 )に 準 拠 して 作 成 したも のです なお この 法 令 の 翻 訳 は 公 定 訳 ではありません 法 的 効 力 を 有 するのは 日 本 語 の 法 令

More information

Preschool Education and Care in Japan

Preschool Education and Care in Japan Preschool Education and Care in Japan Preschool education is called pre-primary education in the ISCED (International Standard Classification of Education, designed by UNESCO) and classified as level 0.

More information

PRACTICE. Field Trial against Cyber-attacks through International Collaboration ISPs Effort to Establish Quick Response Scheme. September 24th, 2013

PRACTICE. Field Trial against Cyber-attacks through International Collaboration ISPs Effort to Establish Quick Response Scheme. September 24th, 2013 PRACTICE Field Trial against Cyber-attacks through International Collaboration ISPs Effort to Establish Quick Response Scheme September 24th, 2013 Satoshi NORITAKE NTT Communications / Telecom-ISAC Japan

More information

As the use of computers is becoming a more integral part of learning environments,

As the use of computers is becoming a more integral part of learning environments, JALT2009 Conference Proceedings 506 Online multifunctional gradebook for busy teachers Raymond Wong Kinki University Nathan Krug Saitama University Frank Tucker Kansai Gaidai University Patrick Rates Ritsumeikan

More information

California Subject Examinations for Teachers

California Subject Examinations for Teachers California Subject Examinations for Teachers TEST GUIDE JAPANESE SUBTEST I Sample Questions and Responses and Scoring Information Copyright 2015 Pearson Education, Inc. or its affiliate(s). All rights

More information

The Course of Study is the series of guidelines for subject

The Course of Study is the series of guidelines for subject The Language Teacher Feature Article 3 Behind MEXT s new Course of Study Guidelines Keywords Course of Study Guidelines, MEXT, Communicative Language Teaching (CLT) in Japan The new Course of Study Guidelines

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

Application Manager. Installation and Upgrade Guide. Version 8 FR6

Application Manager. Installation and Upgrade Guide. Version 8 FR6 Application Manager Installation and Upgrade Guide Version 8 FR6 APPLICATION MANAGER INSTALLATION AND UPGRADE GUIDE ii AppSense Limited, 2012 All rights reserved. No part of this document may be produced

More information

What's New in ADP Reporting?

What's New in ADP Reporting? What's New in ADP Reporting? Welcome to the latest version of ADP Reporting! This release includes the following new features and enhancements. Use the links below to learn more about each one. What's

More information

NVIDIA CUDA GETTING STARTED GUIDE FOR MICROSOFT WINDOWS

NVIDIA CUDA GETTING STARTED GUIDE FOR MICROSOFT WINDOWS NVIDIA CUDA GETTING STARTED GUIDE FOR MICROSOFT WINDOWS DU-05349-001_v6.0 February 2014 Installation and Verification on TABLE OF CONTENTS Chapter 1. Introduction...1 1.1. System Requirements... 1 1.2.

More information

Ibaraki University. Graduate School of Agriculture. (Master s Program)

Ibaraki University. Graduate School of Agriculture. (Master s Program) Ibaraki University 茨 城 大 学 Graduate School of Agriculture 大 学 院 農 学 研 究 科 (Master s Program) 修 士 課 程 Application Guidelines for Academic Year 2015 平 成 27 年 度 学 生 募 集 要 項 (October Admissions) 10 月 入 学 Special

More information

Code Estimation Tools Directions for a Services Engagement

Code Estimation Tools Directions for a Services Engagement Code Estimation Tools Directions for a Services Engagement Summary Black Duck software provides two tools to calculate size, number, and category of files in a code base. This information is necessary

More information

Redline Users Guide. Version 1.12

Redline Users Guide. Version 1.12 Redline Users Guide Version 1.12 Contents Contents 1 About Redline 5 Timeline 5 Malware Risk Index (MRI) Score 5 Indicators of Compromise (IOCs) 5 Whitelists 5 Installation 6 System Requirements 6 Install

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

WINDOWS PROCESSES AND SERVICES

WINDOWS PROCESSES AND SERVICES OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

New Features in XE8. Marco Cantù RAD Studio Product Manager

New Features in XE8. Marco Cantù RAD Studio Product Manager New Features in XE8 Marco Cantù RAD Studio Product Manager Marco Cantù RAD Studio Product Manager Email: marco.cantu@embarcadero.com @marcocantu Book author and Delphi guru blog.marcocantu.com 2 Agenda

More information

Agenda. About Gengo. Our PostgreSQL usage. pgpool-ii. Lessons

Agenda. About Gengo. Our PostgreSQL usage. pgpool-ii. Lessons Agenda About Gengo Our PostgreSQL usage pgpool-ii Lessons Agenda About Gengo Our PostgreSQL usage pgpool-ii Lessons Who I am 冨 田 陽 介 Backend and Ops Engineer Experience Ops role for the first time at Gengo,

More information