Module 52 (Smartphone Pentest Framework)
|
|
- Erick Armstrong
- 6 years ago
- Views:
Transcription
1 (Smartphone Pentest Framework) At the end of this Module, students should understand the purpose of the Smartphone Pentest Framework (SPF). They should understand legal/ethical issues distinguishing smartphone pen testing from other types of pen tests. They should understand how to create and use Android Virtual Device (AVD) emulators using the Android SDK. They should be able to use an AVD(or actual smartphone) as an SPF modem for launching SMS attacks against other smartphones. 1/22
2 Purpose of the Smartphone Pentest Framework Employees use smartphones for their work. Security of smartphones is at risk Remote Vulnerabilities (allow rooting) Client-side Vulnerabilities (browser vulnerabilities) Social Engineering (direct users to pages that exploit vulnerabilities) Local Vulnerabilities (user rootkit or jailbreak) Development was carried out under the DARPA CyberFast program. Goal: make smartphone pen testing easier to do. 2/22
3 Smartphone Special Ethical Legal Issues Do you have permission to hack the device? Get list of phone numbers in scope. Do you have permission to anything you find on the device? Contacts, SMS text, passwords? Is the grantor of the permission legally authorized to give it? What disclosures/disclaimers were given/required of employees? 3/22
4 Architecture Server provides framework functionality from a PC Web server (to exchange information) Mysql database FrameworkAndroidApp.apk can be used to provide (some) functionality from an attached smartphone used as a modem. Vulnerable smartphones are used as targets for the server and framework modem. 4/22
5 The Smart Phones The Smartphone Pentest Framework can be used with actual phones, but that's tricky to demonstrate. Instead of using multiple smartphones, we will use android smartphone emulators and restrict our communications to SMS and Internet (no voice communications. Need to know how to download and install the Android SDK and configure emulators. 5/22
6 Downloading the Android SDK Get the most current version: Google for android sdk Currently get to this page: To run on kali, download linux 32-bit x86 bundle. 6/22
7 Downloading Android SDK 7/22
8 What do I do with the SDK? Unzip it to some reasonable location (perhaps the Desktop) You will likely need to apt-get install libgl1-mesa-swx11 in order to get libgl.so Also, you may need to ln -s /usr/lib/i386-linux-gnu/libgl.so.1 /usr/lib/libgl.so Then you can run the following: cd sdk/tools./android 8/22
9 Configure Android Virtual Devices Select Tools Manage AVDs 9/22
10 Add New AVDs for the Framework Modem and the Vuln Phone Select the New Button 10/22
11 Choose A Device (I'm using 2.2) Increase Storage/Memory/SD Options 11/22
12 Dealing with the Android SDK Manager To list available devices android list To close an Android SDK Manager subwindow Right click on the TitleBar and select Close 12/22
13 Start the Smartphone Pentest Framework Cranky response parsing Use selection 0 for back (even if not listed) 13/22
14 We want to create an Agent inside our Framework Phone Use an Android phone (or emulator) as a modem for you computer to send SMS messages. From main menu in SPA: 4.) Attach Framework to a Mobile Modem 3.) Generate smartphone based app 1.) Android App (Android 1.6) Phone number of agent: All Android Emulators start with Control key for the agent: SPAKEY1 Any seven letter key (security measure) Webserver control path for agent: /control Subdirectory of /var/www This creates FrameworkAndroidApp.apk in the framework console subdirectory of the SPA directory Copy the FrameworkAndroidApp.apk to /var/www for transfer to your modem smartphone. 14/22
15 Download the Framework App to your Modem Smartphone Use the web browser to browse to your control server 15/22
16 Attach or SPF to the Modem From the SPF Main Menu: 4.) Attach Framework to a Mobile Modem 2.) Attach to a smartphone based app Phone Number: Control Key: SPAKEY1 App URL Path: /control On phone, run the Framework App 16/22
17 Enter the Appropriate Information (Order is different) 17/22
18 Mount a Social Engineering Attack In SPF Main Menu: 6.) Run a social engineering or client side attack 1.) Direct Download Agent Deliver Android Agent or Android Meterpreter (Agent/meterpreter:) Agent Platform(Android/iPhone/Blackberry): Android Hosting Path: /agentpath Filename: /coolapp.apk Delivery Method:(SMS or NFC): SMS Phone Number to Attack: Custom text(y/n)? n Select a modem to interact with 18/22
19 Target Phone Receives SMS 19/22
20 Message includes URL to SPF server 20/22
21 And Finally I was unable to get the payloads to function with the AVD versions I was using. 21/22
22 Application Downloads Install/Run 22/22
Advanced Ethical Hacking & Penetration Testing. Ethical Hacking
Summer Training Internship Program 2017 (STIP - 2017) is a practical oriented & industrial level training program for all students who have aspiration to work in the core technical industry domain. This
More informationISDP 2018 Industry Skill Development Program In association with
ISDP 2018 Industry Skill Development Program In association with Penetration Testing What is penetration testing? Penetration testing is simply an assessment in a industry computer network to test the
More informationLab 6: OS Security for the Internet of Things
Department of Computer Science: Cyber Security Practice Lab 6: OS Security for the Internet of Things Introduction The Internet of Things (IoT) is an emerging technology that will affect our daily life.
More informationNEST Kali Linux Tutorial: Burp Suite
NEST Kali Linux Tutorial: Burp Suite Burp gives you full control, letting you combine advanced manual techniques with state-of-the-art automation, to make your work faster, more effective, and more fun.
More informationAdvanced Penetration Testing
Advanced Penetration Testing Additional Insights from Georgia Weidman More Guessable Credentials: Apache Tomcat In the course we looked at specific examples of vulnerabilities. My goal was to cover as
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More informationPrinciples of ICT Systems and Data Security
Principles of ICT Systems and Data Security Ethical Hacking Ethical Hacking What is ethical hacking? Ethical Hacking It is a process where a computer security expert, who specialises in penetration testing
More informationLab 6: OS Security for the Internet of Things
Department of Computer Science: Cyber Security Practice Lab 6: OS Security for the Internet of Things Introduction The Internet of Things (IoT) is an emerging technology that will affect our daily life.
More informationODDS (Olympus Dictation Delivery Service) Setup
ODDS (Olympus Dictation Delivery Service) Setup This quick and easy How-To Guide will help you set up your new ODDS account and enable you to start using the Olympus Dictation App on your Smartphone. 1.
More informationCyberP3i Hands-on Lab Series
CyberP3i Hands-on Lab Series Lab Series using NETLAB Designer: Dr. Lixin Wang, Associate Professor Hands-On Lab for Application Attacks The NDG Security+ Pod Topology Is Used 1. Introduction In this lab,
More informationMetasploit. Installation Guide Release 4.4
Metasploit Installation Guide Release 4.4 TABLE OF CONTENTS About this Guide Target Audience...1 Organization...1 Document Conventions...1 Support...2 Support for Metasploit Pro and Metasploit Express...2
More informationSAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide
SAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide Introduction This onboarding guide covers tasks that account administrators need to perform to set up SAS Visual Statistics and SAS Visual Analytics
More informationHow to Phishing Android Smart Phone Users Through SMS Message
How to Phishing Android Smart Phone Users Through SMS Message Introduction Myeonggil Kong Nowadays, we are doing everything through a smart phone. Because of that, many crimes occur through the smart phone.
More informationcs642 /introduction computer security adam everspaugh
cs642 computer security /introduction adam everspaugh ace@cs.wisc.edu definition Computer Security := understanding and improving the behavior of computing systems in the presence of adversaries adversaries
More informationChanging face of endpoint security
Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L
More informationITG Software Engineering
Android Security Course ID: Page 1 Last Updated 12/15/2014 Android Security ITG Software Engineering Course Overview: This 5 day course covers the Android architecture, the stack, and primary building
More informationSetting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.8 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationManual Android Virtual Device Failed To Load Error
Manual Android Virtual Device Failed To Load Error When I click on the Windows tab and then select Android Virtual Device Manager, I get the error "Android Virtual Device failed to load". I have attached
More informationChapter 2 Setting Up for Development
Introduction to Android Application Development, Android Essentials, Fifth Edition Chapter 2 Setting Up for Development Chapter 2 Overview Learn how to set up our Android development environment Look at
More informationInjectable Exploits. New Tools for Pwning Web Apps and Browsers
Injectable Exploits New Tools for Pwning Web Apps and Browsers Kevin Johnson kevin@inguardians.com Justin Searle justin@inguardians.com Frank DiMaggio frank@secureideas.net 1 Who are we? Kevin Johnson
More informationModule 1: Penetration Testing Planning and Scoping. Module 2: Basic Usage of Linux and its services
Following topics will be covered: Module 1: Penetration Testing Planning and Scoping - Types of penetration testing and ethical hacking projects - Penetration testing methodology - Limitations and benefits
More informationInstalling LAMP on Ubuntu and (Lucid Lynx, Maverick Meerkat)
Installing LAMP on Ubuntu 10.04 and 10.10 (Lucid Lynx, Maverick Meerkat) April 29, 2010 by Linerd If you're developing websites, it's nice to be able to test your code in the privacy of your own computer
More informationAttacks Against Websites 3 The OWASP Top 10. Tom Chothia Computer Security, Lecture 14
Attacks Against Websites 3 The OWASP Top 10 Tom Chothia Computer Security, Lecture 14 OWASP top 10. The Open Web Application Security Project Open public effort to improve web security: Many useful documents.
More informationLong Beach Unified School District. Portal User s Guide. August 2014
Long Beach Unified School District Portal User s Guide August 2014 INTRODUCTION The Long Beach Unified School District s PORTAL (mylbusd) provides users with access to District applications, services,
More informationFreeRangeRemote Access
City of Westminster User Guide to FreeRangeRemote Access For Android tablets using the native browser (Chrome) https://freerange.cityofwestminster.us IMPORTANT! Some versions of Chrome on Android are unable
More informationAdobe Marketing Cloud Bloodhound for Windows 2.2
Adobe Marketing Cloud Bloodhound for Windows 2.2 Contents Bloodhound 2.2 for Windows...3 Getting Started...4 Configure Devices to Send Hits to Bloodhound...5 Enable SSL...6 View Hits...7 Last updated 5/1/2017
More informationProcedure for Connecting to OIL VPN
Procedure for Connecting to OIL VPN Contents Introduction... 1 Pre-requisites... 1 How to Connect to OIL VPN... 1 Access using Checkpoint remote access client... 2 Note for macos users... 6 Accessing using
More informationInstallation Instructions
Installation Instructions Last updated: 08 May 2017 Contents 1. Introduction... 3 2. Windows Installation... 3 2.1. Installing Dictionary App Builder... 3 2.2. Installing Java SE Development Kit (JDK)...
More informationVodafone Secure Device Manager Administration User Guide
Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of June 2017. Vodafone Ready Business Contents Introduction 3 Help 4 How to find help in the Vodafone Secure
More informationL.A.M.P. Stack Part I
L.A.M.P. Stack Part I By George Beatty and Matt Frantz This lab will cover the basic installation and some configuration of a LAMP stack on a Ubuntu virtual box. Students will download and install the
More informationAllen University Microsoft Office 365
Allen University Microsoft Office 365 Here's what you need to know to complete the transition On December 18 at 5:00pm, the University will complete the migration to Office 365, a new version of the hosted
More informationAcronis Backup extension for Plesk
Acronis Backup extension for Plesk ADMINISTRATOR S GUIDE Table of contents 1 Introduction...3 2 Software requirements...3 3 Limitations...3 4 Installing the extension...3 5 Enabling backup...4 6 Uninstalling
More informationMinds-on: Android. Session 1
Minds-on: Android Session 1 Paulo Baltarejo Sousa Instituto Superior de Engenharia do Porto 2016 Outline Mobile devices Android OS Android architecture Android Studio Practice 1 / 33 2 / 33 Mobile devices
More information1 Introduction Requirements Architecture Feature List... 3
Contents 1 Introduction... 2 1.1 Requirements... 2 1.2 Architecture... 3 1.3 Feature List... 3 1.3.1 Device Compliance status... 3 1.3.2 Auto grouping for devices... 4 1.4 Basic Deployment... 4 1.4.1 Prepare
More informationPLEASE READ THIS GUIDE CAREFULLY BEFORE ATTEMPTING TO OPERATE THE ISATHUB. ISAVI ISATHUB QUICK START GUIDE
PLEASE READ THIS GUIDE CAREFULLY BEFORE ATTEMPTING TO OPERATE THE ISATHUB. ISAVI ISATHUB QUICK START GUIDE Your Satellite Telephone Number is: (supplied at time of delivery) Your Wi-Fi Password is: TBD
More informationHow to access Launchpad and Textbooks online
Quest Tech Tips Launchpad & Textbooks Online Directions (front and back) How to setup your mobile device to receive school/district notifications (front and back) Edline parent instructions Free Microsoft
More informationSD Module- Android Programming
Assignment No. 1 SD Module- Android Programming R (2) C (4) V (2) T (2) Total (10) Dated Sign Title: Download Install and Configure Android Studio on Linux /windows platform. Problem Definition: Install
More information1 Introduction Requirements Architecture Feature List... 4
Contents 1 Introduction... 2 1.1 Requirements... 2 1.2 Architecture... 3 1.3 Feature List... 4 1.3.1 Device Compliance status... 4 1.3.2 Auto grouping for devices... 5 1.3.3 Auto grouping for applications...
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,
More informationQUICKBOOKS ONLINE PLUS: A COMPLETE COURSE 2016
QUICKBOOKS ONLINE PLUS: A COMPLETE COURSE 2016 Chapter 2: Create a Company Part 1: Create Email, Access Trial Version, Download Files Lecture Focus 2 Create a QuickBooks Online Email Account Activate Educational
More informationPenetration Testing. James Walden Northern Kentucky University
Penetration Testing James Walden Northern Kentucky University Topics 1. What is Penetration Testing? 2. Rules of Engagement 3. Penetration Testing Process 4. Map the Application 5. Analyze the Application
More informationCS 410/510: Web Security X1: Labs Setup WFP1, WFP2, and Kali VMs on Google Cloud
CS 410/510: Web Security X1: Labs Setup WFP1, WFP2, and Kali VMs on Google Cloud Go to Google Cloud Console => Compute Engine => VM instances => Create Instance For the Boot Disk, click "Change", then
More informationLab: Setting up PL-App with a Raspberry Pi
Lab Topology Objectives Set up a Raspberry Pi board as a PL-App device Use PL-App Launcher to provision and discover PL-App devices Background Cisco Prototyping Lab is a set of hardware and software components
More informationSSL VPN INSTALLATION GUIDE
SSL VPN INSTALLATION GUIDE Sonicwall VPN Client Download & Installation Guide For Windows Machines : 1) Open Browser and Browse the following URL to download the client. https://103.237.170.61/cgi-bin/welcome/virtualoffice
More informationIntroduction to Penetration Testing: Part One. Eugene Davis UAH Information Security Club February 21, 2013
Introduction to Penetration Testing: Part One Eugene Davis UAH Information Security Club February 21, 2013 Ethical Considerations: Pen Testing Ethics of penetration testing center on integrity (ISC)² Code
More informationOWASP German Chapter Stammtisch Initiative/Ruhrpott. Android App Pentest Workshop 101
OWASP German Chapter Stammtisch Initiative/Ruhrpott Android App Pentest Workshop 101 About What we will try to cover in the first session: Setup of a Mobile Application Pentest Environment Basics of Mobile
More informationCIS 76 Ethical Hacking Building an open source Pentest Sandbox, carrying out a Remote Code Execution exploit, and Remediating the RCE vulnerability.
CIS 76 Ethical Hacking Building an open source Pentest Sandbox, carrying out a Remote Code Execution exploit, and Remediating the RCE vulnerability. Ryan Borden December 3, 2017 Contact: ryanborden81@gmail.com
More informationSetting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1
Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date
More informationSetting Up Resources in VMware Identity Manager
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationCloud UC. Program Downloads I WOULD LIKE TO... DOWNLOADING THE CLIENT SOFTWARE
I WOULD LIKE TO... Cloud UC Program Downloads Avaya Cloud allows you to setup your telephone to be used the way you want it to. There are additional programs that extend the abilities of the application
More informationUser Monitoring Smartphone App
User Monitoring Smartphone App Sonnen User Portal Sonnen User Portal Registration From any internet browser the end user will need to type https://meine.sonnenbatterie.de/login into the search engine search
More informationAccessing OUHSC. Requirements to log into Topaz Elements: Steps to Access TOPAZ Elements:
Accessing OUHSC Requirements to log into Topaz Elements: 1. Access granted by the IACUC or IBC. 2. Pulse secure connection via gate.net.ou.edu. (See instructions below) 3. Silverlight compatible browser.
More informationSamsung Mobile Via Usb
How To Install Android Apps From Pc To Samsung Mobile Via Usb Supported model : Smart Phone/Tablet from Galaxy Note III (Android OS 4.3 or over) When you connect your mobile device to Kies via a USB cable,
More informationPenetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security No part of this publication, in whole or in part, may
More informationevoclock+ - AsureForce Mobile V3.0 Reference Guide AsureForce Mobile Version 3.0 Reference Guide AsureForce Mobile 1 P a g e
AsureForce Mobile Version 3.0 Reference Guide AsureForce Mobile 1 P a g e Table of Contents Quick Reference... 2 AsureForce Mobile... 3 Getting Started... 3 AsureForce Mobile App Setup... 3 AsureForce
More informationAndroid Studio Setup Procedure
Android Studio Setup Procedure System Requirements : Windows OS Linux OS Mac OS Microsoft Windows 7/8/10 (32- or 64-bit) 3 GB RAM minimum, 8 GB RAM recommended; plus 1 GB for the Android Emulator 2 GB
More informationInstallation Instructions
Installation Instructions Reading App Builder: Installation Instructions 2017, SIL International Last updated: 1 December 2017 You are free to print this manual for personal use and for training workshops.
More informationHackveda Training - Ethical Hacking, Networking & Security
Hackveda Training - Ethical Hacking, Networking & Security Day1: Hacking windows 7 / 8 system and security Part1 a.) Windows Login Password Bypass manually without CD / DVD b.) Windows Login Password Bypass
More informationHow to Set up Eclipse and Android SDK Manager Environment You need to download the following
How to Set up Eclipse and Android SDK Manager Environment You need to download the following 1. Android Software development Kit (SDK) 2. Eclipse Package 3. Java JDK (if it is not installed on your Windows)
More informationMethodist University. Wireless Connectivity Guide. Version 1.5.0
Methodist University Wireless Connectivity Guide Version 1.5.0 Guide Updates... 3 Getting Started... 4 Available SSID s... 5 Unsecured Connectivity... 5 Methodist University... 5 MU_Guest... 5 MU_Devices...
More informationChoose OS and click on it
1. Installation: 1.1. Install Node.js. Cordova runs on the Node.js platform, which needs to be installed as the first step. Download installer from: https://nodejs.org/en/download/ 1.1.1. Choose LTS version,
More informationHow to silently install Installation Manager and Rational Asset Manager from a command line
How to silently install Installation Manager 1.5.3 and Rational Asset Manager 7.5.1.1 from a command line By Patchanee Petprayoon Unleash the Labs, Solution Architect for Energy and Utilities sector Created
More informationChapter 5: Vulnerability Analysis
Chapter 5: Vulnerability Analysis Technology Brief Vulnerability analysis is a part of the scanning phase. In the Hacking cycle, vulnerability analysis is a major and important part. In this chapter, we
More informationConnecting Remotely Staff & Students
Connecting Remotely Staff & Students Install VMware Horizon View client There are two main ways to access the college network remotely using VMware on your computer, either (1) connecting directly through
More informationStep 1: Syncing Your Library. After installing One Drive for Business, you will be prompted to Sync a library. NEXT: Select the Library URL
Step 1: Syncing Your Library After installing One Drive for Business, you will be prompted to Sync a library. NEXT: Select the Library URL For this, we want to choose the URL that connects to your Office
More informationAllBe1 Anywhere dongle user guide
AllBe1 Anywhere dongle user guide Table of Contents 1. Introduction... 1 2. System requirements... 2 3. PC application installation... 2 4. Using the PC App'... 4 5. Trouble shooting.... 9 1. Introduction
More informationPINNACLE WEB GRADEBOOK Information Technology Services. Palm Guide - HotSync
PINNACLE WEB GRADEBOOK Information Technology Services Palm Guide - HotSync PINNACLE WEB GRADEBOOK Palm Guide - HotSync Information Technology Services 13135 SW 26 ST Miami, FL 33176 Rev. 11.06.09 This
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationQUICK START GUIDE. Quick Start Guide. This will assist you to setup and distribute content to a StratosMedia Player device in 4 easy steps.
Quick Start Guide This will assist you to setup and distribute content to a StratosMedia Player device in 4 easy steps. NOTE: All devices need active internet connectivity. Google Chrome is a browser that
More informationDynamic Detection of Inter- Application Communication Vulnerabilities in Android. Daniel Barton
Dynamic Detection of Inter- Application Communication Vulnerabilities in Android Daniel Barton Authors/Paper Metadata Roee Hay IBM Security Omer Tripp IBM T.J. Watson Research Center Marco Pistoia IBM
More informationQustodio. User Guide. Copyright Qustodio Technologies S.L. All rights reserved. Revised on June 2017.
Qustodio User Guide Copyright Qustodio Technologies S.L. All rights reserved. Revised on June 2017. Table of Contents 1. INTRODUCTION... 3 1.1. WHAT IS QUSTODIO?... 3 1.2. FEATURES AND BENEFITS... 4 2.
More informationSetting up VPS on Ovh public cloud and installing lamp server on Ubuntu instance
Setting up VPS on Ovh public cloud and installing lamp server on Ubuntu instance What is OVH Public Cloud Public Cloud Instances provides a choice of two types of virtual machines: the RAM instances are
More informationGoogle Groups. Using, joining, creating, and sharing. content with groups. What's Google Groups? About Google Groups and Google Contacts
Google Groups Using, joining, creating, and sharing content with groups What's Google Groups? Google Groups is a feature of Google Apps that makes it easy to communicate and collaborate with groups of
More informationAttacks Against Websites. Tom Chothia Computer Security, Lecture 11
Attacks Against Websites Tom Chothia Computer Security, Lecture 11 A typical web set up TLS Server HTTP GET cookie Client HTML HTTP file HTML PHP process Display PHP SQL Typical Web Setup HTTP website:
More informationSchool Installation Guide ELLIS Academic 5.2.6
ELLIS Academic 5.2.6 This document was last updated on 2/16/11. or one or more of its direct or indirect affiliates. All rights reserved. ELLIS is a registered trademark, in the U.S. and/or other countries,
More informationApp Orchestration 2.6
Configuring NetScaler 10.5 Load Balancing with StoreFront 3.0 and NetScaler Gateway for Last Updated: June 04, 2015 Contents Introduction... 3 Configure the NetScaler load balancer certificates... 3 To
More informationfor businesses with more than 25 seats
for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use
More informationSetting up your YouTube Account
Online & Extended Learning Getting Started with YouTube Student Help Contents Setting up your YouTube Account... 1 How to Login to your YouTube Account... 4 How to Upload Videos to YouTube... 5 Uploading
More informationAHNLAB 조주봉 (silverbug)
AHNLAB 조주봉 (silverbug) Android Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Application framework Dalvik virtual machine Integrated
More informationMcAfee Cloud Identity Manager
Marketo Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationMcAfee Cloud Identity Manager
IdeaScale Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More information12.1 Introduction OpenCV4Android SDK Getting the SDK
Chapter 12 OpenCV For Android 12.1 Introduction OpenCV (Open Source Computer Vision Library) is a popular open source software library designed for computer vision application and machine learning. Its
More informationHow To Change My Wordpress Database
How To Change My Wordpress Database Password On Instagram Account Built by one of the world's largest Instagram browsers INK361, this comprehensive widget that can showcase your Instagram account in the
More informationMobile Devices prioritize User Experience
Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile
More informationZK Mobile for Android The Quick Start Guide
potix SIMPLY REACH ZK Mobile for Android TM The Quick Start Guide Version 0.8.1 Feburary 2008 ZK Mobile for Android for Android: Quick Start Guide Page 1 of 14 Copyright. All rights reserved. The material
More informationManual Android Virtual Device Failed To Load Click Details
Manual Android Virtual Device Failed To Load Click Details i am new to android 1_i am not able to see any option after clicking on 'run as' an android virtual device that failed to load.click 'details''.i
More informationSocial Ecology 101: Connecting with a pod
Social Ecology 101: Connecting with a pod In Social Ecology 1 room 101, there are 7 pod stations located throughout the room. If allowed by the instructor, students can join pods with their computer or
More informationVirtual Desktop Infrastructure Setup for Android
Virtual Desktop Infrastructure Setup for Android Virtual Desktop Infrastructure (VDI) allows you to connect to a virtual computer and use software that you don t have installed on your own computer or
More informationAndroid App Development. Ahmad Tayeb
Android App Development Ahmad Tayeb Ahmad Tayeb Lecturer @ Department of Information Technology, Faculty of Computing and Information Technology, KAU Master degree from Information Sciences and Technologies,
More informationInstalling Joomla
Installing Joomla 3.0.11 To start installing Joomla 3.X you have to copy the zipped file Joomla_3.0.1-Stable-Full_Package.zip to the folder in which you want to install Joomla 3.X. On a web host this is
More informationMethodist University. Wireless Connectivity Guide. Version 1.2
Methodist University Wireless Connectivity Guide Version 1.2 Getting Started... 3 Available SSID s... 4 Unsecured Connectivity... 4 Methodist University... 4 MU_Guest... 4 MU_Devices... 4 Secured Connectivity...
More informationLab 3: Introduction to Metasploit
Lab 3: Introduction to Metasploit Aim: The airm of this lab is to develop and execute exploits against a remote machine and test its vulnerabilities using Metasploit. Quick tool introduction: Metasploit
More informationDeveloping Android applications in Windows
Developing Android applications in Windows Below you will find information about the components needed for developing Android applications and other (optional) software needed to connect to the institution
More informationULTEO OPEN VIRTUAL DESKTOP DEBIAN WHEEZY (7.0) SUPPORT
ULTEO OPEN VIRTUAL DESKTOP V4.0.2 DEBIAN WHEEZY (7.0) SUPPORT Contents 1 Prerequisites: Debian Wheezy (7.0) 3 1.1 System Requirements.............................. 3 2 Repository 4 2.1 Online Method..................................
More informationMAIN HEADING: MyMTN App
MAIN HEADING: MyMTN App EXPLANATION: MTN is pleased to announce the launch of the new all-in-one self-service MyMTN mobile application All about the My MTN App!! MTN is pleased to announce the launch of
More informationConfiguring a Remote Desktop Connection for the Stat Apps Server
Configuring a Remote Desktop Connection for the Stat Apps Server This page contains instructions for setting up a remote desktop connection to the Statistical Applications Terminal Server (also known as
More informationUser documentation. BEEM v1.0 January 2010
User documentation BEEM v1.0 January 2010 1 Table of contents Table of contents... 2 About this paper... 3 Using this manual... 3 Navigation keys... 4 Conventions... 5 Support... 5 Installation/Uninstallation...
More informationIntroducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 Business drivers and their impact on IT AGILITY Move fast, be nimble and flexible 66% of business owners identify business agility as a priority EFFICIENCY
More informationSJ Provider Directory Contents
SJ Provider Directory Contents SJ Provider Directory... 1 Accessing the Directory... 2 Apple Devices... 2 Android Devices... 2 Other Devices or Desktop Computers... 2 Browsers... 2 Requesting a New Account...
More informationMcAfee Cloud Identity Manager
EchoSign Provisioning Connector Guide McAfee Cloud Identity Manager version 3.5 and later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More information