Mcabber User Guide. franky
|
|
|
- Susanna Tate
- 9 years ago
- Views:
Transcription
1 Mcabber User Guide franky October 11, 2008
2 Contents 1 Basic Usage Multi-user Chat Transports Symbols Logging Enable Logging Grouping logs Converting centerim logs Scripting Aliases Internal Hooks External scripts Encryption OpenPGP OTR
3 Introduction This guide was written for users who are new to mcabber[4] which is a small command line client for the Jabber protocol[6] as an introduction. This introduction may become a comprehensive guide to every aspect of mcabber later, but the first versions should only be regarded as an overview of all features. Feel free to bug me with corrections of spelling errors or with contributions to the content. Conventions used in this guide: /command This is a command for mcabber which can only be executed during runtime. command A command for mcabber which can be given in the configuration file, too. $command The $-sign precedes shell commands. variable This is a variable which can be set in the configuration file or during runtime. 2
4 Chapter 1 Basic Usage After installing mcabber, you should create a configuration file first. The easiest way of doing this is to copy the sample configuration file[2] to /.mcabber/mcabberrc. Then, you only have to change the variables username and server before you can, finally, start mcabber. When the Login was successful, mcabber might look similar to the following screenshot: The screen is divided into 4 regions: The roster(sometimes called buddy list) in the upper left, the chat window/buffer in the upper right, the input line at the bottom and the log window above the input line. Those two blue lines which are below and above the log window are status lines. The lower one displays the general mcabber status and the upper line the status of the selected contact. The screenshot shows mcabber in chat mode which can be entered by pressing enter or sending a message when a contact is selected. Leaving chatmode is done by pressing Esc. To move between your contacts, you can use the buttons Pg Up/Pg Down. If you look at the roster of the screenshot, you will notice that the contact loic is marked red. That s the default for the unread color, so loic sent a message to you, but you have not read it, yet. Moving by pressing Pg Down would need 6 key presses, so it might be faster to use /roster unread_next to quickly jump to the next unread buffer. Which brings us to the interface of mcabber. Since mcabber has only one input line, there has to be some way of distinguishing mcabber commands from normal text messages. As you might have guessed already, all mcabber commands start with a slash, while any other line which you have entered will be sent as a message to the selected buddy. You won t find a complete list of all commands here, since mcabber has already got a great help system. It s at your fingertips when you enter /help. Furthermore, you 3
5 CHAPTER 1. BASIC USAGE 4 Figure 1.1: screenshot of mcabber can choose the language of the help system by setting lang to de, en, fr, it, nl, pl, ru or uk. 1.1 Multi-user Chat Jabber offers more than other one-on-one chats. There is an extension[10] which adds many-to-many chat, very similar to systems like IRC. Mcabber can participate through the command /room. If you happen to find big rooms, you should play a bit with /color muc to make the conversation more readable. Last but not least, you might be interested in the channel [email protected] as a new mcabber user. Feel free to drop by and tell us about your experiences with mcabber or this guide!
6 CHAPTER 1. BASIC USAGE Transports Transports, also known as Gateways, are Jabber server components which are used for translating your Jabber messages for proprietary networks like ICQ, AIM or MSN. At the time of writing, mcabber can t register transports, but, if you ve registered a transport with another client, you ll be able to use them within mcabber. Transports are, basically, just another contact on your roster. Thus, using transports is done by sending your status, maybe explicitly with /status_to. 1.3 Symbols Most users may be puzzled when they see all those different characters in the roster, the status bar and in the chat window for the first time. Some of those symbols might be obvious, but others aren t descriptive at all. So, here is a list of all characters and their meanings, structured per window where they were taken from. Roster Chat Window Symbols Rosteritem --- unfolded Group +++ folded Group [ ] buddy or chat room(muc) { } buddy who can t see your status + buddy is typing. buddy stopped typing _ buddy status: offline o buddy status: online a buddy status: away d buddy status: do not disturb n buddy status: not available f buddy status: free for chat? buddy status unknown x muc status: not connected C muc status: connected Symbols Meaning --> sent message <== received message ~ message was encrypted with GPG O *** info message #<# error message message was encrypted with OTR Upper Status Line Symbols Meaning ~ chat mode enabled * buffer is scroll-locked [C] chatstate: composing [A] chatstate: active [I] chatstate: inactive [P] chatstate: paused [G] chatstate: gone
7 Chapter 2 Logging Some people write their diaries to remember special moments. Others merely save their chat logs, which are often full of personal details, too. Of course, mcabber can keep your chat history and fortunately, the format of these logs is easy enough to read with your favourite text editor. Moreover, searching is possible with standard unix tools like $grep. 2.1 Enable Logging To enable logging, you ll have to add some lines to your configuration file: s e t l o g g i n g = 1 s e t l o a d l o g s = 1 Those variables tell mcabber to log the chat history and to load old logs when you restart it. Please note that there are a lot of other variables affecting logging. You can e.g. choose whether you want to log Multi-user Chats(log muc conf ) or whether you want to log status changes(logging ignore status). You ll find them all in the sample configuration file[2] if you search for History Logging. 2.2 Grouping logs If you know other instant messengers, you might be used to a concept called metacontacts. They can be used to group users, which have multiple representations in your roster (e.g. because they have work and home accounts). 6
8 CHAPTER 2. LOGGING 7 Unfortunately, mcabber doesn t support metacontacts yet, but at least you can group the history of different contacts together. This basically works by merging those histories and then creating a symlink frome one to the other. Here s an example with the histories of foo [email protected] ond foo [email protected]: $ cd /. mcabber/ h i s t o / $ m e r g e h i s t o r y. py foo work@jabber. org foo home@jabber. org > foo $ mv f o o foo home@jabber. or g $ rm foo work@jabber. org $ ln s f foo home@jabber. org foo work@jabber. org The script merge history.py is included in the mcabber tarball. 2.3 Converting centerim logs You ve got old centericq[8] or centerim[1] logs and want to keep them in mcabber? There s a script called cicq2mcabber.pl in the contrib directory of the mcabber tarball which can be used to do that. Now you only have to figure out where exactly centerim saves the history of a particular contact(somewhere under /.centerim/), convert this file to the mcabber history format and save it to /.mcabber/histo/ with the Jabber ID as the filename.
9 Chapter 3 Scripting This chapter will introduce you to the scripting facilities of mcabber. 3.1 Aliases Aliases are used to map complex commands to a word. /roster search is one of the commands worth remapping because it will be used every day. If you want to remap it to /rs, issue the command alias rs = roster search. 3.2 Internal Hooks Internal Hooks can be used to let mcabber execute commands when a special event occurs. At the time of this writing, only 2 hooks were defined: hook-post-connect hook-pre-disconnect The time of the execution is self-explaining, just set those variables to the command you want to execute. 3.3 External scripts Mcabber will execute the external script specified in the variable events command whenever a new message is received. It will be called at least with 3 parameters: 8
10 CHAPTER 3. SCRIPTING 9 1. MSG or STATUS 2. IN, OUT or MUC if the first argument was MSG or one character of OFDNAI if the first argument was STATUS 3. The JID which triggered the event 4. (optional) filename of the file which contains the message body If you need the message body for your event script, you ll have to set the option event log files to 1. The script has to delete that file after it processed it. To execute mcabber commands, you ll have to compile mcabber with FIFO support($./configure --enable-fifo). Then activate it by setting the variable fifo name to the filename of the fifo in your config file. There will be some verbose debug output in the logging window if you don t set the variable fifo hide output to 1. There is another variable which might be interesting for the developer of external scripts. If statefile is set to a filename, mcabber saves the JIDs of all unread buffers to that file, one per line.
11 Chapter 4 Encryption Encryption is one of the greatest advantages of Jabber compared to similar legacy networks like ICQ, MSN, AIM, etc. With encryption, you ll be able to communicate in hostile network environments with a clear conscience, because almost nobody will be able to spy on you. Practically, every connection which is established when using the Jabber protocol could be encrypted. First of all, you can connect to your Jabber server via ssl, which will prevent anyone between you and the server from sniffing your plaintext messages or your password. In mcabber you could enable this feature by adding s e t s s l = 1 s e t s s l v e r i f y = 1 to your configuration file. The next step is server to server encryption, which you can t control, unless you re the admin of your server. So, theoretically it would be possible to spy between Jabber servers, or maybe your buddy doesn t use an ssl connection. Of course, if you are truly paranoid, you won t trust the server admins but only your buddy. So, to encrypt messages between you and your buddy, end-to-end encryption can be used. There are two protocols for accomplishing this: The first one is OpenPGP/GnuPG, which is a semi standard[9] in the Jabber world. The other protocol is Off-the-Record(OTR) Messaging, which was designed by cryptographers Ian Goldberg and Nikita Borisov[5]. Although OTR isn t a standard, a lot of developers have implemented it for their instant messaging clients. The main reason might be the availability of libotr[7], an open-source library from the authors of OTR which does all the hard work. GnuPG is considered to be more mature, but it also has a major drawback: You can t encrypt messages 10
12 CHAPTER 4. ENCRYPTION 11 between Jabber and legacy networks. Because naturally, the clients of other networks won t support Jabber extensions. OTR can fill that gap, because it only uses the message body as an envelope for the whole protocol. I will now describe in detail how to use both protocols with mcabber. 4.1 OpenPGP First of all, I m assuming that you ve already generated a gnupg key which you want to use to encrypt Jabber messages. If you haven t done this before, go to first. Using PGP encryption with mcabber should be straight-forward, but you have to restart mcabber for configuring it. To enable PGP for mcabber, you must add two lines to your configuration file: s e t pgp = 1 s e t p g p p r i v a t e k e y = 23DEADBEEFDEAD42 The first one enables OpenPGP and the second line tells mcabber which PGP key it should use. If you didn t notice: This hexadecimal number is the last characters of your PGP key fingerprint, get it with gpg --fingerprint --list-secret-keys. If you have no problems writing your passphrase to your hard disk, you could also set the variable pgp passphrase in your config file. Otherwise mcabber will ask you for your passphrase at every start-up. From now on, mcabber will magically use PGP encryption whenever it can. Basically this works because presence messages of users using PGP are signed with their key. If you happen to have a contact whose Jabber client doesn t conform to that part of the standard, you can manually give mcabber their key fingerprint: pgp s e t k e y foo@bar. ne t D9940C9BB1B OTR Enabling OTR in mcabber works in almost the same manner as PGP. But instead of generating your encryption key by hand, mcabber will create one for you when it starts. This might take some time and you can speed it up by generating randomness by typing, moving the mouse, writing to hard disk etc. But first of all, you must add the following lines to your configuration file and restart mcabber:
13 CHAPTER 4. ENCRYPTION 12 s e t o t r = 1 o t r p o l i c y d e f a u l t manual The first line is analogous to PGP. The second one gives the OTR subsystem the hint that you want to be able to start encrypted OTR channels manually(by issuing /otr start). If you want that they are also magically started, you should change manual to opportunistic. The opportunistic mode adds some whitespace characters to the first message sent to a buddy. So, his client can find those characters and establish an OTR channel. Please note that establishing the channel could take some time, depending on the delay of exchanging messages between both ends. (For the technically inclined: Four messages have to be sent before the channel is fully established. The whole protocol is described in detail at http: // Keep in mind that an established channel with a buddy isn t per se secure. It could be possible that you become a victim of a Man-in-the-middle attack. To make it secure, you ll have to exchange the fingerprints of the keys through a trusted medium (telephone, in person, etc). You can see your own fingerprint by using the command /otr key and the fingerprint of your chat buddy by /otr fingerprint. Check /help otr to find out how to trust the fingerprint now. There is even another way for exchanging fingerprints: The Socialist Millionaires Protocol[3]. It s basically a cryptographic secure way for two parties with the secret information x and y to check whether x==y without revealing any information about the secrets. Unfortunately there aren t many clients supporting that feature yet. In mcabber it is mapped to the commands /otr smpq [email protected] your_secret for the initiating party and /otr smpr [email protected] your_secret for the answering party. If both parties supply the same secret, the fingerprints can be marked trusted.
14 Bibliography [1] Centerim. [2] Sample configuration file for mcabber. ~mikael/mcabber/hg/?raw-file/tip/mcabber/mcabberrc.example. [3] Chris Alexander and Ian Goldberg. Improved user authentication in off-the-record messaging. In Proceedings of the 2007 ACM workshop on Privacy in electronic society. ACM, ca/~iang/pubs/impauth.pdf. [4] Mikael Berthe. Mcabber. mcabber/. [5] Nikita Borisov, Ian Goldberg, and Eric Brewer. Off-the-record communication, or, why not to use pgp. In Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society. ACM, http: // [6] XMPP Standards Foundation. Jabber/xmpp protocols. xmpp.org/protocols/. [7] Ian Goldberg, Chris Alexander, and Nikita Borisov. Off-the-record messaging. [8] Konstantin Klyagin. Centericq. [9] Thomas Muldowney. XEP-0027: Current Jabber OpenPGP Usage. XMPP Standards Foundation, extensions/xep-0027.html. 13
15 BIBLIOGRAPHY 14 [10] Peter Saint-Andre. XEP-0045: Multi-User Chat. XMPP Standards Foundation, xep-0045.html.
1.2 Using the GPG Gen key Command
Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
WebSphere Application Server security auditing
Copyright IBM Corporation 2008 All rights reserved IBM WebSphere Application Server V7 LAB EXERCISE WebSphere Application Server security auditing What this exercise is about... 1 Lab requirements... 1
GPG installation and configuration
Contents Introduction... 3 Windows... 5 Install GPG4WIN... 5 Configure the certificate manager... 7 Configure GPG... 7 Create your own set of keys... 9 Upload your public key to the keyserver... 11 Importing
Hypercosm. Studio. www.hypercosm.com
Hypercosm Studio www.hypercosm.com Hypercosm Studio Guide 3 Revision: November 2005 Copyright 2005 Hypercosm LLC All rights reserved. Hypercosm, OMAR, Hypercosm 3D Player, and Hypercosm Studio are trademarks
XMPP Instant Messaging and Active Directory
XMPP Instant Messaging and Active Directory Quick setup of Isode's XMPP Server, M-Link, using Microsoft's Active Directory for user account provisioning Isode Objectives This document is intended for those
Talk Internet User Guides Controlgate Administrative User Guide
Talk Internet User Guides Controlgate Administrative User Guide Contents Contents (This Page) 2 Accessing the Controlgate Interface 3 Adding a new domain 4 Setup Website Hosting 5 Setup FTP Users 6 Setup
So you want to create an Email a Friend action
So you want to create an Email a Friend action This help file will take you through all the steps on how to create a simple and effective email a friend action. It doesn t cover the advanced features;
Samsung Xchange for Mac User Guide. Winter 2013 v2.3
Samsung Xchange for Mac User Guide Winter 2013 v2.3 Contents Welcome to Samsung Xchange IOS Desktop Client... 3 How to Install Samsung Xchange... 3 Where is it?... 4 The Dock menu... 4 The menu bar...
Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER
COVER STORY Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY The leading email applications include new features for helping users secure and authenticate their
Clearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
The KGpg Handbook. Jean-Baptiste Mardelle Rolf Eike Beer
Jean-Baptiste Mardelle Rolf Eike Beer 2 Contents 1 Introduction 5 2 Getting Started 6 3 Using KGpg 8 3.1 Generating a key...................................... 8 3.2 Revoking a key.......................................
Configuration Manual English version
Configuration Manual English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the
IceWarp Server. IM Server Reference. Version 10
IceWarp Server IM Server Reference Version 10 Printed on 12 August, 2009 i Contents Instant Messaging 3 V10 New Features... 4 Libpurple Implementation 15 Networks... 4 Shared Roster... 4 Multi-Session
using version control in system administration
LUKE KANIES using version control in system administration Luke Kanies runs Reductive Labs (http://reductivelabs.com), a startup producing OSS software for centralized, automated server administration.
Instant Messaging Service Reference
IceWarp Unified Communications Instant Messaging Service Reference Version 10.4 Printed on 16 April, 2012 Contents Instant Messaging 1 Reference... 2 General... 2 Services... 2 Trusted Hosts... 8 Archive/History...
Cryptography for Software and Web Developers
Cryptography for Software and Web Developers Part 5: Don t believe the crypto hype Hanno Böck 2014-05-28 1 / 10 The NSA scandal was the biggest boost for snake oil crypto of all time Threema, Telegram,
Backing Up and Restoring Data
Backing Up and Restoring Data Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco Unity Express application
U.S. Bank Secure Mail
U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email
How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)
EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...
Version Control with. Ben Morgan
Version Control with Ben Morgan Developer Workflow Log what we did: Add foo support Edit Sources Add Files Compile and Test Logbook ======= 1. Initial version Logbook ======= 1. Initial version 2. Remove
Project 2: Penetration Testing (Phase II)
Project 2: Penetration Testing (Phase II) CS 161 - Joseph/Tygar November 17, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
RFG Secure FTP. Web Interface
RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
Integrated Instant Messaging System
Integrated Instant Messaging System Ajinkya Nalawade Dharmik Kamdar Pratik Angolkar Sharmila Gaikwad Assistant Professor, Department of Computer Engineering Abstract -- The Internet-based instant messaging
After you install Spark, you'll get going by logging in and adding contacts. Try out a chat with one of your contacts!
Spark User Guide Welcome to Spark! This guide will get you acquainted with the basics of chatting using Spark. You'll get logged in, add contacts, chat by text and voice, exchange files, and more. Note:
TICO-EN. TiXML-Console TICO. User Manual V1.4.0.8
TICO-EN TiXML-Console TICO User Manual V1.4.0.8 2008 Tixi.Com GmbH, Berlin Publication close: September 2008, v.1.4.0.8 This manual is protected by copyright. Any further sale is prohibited without the
Installing Certificates on Spectralink 8400 Handsets
Introduction For the purposes of this document we will be showing you how to load certificates onto the Spectralink wireless telephone in a couple of different ways. We will start with the preferred method,
Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS
Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS 03Archer.indd 71 8/4/05 9:13:59 AM Address Book 3.1 What Is the Address Book The Address Book in Outlook is actually a collection of address books
MOBILITY FOR iphone USER GUIDE
MOBILITY FOR iphone USER GUIDE VERSION 20.0.2 401 Market Street, First Floor Philadelphia, PA 19106 877.258.3722 www.alteva.com Table of Contentsl 1. About Alteva Mobility for iphone... 3 2. Installation...
LYNC 2010 USER GUIDE
LYNC 2010 USER GUIDE D O C U M E N T R E V I S O N H I S T O R Y DOCUMENT REVISION HISTORY Version Date Description 1.0 6/25/2013 Introduction of the Lync 2010 to product line. 2 Lync 2010 User Guide 401
Pragmatic Version Control
Extracted from: Pragmatic Version Control using Subversion, 2nd Edition This PDF file contains pages extracted from Pragmatic Version Control, one of the Pragmatic Starter Kit series of books for project
Automated Offsite Backup with rdiff-backup
Automated Offsite Backup with rdiff-backup Michael Greb 2003-10-21 Contents 1 Overview 2 1.1 Conventions Used........................................... 2 2 Setting up SSH 2 2.1 Generating SSH Keys........................................
Version control. HEAD is the name of the latest revision in the repository. It can be used in subversion rather than the latest revision number.
Version control Version control is a powerful tool for many kinds of work done over a period of time, including writing papers and theses as well as writing code. This session gives a introduction to a
Configure Single Sign on Between Domino and WPS
Configure Single Sign on Between Domino and WPS What we are doing here? Ok now we have the WPS server configured and running with Domino as the LDAP directory. Now we are going to configure Single Sign
About. IP Centrex App for ios Tablet. User Guide
About IP Centrex App for ios Tablet User Guide December, 2015 1 2015 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic,
How to Install SQL Server 2008
How to Install SQL Server 2008 A Step by Step guide to installing SQL Server 2008 simply and successfully with no prior knowledge Developers and system administrators will find this installation guide
Welcome to XO WorkTime
Quick Start Guide End User s Quick Start Guide (for Smartphones) Welcome to XO WorkTime for IP Flex, IP Flex with VPN, Enterprise SIP, and SIP Services Go mobile with your office telephone numbers and
How to Configure Outlook 2003 to connect to Exchange 2010
How to Configure Outlook 2003 to connect to Exchange 2010 Outlook 2003 will install and work correctly on any version of Windows XP, Vista, Windows 7 or Windows 8. These instructions describe how to setup
Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging
Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging Overview The University of Pittsburgh is removing the
orrelog SNMP Trap Monitor Software Users Manual
orrelog SNMP Trap Monitor Software Users Manual http://www.correlog.com mailto:[email protected] CorreLog, SNMP Trap Monitor Software Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No
ios Team Administration Guide (Legacy)
ios Team Administration Guide (Legacy) Contents About ios Development Team Administration 5 At a Glance 6 Team Admins Manage Team Membership and Assign Roles in the Member Center 6 Development Devices
Interactive Reporting Emailer Manual
Brief Overview of the IR Emailer The Interactive Reporting Emailer allows a user to schedule their favorites to be emailed to them on a regular basis. It accomplishes this by running once per day and sending
How to Configure Outlook 2007 to connect to Exchange 2010
How to Configure Outlook 2007 to connect to Exchange 2010 Outlook 2007 will install and work correctly on any version of Windows XP, Vista, Windows 7 or Windows 8. These instructions describe how to setup
User Guide. NAS Compression Setup
NAS compression is not done on the recorder, it is a separate application normally requiring a dedicated machine (audio compression is extremely CPU intensive so need to be very careful about running it
Using SSH Secure Shell Client for FTP
Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
Secret Server Installation Windows Server 2008 R2
Table of Contents Introduction... 2 ASP.NET Website... 2 SQL Server Database... 2 Administrative Access... 2 Prerequisites... 2 System Requirements Overview... 2 Additional Recommendations... 3 Beginning
CEFNS Web Hosting a Guide for CS212
CEFNS Web Hosting a Guide for CS212 INTRODUCTION: TOOLS: In CS212, you will be learning the basics of web development. Therefore, you want to keep your tools to a minimum so that you understand how things
Internet Programming. Security
Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures
BULLGUARD BAckUp GUIDE
BULLGUARD backup GUIDE CONTENTS BullGuard Backup introduction page 3 Installing BullGuard Backup page 6 Uninstalling BullGuard Backup page 11 Registering BullGuard Backup: creating an account page 12 Running
AT&T Voice DNA User Guide
AT&T Voice DNA User Guide Page 1 Table of Contents GET STARTED... 4 Log In... 5 About the User Dashboard... 9 Manage Personal Profile... 15 Manage Messages... 17 View and Use Call Logs... 22 Search the
1 Getting Started. Before you can connect to a network
1 Getting Started This chapter contains the information you need to install either the Apple Remote Access Client or Apple Remote Access Personal Server version of Apple Remote Access 3.0. Use Apple Remote
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
Computing and Communications Services (CCS) - LimeSurvey Quick Start Guide Version 2.2 1
LimeSurvey Quick Start Guide: Version 2.2 Computing and Communications Services (CCS) - LimeSurvey Quick Start Guide Version 2.2 1 Table of Contents Contents Table of Contents... 2 Introduction:... 3 1.
Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3
2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer
Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles... 5 2 Advanced Session... Properties 6 3 Session
Tera Term Telnet. Introduction
Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start
12Planet Chat end-user manual
12Planet Chat end-user manual Document version 1.0 12Planet 12Planet Page 2 / 13 Table of content 1 General... 4 1.1 How does the chat work?... 4 1.2 Browser Requirements... 4 1.3 Proxy / Firewall Info...
Harrisburg University Skype for Business User Guide
Harrisburg University Skype for Business User Guide Contents 2 Accessing Skype for Business... 2 Starting Skype for Business on your desktop... 3 Subsequent access to Skype for Business... 3 Changing Skype
CLC Server Command Line Tools USER MANUAL
CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej
Enterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
IP Power Stone 4000 User Manual
IP Power Stone 4000 User Manual Two Outlet Remote AC Power Controller Multi Link, Inc. 122 Dewey Drive Nicholasville, KY 40356 USA Sales and Tech Support 800.535.4651 FAX 859.885.6619 techsupport@multi
How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On
Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files
Using Avaya Flare Experience for Windows
Using Avaya Flare Experience for Windows Release 9.0 Issue 02.01 September 2013 Contents Chapter 1: About Flare Experience... 5 About Flare Experience... 5 Main window... 6 Button descriptions... 10 Chapter
IP Voice UNIFI. ipad User Guide
IP Voice UNIFI ipad User Guide CONTENTS 1 About UNIFI for ios Tablet 4 2 Getting Started 4 2.1 Installation 4 2.2 Sign In 4 3 Main Tabs 5 4 Contacts 6 4.1 Add Contacts 6 4.2 Edit Contacts 7 5 Presence
SSL Enforcer Documentation
SSL Enforcer Documentation Introduction Install and Uninstall Getting Started Main Settings Options Log Introduction Today a vast majority of Internet activities like social networking, streaming videos,
How to test and debug an ASP.NET application
Chapter 4 How to test and debug an ASP.NET application 113 4 How to test and debug an ASP.NET application If you ve done much programming, you know that testing and debugging are often the most difficult
Ingenious Testcraft Technical Documentation Installation Guide
Ingenious Testcraft Technical Documentation Installation Guide V7.00R1 Q2.11 Trademarks Ingenious, Ingenious Group, and Testcraft are trademarks of Ingenious Group, Inc. and may be registered in the United
Parcelhub - Linnworks Custom Courier Integration Script
Parcelhub - Linnworks Custom Courier Integration Script What is it? When an order is processed using Linnworks, Linnworks has the ability to book a shipment and print shipping labels for that order. Linnworks
Networks & Security Course. Web of Trust and Network Forensics
Networks & Security Course Web of Trust and Network Forensics Virtual Machine Virtual Machine Internet connection You need to connect the VM to the Internet for some of the Web of Trust exercises. Make
Skybot Scheduler Release Notes
Skybot Scheduler Release Notes The following is a list of new features and enhancements included in each release of Skybot Scheduler. Skybot Scheduler 3.3 Oracle interface The new Skybot Scheduler Oracle
Installation Manual v2.0.0
Installation Manual v2.0.0 Contents ResponseLogic Install Guide v2.0.0 (Command Prompt Install)... 3 Requirements... 4 Installation Checklist:... 4 1. Download and Unzip files.... 4 2. Confirm you have
Deploying Secure Internet Connectivity
C H A P T E R 5 Deploying Secure Internet Connectivity This chapter is a step-by-step procedure explaining how to use the ASDM Startup Wizard to set up the initial configuration for your ASA/PIX Security
Introduction. How does FTP work?
Introduction The µtasker supports an optional single user FTP. This operates always in active FTP mode and optionally in passive FTP mode. The basic idea of using FTP is not as a data server where a multitude
COMP 3704 Computer Security
COMP 3704 Computer Security Christian Grothoff [email protected] http://grothoff.org/christian/ 1 Key Size Consider how much the information is worth Even advancements in computing are not going to
WS_FTP Professional 12. Security Guide
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 2 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...
State of Michigan Data Exchange Gateway. Web-Interface Users Guide 12-07-2009
State of Michigan Data Exchange Gateway Web-Interface Users Guide 12-07-2009 Page 1 of 21 Revision History: Revision # Date Author Change: 1 8-14-2009 Mattingly Original Release 1.1 8-31-2009 MM Pgs 4,
Dove User Guide Copyright 2010-2011 Virgil Trasca
Dove User Guide Dove User Guide Copyright 2010-2011 Virgil Trasca Table of Contents 1. Introduction... 1 2. Distribute reports and documents... 3 Email... 3 Messages and templates... 3 Which message is
LiteCommerce Advanced Security Module. Version 2.8
LiteCommerce Advanced Security Module Version 2.8 Reference Manual Revision date: Jul/03/2007 LiteCommerce Advanced Security Module Reference Manual I Table of Contents Introduction...1 Administrator...2
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Last revised: November 12, 2014 Table of Contents Table of Contents... 2 I. Introduction... 4 A. ASP.NET Website... 4 B.
CASHNet Secure File Transfer Instructions
CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are
Ubuntu Open PGP IMPLEMENTATION. Dr. ENİS KARAARSLAN 2014
Ubuntu Open PGP IMPLEMENTATION Dr. ENİS KARAARSLAN 2014 Enter your personal information, select your key encryption type, key strength, and when you want your key to expire. Your name and email address
User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1
User's Manual Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 VirusBarrier Server 2 and VirusBarrier Mail Gateway 2 for Macintosh 2008 Intego. All Rights Reserved Intego
WinSCP PuTTY as an alternative to F-Secure July 11, 2006
WinSCP PuTTY as an alternative to F-Secure July 11, 2006 Brief Summary of this Document F-Secure SSH Client 5.4 Build 34 is currently the Berkeley Lab s standard SSH client. It consists of three integrated
Authorize.net modules for oscommerce Online Merchant.
Authorize.net Authorize.net modules for oscommerce Online Merchant. Chapters oscommerce Online Merchant v2.3 Copyright Copyright (c) 2014 oscommerce. All rights reserved. Content may be reproduced for
Please note that a username and password will be made available upon request. These are necessary to transfer files.
Transferring Data Using Secure File Transfer Process ASU Center for Health Information and Research (CHiR) data partners can now securely electronically send their data submissions by means of Secure File
SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014]
SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014] Table of Contents 1. CONFIGURING SSL ON ORACLE WEBLOGIC... 1-1 1.1 INTRODUCTION... 1-1 1.2 SETTING UP
Managing Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
Mac OS X Server ichat Server Administration Version 10.6 Snow Leopard
Mac OS X Server ichat Server Administration Version 10.6 Snow Leopard KKApple Inc. 2009 Apple Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS X Server software might reproduce
Plugin Integration Guide
Plugin Integration Guide Revision History Version Date Changed By Comments/Reason 1.0 16/09/14 NZB Created 1.01 01/10/ This document describes the implementation requirements for the mobicred Magento Plugin,
Online Banking & Bill Pay. Quick Start Guide. Step-by-step instructions PLUS easy-to-read screen shots and helpful tips.
Online Banking & Bill Pay Quick Start Guide Step-by-step instructions PLUS easy-to-read screen shots and helpful tips. Welcome -- Online System Security Welcome to Online Banking and Bill Pay! Whether
SANbox Manager Release Notes Version 1.03.28 50208-06 Rev A
SANbox Manager Release Notes Version 1.03.28 50208-06 Rev A This software is licensed by QLogic for use by its customers only. Copyright (c) 2001 QLogic Corporation All rights reserved Version 1.03.28
NASA Workflow Tool. User Guide. September 29, 2010
NASA Workflow Tool User Guide September 29, 2010 NASA Workflow Tool User Guide 1. Overview 2. Getting Started Preparing the Environment 3. Using the NED Client Common Terminology Workflow Configuration
10 STEPS TO YOUR FIRST QNX PROGRAM. QUICKSTART GUIDE Second Edition
10 STEPS TO YOUR FIRST QNX PROGRAM QUICKSTART GUIDE Second Edition QNX QUICKSTART GUIDE A guide to help you install and configure the QNX Momentics tools and the QNX Neutrino operating system, so you can
