Manual do KGpg. Jean-Baptiste Mardelle Rolf Eike Beer Tradutor do proxecto Trasno: Xosé Calvo

Size: px
Start display at page:

Download "Manual do KGpg. Jean-Baptiste Mardelle Rolf Eike Beer Tradutor do proxecto Trasno: Xosé Calvo"

Transcription

1 Jean-Baptiste Mardelle Rolf Eike Beer Tradutor do proxecto Trasno: Xosé Calvo

2 2

3 Índice xeral 1. Introdución 5 2. Comezar 6 3. Usar o KGpg Xerar unha chave Cifrar datos Cifrar un ficheiro desde o Konqueror ou o Dolphin Cifrar un texto coa aplicacionciña do KGpg Cifrar o texto do editor do KGpg Descifrar os datos Decifrar un ficheiro desde o Konqueror ou o Dolphin Descifrar un texto coa aplicacionciña do KGpg Descifrar un texto no editor Xestión de chaves Xestor de chaves Propiedades das chaves Signing keys Working with key servers Comunicación cos servidores de chaves Key server search results Configurar o KGpg Cifrado Descifrado Aparencia Configuración do GnuPG Servidores de chaves Diversos Créditos e licenza 19

4 Resumo O KGpg é unha interface gráfica simple para o GnuPG (

5 Capítulo 1 Introdución O KGpg é unha interface simple para o GnuPG, unha poderosa utilidade de cifrado. O GnuPG (tamén coñecido como gpg ) ven incluído na maioría das distribuicións e debería estar instalado no sistema. Pódese obter a versión máis recente en With KGpg you will be able to encrypt and decrypt your files and s, allowing much more secure communications. A mini howto on encryption with gpg is available on GnuPG s web site. Co KGpg, non hai que lembrar as liñas de comando e as opcións do gpg. Pódese facer case todo cuns clics do rato. 5

6 Capítulo 2 Comezar Velaquí unha lista dos componentes principais do KGpg: Icona da bandexa do sistema When you start KGpg, a system tray icon will appear. A botón esquerdo do rato click will open the Key Manager window, while a botón dereito do rato click will open a menu allowing quick access to some important features. If you prefer other options you can change the botón esquerdo do rato action to show the editor or completely disable the system tray icon using the settings dialog. Please note that the system tray icon of KGpg is marked as inactive basically all the time. Since the system tray applet will usually hide inactive icons the one of KGpg will not be shown until you explicitly request it. For details please have a look at the Plasma documentation. Xanela do xestor de chaves 6

7 Este é o lugar central para xestionar as chaves. Para abrir a xanela do xestor de chaves, prema a aplicacionciña do KGpg co botón esquerdo do rato. Pódense importar, exportar, asinar e editar as chaves. A maioría das accións pódense facer cun clic do botón dereito do rato sobre unha chave. Xanela do editor It s a simple text editor, where you can type or paste text to encrypt/decrypt it. To open the editor, click with the botón dereito do rato on KGpg s applet. Integración co xestor de ficheiros O KGpg está integrado no Konqueror e no Dolphin. Isto significa que, cando se calca nun ficheiro, pódese escoller Accións Cifrar o ficheiro para o cifrar. Pódese descrifrar un ficheiro premendo nel co botón esquerdo do rato. 7

8 Capítulo 3 Usar o KGpg Existen dúas formas de cifrar os datos: Cifrado simétrico: os dados só se cifran cun contrasinal. Calquer persoa que tiver un computador co gpg pode descifrar a mensaxe se se lle dá o contrasinal. Para efectuar unha cifra simétrica, escolla a cifra simétrica na xanela de opcións cando se lle pida que escolla un contrasinal de cifrado. Cifrado con chave: primeiro hai que criar un par de chaves (pública e privada) e indicar un contrasinal. Manteña a súa chave privada nun lugar seguro e troque a chave pública cos seus amigos. A partir de entón, se lle quere enviar unha mensaxe cifrada a Alexandre, ten que cifrar a mensagen coa chave pública de Alexandre. Para descifrar a mensaxe, o destinatario necesita a chave privada e o contrasinal de Alex. Key encryption is a bit more complicated (you must exchange keys with your friends) but safer. Remember that if you encrypt a key with someone else s key, you will not be able to decrypt it. You can only decrypt messages that have been encrypted with your public key Xerar unha chave Se non ten unha chave, o KGpg mostra automaticamente o diálogo de xeración de chaves no primeiro arranque. Tamén se pode acceder a este no Xestor de Chaves a partir da opción Chaves Xerar un Par de Chaves. 8

9 Simply enter your name, address and click Ok. This will generate a standard gpg key. If you want more options, you can click on the Expert Mode button, which will bring up a Konsole window with all of gpg s options. Many people play around with their first key, generate bad user ids, add comments they later regret or simply forget their passphrase. To avoid such keys to stay valid forever it s usually a good idea to limit the lifetime to some 12 month. You can modify the lifetime of your secret keys later using the key properties window Cifrar datos Cifrar un ficheiro desde o Konqueror ou o Dolphin Click on the file you want to encrypt with the botón dereito do rato. Choose Actions Encrypt File in the pop up menu. You will then be prompted with the Public key selection dialog. Choose the key of the recipient and click Encrypt. The encrypted file will be saved with a.asc or.gpg extension depending on whether you chose ASCII armored encryption or not. ASCII encrypted files only use readable characters to represent the data resulting in files that are more robust when copied around or sent by mail but are one third larger. 9

10 Cifrar un texto coa aplicacionciña do KGpg You can encrypt the contents of the clipboard by selecting the Encrypt clipboard item in applet menu. When you choose Sign clipboard then the text will be signed instead. Both actions will import the current clipboard contents into an editor window, perform the requested action and paste the contents back into the editor Cifrar o texto do editor do KGpg É tan simple como premer o botón Cifrar. Aparece o diálogo de selección da chave pública; escolla a súa chave e prema Aceptar. A mensaxe cifrada aparece na xanela do editor. Usually you can only encrypt files with keys that are trusted by you. Since you sometimes want to just send a confident note to some random people you are aware of having a GPG key you can set the option Allow encryption with untrusted keys. To make sure that you can decrypt every file you have encrypted even if they are encrypted with someone else s key you can use the options Always encrypt with and Encrypt files with which are available in the KGpg configuration. For more information on the encryption options ASCII armor, Allow encryption with untrusted keys and Symmetrical encryption, please refer to gpg s documentation or man pages Descifrar os datos Decifrar un ficheiro desde o Konqueror ou o Dolphin Prema co botón esquerdo do rato o ficheiro que queira descifrar. Indique o contrasinal e descifrarase. Tamén se pode arrastrar un ficheiro de texto cifrado e soltalo na xanela do editor do KGpg. Pídese o contrasinal e ábrese o texto decifrado no editor do KGpg. Mesmo se poden soltar aquí ficheiros remotos! Tamén se pode empregar a opción Ficheiro Descifrar Ficheiro e escoller o ficheiro que se quere descifrar. 10

11 Descifrar un texto coa aplicacionciña do KGpg You can also decrypt the contents of the clipboard with the decrypt clipboard menu entry of the KGpg applet. An editor window will show up with the decrypted text Descifrar un texto no editor Copie ou arrastre e solte o texto que desexe descifrar e prema o botón Descifrar. Pediráselle o contrasinal Xestión de chaves Pódense efectuar todas as opcións básicas de xestión de chaves a través do KGpg. Para abrir a xanela de xestión de chaves, prema a aplicacionciña do KGpg co botón esquerdo do rato. A maioría das opcións están disponíbeis ao premer co botón dereito nunha chave. Para importar/exportar as chaves públicas, pódense arrastrar e soltar os elementos ou usar os atallos de teclado Copiar/Apegar Xestor de chaves Neste exemplo pódese ver un grupo de chaves que contén dúas chaves, dous pares de chaves e tres chaves públicas. A terceira columna mostra a confianza que se deposita nas chaves. O primeiro par de chaves ten a confianza máxima e tamén está definido como chave predefinida (en negra), mentres que o segundo caducou. Dúas das chaves públicas son de confianza completa e a confianza da última chave é marxinal. A última chave está expandida e mostra a súa subchave ElGamal, un ID de utilizador adicional, ambos con confianza marxinal, e algunhas das súas sinaturas. As sinaturas permiten navegar polo chaveiro. Ao premer dúas veces sobre unha sinatura ou unha chave que apareza como membro dun grupo pásase directamente para a chave primaria correspondente. 11

12 Propiedades das chaves Mentres que o xestor de chaves permite realizar accións xenéricas con unha ou varias chaves, grupos de chaves ou sinaturas, a xanela de propiedades das chaves dá acceso a unha única chave. Pódese acceder a ela premendoenter no xestor de chaves ou dúas veces na chave. Nesta xanela pódense modificar o contrasinal e o prazo de validez das chaves privadas. Tamén se pode definir para todas as chaves o valor de confianza no dono. Este valor indica canto se confía no dono desta chave para que verifiquecorrectamente a identidade das chaves que el/a asina. Ao ter a confianza do dono en conta, o gpg crea a sua propia rede de confianza. O usuario confía nas chaves que asinou. Se lle atribúe a confianza no dono a esas pessoas, confiará tamén nas chaves que asinen, sen ter necesidade de asinar tamén as chaves deles Signing keys When you sign a key of someone else (let s call her Alice) you announce that you are sure that this key really belongs to that person and the key can be trusted. Of course you really should have checked that. This usually means that you have to meet Alice, check at least one identity card and get the full key fingerprint or a copy of her key. Then you go home and sign that key. Usually you will later upload the newly signed key to a key server so everyone knows you have checked that key and the owner may be trusted. Alice will likely do the same so you both will have your keys signed by the other one. If one of you has no identity card at hand it s no problem if the signing happens in only direction. But think about what happens if Alice lives on the other end of the world. You communicate with her regularly but there is no chance you will see her anytime soon. How do you trust her key? When you select her key and then choose Sign Key... you will get the dialog that allows you to choose the options how you would like to sign that key. 12

13 First you can choose the key you will use to sign the key. Then you can enter how carefully you checked that she really is the person she pretends to be. This information will be stored together with the signature so it is a guidance for everyone else who might need that signature (more on this below). And then comes the option that would help you if you can t meet Alice in person: Local signature (cannot be exported). When you activate that option a special version of a signature will be created that can never even by accident leave you keyring. But why is it important how carefully you checked Alice s identity? Who should care? There is a different way to solve your problem with the identity of Alice. If you can t visit Alice anytime soon just think of Trent. You know Trent has a keypair, too. And Trent is a globetrotter, being on a different continent at least twice a month. If you are lucky he will fly close to Alice soon. So you will go and meet with Trent to sign keys. Then you will drop Alice a note that Trent will be at her place soon and ask her if she can meet with him too to sign keys. After all this has happened you know that Trent s key can be trusted and Trent knows that Alice s key can be trusted. If you trust Trent that he has carefully checked Alice s identity then you can also trust her key. These relationships between keys and their owners form a so called web of trust. Within that web there are some important values that define how trustworthy a particular key is. The first thing is how carefully the identity of the key owner was checked. That is the value you have seen above in the secret key selection window. For example you will likely know how to verify your local countries identity card but one from a completely different country may be hard to verify. So you could say that you have very carefully checked Trent s identity because you have seen his identity card and it looks very much the same as yours. But Trent, although he has seen both Alice s identity card and driver license might say he has only done casual checking of her identity as he is not absolutely sure about the documents from that part of the world. The next important value is how much you trust the other person to verify documents. You know Trent is good at that. But George for example is no one you would call smart. He barely looked at your id card when you met him for key signing. You are sure that George is the person he pretends to be as you checked his documents carefully. But he doesn t seem to really care if he checks other people so you will have a high trust in the key of George but a very low trust in the signatures of George. If you open the properties of a key you will find the field Owner Trust. This is how much you trust the key owner when he signs keys. This value will not be exported, it is completely up to your personal preference. 13

14 Now you should have an idea how the web of trust is built, what the owner and key trust values are for, and why you always should be very careful when checking identities: other people might rely on you. But one element in the process is still unverified: the addresses in the keys you signed. Creating a new user identity in your key with the address of Alice or Trent will only take a few mouse clicks. You have verified that Trent really owns his key. But noone has checked until now that Trent really controls the addresses of his user identities. If you choose Sign and Mail User ID... from the menu instead you can close that gap. The idea is that you will sign the key as usual and afterwards it will be split into pieces. Every piece will only contain one user identity of Trent s key and your signature to it. This will be encrypted with Trent s key and sent only to the address given in that identity. Only if Trent can receive this mail and decrypt the message he will be able to import that signature into his key ring. You will not upload your signatures, this is entirely up to him. If your signature will show up on a key server you can be sure that Trent really controls both his key as well as the address you signed. The signatures you make in this process will also be not part of your keyring. So right after you signed Trent s key it will still be shown as untrusted in your keyring. Once Trent has received your mail and imported your signature into his keyring he can upload them to a keyserver. When you refresh his key from a keyserver you will get the new signatures. While that may sound inconvenient first it makes sure that you will not by accident see one of his identities as trusted that he does not control. Only the signatures that show up on a keyserver are those where everyone, including you, can be sure that he really controls the corresponding addresses Working with key servers Comunicación cos servidores de chaves A parte pública dun par de chaves gárdase normalmente nun servidor de chaves. Estes servidores permiten que todo o mundo poida procurar por unha chave que pertenza a unha persoa ou enderezo de determinados. As sinaturas tamén se gardan nestes servidores. 14

15 Esta xanela dá acceso aos servidores de chaves. Pódense procurar e importar chaves a partir dun servidor de chaves, así como exportar as chaves a un servidor. Un exemplo de pesquisa e importación acontece cando se tenta escribir unha mensaxe de correo a alguén novo. Se quere cifrar amensaxe para o seu contacto, pode procurar se el ou ela teñen unha chave nos servidores de chaves. Se ten creado un par de chaves novo ou ten asinado a chave doutra pesoa, é unha boa idea exportar a chave pública (posibelmente con sinaturas novas) a un servidor de chaves. A maioría dos servidores de chaves sincroniza os seus dados entre si, polo que se obteñen resultados semellantes independentemente do servidor que se empregue. Dado que existen excepcións a esta regra, pódese escoller nesta xanela o servidor de chaves que se queira empregar. Normalmente é unha boa idea escoller un servidor predefinido que estea localizado perto (p.ex. no seu país ou no seu continente), dado que estes responden normalmente máis depresa ás pesquisas. Lembre que todo o que envíe a un servidor de chaves normalmente ficará nel por sempre. Esta é unha razón pola que normalmente debería limitar o tempo de validez das súas chaves. Lembre tamén que, ás veces, os servidores de chaves son analisados polos xeradores de lixo electrónico para obteren enderezos de . 15

16 Key server search results All results of a search are displayed in this window. This picture shows a search addresses which showed up 244 results. Using the search field the displayed list was reduced to a single key. This key has two matches: the primary user id itself matches the search string as well as one of the other user ids. You can select one or more keys to import. The ids of those keys are shown in the Keys to import field at the bottom of the window. When you click on Import the key server is contacted again and the keys are fetched into your keyring Configurar o KGpg A configuración está accesíbel desde o menú da aplicacionciña do KGpg (premendo a aplicacionciña co botón dereito do rato) ou através do menú principal ( Configuración Configurar KGpg). Pódense definir os parámetros por omisión para o cifrado, o descifrado, a interface do usuario e a aplicacionciña. A maioría das opcións de cifrado están relacionadas directamente co gpg e están documentadas na súa páxina do man. 16

17 Cifrado Here you can configure special options to be passed to GnuPG to change the encryption behavior. For detailed description please have a look at the GnuPG manual. Encriptación ASCII armada: isto fai que os ficheiros cifrados se garden nun formato que só usa caracteres ASCII imprimíbeis e que ten liñas curtas. Os ficheiros gardados desta forma son maiores que os ficheiros en binario, mais son máis doados de enviar isto é por correo electrónico. Allow encryption with untrusted keys: this allows you to encrypt files with keys that are not trusted by you. Compatibilidade co PGP 6: os ficheiros cifrados son compatíbeis coa norma antiga do PGP6. Esta desactiva certas funcionalidades, polo que só se debería empregar se for realmente necesario. Agochar o ID do usuario: esta opción elimina todos os vestixios do destinatario no ficheiro cifrado. No caso de que se intercepte a transmisión, ninguén poderá obter informacións sobre o destinatario a partir do ficheiro. Se este destinatario tiver varias chaves, terá de experimentar para saber a que utilizou. Cifrar sempre con: todos os cifrados cífranse adicionalmente con esta chave. Se o usuario configura esta opción cunha chave privada, isto garante que poida ler sempre todos os dados cifrados por el mesmo, ao custo de mensaxes maiores. Cifrar os ficheiros con: compórtase como Cifrar sempre como para a cifrado de ficheiros. Comando de cifrado personalizado: se lle hai que pasar algunhas opcións pouco habituais ao GnuPG, pódese indicar aquí a liña de comandos. A maioría dos usuarios non necesita isto. Use *.pgp extension for encrypted files: if you check this option encrypted keys will be named as the input file with the extension.pgp added, otherwise the extension.gpg is used Descifrado Aquí pódese indicar un comando de descodificación personalizado. Esta opción raramente se usa, e só é útil para os usuarios avanzados que coñezan as opcións da liña de comandos. 17

18 Aparencia Aqui pódese configurar a forma como aparece o KGpg. As opcións posíbeis son as cores que reflicten os diferentes níveis de confianza nas chaves do xestor de chaves e a configuración dos tipos de letra do editor Configuración do GnuPG Here you can configure which gpg binary and which configuration file and home folder are used. These values are autodetected on first start and should already work. A utilización do axente do GnuPG fai mais cómodo o traballo co GnuPG, dado que non hai que escribir o contrasinal para todas as accións. Gárdase na memoria durante algún tempo, de modo que todas as operacións que poidesen necesitar dun contrasinal se poidan facer inmediatamente. Lembre que isto podería permitir que outras persoas usen as súas chaves privadas, caso deixe a súa sesión accesíbel Servidores de chaves Aquí pódese crear unha lista dos servidores de chaves coñecidos ao abrir a xanela do servidor de chaves. Se se executa o GnuPG a partir da liña de comandos, somente se empregará o servidor de chaves definido por omisión aquí. O protocolo usado para a comunicación cos servidores de chaves baséase en HTTP, polo que nalgúns ambientes ten sentido respectar o proxy de HTTP cando estea disponíbel Diversos Esta sección permite a configuración dalgunhas funcionalidades que non encaixan noutras seccións. Pódese configurar, por exemplo, iniciar o KGpg automaticamente no arranque. A opción usar a selección do rato no canto do porta-retallos altera se as seleccións se fan a través do botón do medio do rato ou se se fan por combinacións de teclas. You can also change if the systray icon of KGpg is shown or not and what action happens if the icon is clicked with the botón esquerdo do rato. If the systray icon is shown closing the KGpg window will minimize the application to tray. If the systray icon is not shown KGpg will exit when all windows are closed. 18

19 Capítulo 4 Créditos e licenza KGpg Copyright do programa (c) Jean-Baptiste Mardelle bj@altern.org. (c) Jimmy Gilles jimmygilles@gmail.com (c) 2006,2007,2008,2009,2010 Rolf Eike Beer kde@opensource.sf-tec.de Tradución da documentación: Xosé Calvo - Esta documentación está licenciada sob os termos da GNU Free Documentation License. Este programa está licenciado sob os termos da Licenza Pública Xeral de GNU. 19

Arquivos script. Cálculo numérico con Matlab Arquivos script 1

Arquivos script. Cálculo numérico con Matlab Arquivos script 1 Arquivos script Programas en Matlab: conteñen comandos que se executan secuencialmente; extensión.m; Execución: escribi-lo seu nome (sen.m). O arquivo debe estar no directorio actual (ou nun directorio

More information

O Software libre nos concellos de Galicia. Edición O Software libre nos concellos de Galicia. Resumo executivo. Edición 2014

O Software libre nos concellos de Galicia. Edición O Software libre nos concellos de Galicia. Resumo executivo. Edición 2014 O Software libre nos concellos de Galicia. Resumo executivo. Edición 2014 1 Índice Páxina 1. Ficha técnica... 2. Análise de datos... 3. Conclusións principais... 3 4 23 2 1. Ficha técnica Universo: Todos

More information

Manual do KCalc. Bernd Johannes Wuebben Pamela Roberts Anne-Marie Mahfouf Tradutor do proxecto Trasno: Xosé Calvo

Manual do KCalc. Bernd Johannes Wuebben Pamela Roberts Anne-Marie Mahfouf Tradutor do proxecto Trasno: Xosé Calvo Bernd Johannes Wuebben Pamela Roberts Anne-Marie Mahfouf Tradutor do proxecto Trasno: Xosé Calvo 2 Índice xeral 1. Introdución 5 2. Utilización 6 2.1. Utilización xeral.......................................

More information

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction ECE646 Fall 2012 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All

More information

Picasa web download photos. Picasa web download photos.zip

Picasa web download photos. Picasa web download photos.zip Picasa web download photos Picasa web download photos.zip 12/02/2016 Empresa quer focar seus esforços no Google Photos, um "novo espaço para acessar os dados dos seus Picasa Web Albums e poder ver, fazer

More information

WINDOWS TOOLS WINDOWS TOOLS

WINDOWS TOOLS WINDOWS TOOLS Windows Tools Ver. 1 (26-11-04) Profesor: Carlos Carrión Álvarez 1 Este documento irase completando con outros compoñentes. Acéptanse suxestións, corrección de erros, etc en carrion@edu.xunta.es. Indicar

More information

As ACLs aplicadas sobre un sistema arquivos exportado por NFS, tamén son efectivas nos clientes.

As ACLs aplicadas sobre un sistema arquivos exportado por NFS, tamén son efectivas nos clientes. De Manuais Referencia Departamento Informatica Nesta sección superaranse as limitacións do tradicional sistema de permisos de UNIX. Veranse as Listas de Control de Acceso (ACLs), que permiten indicar que

More information

ECOPETROL BARRANCABERJEJA. INTERFACES AL SERVIDOR PI:

ECOPETROL BARRANCABERJEJA. INTERFACES AL SERVIDOR PI: ECOPETROL BARRANCABERJEJA. INTERFACES AL SERVIDOR PI: Este documento fue creado para apoyar la instalación de la(s) estación(es) que contiene(n) la(s) interface(s) al sistema PI de ECOPETROL-Barrancabermeja.

More information

LAB :: PGP (Pretty Good Privacy)

LAB :: PGP (Pretty Good Privacy) LAB :: PGP (Pretty Good Privacy) GnuPG : GnuPG forms the heart of Gpg4win the actual encryption software. Kleopatra : The central certificate administration of Gpg4win, which ensures uniform user navigation

More information

git-flow jesus@jesusamieiro.com Contido Introdución Fluxos de traballo Instalación Comandos de git-flow Exercicio git-flow Ramas principais master develop Permanentes Feature Release Hotfix Ramas de

More information

INTOSAI EXPERTS DATABASE

INTOSAI EXPERTS DATABASE INTOSAI EXPERTS DATABASE User s Manual Version 1.0 Profile: Registrator MU.0001.INTOSAI USER S MANUAL REGISTRATOR PROFILE Experts Database System Author: Daniel Balvis Creation date: May 12th 2015 Last

More information

PGP Key Verification. Version 1.1, 08/26/2002. Stephen Gill Published: 08/26/2002

PGP Key Verification. Version 1.1, 08/26/2002. Stephen Gill   Published: 08/26/2002 PGP Key Verification Version 1.1, 08/26/2002 Stephen Gill E-mail: gillsr@cymru.com Published: 08/26/2002 Contents Credits Introduction... 2 Instructions... 2 Step 1: Retrieve... 3 Step 2: Fingerprint...

More information

Rastreamento de objetos do vpc

Rastreamento de objetos do vpc Rastreamento de objetos do vpc Índice Introdução Rastreamento de objetos do vpc Diagrama de Rede Comandos show da linha de base Introdução Este documento descreve o Rastreamento de objetos do vpc, porque

More information

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction ECE646 Fall 2015 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All

More information

OCTOBEAM. LED Lighting Effect USER MANUAL / MANUAL DE USUARIO

OCTOBEAM. LED Lighting Effect USER MANUAL / MANUAL DE USUARIO LED Lighting Effect USER MANUAL / MANUAL DE USUARIO PLEASE READ THE INSTRUCTIONS CAREFULLY BEFORE USE / POR FAVOR LEA LAS INSTRUCCIÓNES ANTES DE USAR 1. Overview OctoBeam White is a LED Lighting Bar with

More information

Learn PGP. SIPB Cluedump, 19 October Anish Athalye (aathalye), Merry Mou (mmou), Adam Suhl (asuhl) 1 / 22

Learn PGP. SIPB Cluedump, 19 October Anish Athalye (aathalye), Merry Mou (mmou), Adam Suhl (asuhl) 1 / 22 Learn PGP SIPB Cluedump, 19 October 2016 Anish Athalye (aathalye), Merry Mou (mmou), Adam Suhl (asuhl) 1 / 22 2 / 22 Overview 1. Theore cal PGP / Intro to Security 2. Prac cal PGP Installa on, Usage, Demo

More information

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005 Lecture 30 Security April 11, 2005 Cryptography K A ciphertext Figure 7.3 goes here K B symmetric-key crypto: sender, receiver keys identical public-key crypto: encrypt key public, decrypt key secret Symmetric

More information

Documentation for Scanner Tool

Documentation for Scanner Tool Documentation for Scanner Tool Table of Contents Page 2 of 38 Table of Contents Table of Contents Scanner Tool License Scanner tool 2.x compatibility Scanner tool 1.x compatibility Download Requirements

More information

Lab: Securing with PGP

Lab: Securing  with PGP Objectives Understand the concept of public keys, signing, and encrypting email with PGP. Background GNUPG (or GNU Privacy guard) is a free implementation of the OpenPGP standard (RFC 4880) as a tool for

More information

O manual de KCachegrind

O manual de KCachegrind Original author of the documentation: Josef Weidendorfer Updates and corrections: Federico Zenith Tradutor do proxecto Trasno: Marce Villarino 2 Índice xeral 1. Introdución 6 1.1. Perfilado...........................................

More information

First Exam/Second Test 19/6/2010

First Exam/Second Test 19/6/2010 Instituto Superior Técnico Programação Avançada First Exam/Second Test 19/6/2010 Name: Number: Write your number on every page. Your answers should not be longer than the available space. You can use the

More information

Estrategia de Protección de Datos Cloud & DRaaS

Estrategia de Protección de Datos Cloud & DRaaS Estrategia de Protección de Datos Cloud & DRaaS Alexis de Pablos SE for Spain&Portugal alexis.depablos@veeam.com Como Cloud Hybrid permite estar preparado para todo En 2017, las compañías no pueden asumir

More information

DM6. User Guide English ( 3 10 ) Guía del usuario Español ( ) Appendix English ( 13 ) DRUM MODULE

DM6. User Guide English ( 3 10 ) Guía del usuario Español ( ) Appendix English ( 13 ) DRUM MODULE DM6 DRUM MODULE User Guide English ( 3 10 ) Guía del usuario Español ( 11 12 ) Appendix English ( 13 ) 2 User Guide (English) Support For the latest information about this product (system requirements,

More information

gpg4o Manual Version 5.0

gpg4o Manual Version 5.0 gpg4o Manual Version 5.0 Table of Contents Table of Contents 1 General 4 2 System Requirements 5 3 Functional Range 6 3.1 Versions Functional Range Comparison..................... 6 3.2 PGP/Inline and

More information

EDITRAN/XAdES. Installation Manual. XAdES Signing and verification. z/os

EDITRAN/XAdES. Installation Manual. XAdES Signing and verification. z/os EDITRAN/XAdES XAdES Signing and verification z/os Installation Manual INDRA April 2018 EDITRAN/XAdES z/os. Installation Manual CONTENTS 1. INTRODUCTION... 1-1 2. INSTALLATION AND REQUIREMENTS... 2-1 2.1.

More information

Wall. Publications in my wall. Portfolios

Wall. Publications in my wall. Portfolios Content What about VisualEconomy? Register Start session Notifications and pending friendship requests User profiles Latest events Profile creation and update Change profile image Change access data Friends

More information

Super bluetooth phone hacker. Super bluetooth phone hacker.zip

Super bluetooth phone hacker. Super bluetooth phone hacker.zip Super bluetooth phone hacker Super bluetooth phone hacker.zip Download free Super bluetooth hack from Section: Pocket pc software & Category: Mobile softwares. Filetype: Motorola software & Size: 98.94

More information

Learn Sphinx Documentation Documentation

Learn Sphinx Documentation Documentation Learn Sphinx Documentation Documentation Release 0.0.1 Lucas Simon Rodrigues Magalhaes January 31, 2014 Contents 1 Negrito e italico 1 2 Listas 3 3 Titulos 5 4 H1 Titulo 7 4.1 H2 Sub-Titulo.............................................

More information

Security PGP / Pretty Good Privacy. SANOGXXX July, 2017 Gurgaon, Haryana, India

Security PGP / Pretty Good Privacy. SANOGXXX July, 2017 Gurgaon, Haryana, India Email Security PGP / Pretty Good Privacy SANOGXXX 10-18 July, 2017 Gurgaon, Haryana, India Issue Date: [31-12-2015] Revision: [V.1] Security issues for E-mail Confidentiality Network admin can read your

More information

Campaigns. Salesforce, Winter

Campaigns. Salesforce, Winter Campaigns Salesforce, Winter 19 @salesforcedocs Última atualização: 16/10/2018 A versão em Inglês deste documento tem precedência sobre a versão traduzida. Copyright 2000 2018 salesforce.com, inc. Todos

More information

Needham-Schroeder: Secure Key-Distribution Protocol with Public Key Methods

Needham-Schroeder: Secure Key-Distribution Protocol with Public Key Methods DI-FCT-UNL Computer and Network Systems Security Segurança de Sistemas e Redes de Computadores 2011/2012 Needham-Schroeder: Secure Key-Distribution Protocol with Public Key Methods 2011 Henrique J. Domingos,

More information

Microsoft SharePont Server 2013 for the Site Owner/Power User (55035)

Microsoft SharePont Server 2013 for the Site Owner/Power User (55035) Microsoft SharePont Server 2013 for the Site Owner/Power User (55035) Formato do curso: Presencial Preço: 860 Nível: Intermédio Duração: 14 horas Este curso de 3 dias, é destinado a utilizadores avançados

More information

Due: October 8, 2013: 7.30 PM

Due: October 8, 2013: 7.30 PM Jackson State University Department of Computer Science CSC 437-01/539-01 Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan Lab Project # 1: Lab Project on using PGP GNU Privacy Guard (GPG)

More information

EDITRAN/GT 2.1. User manual. EDITRAN transmissions manager. Windows/Unix INDRA 17/03/17

EDITRAN/GT 2.1. User manual. EDITRAN transmissions manager. Windows/Unix INDRA 17/03/17 EDITRAN/GT 2.1 EDITRAN transmissions manager Windows/Unix User manual INDRA 17/03/17 INDEX 1. INTRODUCTION... 1-1 2. CHANGES BETWEEN VERSIONS... 2-1 2.1. Changes in version 2.0 over version 1.0... 2-1

More information

PARA FLASHER BIOS DE ASPIRE 5732Z PRODUCT CATALOG PDF

PARA FLASHER BIOS DE ASPIRE 5732Z PRODUCT CATALOG PDF 01 January, 2018 PARA FLASHER BIOS DE ASPIRE 5732Z PRODUCT CATALOG PDF Document Filetype: PDF 328.96 KB 0 PARA FLASHER BIOS DE ASPIRE 5732Z PRODUCT CATALOG PDF El Basic Input Output System (BIOS) es el

More information

MICROSOFT Course 20411: Administering Windows Server 2012

MICROSOFT Course 20411: Administering Windows Server 2012 MICROSOFT Course 20411: Administering Windows Server 2012 1 INTRODUCCIÓN El curso 20411 se basa en la versión final de Windows Server 2012. La formación aporta al alumno conocimientos sobre las tareas

More information

Garantía y Seguridad en Sistemas y Redes

Garantía y Seguridad en Sistemas y Redes Garantía y Seguridad en Sistemas y Redes Tema 3 User Authen0ca0on Esteban Stafford Departamento de Ingeniería Informá2ca y Electrónica Este tema se publica bajo Licencia: Crea2ve Commons BY- NC- SA 40

More information

An Introduction to How PGP Works

An Introduction to How PGP Works An Introduction to How PGP Works Revision: 0.01 Author: Kenneth Robert Ballou Date 2005-07-21 Document Change History Change Description/Reason Changed By Date Revision Initial Creation of Document Kenneth

More information

Implementing and Managing Windows 10 ( )

Implementing and Managing Windows 10 ( ) Implementing and Managing Windows 10 (20697-1) Formato do curso: Presencial Com certificação: Microsoft Certified Solutions Associate (MCSA) Preço: 1630 Nível: Intermédio Duração: 35 horas Este curso permite

More information

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA Public Key Cryptography, OpenPGP, and Enigmail Cryptography is the art and science of transforming (encrypting) a message so only the intended recipient can read it Symmetric Cryptography shared secret

More information

Default Route de la configuración en el EIGRP

Default Route de la configuración en el EIGRP Default Route de la configuración en el EIGRP Contenido Introducción prerrequisitos Requisitos Componentes Utilizados Configurar Diagrama de la red del r1 del r2 R3 Method-1 usando la ruta predeterminado

More information

ECE 646 Fall Lab 1: Pretty Good Privacy Setup

ECE 646 Fall Lab 1: Pretty Good Privacy Setup ECE 646 Fall 2017 Lab 1: Pretty Good Privacy Setup This setup should be completed before the lecture on Tuesday, October 3. Please read the general information about GNU Privacy Guard from Wikipedia available

More information

Operating Instructions

Operating Instructions Operating Instructions For Digital Camera PC Connection QuickTime and the QuickTime logo are trademarks or registered trademarks of Apple Computer, Inc., used under license. PC Connection for Sharing and

More information

GENERALIDADES INICIAR DE LA HOJA DE CALCULO TEMPORIZADOR. This guide is of virtual use, so it is not necessary to print

GENERALIDADES INICIAR DE LA HOJA DE CALCULO TEMPORIZADOR. This guide is of virtual use, so it is not necessary to print GENERALIDADES INICIAR DE LA HOJA DE CALCULO TEMPORIZADOR 30 25 5 20 10 15 This guide is of virtual use, so it is not necessary to print 1 UNIDAD TEMATICA: GENERALIDADES DE POWER POINT Y USO RESPONSABLE

More information

Anexos. Diseño y construcción de un puente grúa automatizado de precisión

Anexos. Diseño y construcción de un puente grúa automatizado de precisión Anexos Diseño y construcción de un puente grúa automatizado de precisión Nombre: Daniel Andrade García Especialidad: Ingeniería Electrónica Industrial y Automática Tutor: Inmaculada Martínez Teixidor Cotutor:

More information

Introdução e boas práticas em UX Design (Portuguese Edition)

Introdução e boas práticas em UX Design (Portuguese Edition) Introdução e boas práticas em UX Design (Portuguese Edition) By Fabricio Teixeira Introdução e boas práticas em UX Design (Portuguese Edition) By Fabricio Teixeira Cada vez mais o desenvolvimento do front-end

More information

Cryptography: Practice JMU Cyber Defense Boot Camp

Cryptography: Practice JMU Cyber Defense Boot Camp Cryptography: Practice 2013 JMU Cyber Defense Boot Camp Prerequisites This unit assumes that you have already known Symmetric-key encryption Public-key encryption Digital signature Digital certificates

More information

KX-TG5566 KX-TG5576 KX-TGA552

KX-TG5566 KX-TG5576 KX-TGA552 TG5566_5576_TGA552_PQQX14553YA.PDF Page 1 Thursday, March 24, Installation Guide for GIGARANGE USB Utility Model No. KX-TG5566 KX-TG5576 KX-TGA552 Your cordless handset is compatible with the GIGARANGE

More information

COMPUTER CLASSES July 2018

COMPUTER CLASSES July 2018 NEIGHBORHOOD & REGIONAL Linking YOU to LIBRARIES the World of Technology COMPUTER CLASSES July 2018 For up-to-date class schedules and class descriptions, please visit our website at www.houstonlibrary.org

More information

src docs Release Author

src docs Release Author src docs Release 0.8.18 Author September 20, 2018 Contents 1 networkapiclient package 3 1.1 Submodules............................................... 3 1.2 networkapiclient.ambiente module...................................

More information

Querying Microsoft SQL Server 2014 (20461)

Querying Microsoft SQL Server 2014 (20461) Querying Microsoft SQL Server 2014 (20461) Formato do curso: Presencial e Live Training Localidade: Lisboa Com certificação: MCSA: SQL Server Data: 14 Nov. 2016 a 25 Nov. 2016 Preço: 1630 Promoção: -760

More information

CS 161 Computer Security

CS 161 Computer Security Paxson Spring 2013 CS 161 Computer Security 3/14 Asymmetric cryptography Previously we saw symmetric-key cryptography, where Alice and Bob share a secret key K. However, symmetric-key cryptography can

More information

E-BOOK // MANUAL APARELHO NOKIA C3

E-BOOK // MANUAL APARELHO NOKIA C3 27 April, 2018 E-BOOK // MANUAL APARELHO NOKIA C3 Document Filetype: PDF 514.72 KB 0 E-BOOK // MANUAL APARELHO NOKIA C3 Download High Resolution Diagram of Nokia C3-00. Nokia C3-01.5 - O S40 com 1GHz pode

More information

Remove wga para windows 7 professional. Remove wga para windows 7 professional.zip

Remove wga para windows 7 professional. Remove wga para windows 7 professional.zip Remove wga para windows 7 professional Remove wga para windows 7 professional.zip Activate Windows 7/8.1/10 Activate Win 7 Ultimate, Professional, Home edition. Windows 7 is pretty old OS but it Chew WGA

More information

COMPUTER CLASSES April 2019

COMPUTER CLASSES April 2019 NEIGHBORHOOD & REGIONAL Linking YOU to LIBRARIES the World of Technology COMPUTER CLASSES April 2019 For up-to-date class schedules and class descriptions, please visit our website at www.houstonlibrary.org

More information

Operating Instructions

Operating Instructions Operating Instructions For Digital Camera PC Connection QuickTime and the QuickTime logo are trademarks or registered trademarks of Apple Computer, Inc., used under license therefrom. PC Connection for

More information

Quick Installation Guide TK-408K

Quick Installation Guide TK-408K Quick Installation Guide TK-408K Table of Contents Español... 1. Antes de iniciar... 2. Cómo conectar... 3. Cómo utilizar el conmutador KVM... 1 1 2 3 Specifications... Troubleshooting... 5 6 Version 05.04.06

More information

FILE / DE SERVICIO HP MINI PART LIST

FILE / DE SERVICIO HP MINI PART LIST 31 March, 2018 FILE / DE SERVICIO HP MINI PART LIST Document Filetype: PDF 155.08 KB 0 FILE / DE SERVICIO HP MINI PART LIST Find great deals on ebay for HP Mini 110 RAM in Computer Memory. Why should you

More information

SharePoint 2013 Site Collection and Site Administration (55033)

SharePoint 2013 Site Collection and Site Administration (55033) SharePoint 2013 Site Collection and Site Administration (55033) Formato do curso: Presencial Preço: 1740 Nível: Intermédio Duração: 35 horas Este curso de 5 dias, É destinado a utilizadores avançados de

More information

Documentación GT_Complemento_Exportaciones xsd Factura Electrónica en Línea

Documentación GT_Complemento_Exportaciones xsd Factura Electrónica en Línea Documentación GT_Complemento_Exportaciones- 0.1.0.xsd Factura Electrónica en Línea Versión 1 Introducción Este documento describe todos los aspectos del esquema xsd en la que estará basado el nuevo Modelo

More information

Intelligent Application Gateway

Intelligent Application Gateway November 2006 Intelligent Application Gateway Chema Alonso Microsoft MVP Windows Security Informática64 Manufacturing & General Financial & Insurance Healthcare & Education Energy Government 2006 Microsoft

More information

1 Start Ubuntu Privacy Remix

1 Start Ubuntu Privacy Remix Table of Contents 1 Start Ubuntu Privacy Remix...1 2 Working with USB flash drives and diskettes...2 3 Open extended TrueCrypt volume...3 4 Open normal TrueCrypt Volume...4 5 Open and store data in the

More information

and File Encryption on ios with S/MIME and PGP

and File Encryption on ios with S/MIME and PGP Email and File Encryption on ios with S/MIME and PGP Peter Tondl Email and file encryption are no longer an issue in the desktop world. Either you do it or not. In any case, technology rarely fails. All

More information

ford residence southampton, ny Msn hotmail

ford residence southampton, ny Msn hotmail P ford residence southampton, ny Msn hotmail Você está cansado de procurar na internet como criar msn hotmail? Neste post, vamos ensinar pra você, o quanto é fácil criar um msn no hotmail, passo a passo,.

More information

This bulletin describes how to setup calypso so that you can send and receive encrypted s and/or digitally sign your s.

This bulletin describes how to setup calypso so that you can send and receive encrypted  s and/or digitally sign your  s. Date: 12/24/02 1:43 AM From: Luis Soltero To: Bulletins@marinenet.net Copy: Subject: How to Encrypt your Mail With Calypso Return-Path: Delivered-To: bulletins@marinenet.net

More information

Guide Installation and User Guide - Mac

Guide Installation and User Guide - Mac Guide Installation and User Guide - Mac With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign

More information

Deploying and Managing Windows 10 Using Enterprise Services ( )

Deploying and Managing Windows 10 Using Enterprise Services ( ) Deploying and Managing Windows 10 Using Enterprise Services (20697-2) Formato do curso: Presencial Com certificação: Microsoft Certified Solutions Associate (MCSA) Preço: 1670 Nível: Intermédio Duração:

More information

MyPGP Graphical User Interface for PGP

MyPGP Graphical User Interface for PGP MyPGP Graphical User Interface for PGP 11.11.2017 http://www.dit.upm.es/~pepe/mypgp/index_en.html 1 Prerequisites MyPGP is based entirely on BouncyCastle for all cryptographic functions: it is merely a

More information

Dell Active Pen. User s Guide PN556W. Regulatory Model: PN556W

Dell Active Pen. User s Guide PN556W. Regulatory Model: PN556W Dell Active Pen PN556W User s Guide Regulatory Model: PN556W Notas, precauciones y avisos NOTA: Una NOTA indica información importante que le ayuda a hacer un mejor uso de su producto. PRECAUCIÓN: Una

More information

PGP NetShare Quick Start Guide version 9.6

PGP NetShare Quick Start Guide version 9.6 PGP NetShare Quick Start Guide version 9. What is PGP NetShare? The PGP NetShare product is a software tool that provides multiple ways to protect and share your data. You can use PGP NetShare to: Let

More information

Cryptographic Protocols 1

Cryptographic Protocols 1 Cryptographic Protocols 1 Luke Anderson luke@lukeanderson.com.au 5 th May 2017 University Of Sydney Overview 1. Crypto-Bulletin 2. Problem with Diffie-Hellman 2.1 Session Hijacking 2.2 Encrypted Key Exchange

More information

CS 161 Computer Security

CS 161 Computer Security Popa & Wagner Spring 2016 CS 161 Computer Security Discussion 5 Week of February 19, 2017 Question 1 Diffie Hellman key exchange (15 min) Recall that in a Diffie-Hellman key exchange, there are values

More information

Tutorial Como Hacer Jailbreak Iphone 3g 4.2 1

Tutorial Como Hacer Jailbreak Iphone 3g 4.2 1 Tutorial Como Hacer Jailbreak Iphone 3g 4.2 1 Untethered Como hacer jailbreak iphone 3g con snowbreeze. jailbreak slider themes I hacer jailbreak iphone 3g 4.2.1 con snowbreeze Apple News - ios 6 Untethered.

More information

Fundamentos de programação

Fundamentos de programação Fundamentos de programação Tratamento de exceções Edson Moreno edson.moreno@pucrs.br http://www.inf.pucrs.br/~emoreno Exception Handling There are two aspects to dealing with run-time program errors: 1)

More information

COMPUTER CLASSES May 2018

COMPUTER CLASSES May 2018 NEIGHBORHOOD & REGIONAL LIBRARIES Linking YOU to the World of Technology COMPUTER CLASSES May 2018 For up-to-date class schedules and class descriptions, please visit our website at www.houstonlibrary.org

More information

Sony vegas 9 free for windows 7. Sony vegas 9 free for windows 7.zip

Sony vegas 9 free for windows 7. Sony vegas 9 free for windows 7.zip Sony vegas 9 free for windows 7 Sony vegas 9 free for windows 7.zip sony vegas Windows 7 - Free Download Windows 7 sony vegas - Windows 7 Download - Free Windows7 DownloadVideo embedded Watch video Download

More information

Single user Installation. Revisión: 13/10/2014

Single user Installation. Revisión: 13/10/2014 Revisión: 13/10/2014 I Contenido Parte I Introduction 1 Parte II Create Repositorio 3 1 Create... 3 Parte III Installation & Configuration 1 Installation 5... 5 2 Configuration... 9 3 Config. Modo... 11

More information

Important Change to the Year End W2 Process

Important Change to the Year End W2 Process Important Change to the Year End W2 Process This year you will be able to receive your W-2 electronically, download W-2 data to third party tax filing software, and request a copy of your W-2 tax statement.

More information

Connecting your 7. IT Service

Connecting your 7. IT Service Connecting your 7 IT Service 1 Connecting to the wireless network with Windows 7 To be able to use ESADE s WiFi network, be sure to follow the instructions as follows. You must have an updated antivirus

More information

Direct DataSafe for Dazzle Pawn SETUP and USE of program

Direct DataSafe for Dazzle Pawn SETUP and USE of program Direct DataSafe for Dazzle Pawn SETUP and USE of program Direct DataSafe for Dazzle Pawn (DDS for short) is designed specifically for reporting data from your Dazzle Pawn database and sending it automatically

More information

Biocryptology Login. Magento 1.x. Installation and Configuration Instalación y Configuración

Biocryptology Login. Magento 1.x. Installation and Configuration Instalación y Configuración Biocryptology Login Magento 1.x Installation and Configuration Instalación y Configuración 3 16 2018 Biocryptology. All rights reserved. All information and pictures contained herein are subject to change

More information

Guide Installation and User Guide - Windows

Guide Installation and User Guide - Windows Guide Installation and User Guide - Windows With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally

More information

Biocryptology Login. WordPress. Installation and Configuration Instalación y configuración

Biocryptology Login. WordPress. Installation and Configuration Instalación y configuración Biocryptology Login WordPress Installation and Configuration Instalación y configuración Biocryptology. All rights reserved. Biocryptology. Todos los derechos reservados. 3 20 Biocryptology. All rights

More information

Outline Key Management CS 239 Computer Security February 9, 2004

Outline Key Management CS 239 Computer Security February 9, 2004 Outline Key Management CS 239 Computer Security February 9, 2004 Properties of keys Key management Key servers Certificates Page 1 Page 2 Introduction Properties of Keys It doesn t matter how strong your

More information

Mailvelope for Encryption

Mailvelope for  Encryption Mailvelope for Email Encryption Steve Revilak https://masspirates.org/blog/category/cryptoparty/ Cryptoparty @ Somerville Public Library July 15, 2016 1 / 15 What is Mailvelope Mailvelope is a browser

More information

Sesión 2: PL 1b: Gestión de sistemas en tiempo real para prototipado rápido de controladores (MathWorks).

Sesión 2: PL 1b: Gestión de sistemas en tiempo real para prototipado rápido de controladores (MathWorks). Sesión 2: PL 1b: Gestión de sistemas en tiempo real para prototipado rápido de controladores (MathWorks). 1 Objetivo... 3 Hardware description... 3 Software Setup... 3 Setting an Initial Working Folder...

More information

EDITRAN/EA. User and installation manual. Statistics and monitorization. Windows/Unix INDRA 17/03/17

EDITRAN/EA. User and installation manual. Statistics and monitorization. Windows/Unix INDRA 17/03/17 EDITRAN/EA Statistics and monitorization Windows/Unix User and installation manual INDRA 17/03/17 INDEX 1. INTRODUCTION... 1-1 2. EDITRAN/E MANAGEMENT (UNIX)... 2-1 2.1. STATISTICS AND MONITORIZATION...

More information

The Activist Guide to Secure Communication on the Internet. Introduction

The Activist Guide to Secure Communication on the Internet. Introduction The Activist Guide to Secure Communication on the Internet Posted by: The Militant Posted on: September 3rd 2008 Updated on: September 8th 2008 Introduction 1 - Secure Internet Access 1.1 - Internet Cafes

More information

Enterprise Edge 2.0 Personal Call Manager User Guide

Enterprise Edge 2.0 Personal Call Manager User Guide Enterprise Edge 2.0 Personal Call Manager User Guide www.nortelnetworks.com 2000 Nortel Networks P0911958 Issue 01 Contents Enterprise Edge Personal Call Manager 9 Using a handsfree telephone with Enterprise

More information

Get started. All you need to know to get going. LX370

Get started. All you need to know to get going. LX370 Get started. All you need to know to get going. LX370 Welcome Sprint is committed to developing technologies that give you the ability to get what you want when you want it, faster than ever before. This

More information

District 5910 Website Quick Start Manual Let s Roll Rotarians!

District 5910 Website Quick Start Manual Let s Roll Rotarians! District 5910 Website Quick Start Manual Let s Roll Rotarians! All Rotarians in District 5910 have access to the Members Section of the District Website THE BASICS After logging on to the system, members

More information

DOC // MANUAL CALCULADORA HP 17BII EBOOK

DOC // MANUAL CALCULADORA HP 17BII EBOOK 31 March, 2018 DOC // MANUAL CALCULADORA HP 17BII EBOOK Document Filetype: PDF 388.57 KB 0 DOC // MANUAL CALCULADORA HP 17BII EBOOK Why should wait for some days to get or receive the manual calculadora

More information

Autor: Mary Luz Roa SUPPORT GUIDE FOURTH TERM

Autor: Mary Luz Roa SUPPORT GUIDE FOURTH TERM Autor: Mary Luz Roa SUPPORT GUIDE FOURTH TERM 2017 UNIDAD TEMATICA: PROGRAMACION PARA NIÑOS Logro: Identifica las herramientas básicas del programa Alice en la creación de animaciones en 3D, utilizando

More information

Ralph Durkee Independent Consultant Security Consulting, Security Training, Systems Administration, and Software Development

Ralph Durkee Independent Consultant  Security Consulting, Security Training, Systems Administration, and Software Development Ralph Durkee Independent Consultant www.rd1.net Security Consulting, Security Training, Systems Administration, and Software Development PGP and GnuPG Rochester OWASP Agenda: Generic Public Key Encryption

More information

Pre-implementation activities for SAP Note

Pre-implementation activities for SAP Note Pre-implementation activities for SAP Note 1870571 Version 1.0 2013 SAP AG Page 1 Copyright Copyright 2013 SAP AG. All rights reserved. No part of this documentation may be reproduced or transmitted in

More information

SFTP Service (ORK-TR)

SFTP Service (ORK-TR) SFTP Service (ORK-TR) Version 1.3 BME VERSION CONTROL TABLE Version Date Changes / Modifications Author 1.0 09/10/2017 N/A Ignacio Herrero 1.1 23/10/2017 Corrections Ignacio Herrero 1.2 24/10/2017 Addition

More information

Free xfinity username and password wifi

Free xfinity username and password wifi Free xfinity username and password wifi Back Just visit www.xfinity.com/wifipassword and follow the steps provided. At that time the company supplied 9.34 million residential telephone lines. [75]. Percentage

More information

IntesisBox PA-RC2-xxx-1 SANYO compatibilities

IntesisBox PA-RC2-xxx-1 SANYO compatibilities IntesisBox PA-RC2-xxx-1 SANYO compatibilities In this document the compatible SANYO models with the following IntesisBox RC2 interfaces are listed: / En éste documento se listan los modelos SANYO compatibles

More information

Oracle OpenWorld: Labs for Oracle User Productivity Kit and Oracle Tutor Student Guide

Oracle OpenWorld: Labs for Oracle User Productivity Kit and Oracle Tutor Student Guide Oracle OpenWorld: Labs for Oracle User Productivity Kit and Oracle Tutor Student Guide November 2007 Oracle Open World Copyright 2007, Oracle. All rights reserved. Disclaimer This document contains proprietary

More information

Microsoft Excel: Linking & Sharing Data. Dawn Bjork, MCT, MOSM The Software Pro. Learning Guide

Microsoft Excel: Linking & Sharing Data. Dawn Bjork, MCT, MOSM The Software Pro. Learning Guide Microsoft Excel: Linking & Sharing Data Learning Guide Dawn Bjork, MCT, MOSM The Software Pro Technology Speaker Microsoft Certified Trainer Certified Excel Expert Microsoft Office Specialist Master Dawn@

More information