Low-level Software Security: Attacks and Countermeasures
|
|
- Paulina Bridges
- 5 years ago
- Views:
Transcription
1 Lw-level Sftware Security: Attacks and Cuntermeasures Prf Frank PIESSENS These slides are based n the paper: Lw-level Sftware Security by Example by Erlingssn, Yunan and Piessens
2 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses that prevent / detect explitatin Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 2
3 Intrductin An implementatin-level sftware vulnerability is a bug in a prgram that can be explited by an attacker t cause harm Example vulnerabilities: SQL injectin vulnerabilities (discussed in ther part f the curse) XSS vulnerabilities (discussed in ther part f the curse) Buffer verflws and ther memry crruptin vulnerabilities An attack is a scenari where an attacker triggers the bug t cause harm A cuntermeasure is a technique t cunter attacks These lectures will discuss memry crruptin vulnerabilities, cmmn attack techniques, and cmmn cuntermeasures fr them 3
4 Memry crruptin vulnerabilities Memry crruptin vulnerabilities are a class f vulnerabilities relevant fr unsafe languages ie Languages that d nt check whether prgrams access memry in a crrect way Hence buggy prgrams may mess up parts f memry used by the language run-time In these lectures we will fcus n memry crruptin vulnerabilities in C prgrams These can have devastating cnsequences 4
5 Example vulnerable C prgram #include <stdih> int main() { int ckie = 0; char buf[80]; printf("buf: %08x ckie: %08x\n", &buf, &ckie); gets(buf); if (ckie == 0x ) printf("yu win!\n"); } 5
6 Example vulnerable C prgram #include <stdih> int main() { int ckie; char buf[80]; printf("buf: %08x ckie: %08x\n", &buf, &ckie); gets(buf); } 6
7 Backgrund: Memry management in C Memry can be allcated in many ways in C Autmatic (lcal variables in functins) Static (glbal variables) Dynamic (mallc and new) Prgrammer is respnsible fr: Apprpriate use f allcated memry Eg bunds checks, type checks, Crrect de-allcatin f memry 7
8 Prcess memry layut High addresses Lw addresses Arguments/ Envirnment Stack Unused and Mapped Memry Heap (dynamic data) Static Data Prgram Cde Stack grws dwn Heap grws up 8
9 Memry management in C Memry management is very errr-prne Sme typical bugs: Writing past the bund f an array Dangling pinters Duble freeing Memry leaks Fr efficiency, practical C implementatins dn t detect such bugs at run time The language definitin states that behavir f a buggy prgram is undefined 9
10 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 10
11 Stack based buffer verflw The stack is a memry area used at run time t track functin calls and s Per call, an activatin recrd r stack frame is pushed n the stack, cntaining: Actual parameters, address, autmatically allcated lcal variables, As a cnsequence, if a lcal buffer variable can be verflwed, there are interesting memry lcatins t verwrite nearby The simplest attack is t verwrite the address s that it pints t attacker-chsen cde (shellcde) 11
12 Stack based buffer verflw Stack Return address f0 IP f0: call f1 FP SP Saved Frame Ptr f0 Lcal variables f0 f1: buffer[] verflw() 12
13 Stack based buffer verflw Stack Return address f0 f0: call f1 Saved Frame Ptr f0 Lcal variables f0 Arguments f1 IP f1: buffer[] verflw() FP Return address f1 Saved Frame Ptr f1 Space fr buffer SP 13
14 Stack based buffer verflw Stack Return address f0 f0: call f1 Saved Frame Ptr f0 Lcal variables f0 Arguments f1 IP f1: buffer[] verflw() FP Overwritten address Injected Cde SP 14
15 Very simple shell cde In examples further n, we will use: Real shell-cde is nly slightly lnger: LINUX n Intel: char shellcde[] = "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b" "\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd" "\x80\xe8\xdc\xff\xff\xff/bin/sh"; 15
16 Side-nte: endianness Intel prcessrs are little-endian
17 Stack based buffer verflw Example vulnerable prgram: 17
18 Stack based buffer verflw Or alternatively: 18
19 Stack based buffer verflw Snapsht f the stack befre the : 19
20 Stack based buffer verflw Snapsht f the stack befre the : 20
21 Stack based buffer verflw Snapsht f the stack befre the : 0x0012ff4c 0x xfeeb2ecd 0x x66 \x4c\xff\x12\x00 f f f f \xcd\x2e\xeb\xfe f f f f f 21
22 Stack based buffer verflw Lts f details t get right befre it wrks: N nulls in (character-)strings Filling in the crrect address: Fake address must be precisely psitined Attacker might nt knw the address f his wn string Other verwritten data must nt be used befre frm functin Mre infrmatin in Smashing the stack fr fun and prfit by Aleph One 22
23 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 23
24 Heap based buffer verflw If a prgram cntains a buffer verflw vulnerability fr a buffer allcated n the heap, there is n address nearby S attacking a heap based vulnerability requires the attacker t verwrite ther cde pinters We lk at tw examples: Overwriting a functin pinter Overwriting heap metadata 24
25 Overwriting a functin pinter Example vulnerable prgram: 25
26 Overwriting a functin pinter And what happens n verflw: 26
27 Overwriting heap metadata The heap is a memry area where dynamically allcated data is stred Typically managed by a memry allcatin library that ffers functinality t allcate and free chunks f memry (in C: mallc() and free() calls) Mst memry allcatin libraries stre management infrmatin in-band As a cnsequence, buffer verruns n the heap can verwrite this management infrmatin This enables an indirect pinter verwrite -like attack allwing attackers t verwrite arbitrary memry lcatins 27
28 Heap management in dlmallc Tp Heap grws with brk() c Backward pinter Frward pinter Other mgmt inf Free chunk User data Dlmallc maintains a dubly linked list f free chunks When chunk c gets unlinked, c s backward pinter is written t *(frward pinter+12) Or: green value is written 12 bytes abve where red value pints Other mgmt inf Chunk in use 28
29 Expliting a buffer verrun Tp Heap grws with brk() c d RA Stack Green value is written 12 bytes abve where red value pints A buffer verrun in d can verwrite the red and green values Make Green pint t injected cde Make Red pint 12 bytes belw a functin address Heap 29
30 Expliting a buffer verrun Tp Heap grws with brk() RA Green value is written 12 bytes abve where red value pints Net result is that the address pints t the injected cde c Stack Heap 30
31 Indirect pinter verwrite This technique f verwriting a pinter that is later dereferenced fr writing is called indirect pinter verwrite This is a bradly useful attack technique, as it allws t selectively change memry cntents A prgram is vulnerable if: It cntains a bug that allws verwriting a pinter value This pinter value is later dereferenced fr writing And the value written is under cntrl f the attacker 31
32 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 32
33 Return-int-libc Direct cde injectin, where an attacker injects cde as data is nt always feasible Eg When certain cuntermeasures are active Indirect cde injectin attacks will drive the executin f the prgram by manipulating the stack This makes it pssible t execute fractins f cde present in memry Usually, interesting cde is available, eg libc 33
34 Return-int-libc: verview Stack Params fr f1 Return addr Params fr f2 Return addr Params fr f3 Cde Memry f1 f2 f3 SP Return addr Return addr IP 34
35 Return-int-libc: verview Stack Params fr f1 Return addr Params fr f2 Return addr Params fr f3 IP Cde Memry f1 f2 f3 SP Return addr 35
36 Return-int-libc: verview Stack Params fr f1 Return addr Params fr f2 Return addr Params fr f3 IP Cde Memry f1 f2 f3 SP Return addr 36
37 Return-int-libc: verview Stack Params fr f1 Return addr Params fr f2 Return addr Params fr f3 Cde Memry f1 f2 f3 SP Return addr IP 37
38 Return-int-libc: verview Stack Cde Memry SP Params fr f1 Return addr Params fr f2 Return addr IP f1 f2 f3 38
39 Return-int-libc: verview Stack Cde Memry SP Params fr f1 Return addr Params fr f2 Return addr IP f1 f2 f3 39
40 Return-int-libc: verview Stack Cde Memry SP Params fr f1 Return addr IP f1 f2 f3 40
41 Return-t-libc What d we need t make this wrk? Inject the fake stack Easy: this is just data we can put in a buffer Make the stack pinter pint t the fake stack right befre a instructin is executed We will shw an example where this is dne by jumping t a trampline Then we make the stack execute existing functins t d a direct cde injectin But we culd d ther useful stuff withut direct cde injectin 41
42 Vulnerable prgram 42
43 The trampline Assembly cde f qsrt: Trampline cde 43
44 Launching the attack 44
45 Unwinding the fake stack Cde Memry VirtualAllc InterlckedEcxh ange SP 45
46 Unwinding the fake stack Cde Memry IP VirtualAllc InterlckedEcxh ange SP 46
47 Unwinding the fake stack Cde Memry IP VirtualAllc InterlckedEcxh ange SP 47
48 Unwinding the fake stack Cde Memry SP IP VirtualAllc InterlckedEcxh ange 48
49 Unwinding the fake stack Cde Memry VirtualAllc SP InterlckedEcxh ange IP 49
50 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 50
51 Data-nly attacks These attacks prceed by changing nly data f the prgram under attack Depending n the prgram under attack, this can result in interesting explits We discuss tw examples: The unix passwrd attack Overwriting the envirnment table 51
52 Unix passwrd attack Old implementatins f lgin prgram lked like this: Stack Hashed passwrd passwrd Passwrd check in lgin prgram: 1 Read lginname 2 Lkup hashed passwrd 3 Read passwrd 4 Check if hashed passwrd = hash (passwrd) 52
53 Unix passwrd attack Stack Hashed passwrd passwrd Passwrd check in lgin prgram: 1 Read lginname 2 Lkup hashed passwrd 3 Read passwrd 4 Check if hashed passwrd = hash (passwrd) ATTACK: type in a passwrd f the frm pw hash(pw) 53
54 Overwriting the envirnment table 54
55 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 55
56 Stack canaries Basic idea Insert a value right in a stack frame right befre the stred base pinter/ address Verify n frm a functin that this value was nt mdified The inserted value is called a canary, after the cal mine canaries 56
57 Stack canaries Stack Return address f0 IP f0: call f1 FP SP Saved Frame Ptr f0 Canary f1: buffer[] verflw() 57
58 Stack based buffer verflw Stack Return address f0 f0: call f1 Saved Frame Ptr f0 Canary Arguments f1 IP f1: buffer[] verflw() FP Return address f1 Saved Frame Ptr f1 Canary SP 58
59 Stack based buffer verflw Stack Return address f0 f0: call f1 Saved Frame Ptr f0 Canary Arguments f1 IP f1: buffer[] verflw() FP Overwritten address Canary SP 59
60 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 60
61 Nn-executable data Direct cde injectin attacks at sme pint execute data Mst prgrams never need t d this Hence, a simple cuntermeasure is t mark data memry (stack, heap, ) as nn-executable This cunters direct cde injectin, but nt -int-libc r data-nly attacks In additin, this cuntermeasure may break certain legacy applicatins 61
62 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 62
63 Cntrl-flw integrity Mst attacks we discussed break the cntrl flw as it is encded in the surce prgram Eg At the surce cde level, ne always expects a functin t t its call site The idea f cntrl-flw integrity is t instrument the cde t check the sanity f the cntrl-flw at runtime 63
64 Example CFI at the surce level The fllwing cde explicitly checks whether the cmp functin pinter pints t ne f tw knwn functins: 64
65 Example CFI with labels 65
66 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 66
67 Layut Randmizatin Mst attacks rely n precise knwledge f run time memry addresses Intrducing artificial variatin in these addresses significantly raises the bar fr attackers Such adress space layut randmizatin (ASLR) is a cheap and effective cuntermeasure 67
68 Example 68
69 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 69
70 Overview 70
71 Need fr ther defenses The autmatic defenses discussed in this lecture are nly ne element f securing C sftware Instead f preventing / detecting explitatin f the vulnerabilities at run time, ne can: Prevent the intrductin f vulnerabilities in the cde Detect and eliminate the vulnerabilities at develpment time Detect and eliminate the vulnerabilities with testing 71
72 Preventing intrductin Safe prgramming languages such as Java / C# take memry management ut f the prgrammer s hands This makes it impssible t intrduce explitable memry safety vulnerabilities They can still be explited fr denial-f-service purpses Explitable vulnerabilities can still be present in native parts f the applicatin
73 Detect and eliminate vulnerabilities Cde review Static analysis tls: Simple grep -like tls that detect unsafe functins Advanced heuristic tls that have false psitives and false negatives Sund tls that require significant prgrammer effrt t anntate the prgram Testing tls: Fuzz testing Directed fuzz-testing / symblic executin
74 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 74
75 Cnclusin The design f attacks and cuntermeasures has led t an arms race between attackers and defenders While significant hardening f the executin f C-like languages is pssible, the use f safe languages like Java / C# is frm the pint f view f security preferable 75
Low-level Software Security: Vulnerabilities, Attacks and Countermeasures
Lw-level Sftware Security: Vulnerabilities, Attacks and Cuntermeasures Prf Frank PIESSENS Reading material: Ulfar Erlingssn, Yves Yunan, Frank Piessens, Lw-level sftware security by example, Handbk f Infrmatin
More informationIntroduction to InfoSec Recitation 2. Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Intrductin t InfSec Recitatin 2 Nir Krakwski (nirkrak at pst.tau.ac.il) Itamar Gilad (itamargi at pst.tau.ac.il) Mre assembly tips Review f the stack Stack verflws Implementatin Tls Tday Little vs Big
More informationCSE 361S Intro to Systems Software Lab #2
Due: Thursday, September 22, 2011 CSE 361S Intr t Systems Sftware Lab #2 Intrductin This lab will intrduce yu t the GNU tls in the Linux prgramming envirnment we will be using fr CSE 361S this semester,
More informationAssignment #5: Rootkit. ECE 650 Fall 2018
General Instructins Assignment #5: Rtkit ECE 650 Fall 2018 See curse site fr due date Updated 4/10/2018, changes nted in green 1. Yu will wrk individually n this assignment. 2. The cde fr this assignment
More informationStealing passwords via browser refresh
Stealing passwrds via brwser refresh Authr: Karmendra Khli [karmendra.khli@paladin.net] Date: August 07, 2004 Versin: 1.1 The brwser s back and refresh features can be used t steal passwrds frm insecurely
More informationMIPS Architecture and Assembly Language Overview
MIPS Architecture and Assembly Language Overview Adapted frm: http://edge.mcs.dre.g.el.edu/gicl/peple/sevy/architecture/mipsref(spim).html [Register Descriptin] [I/O Descriptin] Data Types and Literals
More informationEastern Mediterranean University School of Computing and Technology Information Technology Lecture2 Functions
Eastern Mediterranean University Schl f Cmputing and Technlgy Infrmatin Technlgy Lecture2 Functins User Defined Functins Why d we need functins? T make yur prgram readable and rganized T reduce repeated
More informationLab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2
UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2012 Lab 1 - Calculatr Intrductin In this lab yu will be writing yur first
More informationLAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C
LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C Due: July 9 (Sun) 11:59 pm 1. Prblem A Subject: Structure declaratin, initializatin and assignment. Structure
More information- Replacement of a single statement with a sequence of statements(promotes regularity)
ALGOL - Java and C built using ALGOL 60 - Simple and cncise and elegance - Universal - Clse as pssible t mathematical ntatin - Language can describe the algrithms - Mechanically translatable t machine
More informationImplementation of Authentication Mechanism for a Virtual File System
Implementatin f Authenticatin Mechanism fr a Virtual File System Prject fr Operating Systems Curse (CS 5204) Implemented by- Vinth Jagannathan Abhishek Ram Under the guidance f Dr Dennis Kafura Abstract
More informationMcGill University School of Computer Science COMP-206. Software Systems. Due: September 29, 2008 on WEB CT at 23:55.
Schl f Cmputer Science McGill University Schl f Cmputer Science COMP-206 Sftware Systems Due: September 29, 2008 n WEB CT at 23:55 Operating Systems This assignment explres the Unix perating system and
More informationProject 4: System Calls 1
CMPT 300 1. Preparatin Prject 4: System Calls 1 T cmplete this assignment, it is vital that yu have carefully cmpleted and understd the cntent in the fllwing guides which are psted n the curse website:
More informationLab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2 Iterative Code Design handout Style Guidelines handout
UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2013 Lab 1 - Calculatr Intrductin Reading Cncepts In this lab yu will be
More informationTRAINING GUIDE. Overview of Lucity Spatial
TRAINING GUIDE Overview f Lucity Spatial Overview f Lucity Spatial In this sessin, we ll cver the key cmpnents f Lucity Spatial. Table f Cntents Lucity Spatial... 2 Requirements... 2 Setup... 3 Assign
More informationThe UNIVERSITY of NORTH CAROLINA at CHAPEL HILL
Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Spring 2016 Lab Prject (PART A): A Full Cmputer! Issued Fri 4/8/16; Suggested
More informationPlease contact technical support if you have questions about the directory that your organization uses for user management.
Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP
More informationRISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins)
Intrductin This reference guide is aimed at managers wh will be respnsible fr managing users within RiskMan where RiskMan is nt cnfigured t use netwrk lgins. This guide is used in cnjunctin with the respective
More informationCS4500/5500 Operating Systems Page Replacement Algorithms and Segmentation
Operating Systems Page Replacement Algrithms and Segmentatin Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOSE, OS@Austin, Clumbia, Rchester Recap f
More informationARM Programmer s Model
ARM Prgrammer s Mdel Hsung-Pin Chang Department f Cmputer Science Natinal Chung Hsing University PDF created with FinePrint pdffactry Pr trial versin www.pdffactry.cm Outline ARM Data Types ARM Prcessr
More informationGetting Started with the Web Designer Suite
Getting Started with the Web Designer Suite The Web Designer Suite prvides yu with a slew f Dreamweaver extensins that will assist yu in the design phase f creating a website. The tls prvided in this suite
More informationLecture 6 -.NET Remoting
Lecture 6 -.NET Remting 1. What is.net Remting?.NET Remting is a RPC technique that facilitates cmmunicatin between different applicatin dmains. It allws cmmunicatin within the same prcess, between varius
More informationCS510 Concurrent Systems Class 2. A Lock-Free Multiprocessor OS Kernel
CS510 Cncurrent Systems Class 2 A Lck-Free Multiprcessr OS Kernel The Synthesis kernel A research prject at Clumbia University Synthesis V.0 ( 68020 Uniprcessr (Mtrla N virtual memry 1991 - Synthesis V.1
More informationSOLA and Lifecycle Manager Integration Guide
SOLA and Lifecycle Manager Integratin Guide SOLA and Lifecycle Manager Integratin Guide Versin: 7.0 July, 2015 Cpyright Cpyright 2015 Akana, Inc. All rights reserved. Trademarks All prduct and cmpany names
More informationCSE 3320 Operating Systems Page Replacement Algorithms and Segmentation Jia Rao
CSE 0 Operating Systems Page Replacement Algrithms and Segmentatin Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f last Class Virtual memry Memry verlad What if the
More informationThe UNIVERSITY of NORTH CAROLINA at CHAPEL HILL
Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Designing a mdule with multiple memries Designing and using a bitmap fnt Designing a memry-mapped display Cmp 541 Digital
More informationComputer Organization and Architecture
Campus de Gualtar 4710-057 Braga UNIVERSIDADE DO MINHO ESCOLA DE ENGENHARIA Departament de Infrmática Cmputer Organizatin and Architecture 5th Editin, 2000 by William Stallings Table f Cntents I. OVERVIEW.
More informationUsing SPLAY Tree s for state-full packet classification
Curse Prject Using SPLAY Tree s fr state-full packet classificatin 1- What is a Splay Tree? These ntes discuss the splay tree, a frm f self-adjusting search tree in which the amrtized time fr an access,
More informationCCNA 1 Chapter v5.1 Answers 100%
CCNA 1 Chapter 5 2016 v5.1 Answers 100% 1. What happens t runt frames received by a Cisc Ethernet switch? The frame is drpped. The frame is returned t the riginating netwrk device. The frame is bradcast
More informationHW4 Software Version 3.4.1
Release ntes HW4 Sftware Versin 3.4.1 Change cntrl HW4 versin 3.4.1 includes all the functins and features f HW4 versin 3.4.0 with the fllwing mdificatins and additins: Enhancements: Nne New features Nne
More informationLevel 2 Development Training
Level 2 Develpment Training Level 2 Develpment Training Level 2 Develpment Training Vide Capture RSS 4000 Level 2 Develpment Training Vide Capture Cntents 1 Intrductin... 3 Intrductin... 3 Available Resurces...
More informationEntering an NSERC CCV: Step by Step
Entering an NSERC CCV: Step by Step - 2018 G t CCV Lgin Page Nte that usernames and passwrds frm ther NSERC sites wn t wrk n the CCV site. If this is yur first CCV, yu ll need t register: Click n Lgin,
More informationBANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu
BANNER BASICS What is Banner? Definitin Prduct Mdules Self-Service-Fish R Net Lg int Banner Banner Envirnment The Main Windw My Banner Pages What is it? What frm d yu use? Steps t create a persnal menu
More informationQuick start guide: Working in Transit NXT with a PPF
Quick start guide: Wrking in Transit NXT with a PPF STAR UK Limited Cntents What is a PPF?... 3 What are language pairs?... 3 Hw d I pen the PPF?... 3 Hw d I translate in Transit NXT?... 6 What is a fuzzy
More information$ARCSIGHT_HOME/current/user/agent/map. The files are named in sequential order such as:
Lcatin f the map.x.prperties files $ARCSIGHT_HOME/current/user/agent/map File naming cnventin The files are named in sequential rder such as: Sme examples: 1. map.1.prperties 2. map.2.prperties 3. map.3.prperties
More informationCodeSlice. o Software Requirements. o Features. View CodeSlice Live Documentation
CdeSlice View CdeSlice Live Dcumentatin Scripting is ne f the mst pwerful extensibility features in SSIS, allwing develpers the ability t extend the native functinality within SSIS t accmmdate their specific
More informationMediaTek LinkIt Development Platform for RTOS Memory Layout Developer's Guide
MediaTek LinkIt Develpment Platfrm fr RTOS Memry Layut Develper's Guide Versin: 1.1 Release date: 31 March 2016 2015-2016 MediaTek Inc. MediaTek cannt grant yu permissin fr any material that is wned by
More informationTest Pilot User Guide
Test Pilt User Guide Adapted frm http://www.clearlearning.cm Accessing Assessments and Surveys Test Pilt assessments and surveys are designed t be delivered t anyne using a standard web brwser and thus
More informationMooring system design in anysim. Introduction... 2
1 Mring system design in anysim CONTENTS Page Intrductin... 2 1 Analysis type DynFlatOutput... 3 1.1 CalcEqui and CalcEnvirEqui... 3 1.2 CalcPsSequence... 4 1.3 CalcFrceSequence... 4 2 Analysis type SingleLinePrepar...
More informationMunicode Website Instructions
Municde Website instructins Municde Website Instructins The new and imprved Municde site allws yu t navigate t, print, save, e-mail and link t desired sectins f the Online Cde f Ordinances with greater
More informationTelecommunication Protocols Laboratory Course
Telecmmunicatin Prtcls Labratry Curse Lecture 2 March 11, 2004 http://www.ab.fi/~lpetre/teleprt/teleprt.html 1 Last time We examined sme key terms: prtcl, service, layer, netwrk architecture We examined
More informationIt has hardware. It has application software.
Q.1 What is System? Explain with an example A system is an arrangement in which all its unit assemble wrk tgether accrding t a set f rules. It can als be defined as a way f wrking, rganizing r ding ne
More informationCaseWare Working Papers. Data Store user guide
CaseWare Wrking Papers Data Stre user guide Index 1. What is a Data Stre?... 3 1.1. When using a Data Stre, the fllwing features are available:... 3 1.1.1.1. Integratin with Windws Active Directry... 3
More informationProfiling & Debugging
Prfiling & Debugging CISC 879 Tristan Vanderbruggen & Jhn Cavazs Dept f Cmputer & Infrmatin Sciences University f Delaware 1 Lecture Overview Prfiling and Debugging Why? Tls Data sets Race Cnditin and
More informationLiveEngage and Microsoft Dynamics Integration Guide Document Version: 1.0 September 2017
LiveEngage and Micrsft Dynamics Integratin Guide Dcument Versin: 1.0 September 2017 Cntents Intrductin... 3 Step 1: Sign Up... 3 CRM Widget Signing Up... 3 Step 2: Cnfiguring the CRM Widget... 4 Accessing
More informationHistory of Java. VM (Java Virtual Machine) What is JVM. What it does. 1. Brief history of Java 2. Java Version History
Histry f Java 1. Brief histry f Java 2. Java Versin Histry The histry f Java is very interesting. Java was riginally designed fr interactive televisin, but it was t advanced technlgy fr the digital cable
More informationDate: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems
Date: Octber 2018 User guide Integratin thrugh ONVIF driver. Prepared By: Devices & Integratins Team, Milestne Systems 2 Welcme t the User Guide fr Online Test Tl The aim f this dcument is t prvide guidance
More informationXilinx Answer Xilinx PCI Express DMA Drivers and Software Guide
Xilinx Answer 65444 Xilinx PCI Express DMA Drivers and Sftware Guide Imprtant Nte: This dwnladable PDF f an Answer Recrd is prvided t enhance its usability and readability. It is imprtant t nte that Answer
More informationAscii Art Capstone project in C
Ascii Art Capstne prject in C CSSE 120 Intrductin t Sftware Develpment (Rbtics) Spring 2010-2011 Hw t begin the Ascii Art prject Page 1 Prceed as fllws, in the rder listed. 1. If yu have nt dne s already,
More informationUpgrade Guide. Medtech Evolution General Practice. Version 1.9 Build (March 2018)
Upgrade Guide Medtech Evlutin General Practice Versin 1.9 Build 1.9.0.312 (March 2018) These instructins cntain imprtant infrmatin fr all Medtech Evlutin users and IT Supprt persnnel. We suggest that these
More informationSystems & Operating Systems
McGill University COMP-206 Sftware Systems Due: Octber 1, 2011 n WEB CT at 23:55 (tw late days, -5% each day) Systems & Operating Systems Graphical user interfaces have advanced enugh t permit sftware
More informationEnabling Your Personal Web Page on the SacLink
53 Enabling Yur Persnal Web Page n the SacLink *Yu need t enable yur persnal web page nly ONCE. It will be available t yu until yu graduate frm CSUS. T enable yur Persnal Web Page, fllw the steps given
More informationThe screenshots/advice are based on upgrading Controller 10.1 RTM to 10.1 IF6 on Win2003
Overview The screenshts/advice are based n upgrading Cntrller 10.1 RTM t 10.1 IF6 n Win2003 Other Interim Fix (IF) upgrades are likely t be similar, but the authr cannt guarantee that the dcumentatin is
More informationSmartPass User Guide Page 1 of 50
SmartPass User Guide Table f Cntents Table f Cntents... 2 1. Intrductin... 3 2. Register t SmartPass... 4 2.1 Citizen/Resident registratin... 4 2.1.1 Prerequisites fr Citizen/Resident registratin... 4
More informationClassFlow Administrator User Guide
ClassFlw Administratr User Guide ClassFlw User Engagement Team April 2017 www.classflw.cm 1 Cntents Overview... 3 User Management... 3 Manual Entry via the User Management Page... 4 Creating Individual
More informationKaltura MediaSpace TM Enterprise 2.0 Requirements and Installation
Kaltura MediaSpace TM Enterprise 2.0 Requirements and Installatin Updated Aug 30, 2011 Server Requirements Hardware The hardware requirements are mstly dependent n the number f cncurrent users yu expect
More informationPoint-to-Point Encryption (P2PE)
Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard
More informationWebEx Web Conferencing Quick Start Guide
WebEx Web Cnferencing Quick Start Guide WebEx allws the curse instructr and participants t cnnect using web cnferencing and VIP using yur cmputer r smart device. WebEx's allws yu t share cntent, chat,
More informationUiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash
UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the
More informationCS4500/5500 Operating Systems Processes
Operating Systems Prcesses Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOS3E, OS@Austin, Clumbia, Rchester Recap f the Last Class Cmputer hardware
More informationC pointers. (Reek, Ch. 6) 1 CS 3090: Safety Critical Programming in C
C pinters (Reek, Ch. 6) 1 Review f pinters A pinter is just a memry lcatin. A memry lcatin is simply an integer value, that we interpret as an address in memry. The cntents at a particular memry lcatin
More informationAutomatic imposition version 5
Autmatic impsitin v.5 Page 1/9 Autmatic impsitin versin 5 Descriptin Autmatic impsitin will d the mst cmmn impsitins fr yur digital printer. It will autmatically d flders fr A3, A4, A5 r US Letter page
More informationReading and writing data in files
Reading and writing data in files It is ften very useful t stre data in a file n disk fr later reference. But hw des ne put it there, and hw des ne read it back? Each prgramming language has its wn peculiar
More informationTaiRox Mail Merge. Running Mail Merge
TaiRx Mail Merge TaiRx Mail Merge TaiRx Mail Merge integrates Sage 300 with Micrsft Wrd s mail merge functin. The integratin presents a Sage 300 style interface frm within the Sage 300 desktp. Mail Merge
More informationAnnouncing Veco AuditMate from Eurolink Technology Ltd
Vec AuditMate Annuncing Vec AuditMate frm Eurlink Technlgy Ltd Recrd any data changes t any SQL Server database frm any applicatin Database audit trails (recrding changes t data) are ften a requirement
More informationTo over come these problems collections are recommended to use. Collections Arrays
Q1. What are limitatins f bject Arrays? The main limitatins f Object arrays are These are fixed in size ie nce we created an array bject there is n chance f increasing r decreasing size based n ur requirement.
More informationTIBCO Statistica Options Configuration
TIBCO Statistica Optins Cnfiguratin Sftware Release 13.3 June 2017 Tw-Secnd Advantage Imprtant Infrmatin SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
More informationSummary. Server environment: Subversion 1.4.6
Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin
More informationCS4500/5500 Operating Systems Computer and Operating Systems Overview
Operating Systems Cmputer and Operating Systems Overview Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOS4E, OS@Austin, Clumbia, UWisc Overview Recap
More informationInstallation and Getting Started
Eurstat Data Transmissin Tls & Services EDAMIS Web Applicatin v3.1 Installatin and Getting Started TABLE OF CONTENTS: 1 Intrductin... 2 2 Installatin... 2 2.1 Prerequisites... 2 2.2 EWA installatin...
More informationCreate Your Own Report Connector
Create Yur Own Reprt Cnnectr Last Updated: 15-December-2009. The URS Installatin Guide dcuments hw t cmpile yur wn URS Reprt Cnnectr. This dcument prvides a guide t what yu need t create in yur cnnectr
More informationThe Login Page Designer
The Lgin Page Designer A new Lgin Page tab is nw available when yu g t Site Cnfiguratin. The purpse f the Admin Lgin Page is t give fundatin staff the pprtunity t build a custm, yet simple, layut fr their
More informationChapter 6: Lgic Based Testing LOGIC BASED TESTING: This unit gives an indepth verview f lgic based testing and its implementatin. At the end f this unit, the student will be able t: Understand the cncept
More informationIntegrating QuickBooks with TimePro
Integrating QuickBks with TimePr With TimePr s QuickBks Integratin Mdule, yu can imprt and exprt data between TimePr and QuickBks. Imprting Data frm QuickBks The TimePr QuickBks Imprt Facility allws data
More informationUser Guide. Avigilon Control Center Mobile Version 2.2 for Android
User Guide Avigiln Cntrl Center Mbile Versin 2.2 fr Andrid 2011-2015, Avigiln Crpratin. All rights reserved. Unless expressly granted in writing, n license is granted with respect t any cpyright, industrial
More informationLab 5 Sorting with Linked Lists
UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C WINTER 2013 Lab 5 Srting with Linked Lists Intrductin Reading This lab intrduces
More informationOne reason for controlling access to an object is to defer the full cost of its creation and initialization until we actually need to use it.
Prxy 1 Intent Prvide a surrgate r placehlder fr anther bject t cntrl access t it. Als Knwn As Surrgate Mtivatin One reasn fr cntrlling access t an bject is t defer the full cst f its creatin and initializatin
More informationExtended Vendors lets you: Maintain vendors across multiple Sage 300 companies using the Copy Vendors functionality. o
Extended Vendrs Extended Vendrs is an enhanced replacement fr the Sage Vendrs frm. It prvides yu with mre infrmatin while entering a PO and fast access t additinal PO, Vendr, and Item infrmatin. Extended
More informationParallel Processing in NCAR Command Language for Performance Improvement
Parallel Prcessing in NCAR Cmmand Language fr Perfrmance Imprvement Ping Gu, University f Wyming Mentr: Wei Huang, NCAR C- Mentr: Dave Brwn, NCAR August 1, 2013 Intrductin and Mtivatin ² The NCAR Cmmand
More informationProper Document Usage and Document Distribution. TIP! How to Use the Guide. Managing the News Page
Managing the News Page TABLE OF CONTENTS: The News Page Key Infrmatin Area fr Members... 2 Newsletter Articles... 3 Adding Newsletter as Individual Articles... 3 Adding a Newsletter Created Externally...
More informationImagine for MSDNAA Student SetUp Instructions
Imagine fr MSDNAA Student SetUp Instructins --2016-- September 2016 Genesee Cmmunity Cllege 2004. Micrsft and MSDN Academic Alliance are registered trademarks f Micrsft Crpratin. All rights reserved. ELMS
More informationJava Programming Course IO
Java Prgramming Curse IO By Võ Văn Hải Faculty f Infrmatin Technlgies Industrial University f H Chi Minh City Sessin bjectives What is an I/O stream? Types f Streams Stream class hierarchy Cntrl flw f
More informationPreparation: Follow the instructions on the course website to install Java JDK and jgrasp on your laptop.
Lab 1 Name: Checked: (instructr r TA initials) Objectives: Learn abut jgrasp - the prgramming envirnment that we will be using (IDE) Cmpile and run a Java prgram Understand the relatinship between a Java
More informationUpgrading Kaltura MediaSpace TM Enterprise 1.0 to Kaltura MediaSpace TM Enterprise 2.0
Upgrading Kaltura MediaSpace TM Enterprise 1.0 t Kaltura MediaSpace TM Enterprise 2.0 Assumptins: The existing cde was checked ut f: svn+ssh://mediaspace@kelev.kaltura.cm/usr/lcal/kalsurce/prjects/m ediaspace/scial/branches/production/website/.
More informationUiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash
UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the
More informationEnterprise Installation
Enterprise Installatin Mnnit Crpratin Versin 3.6.0.0 Cntents Prerequisites... 3 Web Server... 3 SQL Server... 3 Installatin... 4 Activatin Key... 4 Dwnlad... 4 Cnfiguratin Wizard... 4 Activatin... 4 Create
More informationWave IP 4.5. CRMLink Desktop User Guide
Wave IP 4.5 CRMLink Desktp User Guide 2015 by Vertical Cmmunicatins, Inc. All rights reserved. Vertical Cmmunicatins and the Vertical Cmmunicatins lg and cmbinatins theref and Vertical ViewPint, Wave Cntact
More informationINSTALLING CCRQINVOICE
INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a
More informationRefreshing Axiom TEST with a Current Copy of Production Axiom EPM June 20, 2014
Refreshing Axim TEST with a Current Cpy f Prductin Axim EPM June 20, 2014 Refreshing Axim TEST If yu maintain an Axim TEST envirnment yu will want t refresh it with a current cpy f yur PROD database when
More informationIMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7
IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 Prepared by: March Haber, march@il.ibm.cm Last Updated: January, 2012 IBM MetaData Wrkbench Enablement Series Table f Cntents: Table f
More informationSTIDistrict AL Rollover Procedures
2009-2010 STIDistrict AL Rllver Prcedures General Infrmatin abut STIDistrict Rllver IMPORTANT NOTE! Rllver shuld be perfrmed between June 25 and July 25 2010. During this perid, the STIState applicatin
More informationSAP Intelligent Notification 365, Service. On-boarding process for SAP Hybris Marketing Cloud / SAP Hybris Marketing customers
SAP Intelligent Ntificatin 365, Email Service On-barding prcess fr SAP Hybris Marketing Clud / SAP Hybris Marketing custmers TABLE OF CONTENTS 1. DOCUMENT HISTORY... 3 2. INTRODUCTION... 4 3. HIGH LEVEL
More informationFaculty Textbook Adoption Instructions
Faculty Textbk Adptin Instructins The Bkstre has partnered with MBS Direct t prvide textbks t ur students. This partnership ffers ur students and parents mre chices while saving them mney, including ptins
More information1 Version Spaces. CS 478 Homework 1 SOLUTION
CS 478 Hmewrk SOLUTION This is a pssible slutin t the hmewrk, althugh there may be ther crrect respnses t sme f the questins. The questins are repeated in this fnt, while answers are in a mnspaced fnt.
More informationCSE3320 Operating Systems Processes Jia Rao
CSE3320 Operating Systems Prcesses Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f the Last Class Cmputer hardware Time-sharing Space-sharing Characteristics } Lcality,
More informationTable of Contents. 1 Introduction Connecting to the API HTTP request syntax API release versions... 4
API Guide Table f Cntents 1 Intrductin... 3 2 Cnnecting t the API... 4 2.1 HTTP request syntax... 4 2.2 API release versins... 4 3 Direct Answer API... 5 3.1 Required parameters... 5 3.2 Optinal parameters...
More informationExperience With Processes and Monitors in Mesa
Advanced Tpics in Cmputer Systems, CS262A Prf. Eric Brewer Experience With Prcesses and Mnitrs in Mesa I. Experience With Prcesses and Mnitrs in Mesa Fcus f this paper: light-weight prcesses (threads in
More informationInfoCitrus Brief Instructions
InfCitrus Brief Instructins In rder t access the CA InfCitrus system, there are number f steps t fllw. Here is a brief verview f these steps: G t the CA website www.citrusaustralia.cm.au Click n the lgin
More informationElement Creator for Enterprise Architect
Element Creatr User Guide Element Creatr fr Enterprise Architect Element Creatr fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins... 3 Installatin... 4 Verifying the
More informationGraduate Application Review Process Documentation
Graduate Applicatin Review Prcess Cntents System Cnfiguratin... 1 Cgns... 1 Banner Dcument Management (ApplicatinXtender)... 2 Banner Wrkflw... 4 Navigatin... 5 Cgns... 5 IBM Cgns Sftware Welcme Page...
More information