Obfuscating your code with SmartAssembly. SmartAssembly - 6.2
|
|
|
- Whitney Crawford
- 9 years ago
- Views:
Transcription
1 Obfuscating your code with SmartAssembly SmartAssembly - 6.2
2 Contents Red Gate Software Ltd 2
3 Why should I obfuscate my code? The benefits of obfuscation Obfuscating your code with Red Gate's SmartAssembly can help to protect you against intellectual property theft by making your code hard to read. This paper discusses the different forms of obfuscation offered by SmartAssembly and when to use them. Red Gate Software Ltd 3
4 Obfuscating names Obfuscating type and method names SmartAssembly offers three levels of obfuscation for type names and method names. These are: ASCII characters Unicode unprintable characters Unicode unprintable characters and advanced renaming algorithm Renames types and methods using ASCII characters. For example, the type FullScreenSplash might be obfuscated to #dc. Note: You must choose this option if you want to be able to decode stack tracks after obfuscation. Renames types and methods using Unicode unprintable characters. For example, the type FullScreenSplash might be obfuscated to U+1D11E (which is unprintable). Renames types and methods using Unicode unprintable characters and renames multiple items with the same name. For example, the types FullScreenSplash and FontStyle are both obfuscated to U+017D. Obfuscating field names SmartAssembly also offers three different schemes for renaming field names. These are: One-to-one renaming scheme Standard renaming Advanced renaming Changes all fields in all classes so that they have different names. A field's name is unique within an assembly. Note: You must choose this option if you want to be able to retrieve the original field names from stack traces. Alters the field name so that is unique within a class, however the same name is often used within other classes in the assembly. For example, #a: string, #b: boolean, #c: string, #d: boolean. Alters the field name, however it not unique within a class and is reused. Fields of a different type will have the same name. For example, #a: string, #a: boolean, #b: string, #b: boolean. Red Gate Software Ltd 4
5 Regardless of the renaming scheme chosen, the field name is also obfuscated in the same style as the selected types/methods name obfuscation (ASCII or Unicode unprintable characters). Understanding name obfuscation: example To illustrate the effect of using obfuscation options, this example uses the following code sample, part of the C# source code for a program called QueryBee (a simple WinForms application which can query SQL servers). Code before obfuscation namespace QueryBee public class ConnectForm : Form // Fields private IContainer components; private EventHandler Foregrounded; private ComboBox m_combodatabase; private ComboBox m_comboserver; private Button m_connectbutton; private ProgressBar m_connectprogress; private SystemHotkey m_hotkey; private Label m_labeldatabase; private Label m_labelerror; private Label m_labelserver; private NotifyIcon m_trayicon; private ContextMenuStrip m_traymenu; private ToolStripMenuItem m_traymenuclose; private ToolStripMenuItem m_traymenuopen; // Events public event EventHandler Foregrounded; // Methods public ConnectForm(); private void connectform_resize(object sender, EventArgs e); Red Gate Software Ltd 5
6 protected override void Dispose(bool disposing); private void InitializeComponent(); private void m_combodatabase_clickin(object sender, EventArgs e); private void m_combodatabase_textchanged(object sender, EventArgs e); private void m_connectbutton_click(object sender, EventArgs e); private void m_trayicon_doubleclick(object sender, EventArgs e); private void m_traymenuclose_click(object sender, EventArgs e); private void m_traymenuopen_click(object sender, EventArgs e); protected override bool ProcessCmdKey(ref Message msg, Keys keydata); The code above is obfuscated using SmartAssembly s most basic level of obfuscation: ASCII characters and one-to-one field renaming. To show the effects of this obfuscation on the code, Red Gate s.net Reflector (a tool which can disassemble.net executables) can be used to view the result. Code after ASCII character obfuscation namespace #W8z internal class #V8z : Form // Fields private EventHandler #58z; private ComboBox #68z; private Label #78z; private ComboBox #88z; private Label #98z; private NotifyIcon #a9z; private Button #b9z; private ProgressBar #c9z; private #Z8z #d9z; private ContextMenuStrip #e9z; private ToolStripMenuItem #f9z; private ToolStripMenuItem #g9z; private Label #h9z; private IContainer #vyc; Red Gate Software Ltd 6
7 // Events public event EventHandler Foregrounded; // Methods private void #8I(); private void #I9z(object sender, EventArgs e); private void #J9z(object sender, EventArgs e); private void #K9z(object sender, EventArgs e); private void #L9z(object sender, EventArgs e); private void #M9z(object sender, EventArgs e); private void #N9z(object sender, EventArgs e); private void #O9z(object sender, EventArgs e); public #V8z(); protected override void Dispose(bool disposing); protected override bool ProcessCmdKey(ref Message msg, Keys keydata); By changing the names of these methods (from 'ComboDatabase' to '#68z', for example), it is already much harder to understand the function of this code. Note: in the last two lines 'disposing' and 'keydata' have not been obfuscated. This is because SmartAssembly detects when it would be unsafe to obfuscate a name, and leaves names that would break your code if changed. In the example above, the field names ('#58z' and so on) are unique to the class '#V8z', however, and so with some effort it may be possible to work out their functionality. To avoid this, SmartAssembly s standard field renaming function can be applied to reuse the same field names within multiple classes in the assembly. Code after standard field renaming namespace #W8z internal class #V8z : Form // Fields private EventHandler #a; private IContainer #b; private ComboBox #c; Red Gate Software Ltd 7
8 private Label #d; private ComboBox #e; private Label #f; private NotifyIcon #g; private Button #h; private ProgressBar #i; private #Z8z #j; private ContextMenuStrip #k; private ToolStripMenuItem #l; private ToolStripMenuItem #m; private Label #n;... internal class #Y8z : Form // Fields private readonly SqlConnection #a; private IContainer #b; private TextBox #c; private Button #d; private DataGridView #e; private Panel #f; private ProgressBar #g; private Label #h; private Label #i; The level of obfuscation can be improved still further by replacing the ASCII characters in the names above with unprintable Unicode characters (and symbols). Most names are not displayed at all. Code after obfuscation with Unicode unprintable characters namespace internal class : Form Red Gate Software Ltd 8
9 // Fields private EventHandler ; private IContainer ; private ComboBox ; private Label ; private ComboBox ; private Label ; private NotifyIcon ; private Button ; private ProgressBar; private ; private ContextMenuStrip ; private ToolStripMenuItem ; private ToolStripMenuItem ; private Label ; // Events public event EventHandler Foregrounded; // Methods public (); private void (); private void ŽŽ (object sender, EventArgs e); private void Ž (object sender, EventArgs e); private void Ž (object sender, EventArgs e); private void Ž (object sender, EventArgs e); private void Ž (object sender, EventArgs e); private void "Ž (object sender, EventArgs e); private void "Ž (object sender, EventArgs e); protected override void Dispose(bool disposing); Finally, advanced field renaming uses identical names for different fields of different types within the same class. In the example below (which uses ASCII names), the three fields of type 'label' have different names but many fields of different types share the name '#a'. Red Gate Software Ltd 9
10 Code after advanced field renaming namespace #W8z internal class #V8z : Form // Fields private #Z8z #a; private IContainer #a; private EventHandler #a; private Button #a; private ComboBox #a; private ContextMenuStrip #a; private Label #a; private NotifyIcon #a; private ProgressBar #a; private ToolStripMenuItem #a; private ComboBox #b; private Label #b; private ToolStripMenuItem #b; private Label #c; By combining Unicode unprintable character obfuscation with advanced field renaming, you can greatly reduce the risk of anyone understanding your source code, even after disassembly. The result of this level of obfuscation is not shown here because it would be impossible to show that the same unprintable characters are used for multiple field names. Red Gate Software Ltd 10
11 Strings encoding Software often stores passwords, login information, licensing information and/or SQL requests in strings. SmartAssembly can encode strings in an assembly to protect them. Choosing this option may affect the performance of the application. To enable strings encoding, select the appropriate options in the strings encoding section of the main project settings window in SmartAssembly. Notes: You cannot use 'strings encoding with improved protection' with.net 1.1, or with any version of Microsoft Compact Framework, Silverlight or XNA. You cannot use 'compress and encrypt the encoded strings' with.net 1.1, Microsoft Compact Framework version 1, Silverlight or XNA. Red Gate Software Ltd 11
12 Obfuscating control flow In addition to renaming crucial parts of your code, you can also use SmartAssembly to make your code more difficult to read by making it unnecessarily complex (converting it into 'spaghetti code'). Control flow obfuscation prevents most programs from being able to disassemble the code. For example, attempting to disassemble control-flow-obfuscated code using Red Gate's.NET Reflector will give: private static void Main() } // This item is obfuscated and can not be translated. Note: Using control flow obfuscation can impact the performance of your application; there are three levels of control flow obfuscation in SmartAssembly, which which allow you to balance performance overhead against increased complexity. To enable control flow obfuscation, select the option in the control flow obfuscation section of the main project settings window in SmartAssembly. Note: Control flow obfuscation does not work with any version of Microsoft Compact Framework or XNA. Red Gate Software Ltd 12
13 Using a dynamic proxy for external references If you make calls outside of your assembly, these calls will still be visible in your code after string encoding and control flow obfuscation. For example, if you make a call to a message box, it would still be possible to find that call in the disassembled application, even with string encoding and control flow obfuscation enabled. By following external calls like this, it may still be possible for people to understand parts of your code. To solve this, you can use SmartAssembly to create a proxy (the 'references dynamic proxy') at runtime. This proxy makes it harder to understand your code because all external calls appear to be sent to the proxy and not to the external method, property or field which eventually receives it. Enabling the references dynamic proxy also protects your code against any changes. This means that you cannot use the references dynamic proxy if you need to modify your application after SmartAssembly has built it. To enable the references dynamic proxy, select the option in the references dynamic proxy section of the main project settings window in SmartAssembly. Note: You cannot use the references dynamic proxy with.net 1.1, or with any version of Microsoft Compact Framework, Silverlight or XNA Red Gate Software Ltd 13
14 Pruning code SmartAssembly can remove any unused code in the assembly (for example, meta-data or code which will never be executed). Pruning meta-data from your code helps to make it harder to understand; pruning unused code can improve performance. Note: SmartAssembly will try to identify and remove only unused code. However, if you call a member by reflection (including serialization, remoting or data-binding), SmartAssembly may also remove useful code. To prevent this, click Exclusions... to specify those members that should not be pruned by SmartAssembly. To prune code, select the option in the pruning section of the main project settings window in SmartAssembly. Red Gate Software Ltd 14
15 Questions about obfuscation Will obfuscation break my code? SmartAssembly attempts to determine when it would be unsafe to obfuscate a name. If required, you can also manually exclude specific members from being obfuscated by clicking Exclusions... in the Obfuscation section of the project settings. By default, SmartAssembly will obfuscate all public members in your code. You can choose not to obfuscate public members if this stops your program from running. Can I obfuscate DLLs? You cannot normally obfuscate external members of DLLs with SmartAssembly because this would make them useless to other applications which share them. You can use SmartAssembly to merge most DLLs into your code, however. This then allows you to protect the code in the DLL by obfuscating it. It will also improve the performance of your application as all calls to the DLL will now be internal rather than public. Note: Some DLLs will break if you merge them, including shared DLLs used for remoting in a client-server architecture and third-party DLLs which employ code-integrity protection. Red Gate Software Ltd 15
16 If your DLLs cannot be merged, you can use SmartAssembly to embed DLLs in your code instead. This means that a compressed version of the DLL is stored in the assembly. At runtime it will be decompressed and loaded into memory. Embedded DLLs can be obfuscated but this technique may not improve the performance of your application because the resulting DLL calls will still be public. Note: You cannot use embedding with.net 1.1, or with any version of Microsoft Compact Framework, Silverlight or XNA If I have a bug in my obfuscated code and a user sends me a stack trace, how can I read it? Because obfuscation makes parts of your code unreadable, a stack trace generated from obfuscated code is meaningless. SmartAssembly's error reporting feature will automatically translate the obfuscated parts of your code back to their original values when you view an error report. If users send stack traces to you manually (by , for example), you can use SmartAssembly to translate these, too. Note: To be able to decode stack traces after obfuscation, you must only use ASCII characters to obfuscate your code. To be able to see the original field names in the stack traces, you must also choose the one-to-one field renaming scheme. Red Gate Software Ltd 16
17 Conclusion In this paper, I have shown how you can use SmartAssembly to protect your intellectual property by obfuscating your code (including DLLs), hiding most calls to external methods and removing unessential code. I have also shown that, thanks to SmartAssembly's built-in error reporting feature, obfuscating your code does not mean that you have to lose important debugging information from your customers. Red Gate Software Ltd 17
18 Acknowledgements Trademarks and registered trademarks Red Gate is a registered trademark of Red Gate Software Ltd registered in the U.S. Patent and Trademark Office..NET Reflector and SQL Compare are registered trademarks of Red Gate Software Ltd registered in the U.S. Patent and Trademark Office. ANTS Performance Profiler, ANTS Memory Profiler,.NET Reflector Pro, Exception Hunter, Schema Compare for Oracle, SQL Backup, SQL Data Compare, SQL Comparison SDK, SQL Dependency Tracker, SQL Doc, SQL HyperBac, SQL Log Rescue, SQL Monitor, SQL Multi Script, SQL Packager, SQL Prompt, SQL Refactor, SQL Scripts Manager, SQL Storage Compress, SQL Toolbelt, SQL Virtual Restore, and Exchange Server Archiver are trademarks of Red Gate Software Ltd. Microsoft, Windows, Windows 98, Windows NT, Windows 2000, Windows 2003, Windows XP, Windows Vista, Windows 7, Visual Studio, and other Microsoft products referenced herein are either registered trademarks or trademarks of Microsoft Corporation. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. InstallShield is a registered trademark and service mark of InstallShield Software Corporation. PagerDuty is a registered trademark of PagerDuty, Inc. Copyright information All Red Gate applications are Red Gate Software Ltd SQL Backup, SQL Compare, SQL Data Compare, SQL Packager, and SQL Prompt contain software that is Copyright Jean-loup Gailly and Mark Adler. SQL Doc includes software developed by Aspose ( SQL Backup contains software that is Copyright Terence Parr. Refer to the ACKNOWLEDGEMENTS.txt file in your SQL Backup installation directory for the full license text. Why should I obfuscate my code?... iii Obfuscating names... iv Strings encoding... xi Obfuscating control flow... xii Using a dynamic proxy for external references... xiii Pruning code... xiv Questions about obfuscation... xv Red Gate Software Ltd 18
19 Conclusion...xvii Acknowledgements... xviii Red Gate Software Ltd 19
SQL Object Level Recovery Native 1.1
SQL Object Level Recovery Native 1.1 September 2009 Note: these pages apply to a version of this product that is not the current released version. For the latest support documentation, please see http://documentation.red-gate.com
DOCUMENTATION FILE RESTORE
DOCUMENTATION Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication may be reproduced, transmitted, transcribed,
SQL Server Setup Guide for BusinessObjects Planning
SQL Server Setup Guide for BusinessObjects Planning BusinessObjects Planning XI Release 2 Copyright 2007 Business Objects. All rights reserved. Business Objects owns the following U.S. patents, which may
Installation Guide Revision 1.0.
Sage Intelligence Financial Reporting for Sage ERP X3 Installation Guide Revision 1.0. The software described in this document is protected by copyright, And may not be copied on any medium except as specifically
Eurobackup PRO Exchange Databases Backup Best Practices
P a g e 1 Eurobackup PRO Exchange Databases Backup Best Practices P a g e 2 Contents Introduction... 3 How to configure Exchange database backup with Eurobackup PRO... 4 Daily backup of Exchange databases...
CRM Setup Factory Installer V 3.0 Developers Guide
CRM Setup Factory Installer V 3.0 Developers Guide Who Should Read This Guide This guide is for ACCPAC CRM solution providers and developers. We assume that you have experience using: Microsoft Visual
DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS
DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication
FileMaker 11. ODBC and JDBC Guide
FileMaker 11 ODBC and JDBC Guide 2004 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later
for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later Copyright 2015, Lucid Innovations Limited. All Rights Reserved Lucid Research
How To Install Outlook Addin On A 32 Bit Computer
Deployment Guide - Outlook Add-In www.exclaimer.com Contents About This Guide... 3 System Requirements... 4 Software... 4 Installation Files... 5 Deployment Preparation... 6 Installing the Add-In Manually...
DOCUMENTATION FILE BACKUP
DOCUMENTATION Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication may be reproduced, transmitted, transcribed,
AVG 8.5 Anti-Virus Network Edition
AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective
Migrating helpdesk to a new server
Migrating helpdesk to a new server Table of Contents 1. Helpdesk Migration... 2 Configure Virtual Web on IIS 6 Windows 2003 Server:... 2 Role Services required on IIS 7 Windows 2008 / 2012 Server:... 2
SimbaEngine SDK 9.4. Build a C++ ODBC Driver for SQL-Based Data Sources in 5 Days. Last Revised: October 2014. Simba Technologies Inc.
Build a C++ ODBC Driver for SQL-Based Data Sources in 5 Days Last Revised: October 2014 Simba Technologies Inc. Copyright 2014 Simba Technologies Inc. All Rights Reserved. Information in this document
FileMaker 12. ODBC and JDBC Guide
FileMaker 12 ODBC and JDBC Guide 2004 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.
1 of 10 1/31/2014 4:08 PM
1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings
BackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
Qlik REST Connector Installation and User Guide
Qlik REST Connector Installation and User Guide Qlik REST Connector Version 1.0 Newton, Massachusetts, November 2015 Authored by QlikTech International AB Copyright QlikTech International AB 2015, All
Quick Reference Guide
Quick Reference Guide 2 This Guide shows screen pictures made with Windows XP. The appearance may vary under other Operating Systems. Why are PDF files popular? The Portable Document Format has become
DOCUMENTATION SYSTEM STATE BACKUP & RESTORE OPERATIONS
DOCUMENTATION SYSTEM STATE BACKUP & RESTORE OPERATIONS Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication may
BackupAssist v6 quickstart guide
Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...
Usage Analysis Tools in SharePoint Products and Technologies
Usage Analysis Tools in SharePoint Products and Technologies Date published: June 9, 2004 Summary: Usage analysis allows you to track how websites on your server are being used. The Internet Information
Using Blackboard ConnectTxt Outlook Add-in
Using Blackboard ConnectTxt Outlook Add-in This document is intended for those using: Outlook Add-in 1.1 Microsoft Outlook Versions 2003 (11), 2007 (12) and 2010 (14) Date: 24 th July 2012 Contents 1.
ACTi NVR Config Converter User s Manual. Version 1.0.0.17 2012/06/07
ACTi NVR Config Converter User s Manual Version 1.0.0.17 2012/06/07 Legal Notice Disclaimer The information contained in this document is intended for general information purposes. ACTi Corporation shall
USER MANUAL. v. 11.4.1 ---------------------- December 2015 ----------------------
USER MANUAL v. 11.4.1 ---------------------- December 2015 ---------------------- Contents At a Glance Miscellaneous 3 About EncryptDisc 14 Product info 4 About this manual 15 Copyright & trademark 15
29200 Northwestern Hwy Suite 350 Southfield, MI 48034. 1-866-4WINSPC winspc.com
29200 Northwestern Hwy Suite 350 Southfield, MI 48034 1-866-4WINSPC winspc.com 2016 DataNet Quality Systems. All rights reserved. WinSPC is a registered trademark of DataNet Quality Systems. Document Version:
Dynamic Web Programming BUILDING WEB APPLICATIONS USING ASP.NET, AJAX AND JAVASCRIPT
Dynamic Web Programming BUILDING WEB APPLICATIONS USING ASP.NET, AJAX AND JAVASCRIPT AGENDA 1. Introduction to Web Applications and ASP.net 1.1 History of Web Development 1.2 Basic ASP.net processing (ASP
SQL Server 2005 Reporting Services (SSRS)
SQL Server 2005 Reporting Services (SSRS) Author: Alex Payne and Brian Welcker Published: May 2005 Summary: SQL Server 2005 Reporting Services is a key component of SQL Server 2005. Reporting Services
PRODUCT GUIDE. N u c l e u s D a t a R e c o v e r y. C o m P riv a t e L i m i t e d
PRODUCT GUIDE Table of Contents 1. Introduction to Kernel SQL Password Recovery... 4 1.1 Using this Manual... 4 1.2 About Kernel SQL Password Recovery... 5 1.4 Who Should Use this Software?... 5 2. Getting
Using the Caché SQL Gateway
Using the Caché SQL Gateway Version 2007.1 04 June 2007 InterSystems Corporation 1 Memorial Drive Cambridge MA 02142 www.intersystems.com Using the Caché SQL Gateway Caché Version 2007.1 04 June 2007 Copyright
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency United States
Primo Online End User Help. Version 4.x
Version 4.x CONFIDENTIAL INFORMATION DISCLAIMER The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss. DO NOT COPY UNLESS YOU HAVE
Oracle Identity Manager
Oracle Identity Manager Connector Guide for Microsoft Active Directory Password Synchronization Release 9.1.1 E11218-15 November 2015 Oracle Identity Manager Connector Guide for Microsoft Active Directory
Auditing manual. Archive Manager. Publication Date: November, 2015
Archive Manager Publication Date: November, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software,
FileMaker 13. ODBC and JDBC Guide
FileMaker 13 ODBC and JDBC Guide 2004 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.
MS SQL Server Backup - User Guide
MS SQL Server Backup - User Guide TABLE OF CONTENTS Introduction... 1 Features... 1 System Requirements... 1 MS SQL Server Backup... 2 Accessing SQL Server Backup... 2 MS SQL Server Restore... 6 Accessing
Thank you for using AD Bulk Export 4!
Thank you for using AD Bulk Export 4! This document contains information to help you get the most out of AD Bulk Export, exporting from Active Directory is now quick and easy. Look here first for answers
EPM Performance Suite Profitability Administration & Security Guide
BusinessObjects XI R2 11.20 EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 Windows Patents Trademarks Copyright Third-party Contributors Business Objects
FileMaker 14. ODBC and JDBC Guide
FileMaker 14 ODBC and JDBC Guide 2004 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks of FileMaker,
Configuring Backup Settings. Copyright 2009, Oracle. All rights reserved.
Configuring Backup Settings Objectives After completing this lesson, you should be able to: Use Enterprise Manager to configure backup settings Enable control file autobackup Configure backup destinations
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
FmPro Migrator - FileMaker to SQL Server
FmPro Migrator - FileMaker to SQL Server FmPro Migrator - FileMaker to SQL Server 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.10 1.11 1.12 1.13 1.14 1.15 FmPro Migrator - FileMaker to SQL Server Migration
FireSIGHT User Agent Configuration Guide
Version 2.2 August 20, 2015 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
TIBCO BusinessConnect Trading Partner Administration. Software Release 6.0 November 2011
TIBCO BusinessConnect Trading Partner Administration Software Release 6.0 November 2011 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
ibolt V3.2 Release Notes
ibolt V3.2 Release Notes Welcome to ibolt V3.2, which has been designed to deliver an easy-touse, flexible, and cost-effective business integration solution. This document highlights the new and enhanced
Microsoft Dynamics TM NAV 5.00. Installation & System Management: Application Server for Microsoft Dynamics NAV
Microsoft Dynamics TM NAV 5.00 Installation & System Management: Application Server for Microsoft Dynamics NAV INSTALLATION & SYSTEM MANAGEMENT: APPLICATION SERVER FOR MICROSOFT DYNAMICS NAV Information
StreamServe Persuasion SP5 Control Center
StreamServe Persuasion SP5 Control Center User Guide Rev C StreamServe Persuasion SP5 Control Center User Guide Rev C OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other international patents
Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1
Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of
MSSQL quick start guide
C u s t o m e r S u p p o r t MSSQL quick start guide This guide will help you: Add a MS SQL database to your account. Find your database. Add additional users. Set your user permissions Upload your database
Integrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0
Integrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0 This document supports the version of each product listed and supports all subsequent versions until the document
DigiVault Online Backup Manager. Microsoft SQL Server Backup/Restore Guide
DigiVault Online Backup Manager Microsoft SQL Server Backup/Restore Guide Version 4.6.1.4 October 2005 DigiVault Backup Manager User Guide 2 Table of Contents 1 Backup/Restore Microsoft SQL Server 7.0
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
Xopero Backup Build your private cloud backup environment. Getting started
Xopero Backup Build your private cloud backup environment Getting started 07.05.2015 List of contents Introduction... 2 Get Management Center... 2 Setup Xopero to work... 3 Change the admin password...
Data Security and Governance with Enterprise Enabler
Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date
Connectivity Pack for Microsoft Guide
HP Vertica Analytic Database Software Version: 7.0.x Document Release Date: 2/20/2015 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements
Matisse Installation Guide for MS Windows
Matisse Installation Guide for MS Windows July 2013 Matisse Installation Guide for MS Windows Copyright 2013 Matisse Software Inc. All Rights Reserved. This manual and the software described in it are
Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4
Pcounter Web Report 3.x Installation Guide - v2014-11-30 Pcounter Web Report Installation Guide Version 3.4 Table of Contents Table of Contents... 2 Installation Overview... 3 Installation Prerequisites
Change Manager 5.0 Installation Guide
Change Manager 5.0 Installation Guide Copyright 1994-2008 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A. All rights reserved.
A SharePoint Developer Introduction. Hands-On Lab. Lab Manual HOL8 Using Silverlight with the Client Object Model C#
A SharePoint Developer Introduction Hands-On Lab Lab Manual HOL8 Using Silverlight with the Client Object Model C# Information in this document, including URL and other Internet Web site references, is
PC-Duo Web Console Installation Guide
PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks
Walkthrough: Creating and Using an ASP.NET Web Service in Visual Web Developer
http://msdn.microsoft.com/en-us/library/8wbhsy70.aspx Walkthrough: Creating and Using an ASP.NET Web Service in Visual Web Developer In addition to letting you create Web pages, Microsoft Visual Studio
User's Guide FairCom Performance Monitor
User's Guide FairCom Performance Monitor User's Guide FairCom Performance Monitor Contents 1. c-treeace Performance Monitor... 4 2. Startup... 5 3. Using Main Window... 6 4. Menus... 8 5. Icon Row... 11
Getting Started with the Ed-Fi ODS and Ed-Fi ODS API
Getting Started with the Ed-Fi ODS and Ed-Fi ODS API Ed-Fi ODS and Ed-Fi ODS API Version 2.0 - Technical Preview October 2014 2014 Ed-Fi Alliance, LLC. All rights reserved. Ed-Fi is a registered trademark
Getting Started with ESXi Embedded
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
User Guide for Creating a WhatsUp Event Logs Database on Microsoft SQL Server for Log Management v10.x
User Guide for Creating a WhatsUp Event Logs Database on Microsoft SQL Server for Log Management v10.x Contents Creating a WhatsUp Event Logs Database on Microsoft SQL Server Please read the following
Contents. 2. cttctx Performance Test Utility... 8. 3. Server Side Plug-In... 9. 4. Index... 11. www.faircom.com All Rights Reserved.
c-treeace Load Test c-treeace Load Test Contents 1. Performance Test Description... 1 1.1 Login Info... 2 1.2 Create Tables... 3 1.3 Run Test... 4 1.4 Last Run Threads... 5 1.5 Total Results History...
Web Service for SKF @ptitude Observer. Installation Manual. Part No. 32179700 Revision A
Web Service for SKF @ptitude Observer Part No. 32179700 Revision A Copyright 2009 by SKF Reliability Systems All rights reserved. Aurorum 30, 977 75 Luleå Sweden Telephone: +46 (0) 920 758 00, Fax: +46
Remote Filtering Software
Remote Filtering Software Websense Web Security Solutions v7.7-7.8 1996 2013, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2013 The products and/or
Database Communica/on in Visual Studio/C# using Web Services. Hans- Pe=er Halvorsen, M.Sc.
Database Communica/on in Visual Studio/C# using Web Services Hans- Pe=er Halvorsen, M.Sc. Background We will use Web Services because we assume that the the App should be used on Internet outside the Firewall).
Logi Ad Hoc Management Console Usage Guide
Logi Ad Hoc Management Console Usage Guide Version 11.2 Last Updated: March 2014 Page 2 Table of Contents Introduction... 5 Document Overview... 5 Target Audience... 7 System Requirements... 8 Components...
AVALANCHE MC 5.3 AND DATABASE MANAGEMENT SYSTEMS
AVALANCHE MC 5.3 AND DATABASE MANAGEMENT SYSTEMS Avalanche Mobility Center (MC) offers support for other database management systems (DBMS) as alternatives to the built-in PostgreSQL DBMS. This was prompted
How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (
GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
AuditWizard v8. SQL Maintenance
AuditWizard v8 This document describes a few operations we recommend to improve or maintain the performance of AuditWizard v8 and the back end SQL server. These steps should allow for optimal upload, application
How To Backup A Database In Navision
Making Database Backups in Microsoft Business Solutions Navision MAKING DATABASE BACKUPS IN MICROSOFT BUSINESS SOLUTIONS NAVISION DISCLAIMER This material is for informational purposes only. Microsoft
Microsoft Dynamics GP 2013. econnect Installation and Administration Guide
Microsoft Dynamics GP 2013 econnect Installation and Administration Guide Copyright Copyright 2012 Microsoft Corporation. All rights reserved. Limitation of liability This document is provided as-is. Information
PAINLESS MULTI-DBMS STRATEGY For Magic Developers
PAINLESS MULTI-DBMS STRATEGY For Magic Developers Contents Mertech s ISAM to SQL Database Connectivity Drivers for Btrieve BTR2SQL Support for Magic Getting Started! Contact Information This document is
Secure Agent Quick Start for Windows
Secure Agent Quick Start for Windows 1993-2015 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)
Mobility Services Platform 3.1 Software Installation Guide
Mobility Services Platform 3.1 Software Installation Guide Mobility Services Platform 3.1 Software Installation Guide 72E-100159-03 Revision A September 2007 2007 by Motorola, Inc. All rights reserved.
1 Review Information About this Guide
Oracle Database Client Quick Installation Guide 11g Release 2 (11.2) for Microsoft Windows x64 (64-Bit) E49700-03 December 2014 This guide describes how to quickly install the Oracle Database Client product
How To Restore An Org Server With Anor Backup For Windows 7.5.2 (Oracle)
Oracle Server Backup User Guide TABLE OF CONTENTS Introduction... 2 Oracle Server Backup... 3 Features... 3 Requirements for Oracle server backup... 3 How to enable ARCHIVELOG Mode... 3 System Requirements...
Choosing a Development Tool
Microsoft Dynamics GP 2013 R2 Choosing a Development Tool White Paper This paper provides guidance when choosing which development tool to use to create an integration for Microsoft Dynamics GP. Date:
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
4cast Server Specification and Installation
4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system
How To Develop A Mobile Application On Sybase Unwired Platform
Tutorial: Windows Mobile Application Development Sybase Unwired Platform 2.1 DOCUMENT ID: DC01285-01-0210-01 LAST REVISED: December 2011 Copyright 2011 by Sybase, Inc. All rights reserved. This publication
Vyapin Office 365 Management Suite
Vyapin Office 365 Management Suite Last Updated: May 2015 Copyright 2015 Vyapin Software Systems Private Limited. All rights reserved. This document is being furnished by Vyapin Software Systems Private
DOCUMENTATION SHADOWPROTECT - MICROSOFT WINDOWS SYSTEM BACKUP AND RESTORE OPERATIONS
DOCUMENTATION SHADOWPROTECT - MICROSOFT WINDOWS SYSTEM BACKUP AND RESTORE OPERATIONS Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited.
Mimer SQL. Getting Started on Windows. Version 10.1
Mimer SQL Getting Started on Windows Version 10.1 Mimer SQL, Getting Started on Windows, Version 10.1, May 2015 Copyright Mimer Information Technology AB. The contents of this manual may be printed in
How to Prepare for the Upgrade to Microsoft Dynamics CRM 2013 (On-premises)
How to Prepare for the Upgrade to Microsoft Dynamics CRM 2013 (On-premises) COMPANY: Microsoft Corporation RELEASED: September 2013 VERSION: 1.0 Copyright This document is provided "as-is". Information
Omgeo OASYS Workstation Installation Guide. Version 6.4 December 13, 2011
Omgeo OASYS Workstation Installation Guide Version 6.4 December 13, 2011 Copyright 2011 Omgeo LLC. All rights reserved. This publication (including, without limitation, any text, image, logo, compilation,
Windows Server Update Services 3.0 SP2 Step By Step Guide
Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server
Abila MIP. Installation User's Guide
This is a publication of Abila, Inc. Version 2014.x Copyright 2013 Abila, Inc. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are registered trademarks
The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.
Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...
