Polymorphic Shellcodes vs. Application IDSs
|
|
- Jocelin Lindsey
- 8 years ago
- Views:
Transcription
1 Plymrphic Shellcdes vs. Applicatin IDSs 1. Intrductin. 2. Shellcde types and recgnitin techniques. 3. Intrusin Detectin Systems. 4. NGSecureWeb. 5. References. 6. Credits. Page 1 f 6
2 1. Intrductin. This dcument fcuses n hw IDS, under certain circumstances, can detect Plymrphic shellcdes. We will g thrugh the three main parts f a plymrphic shellcde and analyze IDS cmmn prblems t detect them. 2. Shellcde types and recgnitin techniques. We will discuss shellcdes referring t IA32 platfrms. Please nte that all these techniques can be implemented n ther platfrms such as SPARC, HPPA, MIPS, etc. Befre plymrphic appeared, regular shellcdes had tw well-defined sectins: NOP sectin: This is the sectin where the prgram will jump when a cmmn buffer verflw is successfully explited. It is just a huge amunt f NOP instructins. Shellcde paylad: This is the sectin where gets executed /bin/sh, binds a shell t a TCP prt, etc. These shellcdes are very easy t detect. On the past years it was very cmmn t use 0x90 instructins (np) n IA32 platfrms in the NOP sectin. S IDS just searched fr an X amunt f 0x90s and triggered a shellcde alarm. Als, sme IDS have signatures (such as /bin/sh) t detect the shellcde paylad. When plymrphic shellcdes appeared these techniques became bslete. Plymrphic shellcdes have three well-defined sectins: NOP sectin: This sectin nw is a randm mix f n-effect instructins such as inc %eax, inc %ebx, pp %eax, np, dec %eax, Decrypter engine: This sectin cntains an engine t decrypt the shellcde paylad. This engine is nt the same frm ne shellcde t anther, it varies randmly using sme virii plymrphic techniques. The cipher used nrmally is a xr mechanism r a duble xr mechanism, it culd be implemented a better ciphering mechanism such as RJINDAEL, but shellcde wuld grw in sme thusands f bytes and wuld nt be useful anymre in many buffer verflw explitatins. Encrypted shellcde paylad: This sectin has the riginal shellcde encrypted. Page 2 f 6
3 This kind f shellcde is harder, thugh nt impssible t detect. There has been sme discussin n hw t detect such shellcdes: Shellcde paylad decrypt and detectin with ld shellcde paylad signatures: This technique, used by antivirus t detect viral cde, can be an apprached t detect these shellcdes. But it has sme pen issues: Hw d yu detect it is an encrypted shellcde paylad? Which cipher mechanism uses? Which key(s) are used in the cipher mechanism? Can it be brute-frced in lw time? Signatures t detect the decrypter engine: This technique culd be a better apprach, but has sme prblems t: Since decrypter engine mutates and t many instructins are invlved, IDS wuld have t check t many signatures (mask). Lts f false psitives. T many CPU cycles and time needed. Decrypter engine emulatin: IDS is emulating the cde s if it finds cde that seems t decrypt smething in memry it raises a shellcde alarm. This technique raises lw number f false psitives but has a strng weakness: T many CPU cycles and time needed. NOPS sectin detectin: INMHO this is the best technique, it just tries t detect a NOP_NUMBER number f n-effect instructins. It has sme issues such as many false psitive, but if yu set NOP_NUMBER t a range between 50-60, recgnizes almst every shellcde. Weaknesses: Lts f CPU cycles. False psitive when NOP_NUMBER is lw. Since sme nn-effect instructins have ascii representatin, sme character strings such as AAAAA 60times A, wuld be recgnized as shellcdes. Page 3 f 6
4 It is very imprtant t set NOP_NUMBER t a reasnable value in rder t avid t many false psitives. Thrughut NGSEC s benchmark test we fund that a number ranging was a gd value t detect shellcdes withut t many false psitives. Yu can grab a free simple Netwrk IDS that implements this technique at: 3. Intrusin Detectin Systems: There are mainly three types f Intrusin Detectin Systems: Netwrk IDS: This type f IDS grabs datagrams frm a netwrk interface and lks fr attack patterns in them (such as prt scanning, cgi explitatin, etc). Hst IDS: This type f IDS lks fr patterns in lcal user actins; e.g. if a user is trying t view such file as /rt/.rhsts, this actin culd clearly be identified as an attack pattern. Applicatin IDS: This type f IDS has recently appeared. It just lks fr attack patterns t all the input data that cmes t the applicatin. Implementing the NOPS sectin detectin n these types f IDS has, as usual, pen issues: Netwrk IDS: Since it has t grab as many datagrams as it can, it can t waste t much time lking at every packet, because it culd drp t many datagrams while lking fr NOPS. This wuld cause a big decrease n IDS perfrmance. Hst IDS: This technique can be implemented with these type f IDS s, but there are better ways f buffer verflw explitatin detectin, since yu can watch the flw f the prgram and see when return pinter is changed. Applicatin IDS: This is the best kind f IDS t implement this technique. Since all input data is checked, n drp f data is pssible, and nrmally nt many data is checked (lw CPU and time t check) yu can recgnize almst all plymrphic shellcdes at input data. Yu have t set the NOP_NUMBER t a value that fits better with yur prtcl, and nrmal data input. Page 4 f 6
5 4. NGSecureWeb : The NOP detectin technique was successfully implemented in NGSecureWeb : An Applicatin IDS and firewall fr Web Servers. NGSecureWeb is the result f the fusin f tw security technlgies: Firewalls and IDSs. NGSW filters all traffic frm client t the web-server, lking fr well-knwn attacks t web-servers and t its third party applicatins. When NGSW detects a pssible attack (acts as an Applicatin IDS), it will refuse t frward it t the web server (acts as an Applicatin Firewall). NGSW will prtect yur system frm bth knwn and unknwn vulnerabilities, since its IDS engine lks fr patterns f well-knwn attacks. Future security flaws in this web-server and its applicatins will nt be explitable. Currently NGSW IDS engine checks fr the fllwing patterns: Directry traversal attacks: During the past few years many CGI applicatins have suffered this kind f vulnerabilities, especially the nes invlved in file managing. NGSW Firewall engine will prtect bth fr knwn and unknwn vulnerabilities. Frbidden Wrds: NGSW will search the entire request fr frbidden wrds (defined by the Administratr). Fr example, it isn t cmmn t find the wrd "/bin/sh" in an HTTP request. NGSW IDS engine detects these wrds and NGSW Firewall engine blcks the request t the web-server. Shellcde: NGSW IDS engine uses the newest techniques in shellcde recgnitin (even plymrphic nes). Lng Headers (buffer verflws): NGSW IDS engine will check the length f all HTTP headers lking fr unusual values. Lng GET (buffer verflws): NGSW IDS engine will check the length f the GET arguments lking fr unusual high values. These high values culd be due f buffer verflw explitatin. Lng POST (buffer verflws): NGSW IDS engine will check the length f the URL arguments lking fr unusual high values. These high values culd be due f buffer verflw explitatin. Lng URL (buffer verflws): NGSW IDS engine will check the length f the URL lking fr unusual high values. These high values culd be due f buffer verflw explitatin. Current versin is Please direct any enquiries t ngsw@ngsec.cm Page 5 f 6
6 5. References: [1] NGSecureWeb at [2] ADM mutate at [3] Fcus-IDS at 6. Credits: This dcument was brught t yu by: Fermín J. Serna < fjserna@ngsec.cm > Chief Technlgy Officer Next Generatin Security Technlgies NGSEC Research Team < labs@ngsec.cm > Page 6 f 6
Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008
Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,
More informationExercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008
Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,
More informationAccess EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3
EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.
More informationCSE 231 Fall 2015 Computer Project #4
CSE 231 Fall 2015 Cmputer Prject #4 Assignment Overview This assignment fcuses n the design, implementatin and testing f a Pythn prgram that uses character strings fr data decmpressin. It is wrth 45 pints
More informationLicensing Windows Server 2012 R2 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents
More informationConfiguring BMC AREA LDAP Using AD domain credentials for the BMC Windows User Tool
Cnfiguring BMC AREA LDAP Using AD dmain credentials fr the BMC Windws User Tl Versin 1.0 Cnfiguring the BMC AREA LDAP Plugin fr Dmain Username and Passwrds Intrductin...3 LDAP Basics...4 What is LDAP and
More informationTraffic monitoring on ProCurve switches with sflow and InMon Traffic Sentinel
An HP PrCurve Netwrking Applicatin Nte Traffic mnitring n PrCurve switches with sflw and InMn Traffic Sentinel Cntents 1. Intrductin... 3 2. Prerequisites... 3 3. Netwrk diagram... 3 4. sflw cnfiguratin
More informationSBClient and Microsoft Windows Terminal Server (Including Citrix Server)
SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance
More informationTRAINING GUIDE. Crystal Reports for Work
TRAINING GUIDE Crystal Reprts fr Wrk Crystal Reprts fr Wrk Orders This guide ges ver particular steps and challenges in created reprts fr wrk rders. Mst f the fllwing items can be issues fund in creating
More informationMETU. Computer Engineering
METU Cmputer Engineering CENG 491 Cmputer Engineering Design I AKAMAI SYSTEMS Members f the Team: Ahmet Emin Tsun e141801@metu.edu.tr Uğur Can Tekin e134800@metu.edu.tr Hasan İşler e134758@metu.edu.tr
More informationWHITE PAPER. Vendor Managed Inventory (VMI) is Not Just for A Items
WHITE PAPER Vendr Managed Inventry (VMI) is Nt Just fr A Items Why it s Critical fr Plumbing Manufacturers t als Manage Whlesalers B & C Items Executive Summary Prven Results fr VMI-managed SKUs*: Stck-uts
More informationCallRex 4.2 Installation Guide
CallRex 4.2 Installatin Guide This dcument describes hw t install CallRex 4.2. It cvers the fllwing: CallRex 4.2 Cmpnents. Server Prerequisites. Perfrming the Installatin. Changing the Accunt Used by CallRex
More informationLicensing Windows Server 2012 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This
More informationFirewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers)
Firewall/Prxy Server Settings t Access Hsted Envirnment Client firewall settings in mst cases depend n whether the firewall slutin uses a Stateful Inspectin prcess r ne that is cmmnly referred t as an
More informationIntegrating With incontact dbprovider & Screen Pops
Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint
More informationViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation
ViPNet VPN in Cisc Envirnment Supplement t ViPNet Dcumentatin 1991 2015 Inftecs Americas. All rights reserved. Versin: 00121-04 90 02 ENU This dcument is included in the sftware distributin kit and is
More informationWelcome to Remote Access Services (RAS)
Welcme t Remte Access Services (RAS) Our gal is t prvide yu with seamless access t the TD netwrk, including the TD intranet site, yur applicatins and files, and ther imprtant wrk resurces -- whether yu
More informationTypical Interview Questions and Answers
Typical Interview Questins and Answers Why d yu want t wrk fr this cmpany? Why are yu interested in this jb? The interviewer is trying t determine what yu knw and like abut the cmpany, whether yu will
More informationSegment-oriented Recovery
Advanced Tpics in Operating Systems, CS262a Prf. Eric A. Brewer (with help frm Rusty Sears) Segment-riented Recvery ARIES wrks great but is 20+ years ld and has sme prblems: viewed as very cmplex n available
More informationServ-U Distributed Architecture Guide
Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U
More information5.2.1 Passwords. Information Technology Policy. Policy. Purpose. Policy Statement. Applicability of this Policy
Infrmatin Technlgy Plicy 5.2.1 Passwrds Plicy Area: 5.2 Security Title: 5.2.1 Passwrds Issued by: Assistant Vice-President/CIO, ITS Date Issued: 2006 July 24 Last Revisin Date: 2011 Octber 19 Apprved by:
More informationFrequently Asked Questions November 19, 2013. 1. Which browsers are compatible with the Global Patent Search Network (GPSN)?
Frequently Asked Questins Nvember 19, 2013 General infrmatin 1. Which brwsers are cmpatible with the Glbal Patent Search Netwrk (GPSN)? Ggle Chrme (v23.x) and IE 8.0. 2. The versin number and dcument cunt
More informationApplication Note: 202
Applicatin Nte: 202 MDK-ARM Cmpiler Optimizatins Getting the Best Optimized Cde fr yur Embedded Applicatin Abstract This dcument examines the ARM Cmpilatin Tls, as used inside the Keil MDK-ARM (Micrcntrller
More informationDeployment Overview (Installation):
Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int
More informationService Desk Self Service Overview
Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service
More informationo 1.1 - How AD Query Works o 1.2 - Installation Requirements o 2.1 - Inserting your License Key o 2.2 - Selecting and Changing your Search Domain
SysOp Tls Active Directry Management sftware Active Directry Query v1.x Sftware Installatin and User Guide Updated September 29, 2008 In This Dcument: 1.0 Intrductin 1.1 - Hw AD Query Wrks 1.2 - Installatin
More informationConsiderations for Success in Workflow Automation. Automating Workflows with KwikTag by ImageTag
Autmating Wrkflws with KwikTag by ImageTag Cnsideratins fr Success in Wrkflw Autmatin KwikTag balances cmprehensive, feature-rich Transactinal Cntent Management with affrdability, fast implementatin, ease
More informationRetirement Planning Options Annuities
Retirement Planning Optins Annuities Everyne wants a glden retirement. But saving fr retirement is n easy task. The baby bmer generatin is graying. Mre and mre peple are appraching retirement age. With
More informationROSS RepliWeb Operations Suite for SharePoint. SSL User Guide
ROSS RepliWeb Operatins Suite fr SharePint SSL User Guide Sftware Versin 2.5 March 18, 2010 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm,
More informationA Beginner s Guide to Building Virtual Web Servers
A Beginner s Guide t Building Virtual Web Servers Cntents Intrductin... 1 Why set up a web server?... 2 Installing Ubuntu 13.04... 2 Netwrk Set Up... 3 Installing Guest Additins... 4 Updating and Upgrading
More informationefusion Table of Contents
efusin Cst Centers, Partner Funding, VAT/GST and ERP Link Table f Cntents Cst Centers... 2 Admin Setup... 2 Cst Center Step in Create Prgram... 2 Allcatin Types... 3 Assciate Payments with Cst Centers...
More informationDiagnosis and Troubleshooting
Diagnsis and Trubleshting DataDirect Cnnect Series ODBC Drivers Intrductin This paper discusses the diagnstic tls that are available t cnfigure and trublesht yur ODBC envirnment and prvides a trubleshting
More informationLive Analytics for Kaltura Live Streaming Information Guide. Version: Jupiter
Live Analytics fr Kaltura Live Streaming Infrmatin Guide Versin: Jupiter Kaltura Business Headquarters 250 Park Avenue Suth, 10th Flr, New Yrk, NY 10003 Tel.: +1 800 871 5224 Cpyright 2015 Kaltura Inc.
More informationThe actions discussed below in this Appendix assume that the firm has already taken three foundation steps:
MAKING YOUR MARK 6.1 Gd Practice This sectin presents an example f gd practice fr firms executing plans t enter the resurces sectr supply chain fr the first time, r fr thse firms already in the supply
More informationAccident Investigation
Accident Investigatin APPLICABLE STANDARD: 1960.29 EMPLOYEES AFFECTED: All emplyees WHAT IS IT? Accident investigatin is the prcess f determining the rt causes f accidents, n-the-jb injuries, prperty damage,
More informationFINRA Regulation Filing Application Batch Submissions
FINRA Regulatin Filing Applicatin Batch Submissins Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 FTP Access t FINRA... 2 FTP Accunt n FINRA s
More informationABELMed Platform Setup Conventions
ABELMed Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELMed licensees and their hardware vendrs with the infrmatin that they will require
More informationImplementing ifolder Server in the DMZ with ifolder Data inside the Firewall
Implementing iflder Server in the DMZ with iflder Data inside the Firewall Nvell Cl Slutins AppNte www.nvell.cm/clslutins JULY 2004 OBJECTIVES The bjectives f this dcumentatin are as fllws: T cnfigure
More informationUsing Sentry-go Enterprise/ASPX for Sentry-go Quick & Plus! monitors
Using Sentry-g Enterprise/ASPX fr Sentry-g Quick & Plus! mnitrs 3Ds (UK) Limited, February, 2014 http://www.sentry-g.cm Be Practive, Nt Reactive! Intrductin Sentry-g Enterprise Reprting is a self-cntained
More informationAttunity RepliWeb SSL Guide
Attunity RepliWeb SSL Guide Sftware Versin 5.2 June 25, 2012 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm, Supprt: http://supprt.repliweb.cm
More informationGETTING STARTED With the Control Panel Table of Contents
With the Cntrl Panel Table f Cntents Cntrl Panel Desktp... 2 Left Menu... 3 Infrmatin... 3 Plan Change... 3 Dmains... 3 Statistics... 4 Ttal Traffic... 4 Disk Quta... 4 Quick Access Desktp... 4 MAIN...
More informationDerivative Markets and Instruments
1 Mdule # 6 Cmpnent # 1 This Cmpnent: fcuses n the basics f as part f ur examinatin f Derivatives. assumes a base level f financial thery, but attempts t add a level f practical applicatin. We attempt
More informationX7500 Series, X4500 Scanner Series MFPs: LDAP Address Book and Authentication Configuration and Basic Troubleshooting Tips
X7500 Series, X4500 Scanner Series MFPs: LDAP Address Bk and Authenticatin Cnfiguratin and Basic Trubleshting Tips Lexmark Internatinal 1 Prerequisite Infrm atin In rder t cnfigure a Lexmark MFP fr LDAP
More informationConfiguring SSL and TLS Decryption in ngeniusone
Cnfiguring SSL and TLS Decryptin in ngeniusone The cnfigure SSL Decryptin feature supprts real-time capture f ASI and ASR traffic flws as well as decding f Secure Scket Link (SSL) and Transprt Layer Security
More informationHelpdesk Support Tickets & Knowledgebase
Helpdesk Supprt Tickets & Knwledgebase User Guide Versin 1.0 Website: http://www.mag-extensin.cm Supprt: http://www.mag-extensin.cm/supprt Please read this user guide carefully, it will help yu eliminate
More information(in)rl Webcast - Hardware & Technology Checklist
(in)rl Webcast - Hardware & Technlgy Checklist Checklist fr Meetup Hsts 1. Passwrd t lgin t the webcast- we ll email this t yu the week f the event 2. The link fr viewing the webcast - we ll email this
More information1.3. The Mean Temperature Difference
1.3. The Mean Temperature Difference 1.3.1. The Lgarithmic Mean Temperature Difference 1. Basic Assumptins. In the previus sectin, we bserved that the design equatin culd be slved much easier if we culd
More informationTen Steps for an Easy Install of the eg Enterprise Suite
Ten Steps fr an Easy Install f the eg Enterprise Suite (Acquire, Evaluate, and be mre Efficient!) Step 1: Dwnlad the eg Sftware; verify hardware and perating system pre-requisites Step 2: Obtain a valid
More informationesupport Quick Start Guide
esupprt Quick Start Guide Last Updated: 5/11/10 Adirndack Slutins, Inc. Helping Yu Reach Yur Peak 908.725.8869 www.adirndackslutins.cm 1 Table f Cntents PURPOSE & INTRODUCTION... 3 HOW TO LOGIN... 3 SUBMITTING
More informationThe AppSec How-To: Choosing a SAST Tool
The AppSec Hw-T: Chsing a SAST Tl Surce Cde Analysis Made Easy GIVEN THE WIDE RANGE OF SOURCE CODE ANALYSIS TOOLS, SECURITY PROFESSIONALS, AUDITORS AND DEVELOPERS ALIKE ARE FACED WITH THE QUESTION: Hw
More informationATL: Atlas Transformation Language. ATL Installation Guide
ATL: Atlas Transfrmatin Language ATL Installatin Guide - versin 0.1 - Nvember 2005 by ATLAS grup LINA & INRIA Nantes Cntent 1 Intrductin... 3 2 Installing ADT frm binaries... 3 2.1 Installing Eclipse and
More informationBest Practice - Pentaho BA for High Availability
Best Practice - Pentah BA fr High Availability This page intentinally left blank. Cntents Overview... 1 Pentah Server High Availability Intrductin... 2 Prerequisites... 3 Pint Each Server t Same Database
More information:: EMAIL ADMIN HELP AT A GLANCE Contents
:: EMAIL ADMIN HELP AT A GLANCE Cntents Email Admin Dmain Inf... 2 POP Accunts... 3 Edit POP Accunts... 4 Search Accunts... 5 Frwards... 6 Spam Cntrl... 7 CatchAll... 8 EMAIL ADMIN HELP AT A GLANCE ::
More informationEmulated Single-Sign-On in LISTSERV Rev: 15 Jan 2010
Emulated Single-Sign-On in LISTSERV Rev: 15 Jan 2010 0. Nte that frm LISTSERV versin 15.5, LISTSERV supprts using an external LDAP directry (r Windws Active Directry) fr lgin authenticatin in additin t
More informationLISTSERV ADMINISTRATION Department of Client Services Information Technology Systems Division
LISTSERV ADMINISTRATION Department f Client Services Infrmatin Technlgy Systems Divisin E-MAIL LIST INSTRUCTIONS Yur List s Admin Webpage...2 Fr assistance cntact the Technlgy Assistance Center: 962-4357
More informationLab 12A Configuring Single Sign On Service
Lab 12A Cnfiguring Single Sign On Service Intrductin In this lab exercise we will see hw t cnfigure the Single Sign On Service and cnfigure Individual and Grup Enterprise Applicatin Definitins. The lab
More informationEmail Setup PPD IT How-to Guides June 2010
Email Setup Cntents Email Infrmatin... 2 IMAP and POP3 settings... 2 Cnfiguring Micrsft Outlk 2007... 2 Archiving mail... 3 Cnfiguring AutArchive in Micrsft Outlk 2007... 3 Access frm ff site... 4 Cnfiguring
More informationFirewall Protection Profile
samhällsskydd ch beredskap 1 (10) ROS-ISÄK Rnny Janse 010-2404426 rnny.janse@msb.se Firewall Prtectin Prfile Extended Package: NAT samhällsskydd ch beredskap 2 (10) Innehållsförteckning 1. Intrductin...
More informationHow To Set Up A General Ledger In Korea
MODULE 6: RECEIVABLES AND PAYABLES MANAGEMENT: PAYMENT DISCOUNT AND PAYMENT TOLERANCE Mdule Overview Granting payment discunts prvides an incentive fr custmers t quickly pay their utstanding amunts in
More informationHow do I evaluate the quality of my wireless connection?
Hw d I evaluate the quality f my wireless cnnectin? Enterprise Cmputing & Service Management A number f factrs can affect the quality f wireless cnnectins at UCB. These include signal strength, pssible
More informationDisk Redundancy (RAID)
A Primer fr Business Dvana s Primers fr Business series are a set f shrt papers r guides intended fr business decisin makers, wh feel they are being bmbarded with terms and want t understand a cmplex tpic.
More informationWelcome to Microsoft Access Basics Tutorial
Welcme t Micrsft Access Basics Tutrial After studying this tutrial yu will learn what Micrsft Access is and why yu might use it, sme imprtant Access terminlgy, and hw t create and manage tables within
More informationLeadStreet Broker Guide
RE/MAX f Western Canada LeadStreet Brker Guide Ver. 2.0 Revisin Histry Name Date Versin Descriptin Tamika Anglin 09/04/13 1.0 Initial Creatin Tamika Anglin 11/05/13 2.0 Inclusin f instructins n reprting
More informationHOWTO: How to configure SSL VPN tunnel gateway (office) to gateway
HOWTO: Hw t cnfigure SSL VPN tunnel gateway (ffice) t gateway Hw-t guides fr cnfiguring VPNs with GateDefender Integra Panda Security wants t ensure yu get the mst ut f GateDefender Integra. Fr this reasn,
More informationLogMeIn Rescue Web SSO via SAML 2.0 Configuration Guide
LgMeIn Rescue Web SSO via SAML 2.0 LgMeIn Rescue Web SSO via SAML 2.0 Cnfiguratin Guide 02-19-2014 Cpyright 2015 LgMeIn, Inc. 1 LgMeIn Rescue Web SSO via SAML 2.0 Cntents 1 Intrductin... 3 1.1 Dcument
More informationUsing PayPal Website Payments Pro UK with ProductCart
Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...
More informationTrends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003
Trends and Cnsideratins in Currency Recycle Devices Nvember 2003 This white paper prvides basic backgrund n currency recycle devices as cmpared t the cmbined features f a currency acceptr device and a
More informationFor students to participate in BYOD please follow these two steps
www.readingtn.k12.nj.us September 15, 2015 Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many
More informationGroup 3 Flip Chart Notes
MDH-DLI Sympsium -- Meeting Mandates, Making the Cnnectin: Wrkers Cmpensatin Electrnic Health Care Transactins -- Nvember 5, 2014 Grup 3 Flip Chart Ntes Meeting Mandates, Making the Cnnectin: Wrkers Cmpensatin
More informationKIK s GUIDE FOR LAW ENFORCEMENT
Thanks fr checking ut ur law enfrcement guide. Kik takes the safety f ur users very seriusly, and we hpe this guide will be a useful tl fr yu. It includes infrmatin abut ur app; the features and functins
More informationPreparing to Deploy Reflection : A Guide for System Administrators. Version 14.1
Preparing t Deply Reflectin : A Guide fr System Administratrs Versin 14.1 Table f Cntents Table f Cntents... 2 Preparing t Deply Reflectin 14.1:... 3 A Guide fr System Administratrs... 3 Overview f the
More informationChapter - 3. Cable Connections
Chapter - 3 Cable Cnnectins One bradband alternative is thrugh cable TV, where yur Internet cnnectin is delivered t yur hme thrugh yur televisin cable. Many cable prviders wn't qute yu an exact speed,
More informationSoftware Distribution
Sftware Distributin Quantrax has autmated many f the prcesses invlved in distributing new cde t clients. This will greatly reduce the time taken t get fixes laded nt clients systems. The new prcedures
More informationPBX Remote Line Extension using Mediatrix 4104 and 1204 June 22, 2011
PBX Remte Line Extensin using Mediatrix 4104 and 1204 June 22, 2011 Prprietary 2011 Media5 Crpratin Table f Cntents Intrductin... 3 Applicatin Scenari... 3 Running the Unit Manager Netwrk Sftware... 4
More informationHIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
More informationLicensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite
Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in This
More informationFAQ Frequently Asked Questions & Answers for using the online assessment platform of ΜanpowerGroup
FAQ Frequently Asked Questins & Answers fr using the nline assessment platfrm f ΜanpwerGrup Versin 1.0 Athens, July 2014 1 Frequently Asked Questins & Answers regarding the use f the nline assessment platfrm
More informationServ-U Distributed Architecture Guide
Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v15.1.2.0 Page 1 f 20 Intrductin Serv-U
More informationProtecting Point of Sale Devices from Targeted Attacks
Prtecting Pint f Sale Devices frm Targeted Attacks 1-Apr-14 Versin 1.0 Final Prepared by Sean Finnegan, Cybersecurity Directr Michael Hward, Principal Cybersecurity Architect MICROSOFT MAKES NO WARRANTIES,
More informationNew York University Computer Science Department Courant Institute of Mathematical Sciences
New Yrk University Cmputer Science Department Curant Institute f Mathematical Sciences Curse Title: Data Cmmunicatin & Netwrks Curse Number:CSCI-GA.2662-00 Instructr: Jean-Claude Franchitti Sessin: 2 Assignment
More informationCustomers FAQs for Webroot SecureAnywhere Identity Shield
Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt
More informationFAQs for Webroot SecureAnywhere Identity Shield
FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt
More informationRECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au
RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS Best practices IT security refers t the bdy f techniques and best practices t prtect yur cmputers and yur interests in the use f IT services, such as nline
More informationCMT for Coexistence 3.4.3. Release Notes
CMT fr Cexistence 3.4.3 Release Ntes May 2015 Table f Cntents What s New in Versin 3.4.3... 3 Release Ntes 3.4.3... 3 On the Fly Decryptin and Encryptin... 4 Prerequisites & Settings... 4 Hw it Wrks...
More informationRemote Desktop Tutorial. By: Virginia Ginny Morris
Remte Desktp Tutrial By: Virginia Ginny Mrris 2008 Remte Desktp Tutrial Virginia Ginny Mrris Page 2 Scpe: The fllwing manual shuld accmpany my Remte Desktp Tutrial vide psted n my website http://www.ginnymrris.cm
More informationCollege Counseling Policies
Chapter 3 Cllege Cunseling Plicies T he cllege search prcess can be an exciting and rewarding ne, but it can als be cnfusing, and there is much pprtunity fr miscmmunicatin. Please read thrugh the fllwing
More informationInformation & Communications Technology ICT Security Compliance Guide (Student)
Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0
More informationUnderstand Business Continuity
Understand Business Cntinuity Lessn Overview In this lessn, yu will learn abut: Business cntinuity Data redundancy Data availability Disaster recvery Anticipatry Set What methds can be emplyed by a system
More informationA Guide for Writing Reflections
A Guide fr Writing Reflectins Writing Thelgical Reflectins What is thelgical reflectin? The purpse f Thelgical Reflectin (TR) is t identify and analyze a significant event and prcess the even frm a biblical
More informationIssue Brief. SBC Distribution Rules for Employer Sponsored Health Plans October 2012. Summary. Which Plans Are Required to Provide the SBC?
Issue Brief SBC Distributin Rules fr Emplyer Spnsred Health Plans Octber 2012 Summary The Affrdable Care Act (ACA) expands ERISA's disclsure requirements by requiring that a summary f benefits and cverage
More informationWhat is a dashboard and why do I want one?
What is a dashbard and why d I want ne? QIQ Slutins Pty Ltd Suite G11, Bay 9, Lcmtive Wrkshp Australian Technlgy Park, Crnwallis Street Eveleigh NSW 1430 Australia Phne: +61 2 9209 4298 Fax: +61 2 9209
More informationiphone Mobile Application Guide Version 2.2.2
iphne Mbile Applicatin Guide Versin 2.2.2 March 26, 2014 Fr the latest update, please visit ur website: www.frte.net/mbile Frte Payment Systems, Inc. 500 West Bethany, Suite 200 Allen, Texas 75013 (800)
More informationRelease Notes. Dell SonicWALL Email Security 8.0 firmware is supported on the following appliances: Dell SonicWALL Email Security 200
Email Security Dell SnicWALL Email Security 8.0 SnicOS Cntents System Cmpatibility... 1 Enhancements in Email Security 8.0... 3 Knwn Issues... 13 Reslved Issues... 13 Upgrading t Email Security 8.0...
More informationDial Backup for Dedicated T1 Circuits using the ATLAS
Article ID: 1449 Q&A Dial Backup fr Dedicated T1 Circuits using the ATLAS Q: Dial Backup fr Dedicated T1 Circuits using the ATLAS A: Intrductin This technical supprt nte describes hw t cnfigure the ATLAS
More informationMPDS Configuration Sheet Windows 2000
MPDS Cnfiguratin Sheet Windws 2000 Cnnecting t the Internet via a Mbile Packet Data service terminal Setting up a Windws 2000 mdem device The PC cmmunicates with the MPDS terminal as if it were a mdem.
More informationInstallation Guide Marshal Reporting Console
Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling
More informationBlue Link Solutions Terminal Server Configuration How to Install Blue Link Solutions in a Terminal Server Environment
Blue Link Slutins Terminal Server Cnfiguratin Hw t Install Blue Link Slutins in a Terminal Server Envirnment Prepared by: Darren Myher April 9, 2002 Table f Cntents Backgrund... 2 Applicatin Server mde
More informationOUTLOOK All About Archives
OUTLOOK All Abut Archives Why d we have Zantaz Enterprise Archiving Slutin (EAS)? Archiving prvides verall lng term strage EAS has been implemented t help manage the 300MB mailbx size limit in Outlk/Exchange
More informationGetting started with Android
Getting started with Andrid Befre we begin, there is a prerequisite, which is t plug the Andrid device int yur cmputer, and lad the drivers fr the OS. In writing this article, I was using Windws XP, 7
More informationHP Connected Backup Online Help. Version 8.7.1 04 October 2012
HP Cnnected Backup Online Help Versin 8.7.1 04 Octber 2012 Legal Ntices Warranty The nly warranties fr Hewlett-Packard prducts and services are set frth in the express statements accmpanying such prducts
More information