Software License Management using the Polymorphic Encryption Algorithm White Paper
|
|
- Evangeline Bryan
- 8 years ago
- Views:
Transcription
1 pmc-ciphers.com Software License Management using the Polymorphic Encryption Algorithm White Paper Published: May 2007, first published in January 2003 PMC Software License Management 1
2 Software License Management using the Polymorphic Encryption Algorithm White Paper Published: May 2007 For the latest information, please see Introduction Software piracy is a serious threat to software companies. The Software and Information Industry Association publishes on May 24, 2000: Business Software Alliance (BSA) has found that global average software piracy rate in 2006 was 35%, virtually unchanged from This amounted to nearly US$40 billion in losses to software companies, according to BSA. Existing software based piracy protection schemes are obviously inadequate; many are also quite intrusive into the end-user system, which is an aspect that no one appreciates. Hardware protection devices (dongles, etc.) are also a failing attempt; an expensive hassled one at that; these devices have been in existence for more than 15 years, yet such protected software sells on the street in China for less than $2; at least slightly below what the software manufacture had intended and not even to mention the fact that they see 0% of profits generated at this point. The bottom line: current fixed-parameter license management systems are a violation and insult to the honest end user and a false sense of security to the software manufacturer; there are no benefits to anyone. PMC Software License Management self-compiling crypto code makes reverse-engineering impossible Our first customer/implementation of this protection scheme actually had the idea to protect their satellite data broadcasting system with our PMC crypto engine. A hacker had been able to crack the conventional licensing system that was previously employed and had published a cracked version of the data decoding software on the internet; this obviously created a professional disaster for the company The key to protect the system is a piece of software which creates an infeasibility in terms of reverse-engineering procedure; the creation of indiscernible variations of PMC Software License Management 2
3 the code itself. Each individual copy of the decoding software has to be personalized with an activation key which consists of the user-specific information, which represents constant data of the target computer. This key is used to yield a set of predefined results; as all users receive the same source code, consequently all licenses must execute the very same instructions in order to decode the data properly. This applies to digital rights management, software installation, licensing schemes, and virtually any other related procedure designed to control and protect data distributions. A good security software specialist must already have cracked one or more programs; knowledge truly is nothing more than experience. Cracking a piece of software is sometimes quite easy to do; often, it is only necessary to change a JNZ command into JZ (jump if accumulator is zero). It is only a single bit of the machine instruction code which must be toggled! After entering the correct licensing code, this cracked software refuses to run, but when total rubbish is entered, one can play the game - without paying. In order to prevent hackers from analysing our original customer s satellite data decoding software, a very clever approach had to be taken; an original an unconventional approach. Little is more vulnerable than a data stream which is decoded by all users in the very same way; or any other broadcast for that matter. The only feasible way is in merging the licensing system with the key functionality of the software itself. In addition, the machine instructions which are analysed by hackers have to be different on every target computer. Therefore, even if one system is compromised by a genius hacker after what would definitely have been a very frustrating and time consuming task to say the least, he would have to start from scratch for another computer...such a concept states the level of protection achievable with PMC and the PMC Software License Management incorporation thereof. PMC Software License Management supplies programmers with the possibility to merge the licensing system with the source code of the application and it makes the software unique for each target computer or end customer or both. The implemented scheme is variable and only depends and the licensing strategy of our customers; much is left to application specific customization. Operating principle of PMC Software License Management In 1949 C.E. Shannon describes the principles of data encryption as confusion and diffusion. He describes confusion as being the use of enciphering transformations that complicate the determination of how the statistics of the ciphertext depend on the statistics of the plaintext. Diffusion simply means spreading the influence of individual pieces of plaintext data over the full ciphertext or at least over big areas of ciphertext. By doing this, the statistics which might be inherent in the plaintext can be hidden. For a licensing engine, this means that a licensing system is good if a hacker faces a lot of operations which cannot be classified properly as relevant or irrelevant for his task (to crack the software). Diffusion is maximized when a large number of operations influence some other operations which are executed by the PMC Software License Management 3
4 microprocessor in the far future. When these two principles are combined, an unbreakable licensing engine can be realized! In 1999 C.B. Roellgen invented a data encryption algorithm which uses a compiler to generate the actual encryption algorithm out of a passphrase. After being declassified as state secret, it is now possible to develop commercial applications based on this algorithm. The underlying method is called the Polymorphic Encryption Algorithm, or PMC. PMC is very useful for applications which need a piece of software to be customized for every user or every target machine. Registration data or simply the name of the user can be compiled into a useful piece of machine code at runtime. An incorrect username compiles into totally different machine code. A microprocessor which executes this machine code at some point of time yields completely different results. Here s a brief explanation of a simple PMC licensing engine: Passphrase (user info, registration key, etc.) Crypto Compiler Compiled Crypto Code Building block 1 Building block 2 Building block 3 Building block 2 Data Array for the internal state. It contains a number of variables which are used by the application which is to be protected Building block 3 propagated internal state Fig. 1: Structure of a PMC implementation for use in a licensing engine A passphrase consisting of registration information which is known to the software manufacturer is compiled into machine code. The compiler simply assembles standardized pseudo-random number generators, the so-called building blocks, adjust addresses as well as entry and exit points to generate a piece of machine code which acts like a huge pseudo-random number generator that is working on the Internal State. The Internal State is a data array which is used throughout the complete operation of the software application. A powerful implementation will combine a set of global variables used by the application software (which is to be protected) in this data array. After initializing the history data array with part of the passphrase, the instruction pointer of the microprocessor on the target machine is set to the start of the Compiled Crypto Code. After finishing the execution of the Compiled Crypto Code, the bit pattern stored in the history data array consists of near-random data. Without being noticeable by a hacker, the Internal State array can even be set to some predefined bit pattern. PMC Software License Management 4
5 The Compiled Crypto Code can be pretty long. If necessary, the crypto compiler generates megabytes of machine instructions within a fraction of a second; the average hacker gets lost when he tries to analyse this code. Professionals go beyond that point they look at the results which are returned by the software. However, as the crypto code affects several variables, but more importantly vital ones for yielding a correct result, and because the crypto code doesn t return anything, even professionals are thwarted. As the whole system avoids using yes/no decisions, it s easy to locate the machine instruction which is responsible for displaying the message invalid license code, but not the others which strike any time and which just change data in a way that makes the software obviously useless. Considerations for the implementation of PMC Software License Management Every copy protection and licensing system should be different. Otherwise, hackers get used to a certain class of algorithms and methods; this is why PMC Software License Management is defined in a different way for each customer. Even the complete mode of operation can be adapted! A good example and available demonstration model is our hierodrive full volume encryption software. This disk encryption software can be downloaded from the internet or it can be distributed as CD shareware; this is perfect because the demo version can be distributed freely! Users then are more willing to install it, test it and then are more likely to purchase a license. All they have to do is to enter a code number which is specific for each target computer, customer ID, IP address, etc. Each user reads a different registration code on the screen and sends it to the distributor, along with his credit card any other relevant purchase details as defined by our customers pre-defined parameter sets. Subsequently this information is then processed to compute the corresponding registration code number. This code number is then passed to the customer. After entering the code number and re-launching the application, the customer has a full version up and running; immediately. There s nothing more to install and if an update is available, we grant our users the right to download it and to use it as a full version. This technique can as well be used for licensing the very same software for a number of different levels (e.g. Demo version, Private Edition and Professional Edition); this obviously simplifies the distribution process even further, while for the first time, maintains intellectual property safeguards. The licensing engine in hierodrive uses compiled crypto code to influence a number of vital variables and writes undefined results to them. Unless an attacker has the required registration key, the results remain undefined and the software will not be able to run correctly. After some time, the license level is finally identified by the application software. An attacker has a tough time to figure out which variable is good for what. As there is no single yes/no response, it s extremely difficult to crack this system. For each customer the licensing system is different; what is good for one application can be disadvantageous for another application. PMC Software License Management 5
6 A crypto compiler can be an overwhelming obstacle to an attacker, provided that it is implemented correctly; imagine that there is an intangible piece of software that isn t present on the hard disk, but which is compiled during runtime of the application program and then decides whether the software will later run correctly or not. Privacy statement Customer data is kept secret for at least 15 years on our standard non-disclosure policy procedure. This is especially true for the company name and for the products which are protected by using some or all of the features of PMC Software License Management. In return, we expect our customers to keep all information which is not publicly known about PMC Software License Management undisclosed for at least 15 years after signing a non-disclosure agreement with us. PMC Ciphers, Inc reserves the right to adopt improvements and new features of PMC Software License Management, which are being conceived or invented in the course of a running development for one customer, in PMC Ciphers, Inc products including PMC Software License Management. PMC Software License Management 6
7 For more information: This is a preliminary document and may be changed substantially prior to final commercial release. This document is provided for informational purposes only and PMC Ciphers, Inc makes no warranties, either express or implied, in this document. Information in this document is subject to change without notice. The entire risk of the use or the results of the use of this document remains with the user. The example companies, organizations, products, people and events depicted herein are fictitious. No association with any real company, organization, product, person or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of PMC Ciphers, Inc. PMC Ciphers, Inc may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from PMC Ciphers, Inc, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property ciphers.de, PMC Ciphers, Inc., All rights reserved. Company and product names mentioned herein may be the trademarks of their respective owners. PMC Software License Management 7
Visualisation of potential weakness of existing cipher engine implementations in commercial on-the-fly disk encryption software
Visualisation of potential weakness of existing cipher engine implementations in commercial on-the-fly disk encryption software C. B. Roellgen Global IP Telecommunications, Ltd. & PMC Ciphers, Inc. August
More informationPipeliner CRM Phaenomena Guide Opportunity Management. 2015 Pipelinersales Inc. www.pipelinersales.com
Opportunity Management 205 Pipelinersales Inc. www.pipelinersales.com Opportunity Management Learn how to manage sales opportunities with Pipeliner Sales CRM Application. CONTENT. Creating and sharing
More informationPipeliner CRM Phaenomena Guide Getting Started with Pipeliner. 2015 Pipelinersales Inc. www.pipelinersales.com
Getting Started with Pipeliner 05 Pipelinersales Inc. www.pipelinersales.com Getting Started with Pipeliner Learn How to Get Started with Pipeliner Sales CRM Application. CONTENT. Setting up Pipeliner
More informationPipeliner CRM Phaenomena Guide Lead Management. 2015 Pipelinersales Inc. www.pipelinersales.com
Lead Management 205 Pipelinersales Inc. www.pipelinersales.com Lead Management Learn how to use sales lead management with Pipeliner Sales CRM Application. CONTENT. Creating and sharing the Sales Lead
More informationUPGRADE. Upgrading Microsoft Dynamics Entrepreneur to Microsoft Dynamics NAV. Microsoft Dynamics Entrepreneur Solution.
UPGRADE Microsoft Dynamics Entrepreneur Solution Upgrading Microsoft Dynamics Entrepreneur to Microsoft Dynamics NAV White Paper June 2008 The information contained in this document represents the current
More informationPipeliner CRM Phaenomena Guide Add-In for MS Outlook. 2015 Pipelinersales Inc. www.pipelinersales.com
Add-In for MS Outlook 205 Pipelinersales Inc. www.pipelinersales.com Add-In for MS Outlook Learn how to use sales lead management with Pipeliner MS Outlook Add-In. CONTENT. Setting up Pipeliner Add-In
More informationfor Java developers Building Mobile Applications Introduction 1 Building Mobile Applications
Introduction Building Mobile Applications for Java developers Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted,
More informationPipeliner CRM Phaenomena Guide Sales Target Tracking. 2015 Pipelinersales Inc. www.pipelinersales.com
Sales Target Tracking 05 Pipelinersales Inc. www.pipelinersales.com Sales Target Tracking Learn how to set up Sales Target with Pipeliner Sales CRM Application. CONTENT. Setting up Sales Dynamic Target
More informationWindows Small Business Server 2003 Upgrade Best Practices
Windows Small Business Server 2003 Upgrade Best Practices Microsoft Corporation Published: May 2005 Version: 1 Abstract To ensure a successful upgrade from the Microsoft Windows Small Business Server 2003
More informationPipeliner CRM Phaenomena Guide Sales Pipeline Management. 2015 Pipelinersales Inc. www.pipelinersales.com
Sales Pipeline Management 2015 Pipelinersales Inc. www.pipelinersales.com Sales Pipeline Management Learn how to manage sales opportunities with Pipeliner Sales CRM Application. CONTENT 1. Configuring
More informationEnable File and Folder Auditing
Enable File and Folder Auditing Publication Date: Feb 9, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About this Guide: This guide will help the end user to enable auditing
More informationPipeliner CRM Phaenomena Guide Administration & Setup. 2015 Pipelinersales Inc. www.pipelinersales.com
Administration & Setup 05 Pipelinersales Inc. www.pipelinersales.com Administration & Setup Learn how to manage your sales team with Pipeliner Sales CRM Application. CONTENT. Managing Pipeliner s Users
More information2007 Microsoft Office System Document Encryption
2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft
More informationMBAM Self-Help Portals
MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa
More informationWindows Scheduled Tasks Management Pack Guide for System Center Operations Manager. Published: 07 March 2013
Windows Scheduled Tasks Management Pack Guide for System Center Operations Manager Published: 07 March 2013 Copyright Information in this document, including URL and other Internet Web site references,
More informationMicrosoft Dynamics GP. Electronic Signatures
Microsoft Dynamics GP Electronic Signatures Copyright Copyright 2006 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without
More informationInstalling Windows Rights Management Services with Service Pack 2 Step-by- Step Guide
Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Microsoft Corporation Published: October 2006 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide
More informationTOPS Internet Backup Service User Guide
TOPS Internet Backup Service User Guide By TOPS Software, LLC Clearwater, Florida Document History Version Edition Date Document Software Trademark Copyright First Edition 09 2006 TOPS IBF AA 3.2.1 The
More informationApache: Analyze Logs for Malicious Activities & Monitor Server Performance
Apache: Analyze Logs for Malicious Activities & Monitor Server Performance EventTracker v7.6 Publication Date: Feb 12, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About
More informationhttp://www.microsoft.com/middleeast/arabicdev/farsi/wpaper.asp Office Language Interface Pack for Farsi (Persian) Content
Page 1 of 11 Office Language Interface Pack for Farsi (Persian) Abstract Microsoft Office Language Interface Pack (LIP) is a high-quality, localized skin for emerging and minority language markets. LIP
More informationQuick Install Guide - Safe AutoLogon For First-time Users - Installing and Running the Software. Published: February 2013 Software version: 5.
Quick Install Guide - Safe AutoLogon For First-time Users - Installing and Running the Software Published: February 2013 Software version: 5.0 Contents Introduction... 1 Safe AutoLogon solution... 2 Installation
More informationWindows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
More informationHow To Set Up A Load Balancer With Windows 2010 Outlook 2010 On A Server With A Webmux On A Windows Vista V2.2.5.2 (Windows V2) On A Network With A Server (Windows) On
Load Balancing Exchange 2010 OWA for External Access using WebMux Published: April 2011 Information in this document, including URL and other Internet Web site references, is subject to change without
More informationOverview of Microsoft Office 365 Development
Overview of Microsoft Office 365 Development Office 365 Hands-on lab In this lab, you will work with existing Office 365 apps. This document is provided for informational purposes only and Microsoft makes
More informationHyper-V Server 2008 Setup and Configuration Tool Guide
Hyper-V Server 2008 Setup and Configuration Tool Guide Microsoft Corporation Published: October 2008 Author: Cynthia Nottingham Abstract This guide will help you set up and configure Microsoft Hyper-V
More informationRedBlack CyBake Online Customer Service Desk
RedBlack CyBake Online Customer Service Desk Publication Date: June 2014 Copyright Copyright 2014 RedBlack Software Ltd. All rights reserved. Complying with all applicable copyright laws is the responsibility
More informationHow To Use Pretty Good Privacy (Pgp) For A Secure Communication
Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security
More informationProduct Development. Using Critical Path EVM for the Microsoft Project Desktop Application Readme
Product Development Using Critical Path EVM for the Microsoft Project Desktop Application Readme Published: June 2009 Table of Contents Introduction... 1 System Requirements... 1 Installing the Critical
More informationCentrify Mobile Authentication Services for Samsung KNOX
Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under
More informationHyper-V Server 2008 Getting Started Guide
Hyper-V Server 2008 Getting Started Guide Microsoft Corporation Published: October 2008 Author: Cynthia Nottingham Abstract This guide helps you become familiar with Microsoft Hyper-V Server 2008 by providing
More informationMicrosoft Dynamics GP. Pay Steps for Human Resources Release 9.0
Microsoft Dynamics GP Pay Steps for Human Resources Release 9.0 Copyright Copyright 2006 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
More informationWindows BitLocker Drive Encryption Step-by-Step Guide
Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft
More informationFLoader User's Manual
FLoader User's Manual Version 1.0.07 Build February 12, 2002 Copyright Topcon Positioning Systems, Inc. 2002 All rights reserved Last Revised February 14, 2002 INTRODUCTION / TERMS AND CONDITIONS Thank
More informationTechniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab
Techniques of Asymmetric File Encryption Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Abstract As more and more people are linking to the Internet, threats to the
More informationBMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
More informationIntellectual Property
Intellectual Property Ethics and Computing Chapter 8 Summer 2001 CSE 4317: Intellectual Property 1 Motivation Most new ideas in the computer field involve intellectual property Intellectual property must
More informationORACLE CRM ON DEMAND DEVELOPMENT ADDENDUM TO THE ORACLE PARTNERNETWORK AGREEMENT
ORACLE CRM ON DEMAND DEVELOPMENT ADDENDUM TO THE ORACLE PARTNERNETWORK AGREEMENT This Oracle CRM On Demand Development Addendum (the " CRM On Demand Addendum ") is between you ( Developer ) and the Oracle
More informationWhat Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
More informationSCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
More informationMicrosoft Solutions for Security. Delivering the Windows Server 2003 Security Guide
Microsoft Solutions for Security Delivering the Windows Server 2003 Security Guide Information in this document, including URL and other Internet Web site references, is subject to change without notice.
More informationDeploying the Workspace Application for Microsoft SharePoint Online
Microsoft Dynamics GP Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Workspace is a method to enable Microsoft Excel-based dashboards for SharePoint Online. This
More informationThe Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler Rebecca.cutler@tufts.edu Mentor: Professor Chris Gregg Abstract Modern day authentication systems
More informationMicrosoft Dynamics GP. Bank Reconciliation
Microsoft Dynamics GP Bank Reconciliation Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
More informationHow to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
More informationContent Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
More informationPrinceton University Computer Science COS 432: Information Security (Fall 2013)
Princeton University Computer Science COS 432: Information Security (Fall 2013) This test has 13 questions worth a total of 50 points. That s a lot of questions. Work through the ones you re comfortable
More informationThe 2007 R2 Version of Microsoft Office Communicator Mobile for Windows Mobile: Frequently Asked Questions
The 2007 R2 Version of Microsoft Office Communicator Mobile for Windows Mobile: Frequently Asked Questions Published: December 2008 Information in this document, including URL and other Internet Web site
More informationInsight Guide. Encryption: A Guide
Encryption: A Guide for Beginners If you read anything about information security, you re likely to have come across the word encryption. It s a fundamental building block when it comes to securing your
More informationCompany Profile. Dhyey Consulting Services Pvt. Ltd. Directors. Solutions. Partners. June 18 th 2013. Nilesh Mandani Nilesh Panchal Sahil Amin
Company Profile Dhyey Consulting Services Pvt. Ltd. June 18 th 2013 Directors Nilesh Mandani Nilesh Panchal Sahil Amin Solutions Enterprise Resource Planning Customer Relationship Management Business Intelligence
More informationWINDOWS 7 & HOMEGROUP
WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows
More informationHow To Create An Intelligent Infrastructure Solution
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
More informationSY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
More informationCredit Card Extension White Paper
Credit Card Extension White Paper March 2010 Copyright Copyright 2004 Azox, Inc.. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the
More informationSamsung KNOX EMM Authentication Services. SDK Quick Start Guide
Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license
More informationCustomizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step
Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step Guide Microsoft Corporation Published: July 2009 Updated: September 2009 Abstract Remote Desktop Web Access (RD Web
More informationModule 1: Introduction to Designing Security
Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case
More informationWindows Azure Pack Installation and Initial Configuration
Windows Azure Pack Installation and Initial Configuration Windows Server 2012 R2 Hands-on lab In this lab, you will learn how to install and configure the components of the Windows Azure Pack. To complete
More informationMobile Money Payment Gateway System - An Overview of System Process. Prepared by: Neowave E-commerce Team Version 1.0 25/2/2006
Mobile Money Gateway System - An Overview of System Process Prepared by: Neowave E-commerce Team Version 1.0 25/2/2006 PAYMENT MODE 1 - REMOTE PAYMENT REMOTE OR DELAYED ORDERING PAYMENT BY SECURITY PIN
More informationNew VoIP Solutions in Windows Embedded CE 6.0 R2
New VoIP Solutions in Windows Embedded CE 6.0 R2 Writer: Douglas Boling Published: November 2007 Summary: Windows Embedded CE 6.0 R2 contains new VoIP solutions. This paper describes those VoIP Solutions
More informationThe Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore hongjun@i2r.a-star.edu.sg Abstract. In this report, we point out a serious security flaw in Microsoft
More informationHIPAA: The Role of PatientTrak in Supporting Compliance
HIPAA: The Role of PatientTrak in Supporting Compliance The purpose of this document is to describe the methods by which PatientTrak addresses the requirements of the HIPAA Security Rule, as pertaining
More informationZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
More informationCINSAY RELEASE NOTES. Cinsay Product Updates and New Features V2.1
CINSAY RELEASE NOTES Cinsay Product Updates and New Features V2.1 2011, 2012, 2013 Cinsay, Inc. All rights reserved. Use of the Cinsay software to which this document relates is governed by, and subject
More informationUnderstanding Automotive EDI Automating and Integrating EDI for Increased Efficiency and Improved Delivery Performance
WHITE PAPER Understanding Automotive EDI Automating and Integrating EDI for Increased Efficiency and Improved Delivery Performance September 1, 2010 Written by Donna M. Ward PMP and former co-chair of
More informationProduct Information about. GEDO-TEC ContactManager
Product Information about GEDO-TEC ContactManager Page 1 of 11 Licence Information: GEDO-TEC Software is try-before-buy software. This means: 1. All copyrights to GEDO-TEC ContactManager are exclusively
More informationOne Time Pad Encryption The unbreakable encryption method
One Time Pad Encryption The unbreakable encryption method One Time Pad The unbreakable encryption method One Time Pad encryption is a very simple, yet completely unbreakable cipher method. It has been
More informationMicrosoft Dynamics GP. Bill of Materials
Microsoft Dynamics GP Bill of Materials Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
More informationSage CRM Connector Tool White Paper
White Paper Document Number: PD521-01-1_0-WP Orbis Software Limited 2010 Table of Contents ABOUT THE SAGE CRM CONNECTOR TOOL... 1 INTRODUCTION... 2 System Requirements... 2 Hardware... 2 Software... 2
More informationEnhancing VoIP with Voice Peering
Enhancing VoIP with Voice Peering The Voice Peering Fabric is a service of Stealth Communications. Jinci Liu, Stealth Communications, Inc. Published: July 2005 (last revised January 2006) Abstract From
More informationHardware & Software Requirements for BID2WIN Estimating & Bidding, the BUILD2WIN Product Suite, and BID2WIN Management Reporting
Hardware & Software s for BID2WIN Estimating & Bidding, the BUILD2WIN Product Suite, and BID2WIN Management Reporting BID2WIN Software, Inc. Updated 05/08/2012 Abstract This document describes the hardware
More informationMicrosoft Dynamics GP. Payroll Connect
Microsoft Dynamics GP Payroll Connect Copyright Copyright 2005 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
More informationHP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
More informationInstallation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
More informationbest practices for encryption in android
best practices for encryption in android SUBHEADER VALUE PROPOSTION STATEMENT GOES HERE developer.motorola.com/enterprise WHITE PAPER BEST PRACTICES FOR ENCRYPTION IN ANDROID 2 introduction Android has
More informationBusiness Portal for Microsoft Dynamics GP. Requisition Management User s Guide Release 10.0
Business Portal for Microsoft Dynamics GP Requisition Management User s Guide Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws
More informationProtecting Microsoft Internet Information Services Web Servers with ISA Server 2004
Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents
More informationCentrify Mobile Authentication Services
Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject
More informationReprinted with permission from the January 2004 issue of the Intellectual Property & Technology Law Journal.
Reprinted with permission from the January 2004 issue of the Intellectual Property & Technology Law Journal. Beyond the NDA: Digital Rights Management Isn t Just for Music By Adam Petravicius and Joseph
More informationWindows Embedded Compact 7: RemoteFX and Remote Experience Thin Client Integration
Windows Embedded Compact 7: RemoteFX and Remote Experience Thin Client Integration Windows Embedded Technical Article Summary: Microsoft RemoteFX is a new Windows Server 2008 R2 SP1 feature that enables
More informationCounter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
More informationCompter Networks Chapter 9: Network Security
Goals of this chapter Compter Networks Chapter 9: Network Security Give a brief glimpse of security in communication networks Basic goals and mechanisms Holger Karl Slide set: Günter Schäfer, TU Ilmenau
More informationLecture 12: Software protection techniques. Software piracy protection Protection against reverse engineering of software
Lecture topics Software piracy protection Protection against reverse engineering of software Software piracy Report by Business Software Alliance for 2001: Global economic impact of software piracy was
More informationDeploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide
Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide Microsoft Corporation Published: October 2010 Abstract This step-by-step guide walks you through the
More informationVeeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
More informationICOM 5018 Network Security and Cryptography
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic techniques. Cryptographic algorithms and protocols
More informationIMPLEMENTATION GUIDE. API Service. More Power to You. May 2008. For more information, please contact support@zedo.com
IMPLEMENTATION GUIDE API Service More Power to You May 2008 For more information, please contact support@zedo.com Implementation Guide ZEDO API Service Disclaimer This Implementation Guide is for informational
More informationSafeNet MSSQL EKM Provider User Guide
SafeNet MSSQL EKM Provider User Guide Version 4.8.5 Documentation Version: 20080705 Copyright Information 2009 SafeNet, Inc. All rights reserved All intellectual property is protected by copyright. All
More informationACER ProShield. Table of Contents
ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...
More informationEventTracker: Configuring DLA Extension for AWStats Report AWStats Reports
EventTracker: Configuring DLA Extension for AWStats Report AWStats Reports Publication Date: Oct 18, 2011 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About This Guide Abstract
More informationWhitepaper: Centeris Likewise Identity 3.0 Security Benefits
Whitepaper: Centeris Likewise Identity 3.0 Security Benefits Author: Manny Vellon VP, Product Development Centeris Corporation Abstract This document describes how Centeris Likewise Identity improves the
More informationSmoothWall Virtual Appliance
SmoothWall Virtual Appliance Quick Start Guide Quick Deployment Guide Quick Start Guide Winfrasoft SmoothWall Appliance Quick Start Guide Published: May 2013 Applies to: Winfrasoft Gateway Appliance Web
More informationA Microsoft U.S. Public Sector White Paper by Ken Page and Shelly Bird. January 2009. www.microsoft.com/ government
Federal Server Core Configuration (FSCC) A high-level overview of the value and benefits of deploying a single, standard, enterprise-wide managed server environment A Microsoft U.S. Public Sector White
More informationWHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
More informationMicrosoft Dynamics GP. Check Printing
Microsoft Dynamics GP Check Printing Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting
More informationMicrosoft Dynamics GP. Electronic Signatures
Microsoft Dynamics GP Electronic Signatures Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without
More informationDISCLAIMER, TERMS & CONDITIONS OF USE
DISCLAIMER, TERMS & CONDITIONS OF USE Welcome to Universal Devices, Inc.'s online website. By accessing and using this website, you acknowledge that you have read, agree to, and are aware of the following
More informationSecuring Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
More informationDell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide
Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationCanon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT
Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT This Webview Livescope Software Development Kit Developer License ("Agreement") between you, the "Developer" and the
More informationSecurity Guide for the BD Remote Instrument Support Solution BD Biosciences workstations
Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations 11/2010 This document includes the following topics: About this guide (page 2) TeamViewer remote desktop support
More information