Code Snippets für VS Lab Test

Size: px
Start display at page:

Download "Code Snippets für VS Lab Test"

Transcription

1 Code Snippets für VS Lab Test Beinhaltet TCP, UDP, RMI sowie diverse Security Dinger. Großteils wurde der Code von Lab1 Lab2 genommen, bzw. aus dem TUWEL Faq. Es kann natürlich sein, dass Fehler enthalten sind, also bitte mit kritischem Auge betrachten ;). Exceptions wurden hier für die Leserlichkeit komplett weggelassen, Eclipse wird einen jedoch darauf aufmerksam machen, vondem her sollte das kein großes Problem sein. Viel Spaß beim Lernen. TCP: Client Setup for short communication: UDP: Client Setup for short communication RMI: Client Setup Server Setup SECURITY: BASE64 en/decoding Secure Random Number AES encryption / decryption RSA encryption / decryption HMac

2 TCP: synchronous Server Client communication. Client Setup for short communication: Socketsocket=newSocket("localhost", 1337); BufferedReaderreader=newBufferedReader(new InputStreamReader(socket.getInputStream())); // thetrueisveryimportantfortheautoflush PrintWriterwriter=newPrintWriter(socket.getOutputStream(), true); // writetoserver writer.println("requesttoserver"); // printoutanswer System.out.println(reader.readLine()); // Don tclosewriterorreaderbecausetheythrowexceptions. this.socket.close(); // ServerSocketonlyneedsport, nohost ServerSocketserverSocket=newServerSocket(1337); SocketclientSocket=serverSocket.accept(); BufferedReaderreader=newBufferedReader(new InputStreamReader(clientSocket.getInputStream())); PrintWriterwriter=newPrintWriter(clientSocket.getOutputStream(), true); Stringrequest=reader.readLine(); /* * DOSOMETHINGWITHREQUEST:D */ // answertoclient writer.println("responsetoclient"); // Don tclosewriterorreaderbecausetheythrowexceptions. if(serversocket!=null&&!serversocket.isclosed()) serversocket.close(); if(clientsocket!=null&&!clientsocket.isclosed()) clientsocket.close();

3 UDP: a synchronous Server Client communication. Client Setup for short communication // CLIENTHASEMPTYCONSTRUCTOR DatagramSocketsocket=newDatagramSocket(); StringmessageForUDP="THISISAMESSAGE"; byte[] buffer=messageforudp.getbytes(); // createthepacket DatagramPacketpacket=newDatagramPacket(buffer, buffer.length, InetAddress.getByName(serverhost), udpport); // sendthepacketoff socket.send(packet); // Nowwegonnawaitforapacket, setupthebufferandpacketfirst: buffer=newbyte[1024]; packet=newdatagrampacket(buffer, buffer.length); // thereceiveblocksandwaitstillpacketarrives socket.receive(packet); // Printoutwhatwereceived System.out.println(newString(packet.getData())); socket.close(); // SERVERHASPORTINCONSTRUCTOR DatagramSocketsocket=newDatagramSocket(udpPort); // Nowwegonnawaitforapacket, setupthebufferandpacketfirst: byte[] buffer=newbyte[1024]; DatagramPacketpacket=newDatagramPacket(buffer, buffer.length); // thereceiveblocksandwaitstillpacketarrives socket.receive(packet); Stringrequest=newString(packet.getData())); Stringresponse=newString("response"); // ToreturntoClientwegetAddressandPortfromPacket InetAddressaddress=packet.getAddress(); intport=packet.getport(); buffer=response.getbytes(); packet=newdatagrampacket(buffer, buffer.length, address, port); socket.send(packet); socket.close();

4 RMI: registry thingy for putting addresses and looking them up. Client Setup // getremoteserverobjectfromregistry Registryregistry=LocateRegistry.getRegistry(host, port); IServerRemoteremote=(IServerRemote) registry.lookup(servername); // nowyoucanusethemethodsfromiserverremote(examplefrommuster test) remote.bye(); Server Setup // createregistryonport Registryregistry=LocateRegistry.createRegistry(port); // remoteobistheremoteobject, inourcaseaninstanceofiserverremote( > this) IServerRemoteremote=(IServerRemote) UnicastRemoteObject.exportObject(remoteOb, 0); // bindremoteobjecttoanameintheregistry registry.bind(bindingname, remote); // THAT SITATTHISPOINT, NOWFORCLOSING // remoteobissameasbefore( >this) andtrueisforforcingit UnicastRemoteObject.unexportObject(remoteOb, true); if(registry!=null){ // don tforgettounbindafterunexporting registry.unbind(bindingname); UnicastRemoteObject.unexportObject(registry, true); } //!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! // theiserverremotehasttousetheremoteinterfaceandallmethodsthatwillbe // calledoverrmihavetothrowtheremoteexception

5 SECURITY: BASE64 en/decoding // getarandomstringmessageinbyte byte[] message=newstring("thisisamessage").getbytes(); // encodethemessage byte[] base64encoded=base64.encode(message); // decodethemessage byte[] base64decoded=base64.decode(base64encoded); // togofrombytetostring StringmessageEncoded=newString(base64encoded); Secure Random Number SecureRandomsecureRandom=newSecureRandom(); finalbyte[] number=newbyte[32]; securerandom.nextbytes(number); AES encryption / decryption // CREATEIV >nothingbutarandom16bitbytearray SecureRandomiv=newSecureRandom(); finalbyte[] number=newbyte[16]; iv.nextbytes(number); // CREATEtheKEY, AESthereforeAESInstance KeyGeneratorgenerator=KeyGenerator.getInstance("AES"); // KEYSIZEisinbits generator.init(keysize); SecretKeykey=generator.generateKey(); // ENCRYPTYOURINPUT Ciphercipher=Cipher.getInstance(AESCONFIG); cipher.init(cipher.encrypt_mode, key, newivparameterspec(iv)); byte[] encrypted=cipher.dofinal(input); // ENCRYPTIONANDDECRYPTIONISTHESAMEEXCEPTFORTHECIPHER_MODE!!!!!!! // DECRYPTYOURINPUT Ciphercipher=Cipher.getInstance(AESCONFIG); cipher.init(cipher.decrypt_mode, key, newivparameterspec(iv)); byte[] decrypted=cipher.dofinal(input);

6 RSA encryption / decryption // RSAWEUSETHEPUBLICANDPRIVATEKEYS, shouldbegivenasfile, alsowedon t // needanivobject // ENCRYPTYOURINPUTWITHPUBLICKEY Ciphercipher=Cipher.getInstance(RSACONFIG); cipher.init(cipher.encrypt_mode, publickey);//!!!! PUBLICKEY byte[] encrypted=cipher.dofinal(input); // ENCRYPTIONANDDECRYPTIONISTHESAMEEXCEPTFORTHECIPHER_MODEANDKEY!!!!!!!! // DECRYPTYOURINPUTWITHPRIVATEKEY Ciphercipher=Cipher.getInstance(RSACONFIG); cipher.init(cipher.decrypt_mode, privatekey);//!!!! PRIVATEKEY byte[] decrypted=cipher.dofinal(input); HMac // HMACCHECK // keyisthesecretkey, messageisthemessagewereceived // ThisisbasicallyalsohowyoucreateahMac MachMac=Mac.getInstance("HmacSHA256"); hmac.init(key); hmac.update(message.getbytes(standardcharsets.utf_8)); byte[] calculatedhash=hmac.dofinal(); // receivedhashisthehashthatwereceivedwiththemessage returnmessagedigest.isequal(calculatedhash, receivedhash);

Search Engines Chapter 2 Architecture Felix Naumann

Search Engines Chapter 2 Architecture Felix Naumann Search Engines Chapter 2 Architecture 28.4.2009 Felix Naumann Overview 2 Basic Building Blocks Indexing Text Acquisition iti Text Transformation Index Creation Querying User Interaction Ranking Evaluation

More information

Auskunftsbegehren gemäß Art 15 DSGVO (Facebook Version englisch) - V1.0

Auskunftsbegehren gemäß Art 15 DSGVO (Facebook Version englisch) - V1.0 Auskunftsbegehren gemäß Art 15 DSGVO (Facebook Version englisch) - V1.0 Inhalt 1. Versionsstand dieses Dokuments... 1 1.1 V1.0 Stammfassung... 1 2. Hinweise zu diesem Muster... 1 3. Musterbrief... 2 1.

More information

Installing and Configuring Windows 10 MOC

Installing and Configuring Windows 10 MOC Installing and Configuring Windows 10 MOC 20697-1 In diesem 5-tägigen Seminar lernen Sie die Installation und Konfiguration von Windows-10-Desktops und -Geräten in einer Windows-Server- Domänenumgebung.

More information

Ulrich Stärk

Ulrich Stärk < Ulrich Stärk ulrich.staerk@fu-berlin.de http://www.plat-forms.org 2 Einige Vorurteile Everything in the box is kind of weird and quirky, but maybe not enough to make it completely worthless. PHP: a fractal

More information

Verteilte Systeme UE Important Code

Verteilte Systeme UE Important Code Verteilte Systeme UE Important Code Lab 1 Create ServerSocket ServerSocket serversocket = new ServerSocket(tcpPort); //throws IOException Accept ClientSocket Socket clientsocket = serversocket.accept();

More information

Dwg viewer free download vista. Dwg viewer free download vista.zip

Dwg viewer free download vista. Dwg viewer free download vista.zip Dwg viewer free download vista Dwg viewer free download vista.zip free dwg viewer free download - Free DWG Viewer, Free DWG Viewer, DWG Viewer, and many more programsdeep View Free DWG DXF Viewer, free

More information

Using extensible metadata definitions to create a vendor independent SIEM system

Using extensible metadata definitions to create a vendor independent SIEM system Using extensible metadata definitions to create a vendor independent SIEM system Prof. Dr. Kai Oliver Detken (DECOIT GmbH) * Dr. Dirk Scheuermann (Fraunhofer SIT) * Bastian Hellmann (University of Applied

More information

WorldCat Local Release Notes 13 November 2011

WorldCat Local Release Notes 13 November 2011 WorldCat Local Release Notes 13 November 2011 Contents A-to-Z List and Search Box... 2 Facet Persistence... 8 'View Now' Change... 8 Enabling Local OPAC links on Brief Results Page... 10 Boolean Operators

More information

Anleitung zur Schnellinstallation TEW-684UB 1.01

Anleitung zur Schnellinstallation TEW-684UB 1.01 Anleitung zur Schnellinstallation TEW-684UB 1.01 Table of Contents Deutsch 1 1. Bevor Sie anfangen 1 2. Installation 2 3. Verwendung des drahtlosen Adapters 5 Troubleshooting 7 Wireless Tips 8 Version

More information

1. Übungsblatt. Vorlesung Embedded System Security SS 2017 Trusted Computing Konzepte. Beispiellösung

1. Übungsblatt. Vorlesung Embedded System Security SS 2017 Trusted Computing Konzepte. Beispiellösung Technische Universität Darmstadt Fachbereich Informatik System Security Lab Prof. Dr.-Ing. Ahmad-Reza Sadeghi Raad Bahmani 1. Übungsblatt Vorlesung Embedded System Security SS 2017 Trusted Computing Konzepte

More information

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013 Digital Signatures Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013 Digital Signatures Diagram illustrating how to sign a message Why do we use a one-way hash? How does a collision

More information

Windows Update error code list

Windows Update error code list Die Überprüfung von Update-Fehler-Codes aus dem %systemroot%\windowsupdate.log ist recht mühsam. Hier mal einige Fehler-Codes mit Klartextausgabe zur weiteren und erleichterten Analyse. Windows Update

More information

Developing Microsoft Azure Solutions MOC 20532

Developing Microsoft Azure Solutions MOC 20532 Developing Microsoft Azure Solutions MOC 20532 In dem Kurs 20532A: Developing Microsoft Azure Solutions lernen Sie, wie Sie die Funktionalität einer vorhandenen ASP.NET MVC Anwendung so erweitern, dass

More information

WorldCat Local Release Notes 21 August 2011 Contents

WorldCat Local Release Notes 21 August 2011 Contents WorldCat Local Release Notes 21 August 2011 Contents Full Text Limiter... 2 Availability on Brief Record... 5 'View Now' link change... 7 Local Holdings Records (LHR)... 7 Boolean Support... 8 Common Word

More information

Design and implementation of Virtual Security Appliances (VSA) for SME

Design and implementation of Virtual Security Appliances (VSA) for SME Design and implementation of Virtual Security Appliances (VSA) for SME Prof. Dr. Kai-Oliver Detken, DECOIT GmbH (Germany) Christoph Dwertmann, NICTA (Australia) Table of contents Short introduction of

More information

Exchange 2016 Mailbox Move Request

Exchange 2016 Mailbox Move Request Hier einige Powershell Beispiele zur Abfrage des Status, Größe, Fortschritt, Details, Reporte usw. # Move Übersicht Get-MoveRequest Group-Object -Property:Status Select-Object Name,Count Format- Table

More information

Manual Android Galaxy S2 Update 4.0 Kies Anleitung

Manual Android Galaxy S2 Update 4.0 Kies Anleitung Manual Android Galaxy S2 Update 4.0 Kies Anleitung (HOW-TO) Samsung Galaxy S2 // Root-Anleitung für Anfänger // Was ist Root? Vorteile. Diese Anleitung ist nur für das GT-i9100! How to Install & Update

More information

Flasher Utility. QUANCOM Informationssysteme GmbH

Flasher Utility. QUANCOM Informationssysteme GmbH Flasher Utility Copyright Alle Angaben in diesem Handbuch sind nach sorgfältiger Prüfung zusammengestellt worden, gelten jedoch nicht als Zusicherung von Produkteigenschaften. QUANCOM haftet ausschließlich

More information

USB. USB Sticks in Design und Qualität

USB. USB Sticks in Design und Qualität USB Sticks in Design und Qualität 148 149 USB Touch Pen touch pen OTG (On-The-Go) USB Stick OTG (On-The-Go) USB Drive USB microsd Karte microsd card Werbefläche advertising space 1, 2, 4, 8, 16, 32 GB

More information

COURSE LISTING. Courses Listed. Training for Analytics with Business Warehouse (BW) in SAP BW powered by SAP HANA. Last updated on: 23 Nov 2018

COURSE LISTING. Courses Listed. Training for Analytics with Business Warehouse (BW) in SAP BW powered by SAP HANA. Last updated on: 23 Nov 2018 Training for Analytics with Business Warehouse (BW) in SAP BW powered by SAP HANA Courses Listed Fortgeschrittene BW305H - SAP BW powered by SAP HANA: BW Query Design BW310H - SAP BW powered by SAP HANA:

More information

Intro (with some history) Issues ow, ow, ow, ow, ow, ow, ow, ow, Disclosure/Timeline CHIASMUS cipher

Intro (with some history) Issues ow, ow, ow, ow, ow, ow, ow, ow, Disclosure/Timeline CHIASMUS cipher Intro (with some history) Issues ow, ow, ow, ow, ow, ow, ow, ow, Disclosure/Timeline CHIASMUS cipher We made this: Erik Tews, Julian Wälde, and me independent discovery by Felix Schuster ECB first discovered

More information

SD2IEC evo². Revision E3b

SD2IEC evo². Revision E3b SD2IEC evo² Installation Instructions Revision E3b 16xEight Wir danken für das uns mit dem Kauf dieses Produktes entgegengebrachte Vertrauen! Unser Ziel ist es nicht nur die Anforderungen unserer Kunden

More information

PAR-KL-68. QUANCOM Informationssysteme GmbH

PAR-KL-68. QUANCOM Informationssysteme GmbH PAR-KL-68 Copyright Alle Angaben in diesem Handbuch sind nach sorgfältiger Prüfung zusammengestellt worden, gelten jedoch nicht als Zusicherung von Produkteigenschaften. QUANCOM haftet ausschließlich in

More information

Datenblatt: True Flat Touch Screens

Datenblatt: True Flat Touch Screens - völlig ebene Frontseite, verhindert Schmutzränder - standardmäßig eine entspiegelte Glasfront - schlankes Gehäusedesign - optionaler projiziert kapazitiver Touchscreen (Projected Capacitive oder PCap)

More information

AMIGA WORKBENCH AMIGA WORKBENCH 1 3 AMIGA WORKBENCH 1 3 PDF WORKBENCH (AMIGAOS) - WIKIPEDIA AMIGAOS - WIKIPEDIA 1 / 5

AMIGA WORKBENCH AMIGA WORKBENCH 1 3 AMIGA WORKBENCH 1 3 PDF WORKBENCH (AMIGAOS) - WIKIPEDIA AMIGAOS - WIKIPEDIA 1 / 5 PDF WORKBENCH (AMIGAOS) - WIKIPEDIA AMIGAOS - WIKIPEDIA 1 / 5 2 / 5 3 / 5 amiga workbench 1 3 pdf Workbench 2.0 was released with the launch of the Amiga 3000 in 1990. Until AmigaOS 2.0 there was no unified

More information

TDM+VoIP Smart Media Gateway

TDM+VoIP Smart Media Gateway SmartNode SN11A Series TDM+VoIP Smart Media Gateway Quick Start Guide Important This is a Class A device and is not intended for use in a residential environment. Part Number: MSN11-QS, Rev. C Revised:

More information

Rib Design to Increase Stiffness of Housings

Rib Design to Increase Stiffness of Housings Rib Design to Increase Stiffness of Housings R. Helfrich, M. Klein, A. Schünemann INTES GmbH, Stuttgart, Germany www.intes.de; info@intes.de Summary: Crank housings and transmission housings need sufficient

More information

Manual Update V

Manual Update V Manual Update V4.02.04 This document contains the latest information about PRISMAproduction, which has not been integrated into the handbooks so far or which we want to emphasize as changes. Dieses Dokument

More information

INVENTOR MECHANICAL DESIGN &AMP; 3D CAD SOFTWARE AUTODESK AUTOCAD FOR MAC &AMP; WINDOWS CAD SOFTWARE AUTODESK

INVENTOR MECHANICAL DESIGN &AMP; 3D CAD SOFTWARE AUTODESK AUTOCAD FOR MAC &AMP; WINDOWS CAD SOFTWARE AUTODESK AUTODESK INVENTOR 2015 AUTOCAD PDF INVENTOR MECHANICAL DESIGN &AMP; 3D CAD SOFTWARE AUTODESK AUTOCAD FOR MAC &AMP; WINDOWS CAD SOFTWARE AUTODESK 1 / 5 2 / 5 3 / 5 autodesk inventor 2015 autocad pdf Autodesk

More information

Modern and Lucid C++ for Professional Programmers. Week 15 Exam Preparation. Department I - C Plus Plus

Modern and Lucid C++ for Professional Programmers. Week 15 Exam Preparation. Department I - C Plus Plus Department I - C Plus Plus Modern and Lucid C++ for Professional Programmers Week 15 Exam Preparation Thomas Corbat / Prof. Peter Sommerlad Rapperswil, 08.01.2019 HS2018 Prüfung 2 Durchführung Mittwoch

More information

AUTOMATISIERUNG DER INFRASTRUKTUR

AUTOMATISIERUNG DER INFRASTRUKTUR AUTOMATISIERUNG DER INFRASTRUKTUR NÄCHSTER HALT: STORAGE! ULRICH HÖLSCHER SYSTEMS ENGINEER 1 ES GIBT EINE MENGE ARBEIT WIE GEHEN WIR ES AN? Cloud Management Systems Automatisierung, IT-Prozesse Cloud Readiness/Transformation

More information

Birol ÇAPA Doç. Dr. Sıddıka Berna Örs Yalçın Following code can coompute montgomery multiplication of 128 bit numbers:

Birol ÇAPA Doç. Dr. Sıddıka Berna Örs Yalçın Following code can coompute montgomery multiplication of 128 bit numbers: Homework 3 Implementation of Montgomery Multiplication Montgomery multiplier calculates C = A. B mod N as follows: 1. Given integers x, y and 0 x,y m 2. Montgomery Domain: a. x x m d m, = yr mod m 3. Montgomery

More information

Das Seminar kann zur Vorbereitung auf die Zertifizierung als Microsoft Certified Solutions Developer (MCSD): SharePoint Applications genutzt werden.

Das Seminar kann zur Vorbereitung auf die Zertifizierung als Microsoft Certified Solutions Developer (MCSD): SharePoint Applications genutzt werden. Developing Microsoft SharePoint Server 2013 Core Solutions MOC 20488 In diesem Seminar erlernen die Teilnehmer Kernfähigkeiten, die fast allen SharePoint-Entwicklungsaktivitäten gemeinsam sind. Dazu gehören

More information

CDP 1440i/2440i Getting Started Guide

CDP 1440i/2440i Getting Started Guide COMPREHENSIVE INTERNET SECURITY b SonicWALL CDP Series Appliances CDP 1440i/2440i Getting Started Guide SonicWALL CDP 1440i / 2440i Getting Started Guide This Getting Started Guide contains installation

More information

Extract from Project Report

Extract from Project Report AAA Continuation Activity 2013. Durchführung von E-Assessment mit ILIAS an der Universität Bern Auszug aus dem Projektbericht E-Assessment ilub Extract from Project Report A Comparison of E-Exams with

More information

CANOpen DS402 at KEBA

CANOpen DS402 at KEBA CANOpen DS402 at KEBA Description author: sue version date: 26.5.2008 actual version: V 1.0 printed: 26.5.08 23:14 filename: d:\projekte\cn\canopen_ds402_driver\canopen-ds402 at keba.doc Index of changes

More information

Zielgruppe Dieser Kurs eignet sich für Cloud- und Rechenzentrumsadministratoren.

Zielgruppe Dieser Kurs eignet sich für Cloud- und Rechenzentrumsadministratoren. Datacenter Monitoring with System Center Operations Manager MOC 10964 Sie erwerben in diesem Seminar praktische Erfahrung mit der Überwachung von Infrastruktur und Anwendungen mit System Center 2012 SP1

More information

TI-No. 4002TI05.doc PAGE NO. : 1/1. Settings after Installation of the Firmware Version 74

TI-No. 4002TI05.doc PAGE NO. : 1/1. Settings after Installation of the Firmware Version 74 TI-No. 4002TI05.doc PAGE NO. : 1/1 DEVELOP Technical Information MODEL NAME : D 4500/5500iD MODEL CODE : 4002/4003 TI-INFO-NO. : 05 DATE : 13.07.2001 SUBJECT : Firmware MSC/Message/IR Version 74 PERFORMANCE

More information

Contents. Configuring SSH 1

Contents. Configuring SSH 1 Contents Configuring SSH 1 Overview 1 How SSH works 1 SSH authentication methods 2 SSH support for Suite B 3 FIPS compliance 3 Configuring the device as an SSH server 4 SSH server configuration task list

More information

Continuous Delivery. für Java Anwendungen. Axel Fontaine Software Development Expert

Continuous Delivery. für Java Anwendungen. Axel Fontaine Software Development Expert 07.04.2011 Continuous Delivery für Java Anwendungen Axel Fontaine Software Development Expert twitter.com/axelfontaine www.axelfontaine.com business@axelfontaine.com Ceci n est pas une build tool. Ceci

More information

Copyright 2004 by SMC Networks, Inc. 38 Tesla Irvine, California All rights reserved.

Copyright 2004 by SMC Networks, Inc. 38 Tesla Irvine, California All rights reserved. Copyright Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other

More information

ProCANopen Questions & Answers Version Application Note AN-ION

ProCANopen Questions & Answers Version Application Note AN-ION Version 1.3 2011-07-21 Author(s) Restrictions Abstract Juergen Klueser Public Document This Document gives answers on typical questions on ProCANopen application. Table of Contents 1.0 Overview...1 2.0

More information

THE CLOUD. Who Owns Your Data?

THE CLOUD. Who Owns Your Data? THE CLOUD Who Owns Your Data? Seite 1 TABLE OF CONTENTS Introduction App Server Storage Network / location Seite 2 THIS IS NOT A TALK ABOUT What the cloud is Why to use the cloud Which cloud to use Also,

More information

AC500. Application Note. Scalable PLC for Individual Automation. AC500-S safety PLC - Overview of changes in Automation Builder 2.1.x and 2.0.

AC500. Application Note. Scalable PLC for Individual Automation. AC500-S safety PLC - Overview of changes in Automation Builder 2.1.x and 2.0. Application Note AC500 Scalable PLC for Individual Automation AC500-S safety PLC - Overview of changes in Automation Builder 2.1.x and 2.0.x ABB Automation Products GmbH Wallstadter Str. 59 D-68526 Ladenburg

More information

4. Multicast Multicast Principles. Why is Multicast Important for. Multimedia? Definition of Multicast

4. Multicast Multicast Principles. Why is Multicast Important for. Multimedia? Definition of Multicast 4.3 Multicast 4.3.1 Multicast Principles efinition of Multicast Multicast is defined as the transmission of a data stream from one sender to many receivers with packet duplication and forwarding inside

More information

Monitoring & Automation with OP5 & Stonebranch A presentation in German - English

Monitoring & Automation with OP5 & Stonebranch A presentation in German - English Monitoring & Automation with OP5 & Stonebranch A presentation in German - English Copyright OP5 2017 All rights reserved. PRESENTATION AGENDA Katrin Ackermann-Rossander Jan Josephson Key Account Manager

More information

10/25/ Recursion. Objectives. Harald Gall, Prof. Dr. Institut für Informatik Universität Zürich.

10/25/ Recursion. Objectives. Harald Gall, Prof. Dr. Institut für Informatik Universität Zürich. 11. Recursion Harald Gall, Prof. Dr. Institut für Informatik Universität Zürich http://seal.ifi.uzh.ch/info1! You think you know when you learn, are more sure when you can write, even more when you can

More information

Übungsfragen für den Test zum OMG Certified UML Professional (Intermediate) Download

Übungsfragen für den Test zum OMG Certified UML Professional (Intermediate) Download Die Prüfung zum OCUP (UML Certified UML Professional) besteht aus einem computerbasierten Multiple- Choise-Test, dessen Testfragen aus einem Pool für jeden Kanidaten neu zusammengestellt werden. Die Fragen

More information

EUCEG: Encryption process

EUCEG: Encryption process EUROPEAN COMMISSION DIRECTORATE-GENERAL FOR HEALTH AND FOOD SAFETY General Affairs Information systems EUCEG: Encryption process Document Control Information Settings Document Title: Project Title: Document

More information

Table of contents 2 / 12

Table of contents 2 / 12 OraRSA 1 / 12 Table of contents Introduction... 3 Install... 4 Setup... 4 Load the JAR files... 4 Register ORA_RSA package... 4 Permissions... 4 Upgrade... 4 Uninstall... 5 Switch from Trial to Production

More information

IN THE PRODUCT LINE MODEL VERSIONING DEVELOPMENT. Supported by Enterprise Architect and LemonTree

IN THE PRODUCT LINE MODEL VERSIONING DEVELOPMENT. Supported by Enterprise Architect and LemonTree MODEL VERSIONING IN THE PRODUCT LINE DEVELOPMENT Supported by Enterprise Architect and LemonTree 10.11.2017 TdSE 17, Paderborn Tim Michaelis (PrehCarConnect), Roman Bretz(LieberLieber) VORSTELLUNG PREH

More information

DOWNLOAD PERFECT WILLST DU DIE PERFEKTE WELT

DOWNLOAD PERFECT WILLST DU DIE PERFEKTE WELT DOWNLOAD PERFECT WILLST DU DIE PERFEKTE WELT Page 1 Page 2 perfect willst du die pdf Perfect - Willst du die perfekte Welt?.pdf - Cecelia Ahern - 3841422365 Perfect - Willst du die perfekte Welt? / Perfekt

More information

Emerging Technologies Workshops

Emerging Technologies Workshops Emerging Technologies Workshops Programmierung des Netzwerkes ohne Kenntnisse der Console, ein Traum für Nicht-Cisco-Admins? Was sind diese Emerging Technologies? Sind Technologien, die den Status quo

More information

Artisan Technology Group is your source for quality new and certified-used/pre-owned equipment

Artisan Technology Group is your source for quality new and certified-used/pre-owned equipment Artisan Technology Group is your source for quality new and certified-used/pre-owned equipment FAST SHIPPING AND DELIVERY TENS OF THOUSANDS OF IN-STOCK ITEMS EQUIPMENT DEMOS HUNDREDS OF MANUFACTURERS SUPPORTED

More information

Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools MOC 20398

Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools MOC 20398 Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools MOC 20398 In diesem 5-tätigen Seminar erlernen die Teilnehmer, die Enterprise Mobility Suite zu

More information

file:///h:/temp/htmlö/analyse+dfsio+write+test.html

file:///h:/temp/htmlö/analyse+dfsio+write+test.html nalyse DFSIO Write Test of 8 29.03.2017 12:45 Testreihe Ergebnisse: Probleme: Die Ergebnisse können der Inputspezifikation nicht mehr zugeordnet werden ("hier wollte ich so und so viele Dateien mit so

More information

Internet Protocol (IP) TCP versus UDP

Internet Protocol (IP) TCP versus UDP Internet Protocol (IP) Low-level protocols used by hosts and routers Guides the packets from source to destination host Hides the transmission path phone lines, LANs, WANs, wireless radios, satellite links,

More information

huawei configuration 3E5E5C3156BED808DD5646BC382CA821 Huawei Configuration 1 / 6

huawei configuration 3E5E5C3156BED808DD5646BC382CA821 Huawei Configuration 1 / 6 Huawei Configuration 1 / 6 2 / 6 3 / 6 Huawei Configuration This guide refers to a Huawei EchoLife HG520s router, but will apply to most Huawei routers in general. 1. Visit the router's IP address in a

More information

AW-Information sheet Swissmedic egov Portal Standard functions

AW-Information sheet Swissmedic egov Portal Standard functions List of contents 1 Terms, definitions, abbreviations, glossary... 2 2 Objective and scope... 3 3 Conditions for the use of the Swissmedic egov Portal... 4 4 Using the egov Portal... 4 5 New Swissmedic

More information

Praktische Aspekte der Informatik. Thomas Löwe Prof. Marcus Magnor

Praktische Aspekte der Informatik. Thomas Löwe Prof. Marcus Magnor Praktische Aspekte der Informatik Thomas Löwe Prof. Marcus Magnor Your Proposal It s due 15.05.2016! It s due 22.05.2016! Software Versioning SVN basics, workflow, and commands Further Reading Warning!

More information

Aufgabe 2. Join-Methoden Differential Snapshots. Ulf Leser Wissensmanagement in der Bioinformatik

Aufgabe 2. Join-Methoden Differential Snapshots. Ulf Leser Wissensmanagement in der Bioinformatik Aufgabe 2 Join-Methoden Differential Snapshots Ulf Leser Wissensmanagement in der Bioinformatik Join Operator JOIN: Most important relational operator Potentially very expensive Required in all practical

More information

FLASH INSIGHT. The internet giants media mobilisation Do they play turtle and hare with us?

FLASH INSIGHT. The internet giants media mobilisation Do they play turtle and hare with us? August 2015 Shaping the Digital Future FLASH INSIGHT The internet giants media mobilisation Do they play turtle and hare with us? How Google, Amazon, Apple and Microsoft conquer almost all digital business

More information

... Chair of Mobile Business & Multilateral Security. Lecture 14 Business Informatics 2 (PWIN) Q&A SS 2017

... Chair of Mobile Business & Multilateral Security. Lecture 14 Business Informatics 2 (PWIN) Q&A SS 2017 Lecture 14 Business Informatics 2 (PWIN) Q&A SS 2017 Prof. Dr. Kai Rannenberg Akos Grosz, M.Sc. Christopher Schmitz, M.Sc. www.m-chair.de Chair of Mobile Business & Multilateral Security Jenser (Flickr.com)

More information

AusweisApp2 Manual Release

AusweisApp2 Manual Release AusweisApp2 Manual Release 1.14.0 Governikus GmbH & Co. KG 20.12.2017 Contents 1 Installation of AusweisApp2 on a Windows operating system 1 1.1 Dialog page Welcome - Step 1 of 5.............................

More information

Neuigkeiten aus dem Oracle-Cloud-Portfolio - Fokus auf Infrastructure-as-a-Service

Neuigkeiten aus dem Oracle-Cloud-Portfolio - Fokus auf Infrastructure-as-a-Service Neuigkeiten aus dem Oracle-Cloud-Portfolio - Fokus auf Infrastructure-as-a-Service Oliver Zandner, Leitender System-Berater Architect for Oracle-Cloud- & -On-Premise-Tech. Oracle Deutschland Copyright

More information

CSCE 715: Network Systems Security

CSCE 715: Network Systems Security CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Web Security Web is now widely used by business, government, and individuals But Internet and Web are

More information

Network Programming. Powered by Pentalog. by Vlad Costel Ungureanu for Learn Stuff

Network Programming. Powered by Pentalog. by Vlad Costel Ungureanu for Learn Stuff Network Programming by Vlad Costel Ungureanu for Learn Stuff Java Network Protocols 2 Java Network Protocols 3 Addresses Innet4Address (32-bit) 85.122.23.145 - numeric pentalog.com symbolic Innet6Address

More information

Softwareverteilung HotPotatoes

Softwareverteilung HotPotatoes Besuchen Sie uns im Internet unter http://www.vobs.at/rb 2015 Schulmediencenter des Landes Vorarlberg IT-Regionalbetreuer des Landes Vorarlberg Autor: Erich Vonach 6900 Bregenz, Römerstraße 15 Alle Rechte

More information

DOWNLOAD OR READ : QUICK CORBA 3 OBJECT MANAGEMENT GROUP BOOK 1 PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : QUICK CORBA 3 OBJECT MANAGEMENT GROUP BOOK 1 PDF EBOOK EPUB MOBI DOWNLOAD OR READ : QUICK CORBA 3 OBJECT MANAGEMENT GROUP BOOK 1 PDF EBOOK EPUB MOBI Page 1 Page 2 quick corba 3 object management group book 1 quick corba 3 object pdf quick corba 3 object management group

More information

Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465

Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465 Designing Database Solutions for Microsoft SQL Server 2012 MOC 20465 Dieses Seminar behandelt das Design und die Überwachung von hochperformanten und hochverfügbaren Datenlösungen mit SQL Server 2012.

More information

Java Networking (sockets)

Java Networking (sockets) Java Networking (sockets) Rui Moreira Links: http://java.sun.com/docs/books/tutorial/networking/toc.html#sockets http://www.javaworld.com/javaworld/jw-12-1996/jw-12-sockets_p.html Networking Computers

More information

Form Configuration. You will have to be logged in in OPAS as the same User that you wish to configure the form for.

Form Configuration. You will have to be logged in in OPAS as the same User that you wish to configure the form for. Form Configuration Part 1: add/remove fields/elements using the example of: add/remove the element series in Dates You will have to be logged in in OPAS as the same User that you wish to configure the

More information

IPC-610F. Industrial PC Chassis

IPC-610F. Industrial PC Chassis IPC-610F Industrial PC Chassis Copyright Notice This document is copyrighted, March 2000, by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the right to make improvements to

More information

Lotus Connections Architektur und Installation IBM Corporation

Lotus Connections Architektur und Installation IBM Corporation Lotus Connections Architektur und Installation Architektur Connections WebSphere Application Server incl Lotus Connections HTTP Server Benutzer mit Browser LDAP Tivoli Directory Integrator DatenbankSystem,

More information

Übersicht Port-Liste. Workstation. Liste der in SeMSy III verwendeten Netzwerk-Ports

Übersicht Port-Liste. Workstation.  Liste der in SeMSy III verwendeten Netzwerk-Ports Übersicht -Liste Liste der in SeMSy III verwendeten Netzwerk-s SeMSy III ist ein hochperformantes und zukunftssicheres Videomanagementsystem mit höchstem Bedienkomfort. Es bietet umfangreiche Funktionen,

More information

Security Protocols and Infrastructures. Winter Term 2010/2011

Security Protocols and Infrastructures. Winter Term 2010/2011 Winter Term 2010/2011 Chapter 4: Transport Layer Security Protocol Contents Overview Record Protocol Cipher Suites in TLS 1.2 Handshaking Protocols Final Discussion 2 Contents Overview Record Protocol

More information

Unavoidable trees and forests in graphs

Unavoidable trees and forests in graphs Bachelor thesis Unavoidable trees and forests in graphs Georg Osang July 19, 01 Reviewers: Advisors: Prof. Dr. Maria Axenovich Prof. Dr. Dorothea Wagner Prof. Dr. Maria Axenovich Dr. Ignaz Rutter Faculty

More information

HOW THE INTERNET OF THINGS IS CHANGING THE WAY WE WORK

HOW THE INTERNET OF THINGS IS CHANGING THE WAY WE WORK GLOBAL SPONSORS HOW THE INTERNET OF THINGS IS CHANGING THE WAY WE WORK MARTIN PERZL LEAD GLOBAL ARCHITECT, DELL EMC @PERZLM MARTIN.PERZL@DELL.COM How the Internet of Things is changing the way we work

More information

Download google chrome version 44 Google Chrome Google

Download google chrome version 44 Google Chrome Google Download google chrome version 44 I need your attention guys.. the link given above is fake. I would like to give a helping hand and after searching for the real file, I finally fount it. If you want,

More information

Introduction to Computational Linguistics

Introduction to Computational Linguistics Introduction to Computational Linguistics Frank Richter fr@sfs.uni-tuebingen.de. Seminar für Sprachwissenschaft Eberhard Karls Universität Tübingen Germany Intro to CL WS 2011/12 p.1 Langenscheidt s T1

More information

Cipher Suite Configuration Mode Commands

Cipher Suite Configuration Mode Commands The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables

More information

Inside the World of Cryptographic Algorithm Validation Testing. Sharon Keller CAVP Program Manager NIST ICMC, May 2016

Inside the World of Cryptographic Algorithm Validation Testing. Sharon Keller CAVP Program Manager NIST ICMC, May 2016 Inside the World of Cryptographic Algorithm Validation Testing Sharon Keller CAVP Program Manager NIST ICMC, May 2016 Mission To provide federal agencies in the United States and Canada with assurance

More information

PIC Council Charter. Jürgen Wagner, Friedhelm Krebs. SAP AG Version 1.1 April 26 th, 2004

PIC Council Charter. Jürgen Wagner, Friedhelm Krebs. SAP AG Version 1.1 April 26 th, 2004 PIC Council Charter Jürgen Wagner, Friedhelm Krebs SAP AG Version 1.1 April 26 th, 2004 PIC Council Charter Mission of PIC Council Its mission is to guarantee quality of process integration content by

More information

Bechtle Solutions Update VMware Horizon 7 What s New

Bechtle Solutions Update VMware Horizon 7 What s New Bechtle Solutions Update VMware Horizon 7 What s New Bechtle Schweiz AG - IT-Systemhaus Zürich Marco Flückiger / Senior Systems Engineer Basel 20. September 2016 Agenda Horizon 7: What s New Innovationen

More information

IPC Industrial PC Chassis. User's Manual

IPC Industrial PC Chassis. User's Manual IPC-6908 Industrial PC Chassis User's Manual Copyright notice This document is copyrighted, November 1999, by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves the right to make

More information

NEUHEITEN NOVELTIES 2018

NEUHEITEN NOVELTIES 2018 NEUHEITEN NOVELTIES 2018 MY HOME MY ISLAND Korsika ELEVATION 2200 Korsika Seda 177220029540 1-Stab 1-strip 2200x182x9,8 2400 Korsika Seda 179220029542 1-Stab 1-strip 2400x222x9,8 Sylt 2200 Sylt Seda 177220029571

More information

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Data Security and Privacy. Topic 14: Authentication and Key Establishment Data Security and Privacy Topic 14: Authentication and Key Establishment 1 Announcements Mid-term Exam Tuesday March 6, during class 2 Need for Key Establishment Encrypt K (M) C = Encrypt K (M) M = Decrypt

More information

Structured Peer-to-Peer Services for Mobile Ad Hoc Networks

Structured Peer-to-Peer Services for Mobile Ad Hoc Networks DOCTORAL DISSERTATION Structured Peer-to-Peer Services for Mobile Ad Hoc Networks Dissertation zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften im Fachbereich Mathematik und

More information

Übungsblatt 2. Aufgabe 1 (Klassifikationen von Betriebssystemen)

Übungsblatt 2. Aufgabe 1 (Klassifikationen von Betriebssystemen) Übungsblatt 2 Aufgabe 1 (Klassifikationen von Betriebssystemen) 1. Zu jedem Zeitpunkt kann nur ein einziges Programm laufen. Wie ist der passende Fachbegriff für diese Betriebsart? 2. Was versteht man

More information

Cryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia

Cryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia Cryptography - SSH Network Security Workshop 29-31 May 2017 Phnom Penh, Cambodia What is Safely Authentication I know who I am talking with Our communication is Encrypted Telnet Servers Terminal Routers

More information

MULTIBASELINE INTERFEROMETRIC SAR AT MILLIMETERWAVES TEST OF AN ALGORITHM ON REAL DATA AND A SYNTHETIC SCENE

MULTIBASELINE INTERFEROMETRIC SAR AT MILLIMETERWAVES TEST OF AN ALGORITHM ON REAL DATA AND A SYNTHETIC SCENE MULTIBASELINE INTERFEROMETRIC SAR AT MILLIMETERWAVES TEST OF AN ALGORITHM ON REAL DATA AND A SYNTHETIC SCENE H. Essen a, T. Brehm a, S. Boehmsdorff b, U. Stilla c a FGAN, Research Institute for High Frequency

More information

Cryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

Cryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea Cryptography - SSH Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 What is Secure Authentication I know who I am talking to Our communication is Encrypted Telnet Servers Terminal

More information

Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C

Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) Your name: This exam consists 13 numbered problems on 6 pages printed front and back on 3 sheets. Please

More information

DOWNLOAD OR READ : VISUAL C MFC PROGRAMMING BY EXAMPLE PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : VISUAL C MFC PROGRAMMING BY EXAMPLE PDF EBOOK EPUB MOBI DOWNLOAD OR READ : VISUAL C MFC PROGRAMMING BY EXAMPLE PDF EBOOK EPUB MOBI Page 1 Page 2 visual c mfc programming by example visual c mfc programming pdf visual c mfc programming by example Generally,

More information

Cryptography. If privacy is outlawed, only outlaws will have privacy. Zimmerman (author of PGP) 1/18

Cryptography. If privacy is outlawed, only outlaws will have privacy. Zimmerman (author of PGP) 1/18 Cryptography Symmetric versus asymmetric cryptography. In symmetric the encryption and decryption keys are the same while in asymmetric cryptography they are different. Public key cryptography. (asymmetric)

More information

FPM-3120TH Series. Flat Panel Monitor with 12" Color TFT/LCD Display. User's Manual

FPM-3120TH Series. Flat Panel Monitor with 12 Color TFT/LCD Display. User's Manual FPM-3120TH Series Flat Panel Monitor with 12" Color TFT/LCD Display User's Manual Copyright Notice This document is copyrighted by Advantech Co., Ltd. All rights are reserved. Advantech Co., Ltd. reserves

More information

Information System Security

Information System Security Prof. Dr. Christoph Karg Aalen University Of Applied Sciences Department Of Computer Science Information System Security Exercise: Cryptography with Java October 16, 2017 The goal of this laboratory exercise

More information

SECURE DATA EXCHANGE. Version

SECURE DATA EXCHANGE. Version SECURE DATA EXCHANGE Version 1.0 20.12.2017 Inhalt 1. GENERAL INFORMATION 2. E-MAIL SIGNATURE 3. PDF-CONTAINER/ENCRYPTOR 4. WEBMAIL USER ACCOUNT 5. CERTIFICATE BASED ENCRYPTION Version 1.0 2 1. GENERAL

More information

FAQ Communication over IE

FAQ Communication over IE FAQ Communication over IE S5-compatible communication over Industrial Ethernet between PC station and SIMATIC S7 FAQ Table of Contents Table of Contents... 2 Question...2 Wie konfiguriere ich die S5-kompatible

More information

Kreative Bedienkonzepte mittels jqueryui

Kreative Bedienkonzepte mittels jqueryui The Oracle Middleware Experts Nico Kreiling Anton Thome The Oracle Middleware Experts Kreative Bedienkonzepte mittels jqueryui - A Hero Journey - Wer wir sind virtual7 GmbH Beratungs- und Softwarepartner

More information