Exception inattendue. Workflow v connexion en tant qu'administrateur

Size: px
Start display at page:

Download "Exception inattendue. Workflow v1.6.1 - connexion en tant qu'administrateur"

Transcription

1 Workflow v connexion en tant qu'administrateur Lorsque je tente d'exporter des fiches (export simple, complet ou complet avec historique) en tant que "Ressource pédagogique [Simple]", j'ai l'erreur : Détail de l'erreur ci-dessous : Exception inattendue Informations générales Application ori-oai-workflow Version Serveur (pcbujbrassart.scd.fr) Date lun :05:19

2 Utilisateur Portail Client Query string Navigateur client Exception levée Nom Message administrateur inconnu (pcbujbrassart.scd.fr) inconnue Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv: ) Gecko/ Firefox/3.5.8 (.NET CLR ) ZipException duplicate entry: ori-6.xml Pile d'exécution javax.faces.facesexception: Error calling action method of component with id downloadform:_idjsp46 caused by: javax.faces.el.evaluationexception: Exception while invoking expression #{importcontroller.export} caused by: org.orioai.workflow.exceptions.exportexception: Exception during export metadatas caused by: java.util.zip.zipexception: duplicate entry: ori-6.xml Pile d'exécution détaillée javax.faces.facesexception: Error calling action method of component with id downloadform:_idjsp46 org.apache.myfaces.application.actionlistenerimpl.processaction(actionlistenerimpl.java:7 2) javax.faces.component.uicommand.broadcast(uicommand.java:109) javax.faces.component.uiviewroot._broadcastforphase(uiviewroot.java:97) javax.faces.component.uiviewroot.processapplication(uiviewroot.java:171) org.apache.myfaces.lifecycle.invokeapplicationexecutor.execute(invokeapplicationexecuto r.java:32) org.apache.myfaces.lifecycle.lifecycleimpl.executephase(lifecycleimpl.java:95) org.apache.myfaces.lifecycle.lifecycleimpl.execute(lifecycleimpl.java:70) org.esupportail.commons.web.servlet.facesservlet.service(facesservlet.java:385) javax.servlet.http.httpservlet.service(httpservlet.java:717) :290) org.apache.myfaces.webapp.filter.extensionsfilter.dofilter(extensionsfilter.java:147) org.acegisecurity.util.filterchainproxy$virtualfilterchain.dofilter(filterchainproxy.java:26 org.acegisecurity.intercept.web.filtersecurityinterceptor.invoke(filtersecurityinterceptor.jav a:107) org.acegisecurity.intercept.web.filtersecurityinterceptor.dofilter(filtersecurityinterceptor.ja va:72) org.acegisecurity.ui.exceptiontranslationfilter.dofilter(exceptiontranslationfilter.java:110) org.acegisecurity.context.httpsessioncontextintegrationfilter.dofilter(httpsessioncontextin tegrationfilter.java:229)

3 org.acegisecurity.util.filterchainproxy.dofilter(filterchainproxy.java:148) org.acegisecurity.util.filtertobeanproxy.dofilter(filtertobeanproxy.java:98) org.apache.catalina.core.standardwrappervalve.invoke(standardwrappervalve.java:233) org.apache.catalina.core.standardcontextvalve.invoke(standardcontextvalve.java:191) org.apache.catalina.authenticator.authenticatorbase.invoke(authenticatorbase.java:465) org.apache.catalina.core.standardhostvalve.invoke(standardhostvalve.java:127) org.apache.catalina.valves.errorreportvalve.invoke(errorreportvalve.java:102) org.apache.catalina.core.standardenginevalve.invoke(standardenginevalve.java:109) org.apache.catalina.connector.coyoteadapter.service(coyoteadapter.java:298) org.apache.coyote.http11.http11processor.process(http11processor.java:852) org.apache.coyote.http11.http11protocol$http11connectionhandler.process(http11protocol. java:588) org.apache.tomcat.util.net.jioendpoint$worker.run(jioendpoint.java:489) java.lang.thread.run(thread.java:595) caused by: javax.faces.el.evaluationexception: Exception while invoking expression #{importcontroller.export} org.apache.myfaces.el.methodbindingimpl.invoke(methodbindingimpl.java:156) org.apache.myfaces.application.actionlistenerimpl.processaction(actionlistenerimpl.java:6 1) javax.faces.component.uicommand.broadcast(uicommand.java:109) javax.faces.component.uiviewroot._broadcastforphase(uiviewroot.java:97) javax.faces.component.uiviewroot.processapplication(uiviewroot.java:171) org.apache.myfaces.lifecycle.invokeapplicationexecutor.execute(invokeapplicationexecuto r.java:32) org.apache.myfaces.lifecycle.lifecycleimpl.executephase(lifecycleimpl.java:95) org.apache.myfaces.lifecycle.lifecycleimpl.execute(lifecycleimpl.java:70) org.esupportail.commons.web.servlet.facesservlet.service(facesservlet.java:385) javax.servlet.http.httpservlet.service(httpservlet.java:717) :290) org.apache.myfaces.webapp.filter.extensionsfilter.dofilter(extensionsfilter.java:147) org.acegisecurity.util.filterchainproxy$virtualfilterchain.dofilter(filterchainproxy.java:26 org.acegisecurity.intercept.web.filtersecurityinterceptor.invoke(filtersecurityinterceptor.jav a:107) org.acegisecurity.intercept.web.filtersecurityinterceptor.dofilter(filtersecurityinterceptor.ja va:72) org.acegisecurity.ui.exceptiontranslationfilter.dofilter(exceptiontranslationfilter.java:110) org.acegisecurity.context.httpsessioncontextintegrationfilter.dofilter(httpsessioncontextin tegrationfilter.java:229)

4 org.acegisecurity.util.filterchainproxy.dofilter(filterchainproxy.java:148) org.acegisecurity.util.filtertobeanproxy.dofilter(filtertobeanproxy.java:98) org.apache.catalina.core.standardwrappervalve.invoke(standardwrappervalve.java:233) org.apache.catalina.core.standardcontextvalve.invoke(standardcontextvalve.java:191) org.apache.catalina.authenticator.authenticatorbase.invoke(authenticatorbase.java:465) org.apache.catalina.core.standardhostvalve.invoke(standardhostvalve.java:127) org.apache.catalina.valves.errorreportvalve.invoke(errorreportvalve.java:102) org.apache.catalina.core.standardenginevalve.invoke(standardenginevalve.java:109) org.apache.catalina.connector.coyoteadapter.service(coyoteadapter.java:298) org.apache.coyote.http11.http11processor.process(http11processor.java:852) org.apache.coyote.http11.http11protocol$http11connectionhandler.process(http11protocol. java:588) org.apache.tomcat.util.net.jioendpoint$worker.run(jioendpoint.java:489) java.lang.thread.run(thread.java:595) caused by: org.orioai.workflow.exceptions.exportexception: Exception during export metadatas org.orioai.workflow.services.importexport.importexportservice.exportmetadataszipfile(imp ortexportservice.java:396) org.orioai.workflow.web.domainservice.getmetadataszipfile(domainservice.java:385) org.orioai.workflow.web.domainservice$$fastclassbycglib$$8e4532fb.invoke(<generate d>) net.sf.cglib.proxy.methodproxy.invoke(methodproxy.java:149) org.springframework.aop.framework.cglib2aopproxy$cglibmethodinvocation.invokejoinpo int(cglib2aopproxy.java:700) org.springframework.aop.framework.reflectivemethodinvocation.proceed(reflectivemethod Invocation.java:149) org.springframework.transaction.interceptor.transactioninterceptor.invoke(transactioninterc eptor.java:106) org.springframework.aop.framework.reflectivemethodinvocation.proceed(reflectivemethod Invocation.java:171) org.springframework.aop.framework.cglib2aopproxy$dynamicadvisedinterceptor.intercept (Cglib2AopProxy.java:635) org.orioai.workflow.web.domainservice$$enhancerbycglib$$22cce5b7.getmetadataszip File(<generated>) org.orioai.workflow.web.controllers.importcontroller.export(importcontroller.java:210) sun.reflect.nativemethodaccessorimpl.invoke0(native Method) sun.reflect.nativemethodaccessorimpl.invoke(nativemethodaccessorimpl.java:39) sun.reflect.delegatingmethodaccessorimpl.invoke(delegatingmethodaccessorimpl.java:25) java.lang.reflect.method.invoke(method.java:585) org.apache.myfaces.el.methodbindingimpl.invoke(methodbindingimpl.java:132) org.apache.myfaces.application.actionlistenerimpl.processaction(actionlistenerimpl.java:6 1) javax.faces.component.uicommand.broadcast(uicommand.java:109) javax.faces.component.uiviewroot._broadcastforphase(uiviewroot.java:97) javax.faces.component.uiviewroot.processapplication(uiviewroot.java:171) org.apache.myfaces.lifecycle.invokeapplicationexecutor.execute(invokeapplicationexecuto r.java:32) org.apache.myfaces.lifecycle.lifecycleimpl.executephase(lifecycleimpl.java:95) org.apache.myfaces.lifecycle.lifecycleimpl.execute(lifecycleimpl.java:70) org.esupportail.commons.web.servlet.facesservlet.service(facesservlet.java:385) javax.servlet.http.httpservlet.service(httpservlet.java:717)

5 :290) org.apache.myfaces.webapp.filter.extensionsfilter.dofilter(extensionsfilter.java:147) org.acegisecurity.util.filterchainproxy$virtualfilterchain.dofilter(filterchainproxy.java:26 org.acegisecurity.intercept.web.filtersecurityinterceptor.invoke(filtersecurityinterceptor.jav a:107) org.acegisecurity.intercept.web.filtersecurityinterceptor.dofilter(filtersecurityinterceptor.ja va:72) org.acegisecurity.ui.exceptiontranslationfilter.dofilter(exceptiontranslationfilter.java:110) org.acegisecurity.context.httpsessioncontextintegrationfilter.dofilter(httpsessioncontextin tegrationfilter.java:229) org.acegisecurity.util.filterchainproxy.dofilter(filterchainproxy.java:148) org.acegisecurity.util.filtertobeanproxy.dofilter(filtertobeanproxy.java:98) org.apache.catalina.core.standardwrappervalve.invoke(standardwrappervalve.java:233) org.apache.catalina.core.standardcontextvalve.invoke(standardcontextvalve.java:191) org.apache.catalina.authenticator.authenticatorbase.invoke(authenticatorbase.java:465) org.apache.catalina.core.standardhostvalve.invoke(standardhostvalve.java:127) org.apache.catalina.valves.errorreportvalve.invoke(errorreportvalve.java:102) org.apache.catalina.core.standardenginevalve.invoke(standardenginevalve.java:109) org.apache.catalina.connector.coyoteadapter.service(coyoteadapter.java:298) org.apache.coyote.http11.http11processor.process(http11processor.java:852) org.apache.coyote.http11.http11protocol$http11connectionhandler.process(http11protocol. java:588) org.apache.tomcat.util.net.jioendpoint$worker.run(jioendpoint.java:489) java.lang.thread.run(thread.java:595) caused by: java.util.zip.zipexception: duplicate entry: ori-6.xml java.util.zip.zipoutputstream.putnextentry(zipoutputstream.java:163) org.orioai.workflow.services.importexport.importexportservice.exportmetadataszipfile(imp ortexportservice.java:359) org.orioai.workflow.web.domainservice.getmetadataszipfile(domainservice.java:385) org.orioai.workflow.web.domainservice$$fastclassbycglib$$8e4532fb.invoke(<generate d>) net.sf.cglib.proxy.methodproxy.invoke(methodproxy.java:149) org.springframework.aop.framework.cglib2aopproxy$cglibmethodinvocation.invokejoinpo int(cglib2aopproxy.java:700) org.springframework.aop.framework.reflectivemethodinvocation.proceed(reflectivemethod Invocation.java:149) org.springframework.transaction.interceptor.transactioninterceptor.invoke(transactioninterc eptor.java:106)

6 org.springframework.aop.framework.reflectivemethodinvocation.proceed(reflectivemethod Invocation.java:171) org.springframework.aop.framework.cglib2aopproxy$dynamicadvisedinterceptor.intercept (Cglib2AopProxy.java:635) org.orioai.workflow.web.domainservice$$enhancerbycglib$$22cce5b7.getmetadataszip File(<generated>) org.orioai.workflow.web.controllers.importcontroller.export(importcontroller.java:210) sun.reflect.nativemethodaccessorimpl.invoke0(native Method) sun.reflect.nativemethodaccessorimpl.invoke(nativemethodaccessorimpl.java:39) sun.reflect.delegatingmethodaccessorimpl.invoke(delegatingmethodaccessorimpl.java:25) java.lang.reflect.method.invoke(method.java:585) org.apache.myfaces.el.methodbindingimpl.invoke(methodbindingimpl.java:132) org.apache.myfaces.application.actionlistenerimpl.processaction(actionlistenerimpl.java:6 1) javax.faces.component.uicommand.broadcast(uicommand.java:109) javax.faces.component.uiviewroot._broadcastforphase(uiviewroot.java:97) javax.faces.component.uiviewroot.processapplication(uiviewroot.java:171) org.apache.myfaces.lifecycle.invokeapplicationexecutor.execute(invokeapplicationexecuto r.java:32) org.apache.myfaces.lifecycle.lifecycleimpl.executephase(lifecycleimpl.java:95) org.apache.myfaces.lifecycle.lifecycleimpl.execute(lifecycleimpl.java:70) org.esupportail.commons.web.servlet.facesservlet.service(facesservlet.java:385) javax.servlet.http.httpservlet.service(httpservlet.java:717) :290) org.apache.myfaces.webapp.filter.extensionsfilter.dofilter(extensionsfilter.java:147) org.acegisecurity.util.filterchainproxy$virtualfilterchain.dofilter(filterchainproxy.java:26 org.acegisecurity.intercept.web.filtersecurityinterceptor.invoke(filtersecurityinterceptor.jav a:107) org.acegisecurity.intercept.web.filtersecurityinterceptor.dofilter(filtersecurityinterceptor.ja va:72) org.acegisecurity.ui.exceptiontranslationfilter.dofilter(exceptiontranslationfilter.java:110) org.acegisecurity.context.httpsessioncontextintegrationfilter.dofilter(httpsessioncontextin tegrationfilter.java:229) org.acegisecurity.util.filterchainproxy.dofilter(filterchainproxy.java:148) org.acegisecurity.util.filtertobeanproxy.dofilter(filtertobeanproxy.java:98) org.apache.catalina.core.standardwrappervalve.invoke(standardwrappervalve.java:233) org.apache.catalina.core.standardcontextvalve.invoke(standardcontextvalve.java:191) org.apache.catalina.authenticator.authenticatorbase.invoke(authenticatorbase.java:465) org.apache.catalina.core.standardhostvalve.invoke(standardhostvalve.java:127)

7 Attributs de requête org.apache.catalina.valves.errorreportvalve.invoke(errorreportvalve.java:102) org.apache.catalina.core.standardenginevalve.invoke(standardenginevalve.java:109) org.apache.catalina.connector.coyoteadapter.service(coyoteadapter.java:298) org.apache.coyote.http11.http11processor.process(http11processor.java:852) org.apache.coyote.http11.http11protocol$http11connectionhandler.process(http11protocol. java:588) org.apache.tomcat.util.net.jioendpoint$worker.run(jioendpoint.java:489) java.lang.thread.run(thread.java:595) acegi_filtersecurityinterceptor_filterapplied = [true] acegi_session_integration_filter_applied = [true] class org.apache.myfaces.shared_tomahawk.renderkit.html.util.javascriptutils.old_view_id = [/jsp/import.jsp] importcontroller = [ImportController# uploadedFile=null]] org.apache.myfaces.addresourcefactory.cache_map_key = [org.apache.myfaces.renderkit.html.util.defaultaddresource@ba6546] org.apache.myfaces.component.html.util.extensionfilter.dofiltercalled = [true] org.jenia.faces.template.listener.phaselistener.phase = [2] org.springframework.web.context.request.requestcontextlistener.request_attributes = [org.apache.catalina.connector.requestfacade@f51ed1] userlogincontroller = [org.orioai.workflow.web.controllers.userlogincontroller@14f0e6e] Attributs de session ACEGI_SAVED_REQUEST_KEY = [SavedRequest[ ACEGI_SECURITY_CONTEXT = [org.acegisecurity.context.securitycontextimpl@920fcb4c: Authentication: org.acegisecurity.providers.usernamepasswordauthenticationtoken@920fcb4c: Username: org.acegisecurity.userdetails.ldap.ldapuserdetailsimpl@1b76e38; Password: [PROTECTED]; Authenticated: true; Details: org.acegisecurity.ui.webauthenticationdetails@255f8: RemoteIpAddress: ; SessionId: B649F52C665B0FC7313B380BEEE12F1E; Granted Authorities: admins, DCVE_all, LOME_all, TEF-E_all, DCVE_admins, TEF-E_admins, LOME_moderators, LOME_admins, TEF-E_moderateursTheses] ACEGI_SECURITY_LAST_USERNAME = [administrateur] applicationcontroller = [org.orioai.workflow.web.controllers.applicationcontroller@76371c] deeplinkingredirector = [org.orioai.workflow.services.application.deeplinkingredirectorimpl@82a26f] exception.marker = [true] exceptioncontroller = [org.esupportail.commons.web.controllers.exceptioncontroller@13cb19a] javax.faces.request.charset = [utf-8] locale = [fr] org.apache.myfaces.custom.redirecttracker.redirecttrackermanager = [org.apache.myfaces.custom.redirecttracker.redirecttrackermanager@db391d] scopedtarget.workflow = [org.orioai.workflow.services.osworkflowservice@11c2718] Attributs de session globale aucun Entêtes HTTP accept-charset: ISO ,utf-8;q=0.7,*;q=0.7 accept-encoding: gzip,deflate accept-language: fr,fr-fr;q=0.8,en-us;q=0.5,en;q=0.3 accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 connection: keep-alive content-length: content-type: application/x-www-form-urlencoded cookie: JSESSIONID=B649F52C665B0FC7313B380BEEE12F1E

8 host: localhost:8185 keep-alive: 300 referer: user-agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; fr; rv: ) Gecko/ Firefox/3.5.8 (.NET CLR ) Paramètres de la requête downloadform:_idjsp41 = [exportfull] downloadform:_idjsp43 = [ressource_pedago_easy] downloadform:_idjsp46 = [Export] downloadform:_idcl = [] downloadform:_link_hidden_ = [] downloadform_submit = [1] javax.faces.viewstate = [ro0abxvyabnbt LWdvZXhwb3J0LWJ1dHRvbnBwcHBweHh4cQB+AKo=] Cookies JSESSIONID = [B649F52C665B0FC7313B380BEEE12F1E] Propriétés système awt.toolkit = [sun.awt.windows.wtoolkit] catalina.base = [C:\usr\ori\tomcat-workflow] catalina.home = [C:\usr\ori\tomcat-workflow] catalina.usenaming = [true] common.loader = [${catalina.base}/lib,${catalina.base}/lib/*.jar,${catalina.home}/lib,${catalina.home}/lib/*.jar] file.encoding = [UTF-8] file.encoding.pkg = [sun.io] file.separator = [\] java.awt.graphicsenv = [sun.awt.win32graphicsenvironment] java.awt.printerjob = [sun.awt.windows.wprinterjob] java.class.path = [/usr/ori/tomcat-workflow\bin\bootstrap.jar] java.class.version = [49.0] java.endorsed.dirs = [/usr/ori/tomcat-workflow\endorsed] java.ext.dirs = [C:\Java\jdk1.5.0_15\jre\lib\ext] java.home = [C:\Java\jdk1.5.0_15\jre] java.io.tmpdir = [/usr/ori/tomcat-workflow\temp] java.library.path = [C:\Java\jdk1.5.0_15\bin;.;C:\WINDOWS\system32;C:\WINDOWS;C:\apache-ant \bin;C:\Java\jdk1.5.0_15\bin;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem; C:\Program Files\Fichiers communs\roxio Shared\DLLShared\;;C:\WINDOWS\system32\WindowsPowerShell\v1.0;C:\Program Files\TortoiseSVN\bin] java.naming.factory.initial = [org.apache.naming.java.javaurlcontextfactory] java.naming.factory.url.pkgs = [org.apache.naming] java.runtime.name = [Java(TM) 2 Runtime Environment, Standard Edition] java.runtime.version = [1.5.0_15-b04] java.specification.name = [Java Platform API Specification] java.specification.vendor = [Sun Microsystems Inc.] java.specification.version = [1.5] java.util.logging.config.file = [/usr/ori/tomcat-workflow\conf\logging.properties] java.util.logging.manager = [org.apache.juli.classloaderlogmanager] java.vendor = [Sun Microsystems Inc.] java.vendor.url = [ java.vendor.url.bug = [ java.version = [1.5.0_15] java.vm.info = [mixed mode] java.vm.name = [Java HotSpot(TM) Client VM]

9 java.vm.specification.name = [Java Virtual Machine Specification] java.vm.specification.vendor = [Sun Microsystems Inc.] java.vm.specification.version = [1.0] java.vm.vendor = [Sun Microsystems Inc.] java.vm.version = [1.5.0_15-b04] line.separator = [ ] org.apache.lucene.fsdirectory.class = [org.apache.lucene.store.fsdirectory] os.arch = [x86] os.name = [Windows XP] os.version = [5.1] package.access = [sun.,org.apache.catalina.,org.apache.coyote.,org.apache.tomcat.,org.apache.jasper.,sun.beans.] package.definition = [sun.,java.,org.apache.catalina.,org.apache.coyote.,org.apache.tomcat.,org.apache.jasper.] path.separator = [;] server.loader = [] shared.loader = [] sun.arch.data.model = [32] sun.boot.class.path = [C:\Java\jdk1.5.0_15\jre\lib\rt.jar;C:\Java\jdk1.5.0_15\jre\lib\i18n.jar;C:\Java\jdk1.5.0_15\jre\lib\sunrsasign.jar; C:\Java\jdk1.5.0_15\jre\lib\jsse.jar;C:\Java\jdk1.5.0_15\jre\lib\jce.jar;C:\Java\jdk1.5.0_15\jre\lib\charsets.jar;C:\ Java\jdk1.5.0_15\jre\classes] sun.boot.library.path = [C:\Java\jdk1.5.0_15\jre\bin] sun.cpu.endian = [little] sun.cpu.isalist = [pentium_pro+mmx pentium_pro pentium+mmx pentium i486 i386 i86] sun.desktop = [windows] sun.io.unicode.encoding = [UnicodeLittle] sun.java.launcher = [SUN_STANDARD] sun.jnu.encoding = [Cp1252] sun.management.compiler = [HotSpot Client Compiler] sun.os.patch.level = [Service Pack 3] tomcat.util.buf.stringcache.byte.enabled = [true] user.country = [FR] user.dir = [C:\usr\ori\tomcat-workflow\bin] user.home = [C:\Documents and Settings\jacques.brassart] user.language = [fr] user.name = [jacques.brassart] user.timezone = [Europe/Paris] user.variant = []?????EXCEPTION.HEADER.MEMORY??????????EXCEPTI ON.MEMORY. FREE??????????EXCEPTI ON.MEMORY. TOTAL??????????EXCEPTI ON.MEMORY. MAX??????????EXCEPTION.MEMORY.VALUE??????????EXCEPTION.MEMORY.VALUE??????????EXCEPTION.MEMORY.VALUE?????

jdbc:mysql://localhost/jiradb_424?autoreconnect=true&useunicode=true&characte rencoding=utf8

jdbc:mysql://localhost/jiradb_424?autoreconnect=true&useunicode=true&characte rencoding=utf8 Systeminformationen Basis-URL https://xxx.xxx.de:443/jira Systemdatum Thursday, 01 Dec 2011 Systemzeit 09:40:03 +0100 Aktuelles Arbeitsverzeichnis Java-Version Java-Hersteller JVM-Version 1.0 JVM-Hersteller

More information

Anatomy of a Pass-Back-Attack: Intercepting Authentication Credentials Stored in Multifunction Printers

Anatomy of a Pass-Back-Attack: Intercepting Authentication Credentials Stored in Multifunction Printers Anatomy of a Pass-Back-Attack: Intercepting Authentication Credentials Stored in Multifunction Printers By Deral (PercX) Heiland and Michael (omi) Belton Over the past year, one focus of the Foofus.NET

More information

LBL Application Availability Infrastructure Unified Secure Reverse Proxy

LBL Application Availability Infrastructure Unified Secure Reverse Proxy LBL Application Availability Infrastructure Unified Secure Reverse Proxy Valerio Mezzalira TCOGROUP Company Outline Mission: Development of Software Tools Aimed at Enhancing High Availability (HA) of IT

More information

PowerTerm WebConnect. Getting Started. Version 5.6 (build 3000)

PowerTerm WebConnect. Getting Started. Version 5.6 (build 3000) PowerTerm WebConnect Version 5.6 (build 3000) Getting Started PowerTerm WebConnect RemoteView PowerTerm WebConnect HostView PowerTerm WebConnect Enterprise PowerTerm WebConnect for Lotus Legal Notice This

More information

Please report this problem on the Codebeamer support site with as much detail as possible so we know how to reproduce it:

Please report this problem on the Codebeamer support site with as much detail as possible so we know how to reproduce it: 1 von 11 23.05.2014 10:11 Please report this problem on the Codebeamer support site with as much detail as possible so we know how to reproduce it: 1. 2. 3. On which page did you experience the problem?

More information

Using SAML for Single Sign-On in the SOA Software Platform

Using SAML for Single Sign-On in the SOA Software Platform Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software

More information

HTTP Authentifizierung

HTTP Authentifizierung HTTP Authentifizierung Valentin Lein Matr. Nr. 0526536 15.12.2010 Computer Technology /21 Inhalt HTTP Basic Authentication Alternative Authentifizierungsmöglichkeiten HTTP Hypertext Transfer Protocol Computer

More information

Introduction Les failles les plus courantes Les injections SQL. Failles Web. Maxime Arthaud. net7. Jeudi 03 avril 2014.

Introduction Les failles les plus courantes Les injections SQL. Failles Web. Maxime Arthaud. net7. Jeudi 03 avril 2014. Maxime Arthaud net7 Jeudi 03 avril 2014 Syllabus Introduction Exemple de Requête Transmission de données 1 Introduction Exemple de Requête Transmission de données 2 3 Exemple de Requête Transmission de

More information

GET /FB/index.html HTTP/1.1 Host: lmi32.cnam.fr

GET /FB/index.html HTTP/1.1 Host: lmi32.cnam.fr GET /FB/index.html HTTP/1.1 Host: lmi32.cnam.fr HTTP/1.1 200 OK Date: Thu, 20 Oct 2005 14:42:54 GMT Server: Apache/2.0.50 (Linux/SUSE) Last-Modified: Thu, 20 Oct 2005 14:41:56 GMT ETag: "2d7b4-14b-8efd9500"

More information

HTTP Response Splitting

HTTP Response Splitting The Attack HTTP Response Splitting is a protocol manipulation attack, similar to Parameter Tampering The attack is valid only for applications that use HTTP to exchange data Works just as well with HTTPS

More information

Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet

Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet Prepared by: Roberto Suggi Liverani Senior Security Consultant Security-Assessment.com

More information

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku Univerzita Komenského v Bratislave Fakulta matematiky, fyziky a informatiky Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku ITMS: 26140230008 dopytovo orientovaný projekt Moderné

More information

Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis

Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis Juan Caballero, Heng Yin, Zhenkai Liang Carnegie Mellon University Dawn Song Carnegie Mellon University & UC Berkeley

More information

Package httprequest. R topics documented: February 20, 2015

Package httprequest. R topics documented: February 20, 2015 Version 0.0.10 Date 2014-09-29 Title Basic HTTP Request Author Eryk Witold Wolski, Andreas Westfeld Package httprequest February 20, 2015 Maintainer Andreas Westfeld HTTP

More information

Arnaud Becart ip- label 11/9/11

Arnaud Becart ip- label 11/9/11 Arnaud Becart ip- label 11/9/11 RUM Synthe2c Tests You should measure HTML and RIA (Flash ) Page Rendering Onload + Full Page Load InteracBons in your page Third Party content How Synthe2c / Real browsers

More information

Developing Secure Mobile Apps

Developing Secure Mobile Apps Developing Secure Mobile Apps SecAppDev 2011 Apple ios (Xcode) edition Platform Architecture What the ios / hardware platform offers us in the way of protection ios application architecture The ios platform

More information

JASPERREPORTS SERVER WEB SERVICES GUIDE

JASPERREPORTS SERVER WEB SERVICES GUIDE JASPERREPORTS SERVER WEB SERVICES GUIDE RELEASE 5.0 http://www.jaspersoft.com JasperReports Server Web Services Guide Copyright 2012 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft,

More information

Playing with Web Application Firewalls

Playing with Web Application Firewalls Playing with Web Application Firewalls Who is Wendel? Independent penetration test analyst. Affiliated to Hackaholic team. Over 7 years in the security industry. Discovered vulnerabilities in Webmails,

More information

THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6

THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6 The Proxy Server THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6 2 1 Purpose The proxy server acts as an intermediate server that relays requests between

More information

ivoyeur: permission to parse

ivoyeur: permission to parse D A V I D J O S E P H S E N ivoyeur: permission to parse David Josephsen is the author of Building a Monitoring Infrastructure with Nagios (Prentice Hall PTR, 2007) and Senior Systems Engineer at DBG,

More information

Information Extraction Art of Testing Network Peripheral Devices

Information Extraction Art of Testing Network Peripheral Devices OWASP AppSec Brazil 2010, Campinas, SP The OWASP Foundation http://www.owasp.org Information Extraction Art of Testing Network Peripheral Devices Aditya K Sood, SecNiche Security ([email protected])

More information

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP

More information

Barracuda Networks Web Application Firewall

Barracuda Networks Web Application Firewall McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: Barracuda Networks Web Application Firewall January 30, 2015 Barracuda Networks Web Application Firewall Page 1 of 10 Important

More information

Research of Web Real-Time Communication Based on Web Socket

Research of Web Real-Time Communication Based on Web Socket Int. J. Communications, Network and System Sciences, 2012, 5, 797-801 http://dx.doi.org/10.4236/ijcns.2012.512083 Published Online December 2012 (http://www.scirp.org/journal/ijcns) Research of Web Real-Time

More information

Web Security Threat Report: January April 2007. Ryan C. Barnett WASC Member Project Lead: Distributed Open Proxy Honeypots

Web Security Threat Report: January April 2007. Ryan C. Barnett WASC Member Project Lead: Distributed Open Proxy Honeypots Web Security Threat Report: January April 2007 Ryan C. Barnett WASC Member Project Lead: Distributed Open Proxy Honeypots What are we reporting? We are presenting real, live web attack data captured in-the-wild.

More information

Cyber Security Workshop Ethical Web Hacking

Cyber Security Workshop Ethical Web Hacking Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp

More information

600-152 People Data and the Web Forms and CGI CGI. Facilitating interactive web applications

600-152 People Data and the Web Forms and CGI CGI. Facilitating interactive web applications CGI Facilitating interactive web applications Outline In Informatics 1, worksheet 7 says You will learn more about CGI and forms if you enroll in Informatics 2. Now we make good on that promise. First

More information

HTTP Caching & Cache-Busting for Content Publishers

HTTP Caching & Cache-Busting for Content Publishers HTTP Caching & Cache-Busting for Content Publishers Michael J. Radwin http://public.yahoo.com/~radwin/ OSCON 2005 Thursday, August 4th, 2005 1 1 Agenda HTTP in 3 minutes Caching concepts Hit, Miss, Revalidation

More information

Hypertext for Hyper Techs

Hypertext for Hyper Techs Hypertext for Hyper Techs An Introduction to HTTP for SecPros Bio Josh Little, GSEC ~14 years in IT. Support, Server/Storage Admin, Webmaster, Web App Dev, Networking, VoIP, Projects, Security. Currently

More information

TIBCO JASPERREPORTS SERVER WEB SERVICES GUIDE

TIBCO JASPERREPORTS SERVER WEB SERVICES GUIDE TIBCO JASPERREPORTS SERVER WEB SERVICES GUIDE RELEASE 6.1 http://www.jaspersoft.com Copyright 2005-2015, TIBCO Software Inc. All rights reserved. Printed in the U.S.A. TIBCO, the TIBCO logo, TIBCO Jaspersoft,

More information

Offsite Backup. Installation and Upgrade Guide

Offsite Backup. Installation and Upgrade Guide Offsite Backup Version 5.x June 2007 Server v5.x Copyright Notice LexNOC, Inc 2000. All rights reserved. Author: Leo Au-Yeung The use and copying of this product is subject to a license agreement. Any

More information

Internet Technologies Internet Protocols and Services

Internet Technologies Internet Protocols and Services QAFQAZ UNIVERSITY Computer Engineering Department Internet Technologies Internet Protocols and Services Dr. Abzetdin ADAMOV Chair of Computer Engineering Department [email protected] http://ce.qu.edu.az/~aadamov

More information

Crowbar: New generation web application brute force attack tool

Crowbar: New generation web application brute force attack tool Crowbar: New generation web application brute force attack tool 1 Tables of contents Introduction... 3 Challenges with brute force attacks... 3 Crowbar a fresh approach... 3 Other applications of crowbar...

More information

Ahsay Offsite Backup Server v5.x. Installation and Upgrade Guide. Ahsay TM Online Backup - Development Department

Ahsay Offsite Backup Server v5.x. Installation and Upgrade Guide. Ahsay TM Online Backup - Development Department Ahsay Offsite Backup Server v5.x Installation and Upgrade Guide Ahsay TM Online Backup - Development Department October 15, 2009 Copyright Notice Ahsay Systems Corporation Limited 2008. All rights reserved.

More information

Protocol-Level Evasion of Web Application Firewalls

Protocol-Level Evasion of Web Application Firewalls Protocol-Level Evasion of Web Application Firewalls USA2012 Ivan Ristic Director of Engineering True Evasion Story Once, a long time ago, I evaded a web application firewall by adding a single character

More information

All You Can Eat Realtime

All You Can Eat Realtime HTML5 WebSocket: All You Can Eat Realtime By Peter Lubbers, Kaazing May 14, 2010 1 About Peter Lubbers Director of Documentation and Training, Kaazing Co-Founder San Francisco HTML5 User Group http://www.sfhtml5.org/

More information

T14 SECURITY TESTING: ARE YOU A DEER IN THE HEADLIGHTS? Ryan English SPI Dynamics Inc BIO PRESENTATION. Thursday, May 18, 2006 1:30PM

T14 SECURITY TESTING: ARE YOU A DEER IN THE HEADLIGHTS? Ryan English SPI Dynamics Inc BIO PRESENTATION. Thursday, May 18, 2006 1:30PM BIO PRESENTATION T14 Thursday, May 18, 2006 1:30PM SECURITY TESTING: ARE YOU A DEER IN THE HEADLIGHTS? Ryan English SPI Dynamics Inc International Conference On Software Testing Analysis and Review May

More information

at () in C:\wamp\www\icaatom-1.2.0\icaatom- 1.2.0\plugins\sfLucenePlugin\lib\vendor\Zend\Search\Lucene\Document.php line 104...

at () in C:\wamp\www\icaatom-1.2.0\icaatom- 1.2.0\plugins\sfLucenePlugin\lib\vendor\Zend\Search\Lucene\Document.php line 104... 500 Internal Server Error Zend_Search_Lucene_Exception Field name "do_thumbnail_fullpath" not found in document. stack trace at () in C:\wamp\www\icaatom-1.2.0\icaatom- 1.2.0\plugins\sfLucenePlugin\lib\vendor\Zend\Search\Lucene\Document.php

More information

Security for mobile apps

Security for mobile apps November 2014 Security for mobile apps This white paper provides education on security considerations and requirements for mobile apps. 1 Contents Authentication & security for mobile apps 3 Securing mobile

More information

Chapter 7. Web Application Firewall

Chapter 7. Web Application Firewall Chapter 7. Web Application Firewall IMS784(침입탐지시스템) Spring, 2011 Prof. H. K. Kim 1 Agenda I. Remind for term project II. Web security threats III. Web application Firewall IV. Practical recommendations

More information

Combating Web Fraud with Predictive Analytics. Dave Moore Novetta Solutions [email protected]

Combating Web Fraud with Predictive Analytics. Dave Moore Novetta Solutions dmoore@novetta.com Combating Web Fraud with Predictive Analytics Dave Moore Novetta Solutions [email protected] Novetta Solutions Formerly, International Biometric Group (IBG) Consulting DoD, DHS, DRDC IR&D Identity Cyber

More information

reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002)

reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002) 1 cse879-03 2010-03-29 17:23 Kyung-Goo Doh Chapter 3. Web Application Technologies reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002) 1. The HTTP Protocol. HTTP = HyperText

More information

No. Time Source Destination Protocol Info 1190 131.859385 128.238.245.34 128.119.245.12 HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1.

No. Time Source Destination Protocol Info 1190 131.859385 128.238.245.34 128.119.245.12 HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1. Ethereal Lab: HTTP 1. The Basic HTTP GET/response interaction 1190 131.859385 128.238.245.34 128.119.245.12 HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1.1 GET /ethereal-labs/http-ethereal-file1.html

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites

More information

We are sorry, an unexpected error has occured in the export of your issue. Please provide the information below to our support.

We are sorry, an unexpected error has occured in the export of your issue. Please provide the information below to our support. We are sorry, an unexpected error has occured in the export of your issue. Please provide the informion below to our support. General Exception: java.lang.illegalsteexception: Unknown metafile type. java.lang.illegalsteexception:

More information

Forms, CGI Objectives. HTML forms. Form example. Form example...

Forms, CGI Objectives. HTML forms. Form example. Form example... The basics of HTML forms How form content is submitted GET, POST Elements that you can have in forms Responding to forms Common Gateway Interface (CGI) Later: Servlets Generation of dynamic Web content

More information

ICSA Labs Web Application Firewall Certification Testing Report Web Application Firewall - Version 2.1 (Corrected) Radware Inc. AppWall V5.6.4.

ICSA Labs Web Application Firewall Certification Testing Report Web Application Firewall - Version 2.1 (Corrected) Radware Inc. AppWall V5.6.4. ICSA Labs Web Application Firewall Certification Testing Report Radware Inc. V5.6.4.1 May 30, 2013 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com WAFX RADWAREINC-2013-0530-01

More information

APPLICATION PROGRAM INTERFACE (API) FOR AIRASSURE WEB PM2.5 SOFTWARE

APPLICATION PROGRAM INTERFACE (API) FOR AIRASSURE WEB PM2.5 SOFTWARE APPLICATION PROGRAM INTERFACE (API) FOR AIRASSURE WEB PM2.5 SOFTWARE APPLICATION NOTE PM2.5-003 (US) Introduction TSI has released an API for the AirAssure Web Software that will enable customers to extract

More information

Playing with Web Application Firewalls

Playing with Web Application Firewalls Playing with Web Application Firewalls DEFCON 16, August 8-10, 2008, Las Vegas, NV, USA Who is Wendel Guglielmetti Henrique? Penetration Test analyst at SecurityLabs - Intruders Tiger Team Security division

More information

Usage of Evaluate Client Certificate with SSL support in Mediator and CentraSite

Usage of Evaluate Client Certificate with SSL support in Mediator and CentraSite Usage of Evaluate Client Certificate with SSL support in Mediator and CentraSite Introduction Pre-requisite Configuration Configure keystore and truststore Asset Creation and Deployment Troubleshooting

More information

BCR Export Protocol SHAPE 2012

BCR Export Protocol SHAPE 2012 BCR Export Protocol SHAPE 2012 Business Card Reader sends HTTP POST multipart request optional HTTP authentication is supported, BASIC and DIGEST methods with the following parameters: command - Action

More information

A Java proxy for MS SQL Server Reporting Services

A Java proxy for MS SQL Server Reporting Services 1 of 5 1/10/2005 9:37 PM Advertisement: Support JavaWorld, click here! January 2005 HOME FEATURED TUTORIALS COLUMNS NEWS & REVIEWS FORUM JW RESOURCES ABOUT JW A Java proxy for MS SQL Server Reporting Services

More information

Cross-Site Scripting (XSS) Attack Lab

Cross-Site Scripting (XSS) Attack Lab Laboratory for Computer Security Education 1 Cross-Site Scripting (XSS) Attack Lab Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science

More information

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet

More information

CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2. Author: Foster Moore Date: 20 September 2011 Document Version: 1.7

CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2. Author: Foster Moore Date: 20 September 2011 Document Version: 1.7 CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2 Author: Foster Moore Date: 20 September 2011 Document Version: 1.7 Level 6, Durham House, 22 Durham Street West PO Box 106857, Auckland City Post Shop, Auckland

More information

Lifecycle Manager Installation and Configuration Guide

Lifecycle Manager Installation and Configuration Guide Lifecycle Manager Installation and Configuration Guide vcenter Lifecycle Manager 1.2 This document supports the version of each product listed and supports all subsequent versions until the document is

More information

An Advanced Fallback Authentication Framework for SAS 9.4 and SAS Visual Analytics

An Advanced Fallback Authentication Framework for SAS 9.4 and SAS Visual Analytics Paper SAS102-2014 An Advanced Fallback Authentication Framework for SAS 9.4 and SAS Visual Analytics Zhiyong Li, SAS Institute; Mike Roda, SAS Institute ABSTRACT SAS 9.4 and SAS Visual Analytics (VA) support

More information

International Journal of Engineering & Technology IJET-IJENS Vol:14 No:06 44

International Journal of Engineering & Technology IJET-IJENS Vol:14 No:06 44 International Journal of Engineering & Technology IJET-IJENS Vol:14 No:06 44 Data Traffic and Security over Internet via Monitoring and Analyzing the HTTP Protocol Ezmolda Barolli, Loren Nebiaj, Gloria

More information

Matisse Installation Guide for MS Windows. 10th Edition

Matisse Installation Guide for MS Windows. 10th Edition Matisse Installation Guide for MS Windows 10th Edition April 2004 Matisse Installation Guide for MS Windows Copyright 1992 2004 Matisse Software Inc. All Rights Reserved. Matisse Software Inc. 433 Airport

More information

HTTP Authentication. RFC 2617 obsoletes RFC 2069

HTTP Authentication. RFC 2617 obsoletes RFC 2069 HTTP Authentication RFC 2617 obsoletes RFC 2069 Agenda Positioning Basic Access Authentication Digest Access Authentication Proxy-Authentication and Proxy- Authorization Security Considerations Internet

More information

Web Application Forensics:

Web Application Forensics: Web Application Forensics: The Uncharted Territory By Ory Segal, Sanctum Security Group Introduction If criminals would always schedule their movements like railway trains, it would certainly be more convenient

More information

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5 DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5 Deploying F5 BIG-IP Local Traffic Manager with Citrix Presentation Server Welcome to the F5 BIG-IP Deployment

More information

Written by Wirabumi Software Sunday, 30 December 2012 11:27 - Last Updated Thursday, 03 January 2013 05:52

Written by Wirabumi Software Sunday, 30 December 2012 11:27 - Last Updated Thursday, 03 January 2013 05:52 This tutorial will guide you to insall Openbravo from source, using Linux (Mint 11/Ubuntu 10.04) operating system. 1 Install PostgreSQL PostgreSQL is a database server that used by Openbravo. You should

More information

WWW. World Wide Web Aka The Internet. dr. C. P. J. Koymans. Informatics Institute Universiteit van Amsterdam. November 30, 2007

WWW. World Wide Web Aka The Internet. dr. C. P. J. Koymans. Informatics Institute Universiteit van Amsterdam. November 30, 2007 WWW World Wide Web Aka The Internet dr. C. P. J. Koymans Informatics Institute Universiteit van Amsterdam November 30, 2007 dr. C. P. J. Koymans (UvA) WWW November 30, 2007 1 / 36 WWW history (1) 1968

More information

VERSION 9.02 INSTALLATION GUIDE. www.pacifictimesheet.com

VERSION 9.02 INSTALLATION GUIDE. www.pacifictimesheet.com VERSION 9.02 INSTALLATION GUIDE www.pacifictimesheet.com PACIFIC TIMESHEET INSTALLATION GUIDE INTRODUCTION... 4 BUNDLED SOFTWARE... 4 LICENSE KEY... 4 SYSTEM REQUIREMENTS... 5 INSTALLING PACIFIC TIMESHEET

More information

*[Bug hunting ] Jose Miguel Esparza 7th November 2007 Pamplona. 2007 S21sec

*[Bug hunting ] Jose Miguel Esparza 7th November 2007 Pamplona. 2007 S21sec *[Bug hunting ] Jose Miguel Esparza 7th November 2007 Pamplona 2007 S21sec AGENDA Finding holes Fuzzing What is this? How to obtain data? Phases Tools Pros and cons Malybuzz What is this? Protocol specifications

More information

UCL Remote Access VPN Service Microsoft Windows XP User Guide

UCL Remote Access VPN Service Microsoft Windows XP User Guide INFORMATION SERVICES DIVISION (ISD) NETWORK SERVICES GROUP UCL Remote Access VPN Service Microsoft Windows XP User Guide Version 0.2 Date 27 th July 2011 Author MC Document Details N/A Last Updated 13

More information

Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with

Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Configuration Guide 2014 Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Table of Contents 1. Introduction...3

More information

Vodia PBX RESTful API (v2.0)

Vodia PBX RESTful API (v2.0) Vodia PBX RESTful API (v2.0) 2015 Vodia Networks Inc. All rights reserved. Page 1 of 30 Contents Login... 3 Get license info... 4 Get a complete list of domains... 5 Get the details of a specific domain...

More information

HACKING OUTLOOK WEB ACCESS. Exchange CAL Security Briefing (Exchange Client Access Server) with. Default Vulnerabilities and Attacks Illustrated

HACKING OUTLOOK WEB ACCESS. Exchange CAL Security Briefing (Exchange Client Access Server) with. Default Vulnerabilities and Attacks Illustrated HACKING OUTLOOK WEB ACCESS OR Exchange CAL Security Briefing (Exchange Client Access Server) with Default Vulnerabilities and Attacks Illustrated Richard Brain 17 th May 2013 Table of Contents 1 Brief

More information

Entrust Managed Services PKI Administrator s Quick Start Guide

Entrust Managed Services PKI Administrator s Quick Start Guide Entrust Managed Services PKI Administrator s Quick Start Guide Each Managed Services PKI organization requires an administrator also known as a local registration authority (LRA) whose duty it is to manage

More information

Sticky Session Setup and Troubleshooting

Sticky Session Setup and Troubleshooting 1 Sticky Session Setup and Troubleshooting Day, Date, 2004 time p.m. ET Teleconference Access: US & Canada: 888-259-4812 Teleconference Access: North America: xxxx Toll Number: 706-679-4880 International:

More information

RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION

RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION RSA ACCESS MANAGER Web Access Management Solution ESSENTIALS Secure Access Enforces access to Web applications based on risk and context Centralizes security and enforces business policy Web Single Sign-on

More information

Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3

Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3 Open-Xchange Authentication & Session Handling Table of Contents 1.Introduction...3 2.System overview/implementation...4 2.1.Overview... 4 2.1.1.Access to IMAP back end services...4 2.1.2.Basic Implementation

More information

Determine What SAS Version and Components Are Available

Determine What SAS Version and Components Are Available Determine What SAS Version and Components Are Available David D. Chapman, Chapman Analytics LLC, Alexandria, VA ABSTRACT For many reasons a user may not know the version of SAS used or what components

More information

The Hyper-Text Transfer Protocol (HTTP)

The Hyper-Text Transfer Protocol (HTTP) The Hyper-Text Transfer Protocol (HTTP) Antonio Carzaniga Faculty of Informatics University of Lugano October 4, 2011 2005 2007 Antonio Carzaniga 1 HTTP message formats Outline HTTP methods Status codes

More information

Com-Trader. Installation Guide

Com-Trader. Installation Guide Com-Trader Installation Guide Table of Contents 1 Introduction 1 1.1. Java Web Start 1 1.2. Download Time 1 1.3. Definitions and Abbreviations 2 2 Installation of Components 3 2.1 Connectivity Setup 3

More information

Entrust Managed Services PKI Administrator Guide

Entrust Managed Services PKI Administrator Guide Entrust Managed Services PKI Entrust Managed Services PKI Administrator Guide Document issue: 3.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered

More information

iconnect ebxml Client System User Manual

iconnect ebxml Client System User Manual iconnect ebxml Client System User Manual 1 TABLE OF CONTENTS I. INSTALLATION SETUP GUIDE I.A System Requirements 3 I.B Installing and Running the iconnect Client System 3 I.C Setting Up Your Company s

More information

Request Manager Installation and Configuration Guide

Request Manager Installation and Configuration Guide Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Polar Help Desk Installation Guide

Polar Help Desk Installation Guide Polar Help Desk Installation Guide Copyright (legal information) Copyright Polar 1995-2005. All rights reserved. The information contained in this document is proprietary to Polar and may not be used or

More information

Using Traffic Direction Systems to simplify fraud... and complicate investigations!

Using Traffic Direction Systems to simplify fraud... and complicate investigations! Using Traffic Direction Systems to simplify fraud... and complicate investigations! Maxim Goncharov What is web traffic? User Site Separate Web traffic? Site User Script-in-the-middle Site Site System

More information

Dragonframe License Manager User Guide Version 1.2.2

Dragonframe License Manager User Guide Version 1.2.2 Dragonframe License Manager User Guide Version 1.2.2 The Dragonframe License Manager (DFLM) provides floating license management for Dragonframe 3.0 and above. You must contact support ([email protected])

More information

ServletExec TM 6.0 Installation Guide. for Microsoft Internet Information Server SunONE Web Server Sun Java System Web Server and Apache HTTP Server

ServletExec TM 6.0 Installation Guide. for Microsoft Internet Information Server SunONE Web Server Sun Java System Web Server and Apache HTTP Server ServletExec TM 6.0 Installation Guide for Microsoft Internet Information Server SunONE Web Server Sun Java System Web Server and Apache HTTP Server ServletExec TM NEW ATLANTA COMMUNICATIONS, LLC 6.0 Installation

More information

site et appel d'offres

site et appel d'offres Définition des besoins et élaboration de l'avant-projet Publication par le client de l'offre (opération sur le externe) Start: 16/07/02 Finish: 16/07/02 ID: 1 Dur: 0 days site et appel d'offres Milestone

More information

GS-AN045 S2W UDP, TCP, HTTP CONNECTION MANAGEMENT EXAMPLES

GS-AN045 S2W UDP, TCP, HTTP CONNECTION MANAGEMENT EXAMPLES S2W UDP, TCP, HTTP CONNECTION MANAGEMENT EXAMPLES Table of Contents 1 PRE-REQUIREMENT... 3 2 UDP... 4 2.1 UDP SERVER... 4 2.1.1 Command Mode... 4 2.1.2 Auto Connect Mode... 5 2.2 UDP CLIENT... 6 2.2.1

More information

Service for checking whether an email is operative or not. Validate email ids in your databases.

Service for checking whether an email is operative or not. Validate email ids in your databases. MailStatus API Service for checking whether an email is operative or not. Validate email ids in your databases. Overview Lleida.net MailStatus API allows you to consult the validity of an email address.

More information

HELP DOCUMENTATION E-SSOM CONFIGURATION GUIDE

HELP DOCUMENTATION E-SSOM CONFIGURATION GUIDE HELP DOCUMENTATION E-SSOM CONFIGURATION GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any

More information

EXPLORATiON in THE CROSS TERRiTORY the inevitable continuation of my first paper: Cross Site Scripting - Attack and Defense guide

EXPLORATiON in THE CROSS TERRiTORY the inevitable continuation of my first paper: Cross Site Scripting - Attack and Defense guide EXPLORATiON in THE CROSS TERRiTORY the inevitable continuation of my first paper: Cross Site Scripting - Attack and Defense guide By Xylitol Summary: The Cross Frame Scripting \ Theoretical explanation

More information

Java Web Application Security

Java Web Application Security Java Web Application Security RJUG Nov 11, 2003 Durkee Consulting www.rd1.net 1 Ralph Durkee SANS Certified Mentor/Instructor SANS GIAC Network Security and Software Development Consulting Durkee Consulting

More information

Load balancing Microsoft IAG

Load balancing Microsoft IAG Load balancing Microsoft IAG Using ZXTM with Microsoft IAG (Intelligent Application Gateway) Server Zeus Technology Limited Zeus Technology UK: +44 (0)1223 525000 The Jeffreys Building 1955 Landings Drive

More information

Prolexic Quarterly Global DDoS Attack Report

Prolexic Quarterly Global DDoS Attack Report Prolexic Quarterly Global DDoS Attack Report Q1 2014 Malicious actors choose reflection, not infection to launch high-bandwidth attacks www.prolexic.com Akamai s State of the Internet Report: Gain insight

More information

Securing SharePoint Server with Windows Azure Multi- Factor Authentication

Securing SharePoint Server with Windows Azure Multi- Factor Authentication Journal of Mobile, Embedded and Distributed Systems, vol. VII, no. 1, 2015 ISSN 2067 4074 Securing SharePoint Server with Windows Azure Multi- Factor Authentication Petru-Radu NARITA Department of Economic

More information