Project Ideas. Semester long projects of medium scope. TAs presenting project ideas today. Students can submit their own ideas
|
|
|
- Damon Wilkins
- 10 years ago
- Views:
Transcription
1 Project Ideas Semester long projects of medium scope TAs presenting project ideas today Students can submit their own ideas Send to To be approved by staff Short presentation of approved ideas this Wed.
2 Project Groups Each group is 6 people, no exceptions Can be with lab partner, but doesn t need to be Form your own groups Use the discussion forum!
3 Project Group Submission Groups choose top 2 project preferences We ll try hard to give top preference Multiple groups on same project Provide times the group can meet Needs to be many, many times! Web submission
4 Project Signup Schedule 1/23 Monday TA project presentation 1/24 Tuesday Students submit project ideas 1/25 Wednesday Approved ideas presented by students 2/1 Wednesday Group signups due
5 Web Security Joel
6 Content Security Policy for Web Applications Content Security Policies (CSP) can be applied to sites to stop XSS but requires modifying the application Modify a large application (e.g. MediaWiki) to use an effective CSP Show that the application still works with the policy applied
7 Privilege Granularity in Chrome Extensions Extensions add functionality to web browsers Chrome limits privileges to only those requested Coarse grained How well does the granularity match actual functionality? Evaluate this over several hundred extensions Find common patterns in extensions Propose alternative privileges?
8 More Web Security Dev
9 Measuring Incoherencies on the Web Platform Goal: Write an addon and a crawler to measure the prevalence of same-origin-policy inconsistencies. For example, cross-origin overlap, document.domain usage. Motivation: Can t improve what you don t know. The current situation is a mess. Evaluation: Number of checks implemented and scale of data collected. Prereqs: HTML, JavaScript, the Web
10 Privilege Separation of HTML5 applications Goal: Implement privilege separated versions of popular HTML5 applications Motivation: TCB Reduction, auditability, SECURITY! Evaluation: TCB reduction achieved, functionality reduced, security analysis Prereqs: HTML, JavaScript
11 Implementation of DSI in Firefox Goal: Implement a nonce based approach to XSS mitigation Motivation: XSS is difficult to protect against purely on the server side. Enlist help from the browser. Evaluation: HTMLPurifier test cases passed Prereqs: C/C++ knowledge, HTML, JavaScript
12 Measuring JavaScript Dynamicity Goal: Write an addon and a crawler to measure the prevalence of crazy js on the web Motivation: JS consists of a number of crazy features that make analysis difficult. A measurement will tell us what we can ignore and what we can t. Evaluation: Number of checks implemented and scale of data collected. Prereqs: HTML, JavaScript
13 Android Security Steve
14 Similarity Among Android Applications by GUI Feature Extraction Goals: Develop a system to compute similarity between GUIs in Android apps Examine both static elements (XML) and dynamic elements (DEX) Motivation: Piracy, malware detection Similar looking applications with underlying differences in code is a good metric for detecting trojaned applications Copied or stolen interface detection Description: Feature extraction and comparisons Android GUIs Students will be expected to evaluate their tool against no less than 1000 applications and demonstrate and evaluate their approach Prereq: Android, Java, C++, machine learning a plus!
15 Measuring Intent Security Problems in Android Goals: Develop a tool to detect problems with Android intents and measure their prevalence among a large set of applications. Suggest proposals to fix most common bugs. Motivation: Intents can leak information or be used to abuse privilege Pressing need to quantify the prevalence of these errors Can shed insight into developing a better Intent system to make Android more secure. Description: Understand common flaws with the Intent system in android, classify and quantify their prevalence on a large dataset. Prereq: Android (very experienced!), Java
16 Android and Testing via Crowd Sourcing Kevin
17 Fine-grained permission control engine on Android The current coarse-grained permission system: Application-level Install-time decision All-or-nothing decision Goal: Fine-grained rule-based permission system (App, Package/Callstack, Permission) Outcome: Policy engine Sample rules
18 Testing via Crowd Sourcing HCI-based programs should be tested by a human Event-driven, user-interaction directed A first step towards that: describing interactions Type username Type pa****rd Click Login Click CS161 Click like Outcome: Interaction recorder and replayer
19 An Evaluation of Automated Bug-finding Approaches Cho
20 Automated Software Analysis Tidal Wave in constraint solving and symbolic execution techniques Analysis of software security will be increasingly automated and based on logic Different SE approaches Dynamic symbolic execution Static checking Model checking How do they compare? Source: A. Platzer
21 What do I need to do? Evaluate and compare the best-of-breed tools of the 3 approaches On a common set of real-world applications Focus on security bugs Soundness & Completeness [Practical] Determine the kind of programs each approach is well-suited for [Research] Gain insights into how they work / apply symbolic execution differently
22 ACID Test Evaluate your own suitability for this project (and your team-mates) Google: KLEE symbolic execution Difficulty: Was it a breeze? Interest: Does it make you want to learn more?
23 Privacy Emil
24 Enhance Privacy of Open Source Apps Goal: Combine popular open source applications with UC Berkeley s platform for private data. Example Apps: Online document editors, photo galleries, video conferencing, chat rooms, webmail. Why: Offer rich applications to users with strong privacy guarantees.
25 Privacy Extension for Browsers Goal: Prevent a website from sending user data to another website. Example: Your online tax software should not share your financial data with crooks. How: Develop a browser extension that intercepts HTTP requests.
26 Google+ Data Analysis Goal: Analyze Google+ data on a global scale. ** We have daily snapshots of the Google+ social graph and profile data. ** Explore and model how social patterns evolve. Determine importance and weights of traits in social networks. Why do people accept friend requests?
27 Graduate School Application System Goal: Create a single website for submitting applications to multiple graduate schools. Why: Offer enhanced privacy for students, and letter recommendation writers.
28 Virtual Machine Forking Goal: Efficiently isolate web sessions from each other on a server to improve security. Why: Prevent privacy breaches across users. How: Fork virtual machine metadata and memory mapping for each user session.
29 Memory Access Privacy Goal: Determine what an application is doing by analyzing its memory access pattern. Why: Demonstrate new form of attack on privacy for outsourced computation. How: Record and analyze memory traces of applications.
30 Alternative Authentication Daniele
31 Active Authentication based on mouse and keyboard usage Goal: write Javascript collection code and Python analysis code to distinguish mouse/keyboard usage patterns Motivation: Active authentication aims at strengthening the classic password authentication by observing user behavior Evaluation: Robustness and portability of Javascript code. Quality of the analysis (number and uniqueness of extracted features) Prereqs: HTML, JavaScript, Python
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
Using the owncloud Android App
Using the owncloud Android App Accessing your files on your owncloud server via the Web interface is easy and convenient, as you can use any Web browser on any operating system without installing special
Mobile Performance Management Tools Prasanna Gawade, Infosys April 2014
Mobile Performance Management Tools Prasanna Gawade, Infosys April 2014 Computer Measurement Group, India 1 Contents Introduction Mobile Performance Optimization Developer Tools Purpose and Overview Mobile
VPN: Virtual Private Network Setup Instructions
VPN: Virtual Private Network Setup Instructions Virtual Private Network (VPN): For e-journals and web-based databases, plus applications like EndNote's Online Search (formerly "Connect") and business systems.
QuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
EMAIL CONFIGURATION AND SETUP USER GUIDE AND REFERENCE MANUAL
EMAIL CONFIGURATION AND SETUP USER GUIDE AND REFERENCE MANUAL The following manual will outline the configuration and setup for email access by any staff member. There are multiple ways to configure this
Table of contents. HTML5 Data Bindings SEO DMXzone
Table of contents Table of contents... 1 About HTML5 Data Bindings SEO... 2 Features in Detail... 3 The Basics: Insert HTML5 Data Bindings SEO on a Page and Test it... 7 Video: Insert HTML5 Data Bindings
SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER
SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER XSS-BASED ABUSE OF BROWSER PASSWORD MANAGERS Ben Stock, Martin Johns, Sebastian Lekies Browser choices Full disclosure: Ben was an intern with Microsoft
Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)
Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Web Applications: Overview and Architecture
Web Applications: Overview and Architecture Computer Science and Engineering College of Engineering The Ohio State University Lecture 1 Road Map in Pictures: Web App Road Map in Pictures Browser Request
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.
Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
BUSINESS IMPACT OF POOR WEB PERFORMANCE
WHITE PAPER: WEB PERFORMANCE TESTING Everyone wants more traffic to their web site, right? More web traffic surely means more revenue, more conversions and reduced costs. But what happens if your web site
Hacking Web Apps. Detecting and Preventing Web Application Security Problems. Jorge Blanco Alcover. Mike Shema. Technical Editor SYNGRESS
Hacking Web Apps Detecting and Preventing Web Application Security Problems Mike Shema Technical Editor Jorge Blanco Alcover AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO
Advanced ANDROID & ios Hands-on Exploitation
Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data
Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data
Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014
Usable Crypto: Introducing minilock Nadim Kobeissi HOPE X, NYC, 2014 2012 Browsers are an environment that is hostile to cryptography Malleability of the JavaScript runtime. The lack of low-level (system-level)
Getting Started Guide for Developing tibbr Apps
Getting Started Guide for Developing tibbr Apps TABLE OF CONTENTS Understanding the tibbr Marketplace... 2 Integrating Apps With tibbr... 2 Developing Apps for tibbr... 2 First Steps... 3 Tutorial 1: Registering
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Access to Kozminski University library databases from home
Access to Kozminski University library databases from home All students and staff at Kozminski University can benefit from special, purchased by the Library of ALK, databases containing many interesting
Revisiting SQL Injection Will we ever get it right? Michael Sutton, Security Evangelist
Revisiting SQL Injection Will we ever get it right? Michael Sutton, Security Evangelist Overview Background What it is? How are we doing? Web 2.0 SQL injection meets AJAX Fuggle SQL Injection meets Google
Content management system comparison
CMS Content management system comparison Content management system comparison Listed below is an outline of the major features, capabilities and shortcomings of today s most popular content management
Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense
Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense Yacin Nadji Illinois Institute Of Technology Prateek Saxena UC Berkeley Dawn Song UC Berkeley 1 A Cross-Site Scripting Attack
Web Application security testing: who tests the test?
Web Application security testing: who tests the test? Ainārs Galvāns Application Penetration Tester www.exigenservices.lv About myself Functional testing Leading test group Reporting to client Performance
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM Agenda Introduction to Application Hacking Demonstration of Attack Tool Common Web Application Attacks Live Bank Hacking Demonstration
Relax Everybody: HTML5 Is Securer Than You Think
Relax Everybody: HTML5 Is Securer Than You Think Martin Johns (@datenkeller) SAP AG Session ID: ADS-W08 Session Classification: Advanced Motivation For some reason, there is a preconception that HTML5
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS Published by Tony Porterfield Feb 1, 2015. Overview The intent of this test plan is to evaluate a baseline set of data security practices
Deploy. Friction-free self-service BI solutions for everyone Scalable analytics on a modern architecture
Friction-free self-service BI solutions for everyone Scalable analytics on a modern architecture Apps and data source extensions with APIs Future white label, embed or integrate Power BI Deploy Intelligent
Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft
Finding and Preventing Cross- Site Request Forgery Tom Gallagher Security Test Lead, Microsoft Agenda Quick reminder of how HTML forms work How cross-site request forgery (CSRF) attack works Obstacles
A Practical Attack to De Anonymize Social Network Users
A Practical Attack to De Anonymize Social Network Users Gilbert Wondracek () Thorsten Holz () Engin Kirda (Institute Eurecom) Christopher Kruegel (UC Santa Barbara) http://iseclab.org 1 Attack Overview
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
This document is for informational purposes only. PowerMapper Software makes no warranties, express or implied in this document.
SortSite 5 User Manual SortSite 5 User Manual... 1 Overview... 2 Introduction to SortSite... 2 How SortSite Works... 2 Checkpoints... 3 Errors... 3 Spell Checker... 3 Accessibility... 3 Browser Compatibility...
Cloudy with a chance of 0-day
Cloudy with a chance of 0-day November 12, 2009 Jon Rose Trustwave [email protected] The Foundation http://www.owasp.org Jon Rose Trustwave SpiderLabs Phoenix DC AppSec 09! Tom Leavey Trustwave SpiderLabs
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Web-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Harvesting Developer Credentials in Android Apps
8 th ACM Conference on Security and Privacy in Wireless and Mobile Networks, New York City, Jun 24-26 Harvesting Developer Credentials in Android Apps Yajin Zhou, Lei Wu, Zhi Wang, Xuxian Jiang Florida
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES AUTHOR: Chema Alonso Informática 64. Microsoft MVP Enterprise Security Hello and welcome to Intypedia.
Chrome Extensions: Threat Analysis and Countermeasures
Chrome Extensions: Threat Analysis and Countermeasures Lei Liu, Xinwen Zhang*, Guanhua Yan*, and Songqing Chen George Mason University Huawei R&D Center Los Alamos NaIonal Laboratory NDSS 12 * Does not
Preventing the Revealing of Online Passwords to Inappropriate Websites with LoginInspector
Preventing the Revealing of Online Passwords to Inappropriate Websites with LoginInspector Chuan Yue University of Colorado Colorado Springs 26th Large Installation System Administration Conference (LISA
Adobe Connect and Zoom are web conferencing tools with many features. Google Hangouts and Skype are primarily for voice calling or text chat.
Group Work Options The group work options listed below can be used during IVC course sessions. Students will have to have a pair of headphones and a microphone for all of these options. Individual groups
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
WEB 2.0 AND SECURITY
WEB 2.0 AND SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Quick Start Guide. Installation and Setup
Quick Start Guide Installation and Setup Introduction Velaro s live help and survey management system provides an exciting new way to engage your customers and website visitors. While adding any new technology
Discovering passwords in the memory
Discovering passwords in the memory Abhishek Kumar ([email protected]) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability
Google Cloud Print Guide
Google Cloud Print Guide Version A ENG Definitions of notes We use the following note style throughout this user s guide: Notes tell you how you should respond to a situation that may arise, or give tips
Lab 3 Assignment (Web Security)
CS 5910 Fundamentals of Computer/Network Security - 3 Credit Hours (Fall 2011 CS 5910 001 22383) Instructor: Chuan Yue Lab 3 Assignment (Web Security) Please follow the requirements and due date specified
Inventory and Analytics for Browser-based Applications in the Enterprise
Inventory and Analytics for Browser-based Applications in the Enterprise Introduction Times are changing. Desktop and client/server business applications (collectively referred to as native applications
Challenges in Android Application Development: A Case Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.294
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
Remote Desktop Web Access. Using Remote Desktop Web Access
Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off
Enrollment Process for Android Devices
1 Enrollment Process for Android Devices Introduction:... 2 Pre-requisites:... 2 Via SMS:... 2 Via Email:... 11 Self Service:... 19 2 Introduction: This is a brief guide to enrolling an android device
How To Manage Web Content Management System (Wcm)
WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
You must download the desktop client before you start, this is found on the Yuuguu page on your Ezereach web portal.
Help using Yuuguu Screen sharing How to host a screen sharing (or web conferencing) session You must download the desktop client before you start, this is found on the Yuuguu page on your Ezereach web
My Stuff Everywhere Your Content On Any Screen
Technical Brief Bob Lund, Distinguished Technologist, CableLabs September, 2014 My Stuff Everywhere Your Content On Any Screen The My Stuff Everywhere Concept The My Stuff Everywhere (MSE) concept is simple
How to Build a Trusted Application. John Dickson, CISSP
How to Build a Trusted Application John Dickson, CISSP Overview What is Application Security? Examples of Potential Vulnerabilities Strategies to Build Secure Apps Questions and Answers Denim Group, Ltd.
Messing with the Android Runtime
Northeastern University Systems Security Lab Messing with the Android Runtime Collin Mulliner, April 26th 2013, Singapore crm[at]ccs.neu.edu SyScan Singapore 2013 $ finger [email protected] 'postdoc'
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware
What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware Contents Introduction.................................2 Installation: Social engineering
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Training module 2 Installing VMware View
Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and
Team Foundation Server 2013 Installation Guide
Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day [email protected] v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide
High-Speed Internet Quick Start Guide
High-Speed Internet Quick Start Guide Connect Your World. NEED HELP? Call 1.800.239.4430 or visit Frontier.com/HelpCenter Contents PART #1: Wi-Fi Router Setup... 4 PART #2: Configure Wi-Fi Router... 8
A guide to affilinet s tracking technology
A guide to affilinet s tracking technology Content Introduction 1 What s covered in this Paper? 1 1. Why does affilinet use cookies? 1 Figure 1 the Commercial Model for Performance Marketing 1 2. How does
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
WALKME WHITEPAPER. WalkMe Architecture
WALKME WHITEPAPER WalkMe Architecture Introduction WalkMe - the Enterprise Class Guidance and Engagement Platform - drives users to action as they use software or websites. WalkMe is used by Enterprises
Remote Desktop Solution, (RDS), replacing CITRIX Home Access
Remote Desktop Solution, (RDS), replacing CITRIX Home Access RDS Applications on a Computer Overview RDS has replaced citrix for remote access at home for College staff and pupils. This does not replace
Managed Devices - Web Browser/HiView
Managed Devices - Web Browser/HiView All Hirschmann managed devices have a web based GUI interface available for configuration purposes. This is typically the primary means of configuration used for most
Defense Media Activity Guide To Keeping Your Social Media Accounts Secure
Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something
Handling of "Dynamically-Exchanged Session Parameters"
Ingenieurbüro David Fischer AG A Company of the Apica Group http://www.proxy-sniffer.com Version 5.0 English Edition 2011 April 1, 2011 Page 1 of 28 Table of Contents 1 Overview... 3 1.1 What are "dynamically-exchanged
Creating Your Own TinyWeb Database. Ball State University - CS116 - Ashley Swartz
Creating Your Own TinyWeb Database Ball State University - CS116 - Ashley Swartz 1. First you will need to download Python 2.6. You can get that at this address http://python.org/download/. You will select
User s guide. Version 2.0. August 2010 1 / 23
User s guide Version 2.0 August 2010 1 / 23 1 CONTENTS 2 Introduction... 3 2.1 What is Mouseflow?... 3 2.2 What can Mouseflow be used for?... 3 2.3 How does Mouseflow work?... 3 2.4 Who is the target audience?...
GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK
Antti Pyykkö, Mikko Malinen, Oskari Miettinen GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK TJTSE54 Assignment 29.4.2008 Jyväskylä University Department of Computer Science
RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC
RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
Customer Bank Account Management System Technical Specification Document
Customer Bank Account Management System Technical Specification Document Technical Specification Document Page 1 of 15 Table of Contents Contents 1 Introduction 3 2 Design Overview 4 3 Topology Diagram.6
Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet
Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
AdwareMedic. About AdwareMedic... 2. How to use AdwareMedic... 3. Frequently Asked Questions... 7. Version History... 9 License Agreement...
AdwareMedic http://www.adwaremedic.com [email protected] About AdwareMedic... 2 System Requirements... 2 Limitations... 2 How to use AdwareMedic... 3 Scan for Adware... 4 Optional items... 5 Firefox
Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
E-LEARNING STUDENT S MANUAL
E-LEARNING STUDENT S MANUAL By Williams College E-Learning is the College s Online Learning Environment, designed to enhance your learning experience by providing access to online course materials, activities,
Recommended operating systems and software for end user services. Operating systems and software not supported for end user services
Recommended operating systems and software for end user services There are different requirements for different features in Office 365 Beta Beta, but the following list will work with every feature: Windows
QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015
QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
