Code Snippets für VS Lab Test
|
|
- Miranda York
- 6 years ago
- Views:
Transcription
1 Code Snippets für VS Lab Test Beinhaltet TCP, UDP, RMI sowie diverse Security Dinger. Großteils wurde der Code von Lab1 Lab2 genommen, bzw. aus dem TUWEL Faq. Es kann natürlich sein, dass Fehler enthalten sind, also bitte mit kritischem Auge betrachten ;). Exceptions wurden hier für die Leserlichkeit komplett weggelassen, Eclipse wird einen jedoch darauf aufmerksam machen, vondem her sollte das kein großes Problem sein. Viel Spaß beim Lernen. TCP: Client Setup for short communication: UDP: Client Setup for short communication RMI: Client Setup Server Setup SECURITY: BASE64 en/decoding Secure Random Number AES encryption / decryption RSA encryption / decryption HMac
2 TCP: synchronous Server Client communication. Client Setup for short communication: Socketsocket=newSocket("localhost", 1337); BufferedReaderreader=newBufferedReader(new InputStreamReader(socket.getInputStream())); // thetrueisveryimportantfortheautoflush PrintWriterwriter=newPrintWriter(socket.getOutputStream(), true); // writetoserver writer.println("requesttoserver"); // printoutanswer System.out.println(reader.readLine()); // Don tclosewriterorreaderbecausetheythrowexceptions. this.socket.close(); // ServerSocketonlyneedsport, nohost ServerSocketserverSocket=newServerSocket(1337); SocketclientSocket=serverSocket.accept(); BufferedReaderreader=newBufferedReader(new InputStreamReader(clientSocket.getInputStream())); PrintWriterwriter=newPrintWriter(clientSocket.getOutputStream(), true); Stringrequest=reader.readLine(); /* * DOSOMETHINGWITHREQUEST:D */ // answertoclient writer.println("responsetoclient"); // Don tclosewriterorreaderbecausetheythrowexceptions. if(serversocket!=null&&!serversocket.isclosed()) serversocket.close(); if(clientsocket!=null&&!clientsocket.isclosed()) clientsocket.close();
3 UDP: a synchronous Server Client communication. Client Setup for short communication // CLIENTHASEMPTYCONSTRUCTOR DatagramSocketsocket=newDatagramSocket(); StringmessageForUDP="THISISAMESSAGE"; byte[] buffer=messageforudp.getbytes(); // createthepacket DatagramPacketpacket=newDatagramPacket(buffer, buffer.length, InetAddress.getByName(serverhost), udpport); // sendthepacketoff socket.send(packet); // Nowwegonnawaitforapacket, setupthebufferandpacketfirst: buffer=newbyte[1024]; packet=newdatagrampacket(buffer, buffer.length); // thereceiveblocksandwaitstillpacketarrives socket.receive(packet); // Printoutwhatwereceived System.out.println(newString(packet.getData())); socket.close(); // SERVERHASPORTINCONSTRUCTOR DatagramSocketsocket=newDatagramSocket(udpPort); // Nowwegonnawaitforapacket, setupthebufferandpacketfirst: byte[] buffer=newbyte[1024]; DatagramPacketpacket=newDatagramPacket(buffer, buffer.length); // thereceiveblocksandwaitstillpacketarrives socket.receive(packet); Stringrequest=newString(packet.getData())); Stringresponse=newString("response"); // ToreturntoClientwegetAddressandPortfromPacket InetAddressaddress=packet.getAddress(); intport=packet.getport(); buffer=response.getbytes(); packet=newdatagrampacket(buffer, buffer.length, address, port); socket.send(packet); socket.close();
4 RMI: registry thingy for putting addresses and looking them up. Client Setup // getremoteserverobjectfromregistry Registryregistry=LocateRegistry.getRegistry(host, port); IServerRemoteremote=(IServerRemote) registry.lookup(servername); // nowyoucanusethemethodsfromiserverremote(examplefrommuster test) remote.bye(); Server Setup // createregistryonport Registryregistry=LocateRegistry.createRegistry(port); // remoteobistheremoteobject, inourcaseaninstanceofiserverremote( > this) IServerRemoteremote=(IServerRemote) UnicastRemoteObject.exportObject(remoteOb, 0); // bindremoteobjecttoanameintheregistry registry.bind(bindingname, remote); // THAT SITATTHISPOINT, NOWFORCLOSING // remoteobissameasbefore( >this) andtrueisforforcingit UnicastRemoteObject.unexportObject(remoteOb, true); if(registry!=null){ // don tforgettounbindafterunexporting registry.unbind(bindingname); UnicastRemoteObject.unexportObject(registry, true); } //!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! // theiserverremotehasttousetheremoteinterfaceandallmethodsthatwillbe // calledoverrmihavetothrowtheremoteexception
5 SECURITY: BASE64 en/decoding // getarandomstringmessageinbyte byte[] message=newstring("thisisamessage").getbytes(); // encodethemessage byte[] base64encoded=base64.encode(message); // decodethemessage byte[] base64decoded=base64.decode(base64encoded); // togofrombytetostring StringmessageEncoded=newString(base64encoded); Secure Random Number SecureRandomsecureRandom=newSecureRandom(); finalbyte[] number=newbyte[32]; securerandom.nextbytes(number); AES encryption / decryption // CREATEIV >nothingbutarandom16bitbytearray SecureRandomiv=newSecureRandom(); finalbyte[] number=newbyte[16]; iv.nextbytes(number); // CREATEtheKEY, AESthereforeAESInstance KeyGeneratorgenerator=KeyGenerator.getInstance("AES"); // KEYSIZEisinbits generator.init(keysize); SecretKeykey=generator.generateKey(); // ENCRYPTYOURINPUT Ciphercipher=Cipher.getInstance(AESCONFIG); cipher.init(cipher.encrypt_mode, key, newivparameterspec(iv)); byte[] encrypted=cipher.dofinal(input); // ENCRYPTIONANDDECRYPTIONISTHESAMEEXCEPTFORTHECIPHER_MODE!!!!!!! // DECRYPTYOURINPUT Ciphercipher=Cipher.getInstance(AESCONFIG); cipher.init(cipher.decrypt_mode, key, newivparameterspec(iv)); byte[] decrypted=cipher.dofinal(input);
6 RSA encryption / decryption // RSAWEUSETHEPUBLICANDPRIVATEKEYS, shouldbegivenasfile, alsowedon t // needanivobject // ENCRYPTYOURINPUTWITHPUBLICKEY Ciphercipher=Cipher.getInstance(RSACONFIG); cipher.init(cipher.encrypt_mode, publickey);//!!!! PUBLICKEY byte[] encrypted=cipher.dofinal(input); // ENCRYPTIONANDDECRYPTIONISTHESAMEEXCEPTFORTHECIPHER_MODEANDKEY!!!!!!!! // DECRYPTYOURINPUTWITHPRIVATEKEY Ciphercipher=Cipher.getInstance(RSACONFIG); cipher.init(cipher.decrypt_mode, privatekey);//!!!! PRIVATEKEY byte[] decrypted=cipher.dofinal(input); HMac // HMACCHECK // keyisthesecretkey, messageisthemessagewereceived // ThisisbasicallyalsohowyoucreateahMac MachMac=Mac.getInstance("HmacSHA256"); hmac.init(key); hmac.update(message.getbytes(standardcharsets.utf_8)); byte[] calculatedhash=hmac.dofinal(); // receivedhashisthehashthatwereceivedwiththemessage returnmessagedigest.isequal(calculatedhash, receivedhash);
Search Engines Chapter 2 Architecture Felix Naumann
Search Engines Chapter 2 Architecture 28.4.2009 Felix Naumann Overview 2 Basic Building Blocks Indexing Text Acquisition iti Text Transformation Index Creation Querying User Interaction Ranking Evaluation
More informationAuskunftsbegehren gemäß Art 15 DSGVO (Facebook Version englisch) - V1.0
Auskunftsbegehren gemäß Art 15 DSGVO (Facebook Version englisch) - V1.0 Inhalt 1. Versionsstand dieses Dokuments... 1 1.1 V1.0 Stammfassung... 1 2. Hinweise zu diesem Muster... 1 3. Musterbrief... 2 1.
More informationInstalling and Configuring Windows 10 MOC
Installing and Configuring Windows 10 MOC 20697-1 In diesem 5-tägigen Seminar lernen Sie die Installation und Konfiguration von Windows-10-Desktops und -Geräten in einer Windows-Server- Domänenumgebung.
More informationUlrich Stärk
< Ulrich Stärk ulrich.staerk@fu-berlin.de http://www.plat-forms.org 2 Einige Vorurteile Everything in the box is kind of weird and quirky, but maybe not enough to make it completely worthless. PHP: a fractal
More informationVerteilte Systeme UE Important Code
Verteilte Systeme UE Important Code Lab 1 Create ServerSocket ServerSocket serversocket = new ServerSocket(tcpPort); //throws IOException Accept ClientSocket Socket clientsocket = serversocket.accept();
More informationDwg viewer free download vista. Dwg viewer free download vista.zip
Dwg viewer free download vista Dwg viewer free download vista.zip free dwg viewer free download - Free DWG Viewer, Free DWG Viewer, DWG Viewer, and many more programsdeep View Free DWG DXF Viewer, free
More informationUsing extensible metadata definitions to create a vendor independent SIEM system
Using extensible metadata definitions to create a vendor independent SIEM system Prof. Dr. Kai Oliver Detken (DECOIT GmbH) * Dr. Dirk Scheuermann (Fraunhofer SIT) * Bastian Hellmann (University of Applied
More informationWorldCat Local Release Notes 13 November 2011
WorldCat Local Release Notes 13 November 2011 Contents A-to-Z List and Search Box... 2 Facet Persistence... 8 'View Now' Change... 8 Enabling Local OPAC links on Brief Results Page... 10 Boolean Operators
More informationAnleitung zur Schnellinstallation TEW-684UB 1.01
Anleitung zur Schnellinstallation TEW-684UB 1.01 Table of Contents Deutsch 1 1. Bevor Sie anfangen 1 2. Installation 2 3. Verwendung des drahtlosen Adapters 5 Troubleshooting 7 Wireless Tips 8 Version
More information1. Übungsblatt. Vorlesung Embedded System Security SS 2017 Trusted Computing Konzepte. Beispiellösung
Technische Universität Darmstadt Fachbereich Informatik System Security Lab Prof. Dr.-Ing. Ahmad-Reza Sadeghi Raad Bahmani 1. Übungsblatt Vorlesung Embedded System Security SS 2017 Trusted Computing Konzepte
More informationSlides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013
Digital Signatures Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013 Digital Signatures Diagram illustrating how to sign a message Why do we use a one-way hash? How does a collision
More informationWindows Update error code list
Die Überprüfung von Update-Fehler-Codes aus dem %systemroot%\windowsupdate.log ist recht mühsam. Hier mal einige Fehler-Codes mit Klartextausgabe zur weiteren und erleichterten Analyse. Windows Update
More informationDeveloping Microsoft Azure Solutions MOC 20532
Developing Microsoft Azure Solutions MOC 20532 In dem Kurs 20532A: Developing Microsoft Azure Solutions lernen Sie, wie Sie die Funktionalität einer vorhandenen ASP.NET MVC Anwendung so erweitern, dass
More informationWorldCat Local Release Notes 21 August 2011 Contents
WorldCat Local Release Notes 21 August 2011 Contents Full Text Limiter... 2 Availability on Brief Record... 5 'View Now' link change... 7 Local Holdings Records (LHR)... 7 Boolean Support... 8 Common Word
More informationDesign and implementation of Virtual Security Appliances (VSA) for SME
Design and implementation of Virtual Security Appliances (VSA) for SME Prof. Dr. Kai-Oliver Detken, DECOIT GmbH (Germany) Christoph Dwertmann, NICTA (Australia) Table of contents Short introduction of
More informationExchange 2016 Mailbox Move Request
Hier einige Powershell Beispiele zur Abfrage des Status, Größe, Fortschritt, Details, Reporte usw. # Move Übersicht Get-MoveRequest Group-Object -Property:Status Select-Object Name,Count Format- Table
More informationManual Android Galaxy S2 Update 4.0 Kies Anleitung
Manual Android Galaxy S2 Update 4.0 Kies Anleitung (HOW-TO) Samsung Galaxy S2 // Root-Anleitung für Anfänger // Was ist Root? Vorteile. Diese Anleitung ist nur für das GT-i9100! How to Install & Update
More informationFlasher Utility. QUANCOM Informationssysteme GmbH
Flasher Utility Copyright Alle Angaben in diesem Handbuch sind nach sorgfältiger Prüfung zusammengestellt worden, gelten jedoch nicht als Zusicherung von Produkteigenschaften. QUANCOM haftet ausschließlich
More informationUSB. USB Sticks in Design und Qualität
USB Sticks in Design und Qualität 148 149 USB Touch Pen touch pen OTG (On-The-Go) USB Stick OTG (On-The-Go) USB Drive USB microsd Karte microsd card Werbefläche advertising space 1, 2, 4, 8, 16, 32 GB
More informationCOURSE LISTING. Courses Listed. Training for Analytics with Business Warehouse (BW) in SAP BW powered by SAP HANA. Last updated on: 23 Nov 2018
Training for Analytics with Business Warehouse (BW) in SAP BW powered by SAP HANA Courses Listed Fortgeschrittene BW305H - SAP BW powered by SAP HANA: BW Query Design BW310H - SAP BW powered by SAP HANA:
More informationIntro (with some history) Issues ow, ow, ow, ow, ow, ow, ow, ow, Disclosure/Timeline CHIASMUS cipher
Intro (with some history) Issues ow, ow, ow, ow, ow, ow, ow, ow, Disclosure/Timeline CHIASMUS cipher We made this: Erik Tews, Julian Wälde, and me independent discovery by Felix Schuster ECB first discovered
More informationSD2IEC evo². Revision E3b
SD2IEC evo² Installation Instructions Revision E3b 16xEight Wir danken für das uns mit dem Kauf dieses Produktes entgegengebrachte Vertrauen! Unser Ziel ist es nicht nur die Anforderungen unserer Kunden
More informationPAR-KL-68. QUANCOM Informationssysteme GmbH
PAR-KL-68 Copyright Alle Angaben in diesem Handbuch sind nach sorgfältiger Prüfung zusammengestellt worden, gelten jedoch nicht als Zusicherung von Produkteigenschaften. QUANCOM haftet ausschließlich in
More informationDatenblatt: True Flat Touch Screens
- völlig ebene Frontseite, verhindert Schmutzränder - standardmäßig eine entspiegelte Glasfront - schlankes Gehäusedesign - optionaler projiziert kapazitiver Touchscreen (Projected Capacitive oder PCap)
More informationAMIGA WORKBENCH AMIGA WORKBENCH 1 3 AMIGA WORKBENCH 1 3 PDF WORKBENCH (AMIGAOS) - WIKIPEDIA AMIGAOS - WIKIPEDIA 1 / 5
PDF WORKBENCH (AMIGAOS) - WIKIPEDIA AMIGAOS - WIKIPEDIA 1 / 5 2 / 5 3 / 5 amiga workbench 1 3 pdf Workbench 2.0 was released with the launch of the Amiga 3000 in 1990. Until AmigaOS 2.0 there was no unified
More informationTDM+VoIP Smart Media Gateway
SmartNode SN11A Series TDM+VoIP Smart Media Gateway Quick Start Guide Important This is a Class A device and is not intended for use in a residential environment. Part Number: MSN11-QS, Rev. C Revised:
More informationRib Design to Increase Stiffness of Housings
Rib Design to Increase Stiffness of Housings R. Helfrich, M. Klein, A. Schünemann INTES GmbH, Stuttgart, Germany www.intes.de; info@intes.de Summary: Crank housings and transmission housings need sufficient
More informationManual Update V
Manual Update V4.02.04 This document contains the latest information about PRISMAproduction, which has not been integrated into the handbooks so far or which we want to emphasize as changes. Dieses Dokument
More informationINVENTOR MECHANICAL DESIGN & 3D CAD SOFTWARE AUTODESK AUTOCAD FOR MAC & WINDOWS CAD SOFTWARE AUTODESK
AUTODESK INVENTOR 2015 AUTOCAD PDF INVENTOR MECHANICAL DESIGN & 3D CAD SOFTWARE AUTODESK AUTOCAD FOR MAC & WINDOWS CAD SOFTWARE AUTODESK 1 / 5 2 / 5 3 / 5 autodesk inventor 2015 autocad pdf Autodesk
More informationModern and Lucid C++ for Professional Programmers. Week 15 Exam Preparation. Department I - C Plus Plus
Department I - C Plus Plus Modern and Lucid C++ for Professional Programmers Week 15 Exam Preparation Thomas Corbat / Prof. Peter Sommerlad Rapperswil, 08.01.2019 HS2018 Prüfung 2 Durchführung Mittwoch
More informationAUTOMATISIERUNG DER INFRASTRUKTUR
AUTOMATISIERUNG DER INFRASTRUKTUR NÄCHSTER HALT: STORAGE! ULRICH HÖLSCHER SYSTEMS ENGINEER 1 ES GIBT EINE MENGE ARBEIT WIE GEHEN WIR ES AN? Cloud Management Systems Automatisierung, IT-Prozesse Cloud Readiness/Transformation
More informationBirol ÇAPA Doç. Dr. Sıddıka Berna Örs Yalçın Following code can coompute montgomery multiplication of 128 bit numbers:
Homework 3 Implementation of Montgomery Multiplication Montgomery multiplier calculates C = A. B mod N as follows: 1. Given integers x, y and 0 x,y m 2. Montgomery Domain: a. x x m d m, = yr mod m 3. Montgomery
More informationDas Seminar kann zur Vorbereitung auf die Zertifizierung als Microsoft Certified Solutions Developer (MCSD): SharePoint Applications genutzt werden.
Developing Microsoft SharePoint Server 2013 Core Solutions MOC 20488 In diesem Seminar erlernen die Teilnehmer Kernfähigkeiten, die fast allen SharePoint-Entwicklungsaktivitäten gemeinsam sind. Dazu gehören
More informationCDP 1440i/2440i Getting Started Guide
COMPREHENSIVE INTERNET SECURITY b SonicWALL CDP Series Appliances CDP 1440i/2440i Getting Started Guide SonicWALL CDP 1440i / 2440i Getting Started Guide This Getting Started Guide contains installation
More informationExtract from Project Report
AAA Continuation Activity 2013. Durchführung von E-Assessment mit ILIAS an der Universität Bern Auszug aus dem Projektbericht E-Assessment ilub Extract from Project Report A Comparison of E-Exams with
More informationCANOpen DS402 at KEBA
CANOpen DS402 at KEBA Description author: sue version date: 26.5.2008 actual version: V 1.0 printed: 26.5.08 23:14 filename: d:\projekte\cn\canopen_ds402_driver\canopen-ds402 at keba.doc Index of changes
More informationZielgruppe Dieser Kurs eignet sich für Cloud- und Rechenzentrumsadministratoren.
Datacenter Monitoring with System Center Operations Manager MOC 10964 Sie erwerben in diesem Seminar praktische Erfahrung mit der Überwachung von Infrastruktur und Anwendungen mit System Center 2012 SP1
More informationTI-No. 4002TI05.doc PAGE NO. : 1/1. Settings after Installation of the Firmware Version 74
TI-No. 4002TI05.doc PAGE NO. : 1/1 DEVELOP Technical Information MODEL NAME : D 4500/5500iD MODEL CODE : 4002/4003 TI-INFO-NO. : 05 DATE : 13.07.2001 SUBJECT : Firmware MSC/Message/IR Version 74 PERFORMANCE
More informationContents. Configuring SSH 1
Contents Configuring SSH 1 Overview 1 How SSH works 1 SSH authentication methods 2 SSH support for Suite B 3 FIPS compliance 3 Configuring the device as an SSH server 4 SSH server configuration task list
More informationContinuous Delivery. für Java Anwendungen. Axel Fontaine Software Development Expert
07.04.2011 Continuous Delivery für Java Anwendungen Axel Fontaine Software Development Expert twitter.com/axelfontaine www.axelfontaine.com business@axelfontaine.com Ceci n est pas une build tool. Ceci
More informationCopyright 2004 by SMC Networks, Inc. 38 Tesla Irvine, California All rights reserved.
Copyright Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other
More informationProCANopen Questions & Answers Version Application Note AN-ION
Version 1.3 2011-07-21 Author(s) Restrictions Abstract Juergen Klueser Public Document This Document gives answers on typical questions on ProCANopen application. Table of Contents 1.0 Overview...1 2.0
More informationTHE CLOUD. Who Owns Your Data?
THE CLOUD Who Owns Your Data? Seite 1 TABLE OF CONTENTS Introduction App Server Storage Network / location Seite 2 THIS IS NOT A TALK ABOUT What the cloud is Why to use the cloud Which cloud to use Also,
More informationAC500. Application Note. Scalable PLC for Individual Automation. AC500-S safety PLC - Overview of changes in Automation Builder 2.1.x and 2.0.
Application Note AC500 Scalable PLC for Individual Automation AC500-S safety PLC - Overview of changes in Automation Builder 2.1.x and 2.0.x ABB Automation Products GmbH Wallstadter Str. 59 D-68526 Ladenburg
More information4. Multicast Multicast Principles. Why is Multicast Important for. Multimedia? Definition of Multicast
4.3 Multicast 4.3.1 Multicast Principles efinition of Multicast Multicast is defined as the transmission of a data stream from one sender to many receivers with packet duplication and forwarding inside
More informationMonitoring & Automation with OP5 & Stonebranch A presentation in German - English
Monitoring & Automation with OP5 & Stonebranch A presentation in German - English Copyright OP5 2017 All rights reserved. PRESENTATION AGENDA Katrin Ackermann-Rossander Jan Josephson Key Account Manager
More information10/25/ Recursion. Objectives. Harald Gall, Prof. Dr. Institut für Informatik Universität Zürich.
11. Recursion Harald Gall, Prof. Dr. Institut für Informatik Universität Zürich http://seal.ifi.uzh.ch/info1! You think you know when you learn, are more sure when you can write, even more when you can
More informationÜbungsfragen für den Test zum OMG Certified UML Professional (Intermediate) Download
Die Prüfung zum OCUP (UML Certified UML Professional) besteht aus einem computerbasierten Multiple- Choise-Test, dessen Testfragen aus einem Pool für jeden Kanidaten neu zusammengestellt werden. Die Fragen
More informationEUCEG: Encryption process
EUROPEAN COMMISSION DIRECTORATE-GENERAL FOR HEALTH AND FOOD SAFETY General Affairs Information systems EUCEG: Encryption process Document Control Information Settings Document Title: Project Title: Document
More informationTable of contents 2 / 12
OraRSA 1 / 12 Table of contents Introduction... 3 Install... 4 Setup... 4 Load the JAR files... 4 Register ORA_RSA package... 4 Permissions... 4 Upgrade... 4 Uninstall... 5 Switch from Trial to Production
More informationIN THE PRODUCT LINE MODEL VERSIONING DEVELOPMENT. Supported by Enterprise Architect and LemonTree
MODEL VERSIONING IN THE PRODUCT LINE DEVELOPMENT Supported by Enterprise Architect and LemonTree 10.11.2017 TdSE 17, Paderborn Tim Michaelis (PrehCarConnect), Roman Bretz(LieberLieber) VORSTELLUNG PREH
More informationDOWNLOAD PERFECT WILLST DU DIE PERFEKTE WELT
DOWNLOAD PERFECT WILLST DU DIE PERFEKTE WELT Page 1 Page 2 perfect willst du die pdf Perfect - Willst du die perfekte Welt?.pdf - Cecelia Ahern - 3841422365 Perfect - Willst du die perfekte Welt? / Perfekt
More informationEmerging Technologies Workshops
Emerging Technologies Workshops Programmierung des Netzwerkes ohne Kenntnisse der Console, ein Traum für Nicht-Cisco-Admins? Was sind diese Emerging Technologies? Sind Technologien, die den Status quo
More informationArtisan Technology Group is your source for quality new and certified-used/pre-owned equipment
Artisan Technology Group is your source for quality new and certified-used/pre-owned equipment FAST SHIPPING AND DELIVERY TENS OF THOUSANDS OF IN-STOCK ITEMS EQUIPMENT DEMOS HUNDREDS OF MANUFACTURERS SUPPORTED
More informationPlanning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools MOC 20398
Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools MOC 20398 In diesem 5-tätigen Seminar erlernen die Teilnehmer, die Enterprise Mobility Suite zu
More informationfile:///h:/temp/htmlö/analyse+dfsio+write+test.html
nalyse DFSIO Write Test of 8 29.03.2017 12:45 Testreihe Ergebnisse: Probleme: Die Ergebnisse können der Inputspezifikation nicht mehr zugeordnet werden ("hier wollte ich so und so viele Dateien mit so
More informationInternet Protocol (IP) TCP versus UDP
Internet Protocol (IP) Low-level protocols used by hosts and routers Guides the packets from source to destination host Hides the transmission path phone lines, LANs, WANs, wireless radios, satellite links,
More informationhuawei configuration 3E5E5C3156BED808DD5646BC382CA821 Huawei Configuration 1 / 6
Huawei Configuration 1 / 6 2 / 6 3 / 6 Huawei Configuration This guide refers to a Huawei EchoLife HG520s router, but will apply to most Huawei routers in general. 1. Visit the router's IP address in a
More informationAW-Information sheet Swissmedic egov Portal Standard functions
List of contents 1 Terms, definitions, abbreviations, glossary... 2 2 Objective and scope... 3 3 Conditions for the use of the Swissmedic egov Portal... 4 4 Using the egov Portal... 4 5 New Swissmedic
More informationPraktische Aspekte der Informatik. Thomas Löwe Prof. Marcus Magnor
Praktische Aspekte der Informatik Thomas Löwe Prof. Marcus Magnor Your Proposal It s due 15.05.2016! It s due 22.05.2016! Software Versioning SVN basics, workflow, and commands Further Reading Warning!
More informationAufgabe 2. Join-Methoden Differential Snapshots. Ulf Leser Wissensmanagement in der Bioinformatik
Aufgabe 2 Join-Methoden Differential Snapshots Ulf Leser Wissensmanagement in der Bioinformatik Join Operator JOIN: Most important relational operator Potentially very expensive Required in all practical
More informationFLASH INSIGHT. The internet giants media mobilisation Do they play turtle and hare with us?
August 2015 Shaping the Digital Future FLASH INSIGHT The internet giants media mobilisation Do they play turtle and hare with us? How Google, Amazon, Apple and Microsoft conquer almost all digital business
More information... Chair of Mobile Business & Multilateral Security. Lecture 14 Business Informatics 2 (PWIN) Q&A SS 2017
Lecture 14 Business Informatics 2 (PWIN) Q&A SS 2017 Prof. Dr. Kai Rannenberg Akos Grosz, M.Sc. Christopher Schmitz, M.Sc. www.m-chair.de Chair of Mobile Business & Multilateral Security Jenser (Flickr.com)
More informationAusweisApp2 Manual Release
AusweisApp2 Manual Release 1.14.0 Governikus GmbH & Co. KG 20.12.2017 Contents 1 Installation of AusweisApp2 on a Windows operating system 1 1.1 Dialog page Welcome - Step 1 of 5.............................
More informationNeuigkeiten aus dem Oracle-Cloud-Portfolio - Fokus auf Infrastructure-as-a-Service
Neuigkeiten aus dem Oracle-Cloud-Portfolio - Fokus auf Infrastructure-as-a-Service Oliver Zandner, Leitender System-Berater Architect for Oracle-Cloud- & -On-Premise-Tech. Oracle Deutschland Copyright
More informationCSCE 715: Network Systems Security
CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Web Security Web is now widely used by business, government, and individuals But Internet and Web are
More informationNetwork Programming. Powered by Pentalog. by Vlad Costel Ungureanu for Learn Stuff
Network Programming by Vlad Costel Ungureanu for Learn Stuff Java Network Protocols 2 Java Network Protocols 3 Addresses Innet4Address (32-bit) 85.122.23.145 - numeric pentalog.com symbolic Innet6Address
More informationSoftwareverteilung HotPotatoes
Besuchen Sie uns im Internet unter http://www.vobs.at/rb 2015 Schulmediencenter des Landes Vorarlberg IT-Regionalbetreuer des Landes Vorarlberg Autor: Erich Vonach 6900 Bregenz, Römerstraße 15 Alle Rechte
More informationDOWNLOAD OR READ : QUICK CORBA 3 OBJECT MANAGEMENT GROUP BOOK 1 PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : QUICK CORBA 3 OBJECT MANAGEMENT GROUP BOOK 1 PDF EBOOK EPUB MOBI Page 1 Page 2 quick corba 3 object management group book 1 quick corba 3 object pdf quick corba 3 object management group
More informationDesigning Database Solutions for Microsoft SQL Server 2012 MOC 20465
Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465 Dieses Seminar behandelt das Design und die Überwachung von hochperformanten und hochverfügbaren Datenlösungen mit SQL Server 2012.
More informationJava Networking (sockets)
Java Networking (sockets) Rui Moreira Links: http://java.sun.com/docs/books/tutorial/networking/toc.html#sockets http://www.javaworld.com/javaworld/jw-12-1996/jw-12-sockets_p.html Networking Computers
More informationForm Configuration. You will have to be logged in in OPAS as the same User that you wish to configure the form for.
Form Configuration Part 1: add/remove fields/elements using the example of: add/remove the element series in Dates You will have to be logged in in OPAS as the same User that you wish to configure the
More informationIPC-610F. Industrial PC Chassis
IPC-610F Industrial PC Chassis Copyright Notice This document is copyrighted, March 2000, by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the right to make improvements to
More informationLotus Connections Architektur und Installation IBM Corporation
Lotus Connections Architektur und Installation Architektur Connections WebSphere Application Server incl Lotus Connections HTTP Server Benutzer mit Browser LDAP Tivoli Directory Integrator DatenbankSystem,
More informationÜbersicht Port-Liste. Workstation. Liste der in SeMSy III verwendeten Netzwerk-Ports
Übersicht -Liste Liste der in SeMSy III verwendeten Netzwerk-s SeMSy III ist ein hochperformantes und zukunftssicheres Videomanagementsystem mit höchstem Bedienkomfort. Es bietet umfangreiche Funktionen,
More informationSecurity Protocols and Infrastructures. Winter Term 2010/2011
Winter Term 2010/2011 Chapter 4: Transport Layer Security Protocol Contents Overview Record Protocol Cipher Suites in TLS 1.2 Handshaking Protocols Final Discussion 2 Contents Overview Record Protocol
More informationUnavoidable trees and forests in graphs
Bachelor thesis Unavoidable trees and forests in graphs Georg Osang July 19, 01 Reviewers: Advisors: Prof. Dr. Maria Axenovich Prof. Dr. Dorothea Wagner Prof. Dr. Maria Axenovich Dr. Ignaz Rutter Faculty
More informationHOW THE INTERNET OF THINGS IS CHANGING THE WAY WE WORK
GLOBAL SPONSORS HOW THE INTERNET OF THINGS IS CHANGING THE WAY WE WORK MARTIN PERZL LEAD GLOBAL ARCHITECT, DELL EMC @PERZLM MARTIN.PERZL@DELL.COM How the Internet of Things is changing the way we work
More informationDownload google chrome version 44 Google Chrome Google
Download google chrome version 44 I need your attention guys.. the link given above is fake. I would like to give a helping hand and after searching for the real file, I finally fount it. If you want,
More informationIntroduction to Computational Linguistics
Introduction to Computational Linguistics Frank Richter fr@sfs.uni-tuebingen.de. Seminar für Sprachwissenschaft Eberhard Karls Universität Tübingen Germany Intro to CL WS 2011/12 p.1 Langenscheidt s T1
More informationCipher Suite Configuration Mode Commands
The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables
More informationInside the World of Cryptographic Algorithm Validation Testing. Sharon Keller CAVP Program Manager NIST ICMC, May 2016
Inside the World of Cryptographic Algorithm Validation Testing Sharon Keller CAVP Program Manager NIST ICMC, May 2016 Mission To provide federal agencies in the United States and Canada with assurance
More informationPIC Council Charter. Jürgen Wagner, Friedhelm Krebs. SAP AG Version 1.1 April 26 th, 2004
PIC Council Charter Jürgen Wagner, Friedhelm Krebs SAP AG Version 1.1 April 26 th, 2004 PIC Council Charter Mission of PIC Council Its mission is to guarantee quality of process integration content by
More informationBechtle Solutions Update VMware Horizon 7 What s New
Bechtle Solutions Update VMware Horizon 7 What s New Bechtle Schweiz AG - IT-Systemhaus Zürich Marco Flückiger / Senior Systems Engineer Basel 20. September 2016 Agenda Horizon 7: What s New Innovationen
More informationIPC Industrial PC Chassis. User's Manual
IPC-6908 Industrial PC Chassis User's Manual Copyright notice This document is copyrighted, November 1999, by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the right to make
More informationNEUHEITEN NOVELTIES 2018
NEUHEITEN NOVELTIES 2018 MY HOME MY ISLAND Korsika ELEVATION 2200 Korsika Seda 177220029540 1-Stab 1-strip 2200x182x9,8 2400 Korsika Seda 179220029542 1-Stab 1-strip 2400x222x9,8 Sylt 2200 Sylt Seda 177220029571
More informationData Security and Privacy. Topic 14: Authentication and Key Establishment
Data Security and Privacy Topic 14: Authentication and Key Establishment 1 Announcements Mid-term Exam Tuesday March 6, during class 2 Need for Key Establishment Encrypt K (M) C = Encrypt K (M) M = Decrypt
More informationStructured Peer-to-Peer Services for Mobile Ad Hoc Networks
DOCTORAL DISSERTATION Structured Peer-to-Peer Services for Mobile Ad Hoc Networks Dissertation zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften im Fachbereich Mathematik und
More informationÜbungsblatt 2. Aufgabe 1 (Klassifikationen von Betriebssystemen)
Übungsblatt 2 Aufgabe 1 (Klassifikationen von Betriebssystemen) 1. Zu jedem Zeitpunkt kann nur ein einziges Programm laufen. Wie ist der passende Fachbegriff für diese Betriebsart? 2. Was versteht man
More informationCryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia
Cryptography - SSH Network Security Workshop 29-31 May 2017 Phnom Penh, Cambodia What is Safely Authentication I know who I am talking with Our communication is Encrypted Telnet Servers Terminal Routers
More informationMULTIBASELINE INTERFEROMETRIC SAR AT MILLIMETERWAVES TEST OF AN ALGORITHM ON REAL DATA AND A SYNTHETIC SCENE
MULTIBASELINE INTERFEROMETRIC SAR AT MILLIMETERWAVES TEST OF AN ALGORITHM ON REAL DATA AND A SYNTHETIC SCENE H. Essen a, T. Brehm a, S. Boehmsdorff b, U. Stilla c a FGAN, Research Institute for High Frequency
More informationCryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea
Cryptography - SSH Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 What is Secure Authentication I know who I am talking to Our communication is Encrypted Telnet Servers Terminal
More informationWashington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C
Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) Your name: This exam consists 13 numbered problems on 6 pages printed front and back on 3 sheets. Please
More informationDOWNLOAD OR READ : VISUAL C MFC PROGRAMMING BY EXAMPLE PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : VISUAL C MFC PROGRAMMING BY EXAMPLE PDF EBOOK EPUB MOBI Page 1 Page 2 visual c mfc programming by example visual c mfc programming pdf visual c mfc programming by example Generally,
More informationCryptography. If privacy is outlawed, only outlaws will have privacy. Zimmerman (author of PGP) 1/18
Cryptography Symmetric versus asymmetric cryptography. In symmetric the encryption and decryption keys are the same while in asymmetric cryptography they are different. Public key cryptography. (asymmetric)
More informationFPM-3120TH Series. Flat Panel Monitor with 12" Color TFT/LCD Display. User's Manual
FPM-3120TH Series Flat Panel Monitor with 12" Color TFT/LCD Display User's Manual Copyright Notice This document is copyrighted by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves
More informationInformation System Security
Prof. Dr. Christoph Karg Aalen University Of Applied Sciences Department Of Computer Science Information System Security Exercise: Cryptography with Java October 16, 2017 The goal of this laboratory exercise
More informationSECURE DATA EXCHANGE. Version
SECURE DATA EXCHANGE Version 1.0 20.12.2017 Inhalt 1. GENERAL INFORMATION 2. E-MAIL SIGNATURE 3. PDF-CONTAINER/ENCRYPTOR 4. WEBMAIL USER ACCOUNT 5. CERTIFICATE BASED ENCRYPTION Version 1.0 2 1. GENERAL
More informationFAQ Communication over IE
FAQ Communication over IE S5-compatible communication over Industrial Ethernet between PC station and SIMATIC S7 FAQ Table of Contents Table of Contents... 2 Question...2 Wie konfiguriere ich die S5-kompatible
More informationKreative Bedienkonzepte mittels jqueryui
The Oracle Middleware Experts Nico Kreiling Anton Thome The Oracle Middleware Experts Kreative Bedienkonzepte mittels jqueryui - A Hero Journey - Wer wir sind virtual7 GmbH Beratungs- und Softwarepartner
More information