How To Hack A Satellite Receiver For Profit On A Pc Or Ipad (For A Pb) For A Pk (For An Ipad) For Free (For Pc) For Your Computer) For The First Time (For Your Computer Or
|
|
|
- Elinor Summers
- 5 years ago
- Views:
Transcription
1 Subverting satellite receivers for botnet and profit Sofiane Talmat Senior Security Consultant
2 Agenda The famous who am I? slide The quest for the Control Word A series of What could possibly go wrong? Questions?
3 Who am I? Senior security consultant at IOActive Like Breaking things Having fun with firmware and hardware Do not like: Coffee Who am I? slides
4 The quest for the Control Word
5 Scrambling ECM CW CAS EMM CAS: Conditional Access System ECM: Entitlement Control Message EMM: Entitlement Management Message CW: Control word Scrambler Scrambled Stream
6 Descrambling STB Scrambled Stream EMM ECM CAM Smart Card CW Descrambler CAM: Conditional Access Module STB: Set Top Box To TV
7 What could possibly go wrong?
8 What made the difference? We used to have : Proprietary STBs One service provider per STB We now have : Open STBs Fully featured Linux boxes
9 Attack evolution STB without CAS Software emulator STB with CAS Cloned smart cards CAM Card Sharing Protocol providers plugin Internet connectivity Satellite key sharing
10 Card sharing concept Card Server Internet Client STB OSCAM, ECM/EMM CW CCCAM MGCamd GBOX
11 Components and Actors Card sharing plugins installed on STBs: CCCAM, MGCAMD, NEWCAMD, GBOX, etc. Root provider : Generally server hosted at home Reseller : Generate keys and provide/install plugin End user : Plugin running on STB
12 What could possibly go wrong?
13 Teardown of an STB Realtek RTL8201CP 10/100M STi7111 Mhz) 2x1 Gb DDR2 SDRAM Tuner 3.1 Services GL850G USB 2.0 Hub 1x2Gb NAND flash CORERIVER CICore 1.0
14 Better than my graduation computer STi7111 ROM=256MB RAM= 256MB 10/100M Ethernet port 2 USB 2.0 ports 1 card reader 2 module reader (CI) HDMI RCA SPDIF
15 Are they vulnerable? For all studied devices : Internal design : Fail! System update and upgrades : Fail! OS protection : Fail! Integrated software : Fail! Why? Because they are not designed to be secure
16 Remotely exploitable? YES : But most of them are behind NAT How bad is that? : Accessing an STB means access to internal LAN
17 What could possibly go wrong?
18 How does it work Root provider : Provides reseller with access to card sharing server Provides interface to create/manage accounts Provides plugins to support protocols Reseller : Create and manage accounts Install plugins on end user STBs
19 The weakest link of the chain End user: Installs plugins on his STB through USB key Takes his STB to reseller to install the plugin Download plugins from internet through the STB
20 What s wrong with that? Root provider : Unknown and proceeding from unknown location Reseller : Unknown Proceeding from specific countries (Legally in my country) End user: Unaware about the problem Always seeking free TV at any cost Trusts internet
21 What could possibly go wrong?
22 Overview Number of cards sharing subscribers joining IoT : ~ 4 Millions in Algeria only / what about the world? End user : Unaware
23 Are we getting more? Free access to card sharing server for 394 days
24 What if? A root provider deploys a plugin with backdoor A reseller deploys a plugin with backdoor Millions of end users installing them on their boxes PS : Plugins will be running as root
25 Demo
26 OOPS Something went wrong.
27 Basic steps to build the botnet Building the plugin : Some C/C++ coding skills to build the plugin Thanks to cross compiling tools Hosting the service : Either host a card sharing server Or become a reseller Throw that on internet End users/resellers: They will come for you
28 What will be the result? A massive botnet based on rooted Linux boxes Unaware users about what s happening on their boxes Access to users and companies LAN Yes some companies do have that in my country
29 Did this happen before? Reported CCAM plugin in the wild with a backdoor : Steal information from card sharing providers Send information to an IP address Who could be : Attackers stealing accounts Service providers to counter attack card sharing
30 Challenges to mitigate that The bad thing : You can not educate end user End users don t care, they just want free TV Not easy to put standards for piracy There is some light : Some work is being done for hardening CW interception
31 Black Hat Sound Bytes Millions of Satellite TV receivers joined IoT without security design Card sharing providers can take control of satellite receivers End user is not aware and doesn t understand the risk
32 Questions?
33 Thank you My wife Amina Fernando Arnaboldi Carlos Hollmann Ahmed Mahfouz Abdelkader Mraiagh Hamza Tahmi
Hacking Satellite TV receivers : Are those IoT devices secure?
Hacking Satellite TV receivers : Are those IoT devices secure? Sofiane Talmat Security Consultant Agenda Introduction Many things going wrong Thank you Why Satellite TV receivers? What is this all about?
MOI DVB-S2 Streaming Box Quick Start Guide
MOI DVB-S2 Streaming Box Quick Start Guide V1.1 1 Contents 1. Overview 1.1. At A Glance 1.2. Specifications 1.3. System Requirements 1.4. Package 2. Hardware Connection 3. Software Installation and Configuration
IOActive Security Advisory
IOActive Security Advisory Title Severity Discovered by CVE Lenovo s System Update Uses a Predictable Security Token High Michael Milvich [email protected] Sofiane Talmat [email protected]
Monitoring Conditional Access Systems
Monitoring Conditional Access Systems Introduction A Conditional Access system is a key component for most digital TV operations. They secure the operators investments by encrypting the signals and ensures
EZCast Universal WiFi Display Dongle Quick Instal ation Guide Ver. 1.3
EZCast Universal WiFi Display Dongle Quick Installation Guide Ver. 1.3 Thanks for using the amazing EZCast WiFi display dongle. This is the universal quick installation guide for Visonicom EZCast WiFi
NIVEO Network Attached Storage Series NNAS-D5 NNAS-R4. More information: WWW.NIVEOPROFESSIONAL.COM [email protected]
NIVEO Network Attached Storage Series NNAS-D5 NNAS-R4 More information: WWW.NIVEOPROFESSIONAL.COM [email protected] Product Specification Introduction The NIVEO NNAS series is specifically designed
Chapter 1 Hardware and Software Introductions of pcduino
Chapter 1 Hardware and Software Introductions of pcduino pcduino is a high performance, cost effective mini PC platform that runs PC like OS such as Ubuntu Linux. It outputs its screen to HDMI enabled
The shortest path to cellular communications: Cellular Development Platform
The shortest path to cellular communications: Cellular Development Platform Multi-Tech Overview 40 years focused on Machine-to-Machine (M2M) Communications 80+ patents 20+ million devices, thousands of
DVCrypt Conditional Access System
DVCrypt Conditional Access System Quick start guide 1. Introduction DVCrypt is a conditional access system for digital TV broadcasting networks (DVB). It consists of hardware modules and client/server
An affordable all-digital solution for cable systems of every size
Welcome the Digital Era with CONDOR Set-Top Box Platform & Headend Broadcast System An affordable all-digital solution for cable systems of every size www.picodigital.com Telephone: +1 (858) 546-5050 Toll
North America, Inc. AFFICHER. a true cloud digital signage system. Copyright PDC Co.,Ltd. All Rights Reserved.
AFFICHER a true cloud digital signage system AFFICHER INTRODUCTION AFFICHER (Sign in French) is a HIGH-END full function turnkey cloud based digital signage system for you to manage your screens. The AFFICHER
Secure IP Address Management Layer 2 Network Access Control Solution
Secure IP Address Management Layer 2 Network Access Control Solution Integrated DHCP & IP Address Management Solution Providing Superior Layer 2 Network Access Control Solution Overview Layer 2 Network
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
DIRECTV Set Top Box and Content Protection Description
DIRECTV Set Top Box and Content Protection Description DIRECTV Set Top Boxes There are tens of millions of active DIRECTV set-top boxes (STBs). All DIRECTV STBs receive 100% digital input signals. The
Digg Dekodere - HDPV-C20CXM - HD-C63CX
Digg Dekodere - HDPV-C20CXM - HD-C63CX HD-C63CX - CAS : Conax Chipset pairing Middleware : Cubiware Raskt og enkelt brukergrensesnitt lineær TV programmering ( DVB-C ) On-demand og Pay-per-view (PPV) programmering
TechGuard Firewall Products Specs/Parts/Competitive Analysis
TechGuard Firewall Products Specs/Parts/Competitive Analysis 2003 TechGuard Security, LLC TechGuard Great Walls of Fire Firewalls The Great Walls of Fire firewall is a high performance Internet gateway,
SonicWALL Advantages Over WatchGuard
Competitive Analysis August 2001 WatchGuard SOHO - Product Overview WatchGuard Technologies extended its product offerings to the fast-growing broadband market through the acquisition of BeadleNet, LLC,
GigaBlue HD QUAD Plus Hybrid- HDTV Linux Receiver
The high-end Hybrid Quattro receiver with multimedia functions GigaBlue HD QUAD Plus Hybrid- HDTV Linux Receiver Brand new HD receiver sets new standards The GiGaBlue Quad Plus - satisfied all wishes.
EV-8000S. Features & Technical Specifications. EV-8000S Major Features & Specifications 1
EV-8000S Features & Technical Specifications EV-8000S Major Features & Specifications 1 I. General Description EV-8000S is fully compliant with the international DVB standard and thus transmits digital
OpenWRT - embedded Linux for wireless routers
OpenWRT - embedded Linux for wireless routers Ted Faber USC/ISI USC Viterbi School of Engineering 22 Mar 2007 Outline ISO 1131/IBM 001 Disclaimer: Not an OpenWRT designer or developer There s more than
Higth definition from A to Z. www.azbox-hd.com
Higth definition from A to Z www.azbox-hd.com Do you Feel the full HD multimedia? Wifi Web Browser Yes, you read this correctly. O2media present a new line of AzBox HD receivers, with the AzBox HD Elite
OfficeServ Application Suite
OfficeServ Application Suite Introduction to the standard package The OfficeServ application suite consists of a number of applications designed to enhance the functionality and usability of the Samsung
Servers, Clients. Displaying max. 60 cameras at the same time Recording max. 80 cameras Server-side VCA Desktop or rackmount form factor
Servers, Clients Displaying max. 60 cameras at the same time Recording max. 80 cameras Desktop or rackmount form factor IVR-40/40-DSKT Intellio standard server PC 60 60 Recording 60 cameras Video gateway
Setup Guide. You re minutes away from a whole new way of watching TV. Of controlling TV. Of thinking about what TV can be.
Setup Guide You re minutes away from a whole new way of watching TV. Of controlling TV. Of thinking about what TV can be. Unpack the box From HD video calling on your couch to house-of-the-future touch
Coolmax CN-590 Network Storage Solution
Coolmax CN-590 Network Storage Solution Model Name Controller hip CPU OS Memory Interface CN-590 S2892 150MHz RTOS 8MB SDRAM / 1MB NOR Flash LAN Standard 10/100Base-TX Auto MDI/MDI-X Connector Type RJ-45
2014 Teradici Corporation.
VDI Client Comparison Thick, Thin, and PCoIP Zero Clients Agenda > Thick, Thin, and PCoIP Zero Clients > Repurposed PCs to Thin Clients > Thin Clients > PCoIP Zero Clients > Total Cost of Ownership Review
Page 1 / 14 Groupe MOBILITECHMIOSBOX Technical Specification MWP-DT1010. Technical specifications
Page 1 / 14 Technical specifications Page 2 / 14 SUMMARY 1. GENERAL OVERVIEW 1.1 MIOS and the remote management 1.2 The MIOSBOX range 1.3 Synthesis of MIOSBOX s specificities 2. DETAILED PRESENTATION OF
Running Debian on Inexpensive Network Attached Storage Device
Running Debian on Inexpensive Network Attached Storage Devices [email protected] FOSDEM Brussels, Belgium Objectives Explain what Network Attached Storage Devices (NAS) are. Show some interesting hardware.
Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
Archives About ARCHOS TV+
About ARCHOS TV+ General Questions I have installed a firmware/plug-in/game file on my Archos TV+ but it is not recognized by the device. You may have not correctly copied your file on the device. If it
Industry First X86-based Single Board Computer JaguarBoard Released
Industry First X86-based Single Board Computer JaguarBoard Released HongKong, China (May 12th, 2015) Jaguar Electronic HK Co., Ltd officially launched the first X86-based single board computer called JaguarBoard.
Getting Started with the Xilinx Zynq- 7000 All Programmable SoC Mini-ITX Development Kit
Getting Started with the Xilinx Zynq- 7000 All Programmable SoC Mini-ITX Development Kit Table of Contents ABOUT THIS GUIDE... 3 ADDITIONAL DOCUMENTATION... 3 ADDITIONAL SUPPORT RESOURCES... 3 INTRODUCTION...
Yun Shield User Manual VERSION: 1.0. Yun Shield User Manual 1 / 22. www.dragino.com
Yun Shield User Manual VERSION: 1.0 Version Description Date 0.1 Initiate 2014-Jun-21 1.0 Release 2014-Jul-08 Yun Shield User Manual 1 / 22 Index: 1 Introduction... 3 1.1 What is Yun Shield... 3 1.2 Specifications...
Easy H.264 video streaming with Freescale's i.mx27 and Linux
Libre Software Meeting 2009 Easy H.264 video streaming with Freescale's i.mx27 and Linux July 8th 2009 LSM, Nantes: Easy H.264 video streaming with i.mx27 and Linux 1 Presentation plan 1) i.mx27 & H.264
QuickSpecs. HP Compaq t5525 Thin Client. Overview
Overview 1. 10/100 RJ-45 6. PS/2 Connector 2. Security lock 7. DC Power Input 3. Parallel Connector 8. Video Connector 4. USB Connectors 9. Serial Connector 5. Audio connector (mic in/line out) DA - 12265
SanDisk Enterprise Secure USB Flash Drive Security Vulnerability
SanDisk Enterprise Secure USB Flash Drive Security Vulnerability Device CD-ROM partition can be a host for malware and crimeware February 2009 Introduction After my recent experiences with the Read Only
Artikel-Detailinformationen
Artikel-Detailinformationen Hersteller Hewlett-Packard Hewlett-Packard Hewlett-Packard Art-Nr 0108486M 0109287M 0109288M Bezeichnung 1 HP ProBook 4720s i3-350m HP ProBook 4720s i5-430m HP ProBook 4720s
Towards Secure Multi-network Video Services. Steve Oetegenn, President
Towards Secure Multi-network Video Services Steve Oetegenn, President Contents Market Dynamics Multi-network Solutions Evolution of Security 2 Copyright 2015 Verimatrix, Inc. CONFIDENTIAL OTT Market Dynamics
HotelTV1. Client Software Update REV A0.6 D0202. 2014 October. Web : http://support.vestek.com.tr Mail : [email protected] Tel : +90 212 286 01 06
D0202 HotelTV1 Client Software Update 2014 October 1. Revision History Date Owner Version Reason & Change 11 Oct 2011 Bora Tunçer A0.1 Initial creation 24 Jan 2012 Bora Tunçer A0.2 Adding bootloader update
Output Power (without antenna) 5GHz 2.4GHz
Dual Band High- PoE AP Router Dual Band Concurrent AP Router 11a + 11a/b/g Hi- Radios 802.3af PoE Port 7 Wireless Operation Modes 5/10/20 Variable Channel Width Home Digital Network Application School,
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Sistemi ad agenti Principi di programmazione di sistema
Sistemi ad agenti Principi di programmazione di sistema Modulo 6 Why would anyone want to hack or write opensource project for embedded system, when you already have a very powerful and relatively cheap
Designed for the needs of automation, telecommunications, remote supervision, and monitoring
- Programmable automation controller (PAC) MADE IN EU is a series of industrial computers which you can easily adapt to your needs by choosing from the available options. Energy-efficient ARM11 700 MHz
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and
Broadcasting encryption or systematic #FAIL? Phil
WE 201 EK 2 42 Broadcasting encryption or systematic #FAIL? SUMMARY Intro : Broadcasting something... 1984 : Discret 11 1995 : Syster 1996 2002 : Seca 1 2002 2008 : Seca 2 Conclusion 2/49 Broadcasting
Automated Flashing and Testing for Continuous Integration
Automated Flashing and Testing for Continuous Integration Igor Stoppa Embedded Linux Conference North America 2015 1 Automated Flasher Tester AFT Tool for deploying and verifying a SW image on an appropriate
Using VyOS as a Firewall
Copyright 2015, Ray Patrick Soucy Verbatim copying and distribution permitted provided this notice is preserved. Using VyOS as a Firewall Disclaimer: This guide will provide a technical deep-dive into
Post Genie TM WebMail Server 2400/2208R
具 備 容 錯 備 援 機 制 的 網 路 郵 件 伺 服 器 Post Genie TM WebMail Server 2400/2208R October 27, 2004 Presented by Kevin Liou Product Manager, Message Communication QNAP, Member of ICP Electronics In.c (IEI) 1 Agenda
Artikel-Detailinformationen
Artikel-Detailinformationen Hersteller Art-Nr Hewlett-Packard 0111177M Bezeichnung 1 Bezeichnung 2 Bezeichnung 3 Artikel-Bild Compaq 6005 Pro mt. AMD B97 2x4GB, 500GB, Win 7 Pro 64, DFEI SM DVD+/-RW, 22in1
Extended communication server: Fax Server- Administration
Extended communication server: Fax Server- Administration OCTOBER, 2008 Alcatel-Lucent Office Offer - All Rights Reserved Alcatel-Lucent 2008 8AL 90403 USAA ed.01 This document explains how to install
Advanced Network Routers. Datasheet. Model: ERLite-3, ERPoe-5. Sophisticated Routing Features. Advanced Security, Monitoring, and Management
Advanced Network Routers Model: ERLite-3, ERPoe-5 Sophisticated Routing Features Advanced Security, Monitoring, and Management High-Performance Gigabit Ports Advanced Routing Technology for the Masses
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Tools for Attacking Layer 2 Network Infrastructure
Tools for Attacking Layer 2 Network Infrastructure Kai-Hau Yeung, Dereck Fung, and Kin-Yeung Wong Abstract Data Link layer is considered as the weakest link in a secured network. If an initial attack comes
4/2/2014 Linux Dev-Boards. Linux Dev Boards. Tagung Forth Gesellschaft e.v. Maerz 2014. file:///home/cas/talk/linux-boards/html/linux-boards.
Linux Dev Boards Tagung Forth Gesellschaft e.v. Maerz 2014 file:///home/cas/talk/linux-boards/html/linux-boards.html 1/26 Linux Boards "embedded" Boards mit Linux Forth ideal fuer die Boards mit wenig
Who s Endian? www.cloudrouter.dk
Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated
Ahsay BackupBox v1.0. Deployment Guide. Ahsay TM Online Backup - Development Department
Ahsay BackupBox v1.0 Deployment Guide Ahsay TM Online Backup - Development Department October 30, 2009 Copyright Notice Ahsay Systems Corporation Limited 2008. All rights reserved. The use and copying
SUN COBALT RaQ 4 Server Appliance FAQ
SUN COBALT RaQ 4 Server Appliance - Frequently Asked Questions THE SUN COBALT RAQ 4 IS ADVANCING SERVER APPLIANCE TECHNOLOGIES BY INTEGRATING THE MOST POWERFUL TOOLS AND APPLICATIONS INTO A RELIABLE, LOW-COST
Digital Video Broadcasting Conditional Access Architecture
Digital Video Broadcasting Conditional Access Architecture Introduction Digital Video Broadcasting (DVB) is a standard defining a one-to-many unidirectional data network for sending digital TV programs
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
IP Surveillance TroubleShooting Guide Version: 0.9 Release: 20060527
IP Surveillance TroubleShooting Guide Version: 0.9 Release: 20060527 Chapter. 1. Introduction ACTi provides you a series of guides for your project from proposal stage to maintenance stage. They work
ANTIK JUICE IPTV DEMO KIT MANUAL
ANTIK JUICE IPTV DEMO KIT MANUAL Thank you for purchasing the Juice IPTV Demo Kit (IDK). We have put together the Juice IDK to offer our client a good insight about IPTV, and to give you a hand-on experience
Video Monitoring and Log System
HDCS-2U06-S 2U Rack-Mounted 6 SDI Channel H.264 Real-Time Video Serve HDCS-2U06-S Series HDC-502E 2CH SDI HW Compression Card H.264 MPEG-4/AVC Full HD 1080 SDI 32/64 bit Features SDI 1080p 60fps real time
ATV310B User Manual. V1.1 www.mygica.es
ATV310B User Manual V1.1 www.mygica.es 1 Introduction Mygica ATV310B is a product connected to your TV via HDMI that turn your TV to a multifunction smart TV. It is a revolutionary entertainment on your
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
FortiWeb 5.0, Web Application Firewall Course #251
FortiWeb 5.0, Web Application Firewall Course #251 Course Overview Through this 1-day instructor-led classroom or online virtual training, participants learn the basic configuration and administration
Enterprise Erase LAN
Enterprise Erase LAN Network Erasing and Asset Management Server Version 2.0 Users Guide 888.700.8560 toll free www.tabernus.com 11130 Jollyville Rd Suite 301 Austin, TX 78757 Table of Contents 1 Product
- Open Architecture/Interoperability Issues
Digital Set Top Box (STB) - Open Architecture/Interoperability Issues The DVB (Digital Video Broadcast) project group has developed a family of interrelated international standards for digital television
Cloud Services Prevent Zero-day and Targeted Attacks
Cloud Services Prevent Zero-day and Targeted Attacks WOULD YOU OPEN THIS ATTACHMENT? 2 TARGETED ATTACKS BEGIN WITH ZERO-DAY EXPLOITS Duqu Worm Causing Collateral Damage in a Silent Cyber-War Worm exploiting
Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014
SESSION ID: SPO2-W04 Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014 John Summers VP, Security Products Akamai #RSAC The Akamai Intelligent Platform The Platform 167,000+ Servers 2,300+
Lecture 2: Computer Hardware and Ports. [email protected] http://faculty.sau.edu.sa/y.alharbi/en
BMTS 242: Computer and Systems Lecture 2: Computer Hardware and Ports Yousef Alharbi Email Website [email protected] http://faculty.sau.edu.sa/y.alharbi/en The System Unit McGraw-Hill Copyright 2011
VIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
IOVU-571N ARM-based Panel PC
IOVU-571N ARM-based Panel PC Features RISC-based Panel PC IOVU-57N Application Dimensions Ordering Information Specifications ARM-based Panel PC IOVU-571N Serial IOVU software support Packing List Options
EdgeRouter Lite 3-Port Router. Datasheet. Model: ERLite-3. Sophisticated Routing Features. Advanced Security, Monitoring, and Management
EdgeRouter Lite 3-Port Router Model: ERLite-3 Sophisticated Routing Features Advanced Security, Monitoring, and Management High-Performance Gigabit Ports Advanced 3-Port Router Introducing the EdgeRouter
F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689
F5 Intelligent Scale Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689 Intelligent and scalable PROTECTS web properties and brand reputation IMPROVES web application
Alexander installation and configuration guide.
Alexander installation and configuration guide. Contents 1. First time installation... 2 2. Configuration... 5 2.1. Client Configuration... 5 2.2. Server Settings... 6 2.3. System Settings... 8 2.4. Status
Linux Server Support by Applied Technology Research Center. Proxy Server Configuration
Linux Server Support by Applied Technology Research Center Proxy Server Configuration We configure squid for your LAN. Including transparent for HTTP and proxy for HTTPS. We also provide basic training
COMMUNICATION SERVER 1000 COMMUNICATION SERVER 1000 TELEPHONY MANAGER
COMMUNICATION SERVER 1000 COMMUNICATION SERVER 1000 TELEPHONY MANAGER TECHNICAL SPECIFICATIONS Communication Server 1000 Telephony Manager 3.2 Communication Server 1000 Telephony Manager 3.0 Communication
TDP43ME NetPS. Network Printer Server. Control Center. for Ethernet Module
Panduit Corp. 2010 TDP43ME NetPS PA26306A01 Rev. 01 11-2010 Network Printer Server Control Center for Ethernet Module NOTE: In the interest of higher quality and value, Panduit products are continually
Web Tracking for You. Gregory Fleischer
Web Tracking for You Gregory Fleischer 1 INTRODUCTION 2 Me Gregory Fleischer Senior Security Consultant at FishNet Security 3 Disclaimer Why do you hate? 4 Reasons For Tracking TradiFonal reasons for tracking
PFSENSE Load Balance with Fail Over From Version Beta3
PFSENSE Load Balance with Fail Over From Version Beta3 Following are the Installation instructions of PFSense beginning at first Login to setup Load Balance and Fail over procedures for outbound Internet
"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION
"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION CHECK POINT ALERTED EZCAST THAT ITS SMART TV DONGLE, WHICH IS USED BY APPROXIMATELY 5 MILLION USERS, IS EXPOSED TO SEVERE REMOTE CODE EXECUTION VULNERABILITIES
SPEED Cloud Computing Terminal. Model: SPEED-TY310
SPEED Cloud Computing Terminal Model: SPEED-TY310 Remark: the details port pls check by below picture, the difference is the power on /off butten, we design on the top of the device, pls kindly check above
Cisco NAC Appliance Hardware Platforms
1 CHAPTER This chapter provides general information on the Cisco NAC Appliance network access control system, as well as hardware specifications for all Clean Access Manager (CAM) and Clean Access Server
Secure Cloud and Remote Service Connections for AllJoyn Applications
Secure Cloud and Remote Service Connections for AllJoyn Applications Art Lancaster CTO, Affinegy Chair, Gateway Agent Working Group 12 November 2014 AllSeen Alliance 1 Agenda 1. Gateway Agent Working Group
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Nighthawk AC1900 Smart WiFi Router Dual Band Gigabit
Performance & Use AC1900 1900 DUAL BAND 600+1300 RANGE AC1900 WiFi 600+1300 Mbps speeds 1GHz dual core processor Advanced features for lag-free gaming Prioritized bandwidth for streaming videos or music
Secure Cloud and Remote Service Connections for AllJoyn Applications
Secure Cloud and Remote Service Connections for AllJoyn Applications Art Lancaster CTO, Affinegy Chair, Gateway Agent Working Group 5 February 2015 AllSeen Alliance 1 Agenda 1. Gateway Agent Working Group
User Guide 980 HDMI Protocol Analyzer
User Guide 980 HDMI Protocol Analyzer Gen 3 System Rev: C6 Page 1 February 7, 2013 Table of Contents 1 About the 980 HDMI Protocol Analyzer 5 1.1 What makes the 980 HDMI Protocol Analyzer Unique? 5 1.2
TABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
SUN COBALT Qube 3 Appliance FAQ
SUN COBALT Qube 3 Appliance - Frequently Asked Questions NEW FEATURES: VPN Remote Access PPTP VPN LAN to LAN IPSEC Print sharing Windows Domain Controller Port forwarding Multi-level administration 7 languages
Korenix Embedded Systems
Korenix Embedded Systems White Paper: Industrial Router Firewall and VPN Platform 1 White Paper: Industrial Router Firewall and VPN Platform Building Scalable and Secure Networks For today s Industrial
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
SECURITY VULNERABILITIES OF DIGITAL VIDEO BROADCAST CHIPSETS
SECURITY VULNERABILITIES OF DIGITAL VIDEO BROADCAST CHIPSETS Adam Gowdiak Security Explorations INTRODUCTION About Security Explorations Security start-up company from Poland Provides various services
Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes
Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes May 07, 2002 Thank you for choosing Ensim WEBppliance 3.0 for Windows. This document includes information about the following: About Ensim
Performance of Host Identity Protocol on Nokia Internet Tablet
Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007
