The Virtual Environment
|
|
|
- Caren Rich
- 10 years ago
- Views:
Transcription
1 Chapter 2 The Virtual Environment In the following chapters we examine a variety of problems related to information security, as they arise in modern computer and communication systems. To deepen your understanding of these problems, we do not merely consider them abstractly. Rather, we additionally provide you with a set of preconfigured virtual machines that allow you to work through the examples actively in a virtual environment. As a virtualization environment we have chosen VirtualBox [23]. VirtualBox runs on Windows, Linux, Macintosh and OpenSolaris hosts, and supports a large number of guest operating systems. By following the instructions below, you should be able to install the virtual machines on your own computer, which you will need to complete the practical experiments in the following chapters. The virtual machines can be downloaded from the book s web page, The structure of this chapter is as follows. We start with a general introduction to VirtualBox and explain its network options. Afterwards we provide information on the virtual machines as they are used for the practical exercises in this book. Besides information on the network setup you will find information on the types of operating systems, installed software, and user accounts in this section. Finally, we provide brief installation instructions for each of the virtual machines used in subsequent chapters. Note to the reader: To simply install the virtual machines in order to complete the experiments in this book you may skip Sects. 2.2 and 2.3 and follow the installation instructions in Sect Objectives After completion of this chapter you should: be able to install your own virtual machines in VirtualBox D. Basin et al., Applied Information Security, DOI / , Springer-Verlag Berlin Heidelberg
2 18 2 The Virtual Environment be able to install the delivered virtual machines on your computer, provided VirtualBox runs on your computer s operating system be able to tackle all subsequent practical exercises know the layout of the virtual network connecting the virtual machines know the characteristics of the virtual machines provided 2.2 VirtualBox VirtualBox is a full, general-purpose virtualizer for x86 hardware. It is a professionalquality virtualization environment that is also open-source software. The software can be downloaded from the Internet [23]. For most Linux distributions there exist packages that allow its automatic installation using the corresponding package management system Setting up a New Virtual Machine Once VirtualBox has been installed, setting up new virtual machines is straightforward. Figure 2.1 shows the main window of VirtualBox displaying information about the virtual machine alice that is currently running. Fig. 2.1 VirtualBox main window
3 2.2 VirtualBox 19 Pressing the New button in the upper left corner opens the New Virtual Machine Wizard that guides you through the steps necessary to create a new virtual machine in VirtualBox. Providing the type of operating system to be installed allows VirtualBox to prepare OS-dependent proposals for parameters such as the necessary amount of base memory (RAM) or the size of the virtual hard drive. Having chosen the size of the base memory, the next step, Virtual Hard Disk, allows you to either create a new hard disk or to use an existing hard disk. If you choose to create a new hard disk, a virtual hard disk will be created on your system. After creating the hard disk you will be asked to select a boot-medium to install the operating system. If you have chosen to use an existing hard disk, the setup is already completed as it is assumed that the hard disk contains a bootable system. Note that the virtual machines you need to work through the examples presented in this book are provided as hard disks (vdi files in the VirtualBox terminology). To install these machines you must save the corresponding vdi files somewhere on your system. Choose the option Use existing hard disk, leaving the check-box Boot Hard Disk (Primary Master) as it is, and select the location of the vdi file to be installed. This completes the initial setup of a new virtual machine. However, there are settings, such as the network connecting the virtual machines, that must be configured manually on a per-system basis after the hard disks have been created. You can access these settings (only if the machine is shut down) by marking the corresponding virtual machine in VirtualBox s main window and by pressing the Settings button The Network Having installed the hard disks, we must configure VirtualBox to allow the machines to communicate over an IP network (see Fig. 2.2). The network is configured for every virtual machine separately (mark the shutdown virtual machine then follow Settings Network). For every virtual machine, VirtualBox provides up to eight different virtual PCI network adapters. Using the advanced menu you can choose the type of network card to be virtualized by VirtualBox (some operating systems may not support certain cards by default). Furthermore, you can choose a MAC address for the interface and may choose whether the corresponding network cable is plugged in at the startup of the machine or not. Each network adapter can be separately configured to operate in one of the following modes: Not attached: VirtualBox reports to the guest operating system that the corresponding network adapter is present, but that there is no connection (cable unplugged).
4 20 2 The Virtual Environment Fig. 2.2 VirtualBox network settings Network Address Translation (NAT): VirtualBox acts as a router providing DHCPservice to the guest operating system, using the physical network to connect to the Internet. If you want to connect the guest operating system to the Internet, this is the easiest way to do so. Bridged networking: VirtualBox connects to one of your installed network cards and transports packets directly between the guest operating system and the network connected to your physical network card. Internal networking: This creates a network containing a set of selected virtual machines without requiring a physical network interface card. Host-only networking: This creates a network that contains the host and a set of virtual machines. No physical interface is needed; instead a virtual interface (such as a loopback interface) is created on the host. This is a kind of hybrid mode between bridged and internal networking modes, i.e., the virtual machines can talk to each other (internal networking) and can talk to the host (bridged networking). However, there is no need for a physical interface as in bridged networking, and the virtual machines cannot talk to the outside world since they are not connected to the physical interface. In the following, we will only use the Internal Networking mode, so that the virtual machines may talk to each other over a virtual network, but may not connect to the Internet. However, if you wish to connect to the Internet, for example, to
5 2.3 The Lab Environment 21 download software, then you can simply enable an additional network adapter in NAT mode. 2.3 The Lab Environment To carry out the experiments presented in this book, we provide three preconfigured virtual machines, alice, bob, and mallet. The machines are delivered as vdi files such that they can be installed in VirtualBox (use the vdi files as virtual disks). In order to be compliant with the network setup used in this book, you should enable a network adapter for each of the virtual machines and attach it to an Internal Network, for example, named InfSec. Finally, the network should look like the one showninfig.2.3. Fig. 2.3 Network setup Note that the exercises in subsequent chapters entail practices like port scans that might be considered malicious by system administrators if executed against a system under their control. In order to prevent unintended, suspicious network traffic originating from your machine, we recommend that you carry out the assignments
6 22 2 The Virtual Environment in this book using an isolated virtual network. We therefore urge you not to enable a network adapter that connects any of the virtual machines to the Internet. Also note that the virtual machines are preconfigured in such way that the described attacks work. For example, some of the attacks rely on older unpatched kernel versions. Updating the underlying operating system (e.g., over the Internet) might disable some vulnerabilities and thus make it impossible to successfully complete some assignments The Hosts The virtual disks alice.vdi, bob.vdi and mallet.vdi can be downloaded from the web page Whereas host alice is configured as a typical desktop computer having a graphical user interface, bob is configured as a server, i.e., there is no graphical user interface installed and the machine s operating system can only be accessed using a simple command-line interface. Finally, mallet plays the role of the adversary s machine, having a similar desktop environment to that of alice, with the necessary software to complete the attacks preinstalled. Note that the virtual machines delivered as vdi files contain the necessary configurations for automatic configuration of interfaces according to the network setup shown in Fig Since interface configurations under Linux use the interface s name, and the interface s name is bound to the interface s MAC address, you must configure the MAC address of the corresponding virtual machine in VirtualBox accordingly. To do so you must manually enter the corresponding MAC address (given for every machine below) in the network section of each machine s configuration menu in VirtualBox (see also Sect above). Settings for VirtualBox: For optimal performance of the virtual guest systems alice and mallet, VirtualBox offers system-specific tools called guest additions. These additions provide a closer integration between host and guest systems and allow features such as mouse pointer integration, better video support etc. You may install these guest additions for hosts alice and mallet as follows. 1. Choose Devices Install Guest Additions... in the tool bar of the corresponding virtual machine s window after booting. 2. On the virtual machine s filesystem you will now find a mounted CD that contains an installation script, autorun.sh, which can be executed by double-clicking on it.
7 2.3 The Lab Environment 23 Host alice The host alice runs a typical Linux desktop operating system, namely Ubuntu codename lucid. In addition to the standard distribution software, alice runs a set of services such as HTTP and SSH servers. The passwords for the users alice and root to access the operating system are: User name Password alice alice root alice The user names and passwords for the applications running on alice are: User name Password alice alice123 bob bob123 mallet mallet123 Host bob The host bob runs a Debian server operating system and is configured as a typical Linux server. The server runs a set of services including FTP, HTTP, and SSH servers. To create a web site including a web shop, the server s administrator has installed the popular web content management system Joomla! in combination with the web shop extension VirtueMart. The passwords for the users bob and root to access the operating system are: User name Password bob bob root bob The user names and passwords for the applications running on bob are: User name Password alice alice123 bob bob123 mallet mallet123 Host mallet The host mallet plays the role of the adversary s computer. Like alice it runs a Linux desktop operating system (Ubuntu lucid). In addition to the software that comes with the standard distribution, there are many tools installed on mallet that will be used for attacks against alice and bob as described below.
8 24 2 The Virtual Environment The set of tools includes a port scanner (Nmap), a vulnerability scanner (OpenVAS), a password cracker (John the Ripper) and several others. The passwords for the users mallet and root to access the operating system are: User name Password mallet mallet root mallet 2.4 Installing the Virtual Machines To successfully complete the steps described below, we assume that you have successfully installed VirtualBox and that the virtual hard disks alice.vdi, bob (Debian).vdi and mallet.vdi are locally accessible in a directory of your machine Installing host alice 1. Open VirtualBox 2. Choose the New button in the upper left corner to open the New Virtual Machine Wizard 3. Enter alice in the name field, choose Linux for the Operating System option and select Ubuntu using the Version drop-down list 4. Leave the proposed Base Memory Size unchanged (you can also change it according to your preferences and hardware setup) 5. In the Virtual Hard Disk wizard leave the check-box Boot Hard Disk as it is, choose the option Use existing hard disk and select the file alice.vdi on your local file system 6. Finish the base installation by pressing the finish button on the Summary page 7. In the VirtualBox OSE Manager mark the newly created virtual machine alice and press the Settings button in the tool bar 8. Select Network in the alice - Settings window 9. Leave the Enable Network Adapter check-box as it is, change the Attached to: drop-down list to Internal Network and give it the name InfSec 10. Press the Advanced button to display additional options, change there the MAC- Address to ED5BF5 and press OK to confirm the changes Summary of alice s settings for VirtualBox: MAC address for the Ethernet interface: 08:00:27:ED:5B:F5
9 2.4 Installing the Virtual Machines Installing host bob 1. Open VirtualBox 2. Choose the New button in the upper left corner to open the New Virtual Machine Wizard 3. Enter bob in the name field, choose Linux for the Operating System option and select Debian using the Version drop-down list 4. Leave the proposed Base Memory Size unchanged (you can also change it according to your preferences and hardware setup) 5. In the Virtual Hard Disk wizard leave the check-box Boot Hard Disk as it is, choose the option Use existing hard disk and select the file bob (Debian).vdi on your local file system 6. Finish the base installation by pressing the finish button on the Summary page 7. In the VirtualBox OSE Manager mark the newly created virtual machine bob and press the Settings button on the tool bar 8. Select the System tab page in the bob - Settings window and mark the Enable IO APIC check-box under Extended Features 9. Select Storage in the bob - Settings window 10. Mark the IDE Controller, select Add Hard Disk (the right disks symbol in the IDE Controller line), and press Choose existing disk 11. Choose the file bob (Debian).vdi on your file system 12. Remove the corresponding file under SATA Controller 13. In the bob - Settings window select Network 14. Leave the Enable Network Adapter check-box as it is, change the Attached to: drop-down list to Internal Network and give it the name InfSec 15. Press the Advanced button to display additional options, change there the MAC- Address to AAB8D 16. Press OK to confirm the changes Keyboard layout: To adjust the keyboard layout on bob to your local setting, log in as user root and run the command: dpkg-reconfigure console-data Summary of bob s settings for VirtualBox: MAC address for the Ethernet interface: 08:00:27:2A:AB:8D bob onlystartsifio-apicisset the hard disk must be attached to the IDE-controller as the primary master
10 26 2 The Virtual Environment Installing host mallet 1. Open VirtualBox 2. Choose the New button in the upper left corner to open the New Virtual Machine Wizard 3. Enter mallet in the name field, choose Linux for the Operating System option and select Ubuntu using the Version drop-down list 4. Leave the proposed Base Memory Size unchanged (you can also change it according to your preferences and hardware setup) 5. In the Virtual Hard Disk wizard leave the check-box Boot Hard Disk as it is, choose the option Use existing hard disk and select the file mallet.vdi on your local file system 6. Finish the base installation by pressing the finish button on the Summary page 7. In the VirtualBox OSE Manager mark the newly created virtual machine mallet and press the Settings button on the tool bar 8. Select Network in the mallet - Settings window 9. Leave the Enable Network Adapter check-box as it is, change the Attached to: drop-down list to Internal Network and give it the name InfSec 10. Press the Advanced button to display additional options, change the Promiscuous Mode: drop-down list to Allow VMs, then change the MAC-Address to FB3C18 and press OK to confirm the changes Summary of mallet s Settings for VirtualBox: MAC address for the Ethernet interface: 08:00:27:FB:3C:18 the Ethernet interface must be set to promiscuous mode
11
Using VirtualBox ACHOTL1 Virtual Machines
Using VirtualBox ACHOTL1 Virtual Machines The steps in the Apache Cassandra Hands-On Training Level One courseware book were written using VMware as the virtualization technology. Therefore, it is recommended
NAS 249 Virtual Machine Configuration with VirtualBox
NAS 249 Virtual Machine Configuration with VirtualBox Configure and run Virtual Machines on ASUSTOR Portal with VirtualBox A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you
An Oracle White Paper July 2012. Oracle VM 3: Building a Demo Environment using Oracle VM VirtualBox
An Oracle White Paper July 2012 Oracle VM 3: Building a Demo Environment using Oracle VM VirtualBox Introduction... 1 Overview... 2 The Concept... 2 The Process Flow... 3 What You Need to Get Started...
Building a Penetration Testing Virtual Computer Laboratory
Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network
Installing Proview on an Windows XP machine
Installing Proview on an Windows XP machine This is a guide for the installation of Proview on an WindowsXP machine using VirtualBox. VirtualBox makes it possible to create virtual computers and allows
Creating a Linux Virtual Machine using Virtual Box
A. Install Virtual Box: Creating a Linux Virtual Machine using Virtual Box 1. Download the Virtualbox installer http://www.virtualbox.org/wiki/downloads 2. Run the installer and have the installer complete.
The BackTrack Successor
SCENARIOS Kali Linux The BackTrack Successor On March 13, Kali, a complete rebuild of BackTrack Linux, has been released. It has been constructed on Debian and is FHS (Filesystem Hierarchy Standard) complaint.
Bringing the Eko VM Home (302)
Liinux Howttos Brriingiing tthe Eko VM Home ((302)) CIIS 90 Sprriing 2011 Bringing the Eko VM Home (302) This Howto shows how to install VirtualBox and create the Linux Eko VM used in the CIS 90 course.
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
Deploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
User Manual of the Pre-built Ubuntu 12.04 Virutal Machine
SEED Labs 1 User Manual of the Pre-built Ubuntu 12.04 Virutal Machine Copyright c 2006-2014 Wenliang Du, Syracuse University. The development of this document is/was funded by three grants from the US
NAS 109 Using NAS with Linux
NAS 109 Using NAS with Linux Access the files on your NAS using Linux A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Use Linux to access files on
13.1 Backup virtual machines running on VMware ESXi / ESX Server
13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines
5nine Hyper-V Commander
5nine Hyper-V Commander 5nine Hyper-V Commander provides a local graphical user interface (GUI), and a Framework to manage Hyper-V R2 server and various functions such as Backup/DR, HA and P2V/V2V. It
Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)
Configuring Virtual Switches for Use with PVS February 7, 2014 (Revision 1) Table of Contents Introduction... 3 Basic PVS VM Configuration... 3 Platforms... 3 VMware ESXi 5.5... 3 Configure the ESX Management
II. Installing Debian Linux:
Debian Linux Installation Lab Spring 2013 In this lab you will be installing Debian Linux in a KVM (Kernel Virtual Machine). You will be guided through a series of steps to setup the network (IP addresses,
ECT362 Installing Linux Virtual Machine in KL322
ECT362 Installing Linux Virtual Machine in KL322 The steps below outline how to install Linux under Windows as a virtual machine. This install uses the Ubuntu 10.04 distribution of Linux along with the
Setting up VMware Server v1 for 2X VirtualDesktopServer Manual
Setting up VMware Server v1 for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
How to Install Applications (APK Files) on Your Android Phone
How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android
Penetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (External Attacker - Intermediate) By: magikh0e - [email protected] Last Edit: July 06 2012 This guide assumes a few things... 1. You have read the basic guide of this
VIRTUAL NETWORKING WITH "ORACLE VM VIRTUALBOX" FROM A "LINUX" PERSPECTIVE
VIRTUAL NETWORKING WITH "ORACLE VM VIRTUALBOX" FROM A "LINUX" PERSPECTIVE Summary: "Oracle VM VirtualBox" provides five virtual networking configurations for the virtual machines of a "Linux" host computer:
Installing Windows On A Macintosh Or Linux Using A Virtual Machine
Installing Windows On A Macintosh Or Linux Using A Virtual Machine At Shaw Programs, the software we develop is made using Microsoft Access. As with all Microsoft Software it requires Windows in order
Penetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (Internal Attacker - Beginner version) By: magikh0e - [email protected] Last Edit: July 07 2012 This guide assumes a few things... 1. You have installed Backtrack before
1. Open Thunderbird. If the Import Wizard window opens, select Don t import anything and click Next and go to step 3.
Thunderbird The changes that need to be made in the email programs will be the following: Incoming mail server: newmail.one-eleven.net Outgoing mail server (SMTP): newmail.one-eleven.net You will also
Local Caching Servers (LCS): User Manual
Local Caching Servers (LCS): User Manual Table of Contents Local Caching Servers... 1 Supported Browsers... 1 Getting Help... 1 System Requirements... 2 Macintosh... 2 Windows... 2 Linux... 2 Downloading
License Patrol TM Mac Client Installation Guide 7.0 for Mac OS X. September 2015 VERALAB TM
License Patrol TM Mac Client Installation Guide 7.0 for Mac OS X September 2015 VERALAB TM License Patrol Client Installation Guide, 7.0 for Mac OS X. Copyright 2015 VeraLab Inc. All rights reserved. The
Accessing RCS IBM Console in Windows Using Linux Virtual Machine
Accessing RCS IBM Console in Windows Using Linux Virtual Machine For Graphics Simulation Experiment, Real Time Applications, ECSE 4760 Quan Wang Department of ECSE, Rensselaer Polytechnic Institute March,
Email Client Configuration Guide
Email Client Configuration Guide Table of Contents Email Configuration...3 Email settings...3 IMAP...3 POP...3 SMTP...3 Process Overview...5 Account set up wizards...5 Anatomy of an email address...5 Why
Shellshock Security Patch for X86
Shellshock Security Patch for X86 Guide for Using the FFPS Update Manager October 2014 Version 1.0. Page 1 Page 2 This page is intentionally blank Table of Contents 1.0 OVERVIEW - SHELLSHOCK/BASH SHELL
Setting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
User Manual of the Pre-built Ubuntu 9 Virutal Machine
SEED Document 1 User Manual of the Pre-built Ubuntu 9 Virutal Machine Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document is funded by the National Science Foundation
LOCKSS on LINUX. Installation Manual and the OpenBSD Transition 02/17/2011
LOCKSS on LINUX Installation Manual and the OpenBSD Transition 02/17/2011 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 7 BIOS Settings... 10 Installation... 11 Firewall
LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013
LOCKSS on LINUX CentOS6 Installation Manual 08/22/2013 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 6 BIOS Settings... 9 Installation... 10 Firewall Configuration...
Using Keil software with Linux via VirtualBox
Using Keil software with Linux via VirtualBox Introduction The Keil UVision software used to develop programs for ARM based microprocessor systems is designed to run on Microsoft Windows operating systems.
How to install Radiance on your computer via a virtual machine
How to install Radiance on your computer via a virtual machine This instruction will help to install the lighting simulation tool Radiance on a Windows operated computer. As Radiance runs under Unix/Linux,
AKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 16. AKIPS Pty Ltd
AKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 16 AKIPS Pty Ltd July 5, 2016 1 Copyright Copyright 2015 AKIPS Holdings Pty Ltd. All rights reserved worldwide. No part of this
Laboration 3 - Administration
Laboration 3 - Administration During this laboration we will learn how to install, configure and test servers that will allow you to have access remote machines, copy files between computers and file sharing.
FROM A "WINDOWS" PERSPECTIVE
VIRTUAL NETWORKING WITH "Oracle VM VirtualBox" FROM A "WINDOWS" PERSPECTIVE Summary: "VMware Player" provides five virtual networking configurations for the virtual machines of a Windows host computer:
Whitepaper How to Create a Windows Server Virtual Laboratory Environment Using VirtualBox
Whitepaper How to Create a Windows Server Virtual Laboratory Environment Using VirtualBox March 2011 If everyone is thinking alike, then somebody isn't thinking. Gen. George S. Patton, Jr. Copyright 2011
NAS 253 Introduction to Backup Plan
NAS 253 Introduction to Backup Plan Create backup jobs using Backup Plan in Windows A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Create backup
Guest PC. for Mac OS X. User Guide. Version 1.6. Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved.
Guest PC for Mac OS X Version 1.6 User Guide Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved. Table of Contents About Guest PC... 1 About your Virtual Computer... 1 Creating a Virtual
Parallels Desktop for Mac
Parallels Software International, Inc. Parallels Desktop for Mac Quick Start Guide 3.0 (c) 2005-2007 Copyright 2006-2007 by Parallels Software International, Inc. All rights reserved. Parallels and Parallels
2XApplication Server XG v10.1
2XApplication Server XG v10.1 Introduction 1 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are
IDS and Penetration Testing Lab ISA656 (Attacker)
IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible
Installing and Configuring Lexia Reading Desktop Software
Page 1 of 7 Installing and Configuring Lexia Reading Desktop Software Summary: Learn how to install and configure Lexia Reading desktop software, including Lexia Early Reading, Lexia Primary Reading, and
OCS Virtual image. User guide. Version: 1.3.1 Viking Edition
OCS Virtual image User guide Version: 1.3.1 Viking Edition Publication date: 30/12/2012 Table of Contents 1. Introduction... 2 2. The OCS virtualized environment composition... 2 3. What do you need?...
Using Virtual PC 7.0 for Mac with GalleryPro
Using Virtual PC 7.0 for Mac with GalleryPro Installing and Configuring What is Virtual PC for Mac? Virtual PC (VPC) is emulation software that simulates an actual (though virtual) Windows computer running
Chapter 2 Preparing Your Network
Chapter 2 Preparing Your Network This document describes how to prepare your network to connect to the Internet through a router and how to verify the readiness of your broadband Internet service from
Introduction. Installation of SE S AM E BARCODE virtual machine distribution. (Windows / Mac / Linux)
Installation of SE S AM E BARCODE virtual machine distribution (Windows / Mac / Linux) Introduction A "virtual machine" is a fake computer within a true one. An underlying software (here VirtualBox) is
Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE
Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE A P P L I C A T I O N V E R S I O N : 8. 0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your
Guide to Installing BBL Crystal MIND on Windows 7
Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP
Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Quick Deployment Step-by-step instructions to deploy Oracle Big Data Lite Virtual Machine
Quick Deployment Step-by-step instructions to deploy Oracle Big Data Lite Virtual Machine Version 3.0 Please note: This appliance is for testing and educational purposes only; it is unsupported and not
Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.
Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,
TANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
Appendix B Lab Setup Guide
JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
Configuring Security for FTP Traffic
2 Configuring Security for FTP Traffic Securing FTP traffic Creating a security profile for FTP traffic Configuring a local traffic FTP profile Assigning an FTP security profile to a local traffic FTP
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED.
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *If you are using
Setting up Citrix XenServer for 2X VirtualDesktopServer Manual
Setting up Citrix XenServer for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
ISERink Installation Guide
ISERink Installation Guide Version 1.1 January 27, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to
vtcommander Installing and Starting vtcommander
vtcommander vtcommander provides a local graphical user interface (GUI) to manage Hyper-V R2 server. It supports Hyper-V technology on full and core installations of Windows Server 2008 R2 as well as on
Getting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
Step-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure & Ad Hoc Networks Mac OS X 10.5-10.6 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without
Lexia Network Installation Instructions
Lexia Network Installation Instructions For Lexia Early Reading 3.x, Primary Reading 1.x, Foundation Reading 1.x, Strategies for Older Students 4.x, Cross-Trainer 1.x and Quick Reading Test 2.x (NOT for
Red Hat Linux 7.2 Installation Guide
Red Hat Linux 7.2 Installation Guide Ryan Spangler [email protected] http://ceut.uww.edu April 2002 Department of Business Education/ Computer and Network Administration Copyright Ryan Spangler 2002
File Management and File Storage
File Management and File Storage http://training.usask.ca Information Technology Services Division Table of Contents File Management at the University of Saskatchewan...3 Introduction...3 Creating Files
READYNAS INSTANT STORAGE. Quick Installation Guide
READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux
Acellus Lab Cart. User s Manual. Version 4B. Acellus Corporation www.acellus.com. Copyright 2010 Acellus Corporation. All Rights Reserved.
Acellus Lab Cart User s Manual Version 4B Acellus Corporation www.acellus.com 1 Table of Contents Using Acellus... 3 Acellus Lab Cart and Server... 3 Acellus Laptops... 3 Acellus Updates... 4 Accessing
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
Installation Guidelines (MySQL database & Archivists Toolkit client)
Installation Guidelines (MySQL database & Archivists Toolkit client) Understanding the Toolkit Architecture The Archivists Toolkit requires both a client and database to function. The client is installed
Online Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
Option nv, Gaston Geenslaan 14, B-3001 Leuven Tel +32 16 317 411 Fax +32 16 207 164 http://www.option.com Page 1 of 14
Page 1 of 14 ! " #!"#$ % &&' Page 2 of 14 1 INTRODUCTION One of the highly desirable features of the GlobeSurfer III device is the ability to network together Printers and External Hard Disk drives (aka
Enterprise Erase LAN
Enterprise Erase LAN Network Erasing and Asset Management Server Version 2.0 Users Guide 888.700.8560 toll free www.tabernus.com 11130 Jollyville Rd Suite 301 Austin, TX 78757 Table of Contents 1 Product
Getting Started with Vision 6
Getting Started with Vision 6 Version 6.9 Notice Copyright 1981-2009 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop
Setting up Hyper-V for 2X VirtualDesktopServer Manual
Setting up Hyper-V for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein
AXIS Camera Station Quick Installation Guide
AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera
Service & Support. How do you create a communication of VNC with an Industrial Thin Client SIMATIC ITC? Thin Client.
Cover How do you create a communication of VNC with an Industrial Thin Client SIMATIC ITC? Thin Client FAQ August 2012 Service & Support Answers for industry. Question This entry is from the Siemens Industry
You're reading an excerpt. Click here to read official APPLE REMOTE DESKTOP 1.2 user guide http://yourpdfguides.com/dref/1168427
You can read the recommendations in the user guide, the technical guide or the installation guide for APPLE REMOTE DESKTOP 1.2. You'll find the answers to all your questions on the APPLE REMOTE DESKTOP
Information Security Training. Assignment 1 Networking
Information Security Training Assignment 1 Networking By Justin C. Klein Keane September 28, 2012 Assignment 1 For this assignment you will utilize several networking utilities
Virtual machine W4M- Galaxy: Installation guide
Virtual machine W4M- Galaxy: Installation guide Christophe Duperier August, 6 th 2014 v03 This document describes the installation procedure and the functionalities provided by the W4M- Galaxy virtual
Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions
HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange
Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
Virtualization Technology (or how my Windows computer gave birth to a bunch of Linux computers)
Virtualization Technology (or how my Windows computer gave birth to a bunch of Linux computers) The purpose of this document is to walk you through creating a Linux Virtual Machine (a guest Operating System)
Network Probe User Guide
Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5
How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment?
Author Janice Hong Version 1.0.0 Date Mar. 2014 Page 1/56 How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment? Application Note The 32-bit operating system
RecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
Using a USB Flash Drive to Back Up Your Data Files on a Mac Computer
Using a USB Flash Drive to Back Up Your Data Files on a Mac Computer Your GWU-provided flash drive has a storage capacity of 1 GB and is provided as a means for you to back up data files, including email
Chapter7 Setting the Receiving PC for Direct Upload. Setting the Receiving PC for Direct Upload... 148 For Windows... 148 For Macintosh...
Chapter7 Setting the Receiving PC for Direct Upload Setting the Receiving PC for Direct Upload... 148 For Windows... 148 For Macintosh... 153 Setting the Receiving PC for Direct Upload This section explains
With the purchase of ONSSI NetDVMS you have chosen an extremely powerful and intelligent surveillance solution.
Dear ONSSI Customer, With the purchase of ONSSI NetDVMS you have chosen an extremely powerful and intelligent surveillance solution. This Getting Started Administrator Guide will explain how to install
IntraVUE Plug Scanner/Recorder Installation and Start-Up
IntraVUE Plug Scanner/Recorder Installation and Start-Up The IntraVUE Plug is a complete IntraVUE Hardware/Software solution that can plug directly into any network to continually scan and record details
StrikeRisk v6.0 IEC/EN 62305-2 Risk Management Software Getting Started
StrikeRisk v6.0 IEC/EN 62305-2 Risk Management Software Getting Started Contents StrikeRisk v6.0 Introduction 1/1 1 Installing StrikeRisk System requirements Installing StrikeRisk Installation troubleshooting
Amcrest 960H DVR Quick Start Guide
Amcrest 960H DVR Quick Start Guide Welcome Thank you for purchasing our Amcrest 960H DVR! This quick start guide will help you become familiar with our DVR in a very short time. Before installation and
Host Installation on a Terminal Server
TECHNICAL PAPER Host Installation on a Terminal Server Netop develops and sells software solutions that enable swift, secure and seamless transfer of video, screens, sounds and data between two or more
Easy Setup Guide for the Sony Network Camera
-878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer
VIRTUAL NETWORKING WITH "WINDOWS VIRTUAL PC"
VIRTUAL NETWORKING WITH "WINDOWS VIRTUAL PC" Summary: "Windows Virtual PC" provides four virtual networking configurations for the virtual machines of a "Windows 7" host computer: 1. a "Other" gateway/router
Honeywell Internet Connection Module
Honeywell Internet Connection Module Setup Guide Version 1.0 - Page 1 of 18 - ICM Setup Guide Technical Support Setup - Guide Table of Contents Introduction... 3 Network Setup and Configuration... 4 Setting
Using ESXi with PowerChute Business Edition
Using ESXi with PowerChute Business Edition This help covers the following topics: Installing vma for an ESXi Host Server Configuring and Running ESXi 1 Installing vma for an ESXi Host Server vsphere Management
