Fortigate worthy changeover to leaving Microsoft Forefront T...



Similar documents
Microsoft TMG Replacement. How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

FortiOS Handbook - Authentication VERSION 5.2.6

User Authentication. FortiOS Handbook v3 for FortiOS 4.0 MR3

Fortigate Features & Demo

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

High Performance NGFW Extended

FortiOS Handbook Authentication for FortiOS 5.0

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

USER GUIDE. FortiGate SSL VPN User Guide Version 3.0 MR5.

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

USER GUIDE. FortiOS v3.0 MR7 SSL VPN User Guide.

A Guide to New Features in Propalms OneGate 4.0

Feature Brief. FortiGate TM Multi-Threat Security System v3.00 MR5 Rev. 1.1 July 20, 2007

Network Configuration Settings

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Novell Access Manager SSL Virtual Private Network

FortiOS Handbook - PCI DSS Compliance VERSION 5.4.0

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

Please report errors or omissions in this or any Fortinet technical document to

Managing a FortiSwitch unit with a FortiGate Administration Guide

Move over, TMG! Replacing TMG with Sophos UTM

NETASQ MIGRATING FROM V8 TO V9

Configuration Guide BES12. Version 12.2

FortiAuthenticator. User Authentication and Identity Management. Last Updated: 17 th April Copyright Fortinet Inc. All rights reserved.

FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3

Simple security is better security Or: How complexity became the biggest security threat

Advanced Threat Protection Framework: What it is, why it s important and what to do with it

Configuration Guide BES12. Version 12.1

How To Authenticate An Ssl Vpn With Libap On A Safeprocess On A Libp Server On A Fortigate On A Pc Or Ipad On A Ipad Or Ipa On A Macbook Or Ipod On A Network

Chapter 6 Virtual Private Networking Using SSL Connections

Last Order Date (LOD) End of Order (EOO) ASM-ET4 Module 06/19/ /19/ /19/2016 ASM-FB4 ASM-FB4-G

FortiOS Handbook SSL VPN for FortiOS 5.0

Building Your Complete Remote Access Infrastructure on Windows Server 2012

FortiOS Handbook - SSL VPN VERSION 5.2.4

Security. TestOut Modules

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Administration Guide. FortiAuthenticator 1.3

A viable alternative to TMG / UAG Web Application security, acceleration and authentication with DenyAll s DA-WAF

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

TECHNICAL NOTE. FortiGate Traffic Shaping Version

Preparing for GO!Enterprise MDM On-Demand Service

FortiAuthenticator - Two-Factor Authentication Agent for Windows VERSION 1.0

WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560

How To Configure Fortigate For Free Software (For A Free Download) For A Password Protected Network (For Free) For An Ipad Or Ipad (For An Ipa) For Free (For Ipad) For Your Computer Or Ip

Clientless SSL VPN Users

SonicWALL PCI 1.1 Implementation Guide

Configuring Global Protect SSL VPN with a user-defined port

Technical Brief ActiveSync Configuration for WatchGuard SSL 100

Securing The Enterprise

Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3

Mobile Configuration Profiles for ios Devices Technical Note

HA OVERVIEW. FortiGate FortiOS v3.0 MR5.

INTRODUCTION TO FIREWALL SECURITY

Transport server data paths

Astaro Gateway Software Applications

Configuration Guide BES12. Version 12.3

Connecting an Android to a FortiGate with SSL VPN

FortiManager Centralized Device Management

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Controlling Web 2.0 Applications in the Enterprise SOLUTION GUIDE

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Network Configuration/Bandwidth Planning Scope

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Ensuring the security of your mobile business intelligence

FortiOS Handbook - Getting Started VERSION 5.2.2

FortiOS Handbook - Load Balancing VERSION 5.2.2

Introducing the FirePass and Microsoft Exchange Server configuration

Networking for Caribbean Development

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

TMG Replacement Guide

Preventing credit card numbers from escaping your network

FortiOS Handbook What s New for FortiOS 5.0

SSL VPN Portal Options

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Fortinet Network Security NSE4 test questions and answers:

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

FortiAuthenticator - What's New Guide VERSION 4.0

Endpoint Security VPN for Mac

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Sophos UTM. Remote Access via SSL Configuring Remote Client

Step-by-Step Configuration

USER GUIDE. FortiGate SSL VPN User Guide Version 3.0 MR4.

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

FortiOS Handbook Install and System Administration for FortiOS 5.0

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Understanding Microsoft Web Application Security


EXPLORER. TFT Filter CONFIGURATION

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

INSTALL GUIDE. FortiGate-60 series and FortiGate-100A FortiOS 3.0 MR4.

Vantage Report. User s Guide. Version /2006 Edition 1

Network protection and UTM Buyers Guide

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Network Intrusion Prevention Systems (IPS) Frequently Asked Questions FAQ

Transcription:

Sysmagazine geek daily blog Home (/) Categories (/categories/) Companies (/companies/) Contact us (/contact/) Fortigate worthy changeover to leaving Microsoft Forefront TMG MUK (/companies/muk/) Network technologies (/categories/network_technologies/) 9 months, 2 weeks ago For all for a long time already not a secret that the Microsoft company declared termination of the further development of product Forefront TMG (http://blogs.technet.com/b/server-cloud/archive/2012/09/12/importantchanges-to-forefront-product-roadmaps.aspx). Thus, the product became inaccessible to acquisition since December, 1st, 2012, its main support will be stopped after April, 14th, 2015, and the expanded support ends on April, 14th, 2020. Remained in the help Forefront Unified Access Gateway (UAG) for the publication of web resources such as: MS Exchange, SharePoint, Lync etc., does not provide the safety features given earlier by means of TMG that is represented in the small comparative table of functions: And time came talk about necessary safety features, we mark short out, with what of them TMG was capable to make happy us, users: The internetwork shield; Web proxy; Reverse proxy for the publication of internal resources; Web and an Email-filtration; Protection against a harmful/spying software; 1 von 22 15.11.14 22:26

System of preventing of irruptions (IPS); SSL-traffic inspection; Loading equalization; Remote access of users and functional VPN, as a client - server (client-to-site), and between platforms (siteto-site). Thus, before users TMG sooner or later (proceeding from the insonified finite dates of a support) the question on a choice and the subsequent migration on analogous products of indirect vendors appears. So, some of the companies (Sophos, Citrix, Cyberoam, WatchGuards, Kemp, etc.) already began the operating periods (I think, such tautology would be pertinent) on the active advancing of programm and-or apparatus solutions and give full-function alternative smoothly and inevitably leaving notorious TMG. It proves to be true presence in a network of advertizing flyers, actions and other marketing materials in a type ²TMG Replacement Guide, ² {Vendorname} VS. TMG Comparsion etc. The Fortinet company went by same means, as remaining vendory and for today also offers the ² Microsoft TMG Replacement on the basis of a leader of a ruler of own products of network safety FortiGate. As itself TMG (Threat Management Gateway) it was positioned as the solution of unitized control by threats that and to search to it for changeover logically just from among UTM. Therefore, glancing in Kvadrat Gartnera: www.gartner.com/technology/reprints.do?id=1-1h1ro5d&ct;=130710&st;=sb (http:// www.gartner.com/technology/reprints.do?id=1-1h1ro5d&ct=130710&st=sb), ²magicheski the Fortinet in leadership among UTM-decisions is visible here, and this leadership is already enough long-time almost 6 last years. So, we get down to detailed reviewing of provided functions offered ²alternativnym the solution capable, by words vendora, to render equivalent changeover to our subject. Actually, a Fortinet sentence is migration on FortiGate the following list of functions: Here, first of all, it would be desirable to tell that for the large factories in the presence of a difficult network infrastructure, it is recommended to divide the tasks and to use separate uzkonapravlennye solutions. The Fortinet, in particular, can offer implementation such partite and purposeful, but, at the same time floppy and easily scalable approach by means of rulers of the equipment of Fortinet: FortiWeb Web Application Firewall, the solution for protection of web resources and applications (including implementation Reverse Proxy with the protected publication of web resources); FortiMail, complex antispam-decision for mail protection; FortiBalancer, FortiADC, Coyote Point Equalizer all rulers balansirovshchikov loading and control units of delivery of applications. For support of the full series of measures on the network safety, all is better for adding it and switching-on in an 2 von 22 15.11.14 22:26

infrastructure most FortiGate, however, the small and average factories can manage only services of this solution in apparatus, or the virtual modification. So, what provides FortiGate in a section analogous with TMG functions? In turn them we will consider through a prism of changeover TMG, and at the same time and in a general way we familiarize with abilities FortiGate. the Internetwork shield The internetwork shield the beginning of the beginnings of a filtering of undesirable connections from the outside, from the Internet in a corporate network. At the same time, it is necessary to keep account, control and demarcation of access of users from within networks to exterior resources. Therefore, besides a package filtering, translation of addresses and ports, a support of deep inspection of packets with check on a fitting to the existing joint (Stateful/Deep Packet Inspection), FortiGate it first of all a platform of complex protection of a network, under control of a uniform operating system FortiOS with a totality of intrinsic functions of safety, such as: an antivirus, antispam, control of applications, system of preventing of irruption, a web filtering, preventing of leak of the data and other. At all wide dial-up of functionality, the standard policy for web access of users from an internal network in the Internet, created in web interface FortiGate, will look so: the Web proxy One of the oldest and most used functions TMG for provision of access of users to the Internet without additional authentification. 3 von 22 15.11.14 22:26

In FortiGate there is a function ²Explicit web proxy for transmission through a proxy of sessions on HTTP (HTTPS) and FTP, plus a support of an auto-configuration by means of a PAC-file. Also, thanking completely integrated in FortiGate functions Single Sign-On (SSO), possibility to interact with the domain control unit (an Active Directory, Novell edirectory) is accessible and to control access autentifitsirovannyh users, applying to certain groups of the domain the necessary rights and possibilities. In addition to it, functions of virus protection, irruption preventing can be included in such security policies, a web filtering and control of applications. Web proxy switching-on is carried out on demanded (th) interface () ( ²port1 in the upper picture) and creation of an allowing policy (in a picture from below): 4 von 22 15.11.14 22:26

5 von 22 15.11.14 22:26

Implementation Single Sign-On can be carried out in several ways: 1. Using the special program-agent on the domain control unit ( DC Agent ) DC Agent a programm component in the form of separate service of tracking loggings in of the users, installed on the domain control unit. It interacts with FortiGate not directly, and through a collecting channel-agent (Collector Agent). Collector Agent it is installed on any server or, besides, on the domain control unit. The agent gains the information on loggings in of users and exchanges it with FortiGate. The amount of the installed agents can be more than one for fail safety. 2. Inquiry Collector Agent а Such method also provides setting of an additional software in the form of Collector Agent, but on the control unit of the domain it is not necessary to install service DC Agent. Collector Agent it is possible to install in any place of a network (it is desirable on any of Windows-servers) and then it can interrogate the domain control unit about events of authentification of users (²logonah ). Inquiry mechanisms are carried out by means of Windows NetAPI or Security event log. 6 von 22 15.11.14 22:26

3. Inquiry directly with FortGate Since FortiOS versions 5, the inquiry mechanism logonov from the domain control unit has been completely built in in FortGate. Thus, for inquiry it is used only Security event log, and the method of usage is positioned as for small network infrastructures, there where there is no possibility to install Collector Agent on network ambit. However, thus, it is not necessary to forget that FortGate if relieves you of superfluous efforts with software setting that takes loading on storage in storage of structure of the domain and inquiry logonov users on itself. 4. NTLM-autentifikatsija Authentification usage on NTLM, demands for an exchange with FortGate installed Collector Agent on network ambit. At request of the URL-address in the browser of the user, FortGate requests its blast-furnace registration data (login/password), gains them through the browser, checks at Collector Agent a fitting of the user to groups of the domain and gives access to resources according to the group security policy. 7 von 22 15.11.14 22:26

5. Terminal servers Users who gain access to corporate resources through terminal servers of Microsoft or Citrix, have one general address or a pool instead of own IP address. For application to such users of security policies by means of SSO, the Fortinet have a next programm component Terminal Server Agent (TS Agent), installed on the most terminal server. It selects the given range of ports for each user and exchanges this information with Collector Agent which, in turn knows about a fitting of the user to the blast-furnace groups, and to what groups to give what dial-up of resources and what to apply knows a policy FortiGate. The agent so looks: 8 von 22 15.11.14 22:26

In completion of the description of implementation SSO it would be desirable to mark also that the vendor is aimed to functionality development even in the most low models UTM. In acknowledging to it, in 2012 the output of cardinally worked overtime version of OS FortiOS 5 from among which developments there was also support Terminal Server Agent, and more correct operation SSO as a whole, with its above described abundance of variations of application and an auxiliary software has been announced. Though check, though muster, and taking the last versions of a software: Collector Agent, DC Agent, TS Agent in a combination with FortiGate on version FortiOS 5.0.4 and above all will work like clock-work. And if it will be interesting to comprehend tajnosti SSO and we will be entrained in details about it ²pesat ischo since this subject deserves separate paper. Passing to a part of application of security policies, we look, as it will look on FortiGate at successfully tuned programm components SSO: 9 von 22 15.11.14 22:26

The applied rule for access of specific group or the user looks so: More differentiated politicians with assemblage of different blast-furnace groups give more possibilities for control of access of users to network resources. 10 von 22 15.11.14 22:26

Publication OWA/SharePoint The main aspects of a question of the publication of web resources Outlook Web Access or SharePoint is the following: Translation of an exterior IP address; the Exchange of certificates with users from the outside. To begin with we need to import the certificate, it becomes so: From the necessary menu simply select the certificate and push APPRX. Further, for adjustment reverse-proxy it is necessary to adjust loading equalization. We create for this purpose the virtual server: 11 von 22 15.11.14 22:26

For the virtual server it is necessary to define the real server: Final stage, we create a security policy where we allow the traffic from the outside: 12 von 22 15.11.14 22:26

The entering interface (Incoming Interface) in that case will be exterior, the start address (Source Address) will be ²all, and the assignment address (Destination Address) just created virtual server. In the capacity of service, we pass HTTPS since the exchange of the traffic will happen only on HTTPS, and bolshego and it is not necessary to us. As well as in a normal proxy, there is a possibility to expand a safety feature, including in a policy profiles: Virus protection; Systems of preventing of irruption (IPS); Control of applications (here we can restrict or trace that except the necessary application others are not used); URL-filtrations. SSL-traffic Inspection One more important function at migration with TMG this inspection of the SSL-traffic. Turnes on as simplis as well as remaining safety features preadjusted by a profile in the politician. 13 von 22 15.11.14 22:26

As the exchange of certificates is pellucid for the ultimate user in a network, it is possible to use standard built in from vendora and if the internal server will have own self-signed certificate it is possible to include simply ²Allow invalid SSL Certificates, after all they will be perceived as incorrect since do not figure in the list entrusted Certificate Authority (CA). In a section of the publication of web resources on FortiGate, inspection adjustment refers to only to published application and will not touch the remaining traffic, however SSL-inspection function can be used and for more detailed control of the SSL-traffic of ultimate users in corporate security policies. Control of applications To involve function of control of applications it is necessary to create ²sensor applications. It is the same a profile, only in a profile :) We look: 14 von 22 15.11.14 22:26

In our case, it is possible and it is necessary to select specific application, switching sensor control type on ²Specify Applications and a search method to find the necessary application: System of preventing of irruptions For switching-on in a security policy the sensor control for IPS is again necessary: it that through the web interface it is impossible to create the filter on application, but it it is possible to make the only thing of the CLI-console, executing such commands or copying them as a script: 15 von 22 15.11.14 22:26

config ips sensor edit "OWA-Publishing" config entries edit 2 end next end next set application IIS MS_Exchange set location server After creation in CLI the filter, in it it is possible to apply any signatures only for IIS and Exchange. One more ²nejavnaja function this writing of the IPS-signature for access blocking at trying to inject the wrong password. For creation that for OWA 2012 it will look as follows: config ips custom edit "MS.OWA.Login. Error" set comment" set signature "F-SBID (- attack_id 3608; - name \" MS.OWA.Login. Error \"; - pr otocol tcp; - service http; - flow from_server, reversed; - pattern \" <div class = 2 2 signinerror 22 20 role= 22 alert 22 > \"; - context body; - no_case; - pattern! \" < 2F div> \"; - context body; - no_case; - within_abs 20; - rate 3,180;)" next end Here parameter ² - rate 3,180; symbolizes an amount of false errors of password entry (3) and a time of lock of the user on its IP address in seconds (180). Protection against a harmful/spying software The antivirus profile looks so: 16 von 22 15.11.14 22:26

As we see, besides HTTP there are still other types of the traffic (SMTP, POP3, IMAP, MAPI, FTP). We have enough for the publication only HTTP (S). So, we collect this all together. We create a policy for ours reverse-proxy with the publication, from the outside in a corporate network, to be exact on servers of web applications, plus is included all tuned profiles and sensor controls, including SSL-inspection: 17 von 22 15.11.14 22:26

Publication Lync Now, when we in details considered the problem publications OWA/SharePoint with the full possible feature set of safety, it is necessary to mark that publication Lync as web applications happens on FortiGate practically under the same circuit (translation of addresses, an exchange of certificates, protection by functions UTM) and on the same protocols, except for necessity appearance to control as well traffic SIP: 18 von 22 15.11.14 22:26

To consider and such aspect, besides the presented possibilities, in FortiGate support SIP ALG (Application Level Gateway) an application layer gateway which provides detailed inspection and traffic SIP filtering is built in. As well as many functions FortiGate, SIP ALG deserved at the vendor of a separate manual therefore its detailed reviewing also deserves separate paper in the future. Remote access of users and a VPN-network The virtual private networks VPN and the protected scrambled access with their help of remote users to corporate resources of a network or tunnels between the spaced apart platforms of the factories, are very widely used already a time considerable quantity, and TMG here is not unique and unique, providing us the given functional. FortiGate too not panacea but to search for the solution for VPN on the side knowing, as here all of us can already make ²iz boxes it, forgive, moveton. And we made a reservation still in the beginning that the solution our full-function, we will not trick therefore and we will continue with migration of all functions TMG. So, what it is had? We have support L2TP/IPSec and IPsec VPN for so-called ²site-to-site connections and SSL-VPN for remote access from any point that quite approaches for ²client-to-site. 19 von 22 15.11.14 22:26

For IPsec some variations, a-lja static or ²Dialup -connections (having the static address on one side and dynamic from tunnel remote end), Dynamic DNS are accessible. Tunnels are under construction both between FortiGate ами, and between the PC and FortiGate by means of additional software FortiClient. There is an assemblage of authentifications (local groups of users, identifiers of a local and remote node, certificates X.509, the registration data of groups of an Active Directory). SSL it is presented by two regimes web portal and tunnel. Web portals are intended for sweeping access to corporate resources from a web browser that is especially actual for thin clients and mobile devices. In such regime, FortiGate serves as protected HTTP/HTTPS the gateway, and autentifitsiruet users, giving to them then access to a web portal where resources HTTP/HTTPS, telnet, FTP, SMB/CIFS, VNC, RDP, SSH and other are accessible. The tunnel regime offers access to any application to a corporate network, but is for this purpose installed FortiClient or its separate part FortiClient SSL VPN application. FortiClient supports many OS: Windows, Mac OS X, Apple ios and Android. One more of types of additional authorization for VPN is two-factor authentication by means of the apparatus oscillator of one-time passwords FortiToken or softvarnogo FortiTokenMobile for mobile devices. In general, the VPN-FUNCTIONAL is besides wide enough and in all beauty is presented on a couple of hundreds pages, but, at the same time, having a little trained (the direct arm) it is possible to be controlled easily with numerous tunnels and web portals. At last, we mark also a support of VPN-tunnels with indirect (third-party) vendors, among which connection possibility to cloudy service Windows Azure from Microsoft which too uses 20 von 22 15.11.14 22:26

IPSec VPN. At last, summing up all aforesaid, with confidence we say that the Fortinet in the name of the leader rulers of UTM-devices FortiGate can provide with its purchasing very wide dial-up of functionality for creation of system of complex network safety of the factories of any sizes, leaving thus a gap for growth of their quantity. It is impossible to avoid possibility more uzkoprofilno to reinforce protection by means of separate rulers of the equipment of Fortinet, such as: FortiWeb, FortiMail, FortiBalancer, FortiToken and FortiClient, mentioned by us in the capacity of passage from Microsoft TMG, and also remaining grocery rulers: FortiWifi and FortiAP for creation of the protected wireless communication, centralized control FortiManager, the centralized collection and the papework analysis FortiAnalyzer, protection against DDoS-attacks FortiDDoS, protection of databases FortiDB, web cachings FortiCache, the caching DNS-server FortiDNS, the separate solution for authentification of users FortiAuthenticator, operations ²v rupture at falling out of network devices FortiBridge, switching FortiSwitch and it yet the list end The scalability question is necessary for considering depending on demanded functions, before used in TMG. And if to you attracted FortiGate alone or together with other iron from Fortinet that small enterprises (approximately to 100 users) should pay attention to model FortiGate-90D and more low, and to larger organizations on FortiGate-100D and above since a support of some functions (as well as the price) varies depending on model. In end, from itself it would be desirable to underline that about, whether dostoen FortiGate to become for you not only full-function, but also imperceptible and problemless passage from Microsoft TMG to solve, naturally, to you. As on me it is quite implemented. Anzeige Reiseangebote San Francisco Top 2.5* Hotel inkl. Flug. Jetzt günstig buchen! Fehler: Netzwerk- Zeitüberschreitun ab 1013 ab 949 travelscout24.de Günstige Flüge bei Opodo.de! Flug von Berlin nach San Francisco! opodo.de Der Server unter ads.travelaudience.com braucht zu lange, um eine Antwort zu sende Die Website könnte vorübergehend nicht erreichbar sein, versuchen Sie es bitte sp nochmals. Wenn Sie auch keine andere Website aufrufen können, überprüfen Sie bitte die 21 von 22 15.11.14 22:26

0 Comments sysmagazine! Login Sort by Best Share Favorite Start the discussion ALSO ON SYSMAGAZINE WHAT'S THIS? Notch refused exhaustion Minecraft for Oculus Rift IT daily blog, news, magazine, technologies 1 comment 6 months ago AvatarIT Offshoring this is good that they are trying to make site like facebook. hope they would be able to make it as popular as fb but it wouldn't be that easy to fight with FB.thanks for sharing It are time to pay: non-standard methods of a monetization of a software and numeral content 1 comment 6 months ago AvatarExchange Paypal to Skrill Regardless of what WorldPay forecasts, users will keep relying on credit and debit cards for these kind of transactions between two e-wallet providers Diamond Dash or as it are not necessary to protect the online of application 1 comment 6 months ago AvatarRafhael Henrique B. Araujo what do i need to have all that gold? :O Operation with USB devices in the program on the C in MacOS X IT daily blog, news, magazine, 1 comment 7 technologies months ago Avatarrj HiI'm new to Mac Apps...is that possible to list or access files which is stored on the usb drive using IOKit? any help would be appreciated!thanks 22 von 22 15.11.14 22:26