THUNDERKRYPT: THUNDERBIRD EXTENSION
|
|
- Emil Robertson
- 5 years ago
- Views:
Transcription
1 THUNDERKRYPT: THUNDERBIRD EXTENSION Version: 1.0 Date: Authors: Dirk, Eduardo, Zakaria Description: Thunderkrypt adds java-based decryption to Mozilla Thunderbird > 1.5 The current document describes the development process of the Thunderkrypt-Extension for Thunderbird. More information about building extensions for Thunderbird is available at Building a Thunderbird extension: Preferences made easy: Extension Development: Just a quick note - since one of the latest nightly builds it s possible to use java classes from your extensions javascript code. Looks like this: var javastring = new java.lang.string("that's just a test text"); alert(javastring.length()); - 1 -
2 CONTENTS 1 USER DOCUMENTATION INSTALLATION FUNCTIONALITY ADJUSTMENTS SETTING UP THE DEVELOPMENT ENVIRONMENT THE LAYOUT OF CONTENT WITHIN THE XPI FILE: CREATE THE INSTALL MANIFEST CREATING THE CHROME.MANIFEST FILE DESCRIPTION HOW DOES IT WORK COMMUNICATION OF JAVASCRIPT WITH JAVA DECRYPTION PROCESS SIGNATURE
3 1 USER DOCUMENTATION 1.1 INSTALLATION (1) If you have the xpi-file, just copy it into the Thunderbird extension folder and start Thunderbird. You will be prompted for installation. Alternatively you can install it using Extras Add-ins Install in Thunderbird. (2) If you have the development folder (just the contents of the xpi-file), just copy the folder in the Thunderbird extension folder. (3) Note that the folder needs to have the same name as the extension ID from the install.rdf included within the extension. Alternatively the full path to the folder can be put into a named with the extension name. This file needs to be in the Thunderbird extension folder. Note that after making any changes to the extension, Thunderbird needs to be restarted. After the first start, the path to the java location needs to be entered in Thunderbird Extras Add-ons Thunderkrypt Preferences. Then Thunderbird needs to be restarted again. (4) To build a xpi-file, basically the contents of the extension's folder (not the extension folder itself) need to be zipped up, and after that the zip file needs to be renamed to have a.xpi extension. More information on that:
4 1.2 FUNCTIONALITY (1) Entering the java path in preferences: (2) Menu Thunderkrypt with menu items decrypt and About. (3) To decrypt an , the needs to be selected and then Thunderkrypt decrypt . After that a dialog will pop up that asks for the pin and the decrypted mail will show up in a message window
5 2 ADJUSTMENTS In order to use the TUD-Card, some adjustments must be made. The session key must be read from the card reader (and not from the KeyStore, as done actually). This needs to be adjusted in the file ReadEncrypted .java in the following code: //skey ist thes session key that must be read from the card. encryptedkey is the encrypted session key Key skey; keycipher.init(cipher.unwrap_mode, key); skey = keycipher.unwrap(encryptedkey, alg, Cipher.SECRET_KEY); So the skey from the TUD-Card needs to be read. The PIN is stored in the variable pin, so it may be used directly. All the code that uses the Keystore may then be removed, since it is not needed anymore when using the card. Eventually, the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files 6 need to be downloaded from: 3 SETTING UP THE DEVELOPMENT ENVIRONMENT 3.1 THE LAYOUT OF CONTENT WITHIN THE XPI FILE: extension.xpi: /install.rdf //the description file for the extension. /chrome.manifest //Tells Thunderbird where chrome files are. /chrome/ /chrome/content/ // XUL, JavaScript /chrome/content/mainoverlay.xul //file describing UI elements to add /chrome/content/overlay.js //file with scripts to run in Thunderbird - 5 -
6 3.2 CREATE THE INSTALL MANIFEST install.rdf file is used by the Extension Manager when installing an XPI file and when registering an extension at specified location: <?xml version="1.0"?> <RDF xmlns=" xmlns:em=" <Description about="urn:mozilla:install-manifest"> <em:version>0.0</em:version> <!-- Target Application this extension can install into, with minimum and maximum supported versions. --> <em:targetapplication> <Description> <em:id>{3550f703-e582-4d05-9a08-453d09bdfdc6}</em:id> <em:minversion>1.5</em:minversion> <em:maxversion>2.0.0.*</em:maxversion> </Description> </em:targetapplication> <!-- Front End MetaData --> <em:name>thunderkrypt</em:name> <em:description>thunderbird Cryptography Addon</em:description> <em:creator>dirk, Eduardo, Zakaria</em:creator> </Description> </RDF> the ID of the extension. This is some value you come up with to identify your extension uniquely in address format. {3550f703-e582-4d05-9a08-453d09bdfdc6} Thunderbird's application ID. Without this exact number it will not install. More detailed information about the Install Manifest is available at
7 3.3 CREATING THE CHROME.MANIFEST A supplier of chrome for a given window type is called a chrome provider. The providers work together to supply a complete set of chrome for a particular window, from the images on the toolbar buttons to the files that describe the text, content and appearance of the window itself. The Chrome Registry: The Gecko runtime maintains a service known as the chrome registry that provides mappings from chrome package names to the physical location of chrome packages on disk. This chrome registry is configurable and persistent, and thus a user can install different chrome providers, and select a preferred skin and locale. In order to inform the chrome registry of the available chrome, a text manifest is used: this manifest is "chrome.manifest" in the root of an extension, or theme, and chrome/*.manifest in a XULRunner application. The plaintext chrome manifests are in a simple line-based format. Each line is parsed individually; if the line is parsable the chrome registry takes the action identified by that line; otherwise the chrome registry ignores that line (and prints a warning message in the runtime error console). There are three basic types of chrome providers: (1) Content: The main source file for a window description comes from the content provider, and it can be any file type viewable from within Mozilla. It will typically be a XUL file, since XUL is designed for describing the contents of windows and dialogs. The JavaScript files that define the user interface are also contained within the content packages, as well as most XBL binding files. (2) Locale: Localizable applications keep all their localized information in locale providers. This allows translators to plug in a different chrome package to translate an application without altering the rest of the source code. The two main types of localizable files are DTD files and Java-style properties files. (3) Skin: A skin provider is responsible for providing a complete set of files that describe the visual appearance of the chrome. Typically a skin provider will provide CSS files and images
8 Manifest Instructions: (1) Comments: A line is a comment if it begins with the character '#'; any other characters on the line are ignored. # this line is a comment - you can put whatever you want here (2) Content: A content package is registered with the line content packagename uri/to/files/ [flags] This will register a location to use when resolving the URI chrome://packagename/content/... The URI may be absolute or relative to the location of the manifest file. Note, that it must end with an '/'. (3) Locale: A locale package is registered with the line locale packagename localename uri/to/files/ [flags] This will register a locale package when resolving the URI chrome://packagename/locale/.... (4) Skin: A skin package is registered with the line skin packagename skinname uri/to/files/ [flags] This will register a skin package when resolving the URI chrome://packagename/skin/.... (5) Overlay XUL overlays are registered with the following syntax: overlay chrome://uri-to-be-overlaid chrome://overlay-uri [flags] - 8 -
9 Example Chrome.Manifest Content krypt chrome/content/ locale krypt en-us chrome/locale/en-us/ overlay chrome://messenger/content/messenger.xul chrome://krypt/content/mainoverlay.xul overlay chrome://messenger/content/messengercompose/messengercompose.xul chrome://krypt/content/compose.xul Line 1 registers a content provider. It registers a location to use when resolving the URI chrome://krypt/content/ Line 2 registers a locale package. Line 3 registers an overlay for chrome://messenger/content/messenger.xul, that allows to modify Thunderbird s main window UI from the mainoverlay.xul file. Line 4 registers an overlay for chrome://messenger/content/messengercompose/messengercompose.xul, that allows to modify Thunderbird s compose - window UI from the compose.xul file. More detailed information about chrome is available at
10 4 FILE DESCRIPTION The following table provides a brief summary of contained files in the present extension relative to the path folder of the extension: \extensions\thunderkrypt@pikolab.net\ File chrome.manifest install.rdf Description Tells Firefox where the chrome files are and what to do with them. All the necessary registrations are made here, for example the UI windows and locale files. The description file for the extension ("Install manifest") Details of the plugin are given here, like its ID, name, version number, and supported Thunderbird versions. chrome\content\communication.js chrome\content\compose.js The communication and the message handling with the local java server is managed here. For that a socket connection is opened and managed. Functions are defined to send messages to the local server and to format them, and to handle incoming messages from the java server. This script is loaded by the compose.xul by <script type="application/x-javascript" src="chrome://krypt/content/compose.js" /> Provides methods to intercept message sending and to add signature attachments (not completed, refer to section 6). chrome\content\compose.xul Modify Thunderbird s compose - window UI from the compose.xul file
11 chrome\content\mainoverlay.xul chrome\content\options.xul chrome\content\overlay.js Modify Thunderbird s main window UI from the mainoverlay.xul file. The Thunderkrypt-Menu is added here. Modify Thunderkrypt s preferences in Thunderbird ExtrasAddons Thunderkrypt Preferences This script is loaded from the mainoverlay.xul by <script src="overlay.js"/> The script is the main javascript file. It is responsible for launching Java (with the necessary JARS) and the local server. The local server then listens to a socket and waits for messages. This file also catches when a user wants to decrypt an , and creates the necessary message to send to the local server. He then waits for the respective signal from the java server that the decrypted is ready, and then it shows it on a new window. When Thunderbird is closed, it tells the java server so that he can delete the temporary files it used. chrome\defaults\preferences\prefs.js chrome\locale\en-us\prefwindow.dtd Preference dialog to enter java path. Document Type Definition file which is used to internationalize xul. Used in options.xul by <!DOCTYPE prefwindow SYSTEM "chrome://krypt/locale/prefwindow.dtd"> It defines the message to be shown when the user wants to set his java path. data\ Folder where the decrypted and encrypted s are saved temporarily. The p12 is also saved here if using a
12 p12 file in the extension. jars\bcprov-jdk jar jars\mail.jar jars\thunderkrypt.jar jars\thunderkrypt.jar\localserver.class jars\thunderkrypt.jar\readencryptedem ail.class jars\thunderkrypt.jar\org\bouncycastle\ BouncyCastle Security Provider JavaMail API All the classes are saved here, like LocalServer and ReadEncrypted . This is the Java Local Server. It opens a socket connection and listens to the specified port. It then parses the received message and depending of it takes the appropriate action, like decrypting the , saving the PIN, deleting temp files, etc. This file is on charge of the whole decryption, mainly in the method savedecryptedmail. It then writes the decrypted on the specified location. Modified BouncyCastle classes (actually very little modifications, like some methods we needed made public)
13 5 HOW DOES IT WORK 5.1 COMMUNICATION OF JAVASCRIPT WITH JAVA The whole application is based on passing of messages from javascript to a java local server and back from the local server to javascript. When Thunderbird is started, the Java Local Server class is started and opens a socket listening to a port. Javascript is then able to send him XML messages and then get a response back. The different types of messages sent from javascript to the java server are: (1) <thunderkrypt:message> </thunderkrypt:message> This are the envelope XML tags used for every message sent to java. Each message is contained inside them. (2) <thunderkrypt:encryptedmessage> </thunderkrypt:encryptedmessage> This is the message passed to java containing an encrypted in order for the java local server to decrypt it and save it in a temporary file on disk. When the Java Server is finished with the decryption, it sends Javascript a message back signalizing it: < /thunderkrypt:decryptedmessagesent>. Then, Thunderbird reads the decrypted from the file and displays it. (3) <thunderkrypt:encryptedpassword> </thunderkrypt:encryptedpassword> This is the message passed to java containing the PIN for the TUD-Card. If not using the TUD-Card it contains the password for the KeyStore. At the moment it is not encrypted, but it can be extended to send the encrypted PIN for security. (4) <thunderkrypt:exit /> Javascript tells Java that it was exited, so java can delete all temporary files used and close the Java Server. This is needed because next time we will open thunderbird, it will start listening to the same port again. The files must be deleted for security reasons. Decrypted files should not be left on disk
14 (5) <thunderkrypt:dir> </thunderkrypt:dir> This message is sent from Thunderbird in order to tell the Java Local Server where the Thunderbird Extensions Directory is located, so that java can save the temporary files there. Java is launched from the file overlay.js (launchjava()). The files communication.js and localserver.java are doing the communication between JavaScript and Java. The communication.js sends messages (helo) to the localserver.java and waits for answers from the localserver.java. The method handleconnection in localserver.java parses the incoming messages and depending on it, takes an action (see the XML Messages sent). 5.2 DECRYPTION PROCESS The process is initiated by calling function ondecryptmenuitemcommand() in overlay.js. This sends a message (see above) to the localserver.java. The method handleconnection in localserver.java handles the decryption process: byte[] messageasbytes = command.getbytes(); if (pin=="") throw new Exception("Kann nicht entschlüsseln, da PIN nicht geschickt wurde!"); //here is the decryption made: it receives the message bytes senddecryptedmessage(messageasbytes,out); senddecryptedmessage writes the message as a file into a temporary file. The file ReadEncrypted .java is responsible for the decryption process. MessageSender.handleAnswer = function(answer) in the communication.js waits for the answer <thunderkrypt:decryptedmessagesent /> and displays the decrypted.eml (the decrypted temporary file)
15 6 SIGNATURE This functionality is not completed yet. The basic idea is to sign an by sending this mail to the java-server. The Server will sign the received mail and save it on disk. After this, the signature of the mail will be attached in the opened mail-compose-window. For testing we have tried to attach a file from a temp directory, the content of the file for this test is not relevant. The process of the attachment of the signature will be the same. The problem with that attached signature is that it is just recognized as a normal attachment. To indicate that the attachment is a signature of an , we need to manipulate the attachment content type header field of the attachment before sending the . When modifying it manually, the attachment is recognized as a signature. That means we save the mail as file (*.eml). The attached signature in the mail must have a valid format for this test. After that we open the file with a text editor, and we change the content type of the attachment from attachment to signature. You can insert the correct values by comparing it with a valid signed mail. The attachment will be recognized as a signature. Therefore, a method that manipulates the header in the javascript-code before sending the , needs to be found
How to Write Your First Extension
How to Write Your First Extension Bruce Willis Extension (Francois Mori/AP Photo) How to Write Your First Extension 1. Create development profile 2. Configuration settings 3. Pointing extension to your
More informationHow to Write Your First Extension
How to Write Your First Extension Bruce Willis Extension (Francois Mori/AP Photo) How to Write Your First Extension 1. Create development profile 2. Configuration settings 3. Pointing extension to your
More informationOpen XML Gateway User Guide. CORISECIO GmbH - Uhlandstr Darmstadt - Germany -
Open XML Gateway User Guide Conventions Typographic representation: Screen text and KEYPAD Texts appearing on the screen, key pads like e.g. system messages, menu titles, - texts, or buttons are displayed
More informationThunderbird Extension for Spamato
Thunderbird Extension for Spamato Raphael Ackermann raphy@student.ethz.ch September 20, 2005 1 Contents 1 Introduction 3 2 Spamato 3 2.1 Framework............................ 3 2.2 Email Clients...........................
More informationepad-vision SDK for Chrome & Firefox
Integration Guide epad-vision SDK for Chrome & Firefox Copyright 1995-2015 epadlink. All rights reserved. www.epadlink.com Table of Contents 1.0 Introduction... 4 2.0 Overview and Architecture... 4 2.1
More informationMTAT Research Seminar in Cryptography The Security of Mozilla Firefox s Extensions
MTAT.07.019 Research Seminar in Cryptography The Security of Mozilla Firefox s Extensions Kristjan Krips 1 Introduction Mozilla Firefox has 24.05% of the recorded usage share of web browsers as of October
More informationRASP Library for Java Version 2.0.0
OIO Service Oriented Infrastructure RASP Library for Java Version 2.0.0 Installation Guide Contents 1 Introduction... 3 2 System requirements... 4 3 Installation... 5 3.1 Working on a local copy of the
More informationPreface 7. 1 Introduction to OpenUI5 9
TABLE OF CONTENTS Table of Contents Preface 7 1 Introduction to OpenUI5 9 2 OpenUI5 Getting started 13 2.1 Libraries in OpenUI5 13 2.2 OpenUI5 development environment 14 2.3 Eclipse installation 15 2.4
More informationImproving Yioop! User Search Data Usage PROJECT ADVISOR : DR. CHRIS POLLETT COMMITTEE MEMBERS: DR. MARK STAMP & DR. SOON TEE TEOH
Improving Yioop! User Search Data Usage PROJECT ADVISOR : DR. CHRIS POLLETT COMMITTEE MEMBERS: DR. MARK STAMP & DR. SOON TEE TEOH Agenda Introduction Project Goal Background User Data Visualization Re-rank
More informationInstructions for Configuring Your Browser Settings and Online Security FAQ s
Instructions for Configuring Your Browser Settings and Online Security FAQ s General Settings The following browser settings and plug-ins are required to properly access Digital Insight s webbased solutions.
More informationGuide Installation and User Guide - Mac
Guide Installation and User Guide - Mac With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign
More informationPOOSL IDE Installation Manual
Embedded Systems Innovation by TNO POOSL IDE Installation Manual Tool version 4.1.0 7 th November 2017 1 POOSL IDE Installation Manual 1 Installation... 4 1.1 Minimal system requirements... 4 1.2 Installing
More informationTest/Debug Guide. Reference Pages. Test/Debug Guide. Site Map Index
Site Map Index HomeInstallationStartAuthoringStreamSQLTest/DebugAPI GuideAdminAdaptersSamplesStudio GuideReferences Current Location: Home > Test/Debug Guide Test/Debug Guide The following topics explain
More informationMobile Application Workbench. SAP Mobile Platform 3.0 SP02
SAP Mobile Platform 3.0 SP02 DOCUMENT ID: DC-01-0302-01 LAST REVISED: January 2014 Copyright 2014 by SAP AG or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced
More informationMultiQ Products AB reserves the right to make changes to this document and to product specifications without prior notice.
Technical Note How to create a custom virtual keyboard This technical note describes how to create a custom virtual keyboard and how to add it to the MultiQ Media monitor/player. The reader is presumed
More informationTrack 3 Session 5. IBM Notes Browser Plug-in:Leverage your IBM Notes Application investment in a Browser. Stefan Neth
Track 3 Session 5 IBM Notes Browser Plug-in:Leverage your IBM Notes Application investment in a Browser Stefan Neth stefan.neth@de.ibm.com IBM Collaboration Solutions Client Technical Specialist 1 Please
More informationUsing BlueStep Backup
Using BlueStep Backup BlueStep Backup Your data is an invaluable resource. To protect and store critical digital documents and files, BlueStep Technologies offers the ideal technological solution - BlueStep
More informationEMC Documentum Composer
EMC Documentum Composer Version 6.0 SP1.5 User Guide P/N 300 005 253 A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 2008 EMC Corporation. All
More informationInstalling Thunderbird
by Len Nasman, Bristol Village Ohio Computer Club Copyright 2018 ~may be copied with permission Introduction The thing to remember is that to send and receive email you must have three things: 1. An email
More informationGuide Installation and User Guide - Windows
Guide Installation and User Guide - Windows With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally
More informationAdd Tags to a Sent Message [New in v0.6] Misc 2
Tag Toolbar 0.6 Contents Overview Display and Toggle Tags Change Mode Use Categories Search Tags [New in v0.6] Add Tags to a Sent Message [New in v0.6] Misc 2 Overview Recognize attached tags easily Thunderbird
More informationAn Intelligent Sorter Extension for Thunderbird
An Intelligent Email Sorter Extension for Thunderbird Yoon Suk Chang Client/Supervisor: Eric McCreath COMP6703 escience Project III The Department of Computer Science Australian National University June
More informationFor detailed technical instructions refer to the documentation provided inside the SDK and updated samples.
The vsphere HTML Client SDK Fling provides libraries, sample plug-ins, documentation and various SDK tools to help you develop and build user interface extensions which are compatible with both vsphere
More informationJava TM SE 7 Release Notes Microsoft Windows Installation (32-bit)
» search tips Search Products and Technologies Technical Topics Join Sun Developer Network Java TM SE 7 Release Notes Microsoft Windows Installation (32-bit) System Requirements JDK Documentation See supported
More informationBrowser Configuration Reference
Sitecore CMS 7.0 or later Browser Configuration Reference Rev: 2013-09-30 Sitecore CMS 7.0 or later Browser Configuration Reference Optimizing Internet Explorer and other web browsers to work with Sitecore
More informationApptix Online Backup by Mozy User Guide
Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing
More informationDidiSoft OpenPGP Library for Java version 3.1
DidiSoft OpenPGP Library for Java version 3.1 1 / 10 Table of contents Introduction... 3 Setup... 4 JAR files... 4 Switching from Trial/Evaluation/ version to Production... 4 Javadoc in Eclipse... 4 Migration
More informationFIREFOX MENU REFERENCE This menu reference is available in a prettier format at
FIREFOX MENU REFERENCE This menu reference is available in a prettier format at http://support.mozilla.com/en-us/kb/menu+reference FILE New Window New Tab Open Location Open File Close (Window) Close Tab
More informationTo: Proofpoint Protection Server administrators From: Proofpoint Re: Informing your user community about encrypting and decrypting secure
To: Proofpoint Protection Server administrators From: Proofpoint Re: Informing your user community about encrypting and decrypting secure email This memo describes how to use Proofpoint Encryption to send
More informationkeyon / PKCS#11 to MS-CAPI Bridge User Guide V2.4
/ PKCS#11 to MS-CAPI Bridge V2.4 April 2017 Table of Contents Copyright 2017 by AG All rights reserved. No part of the contents of this manual may be reproduced or transmitted in any form or by any means
More informationStyle Report Enterprise Edition
INTRODUCTION Style Report Enterprise Edition Welcome to Style Report Enterprise Edition! Style Report is a report design and interactive analysis package that allows you to explore, analyze, monitor, report,
More informationEtasoft etranslator version 1.x
Etasoft etranslator version 1.x Copyright 2011 Etasoft Inc. Main website http://www.etasoft.com Product website http://www.xtranslator.com Purpose...2 Requirements...2 Package Details...2 Licensing...2
More informationThe security of Mozilla Firefox s Extensions. Kristjan Krips
The security of Mozilla Firefox s Extensions Kristjan Krips Topics Introduction The extension model How could extensions be used for attacks - website defacement - phishing attacks - cross site scripting
More informationInstructions For Configuring Your Browser Settings and Online Banking FAQ's
Instructions For Configuring Your Browser Settings and Online Banking FAQ's Instructions By Browser Type Google Chrome Firefox Internet Explorer 8 Internet Explorer 9 Safari Online Banking FAQ's Google
More informationSchool Installation Guide ELLIS Academic 5.2.6
ELLIS Academic 5.2.6 This document was last updated on 2/16/11. or one or more of its direct or indirect affiliates. All rights reserved. ELLIS is a registered trademark, in the U.S. and/or other countries,
More informationIT6503 WEB PROGRAMMING. Unit-I
Department of Information Technology Question Bank- Odd Semester 2015-2016 IT6503 WEB PROGRAMMING Unit-I SCRIPTING 1. What is HTML? Write the format of HTML program. 2. Differentiate HTML and XHTML. 3.
More informationLab 1: Getting Started with IBM Worklight Lab Exercise
Lab 1: Getting Started with IBM Worklight Lab Exercise Table of Contents 1. Getting Started with IBM Worklight... 3 1.1 Start Worklight Studio... 5 1.1.1 Start Worklight Studio... 6 1.2 Create new MyMemories
More informationEnabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface
Enabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface Release 7.1 Revised: March 5, 2013 1:53 pm This document describes the
More informationFor detailed technical instructions refer to the documentation provided inside the SDK and updated samples.
The vsphere HTML Client SDK Fling provides libraries, sample plug-ins, documentation and various SDK tools to help you develop and build user interface extensions which are compatible with both vsphere
More informationImproving Yioop! User Search Data Usage
Improving Yioop! User Search Data Usage A Writing Report Presented to The Faculty of the Department of Computer Science San José State University In Partial Fulfillment of the Requirements for the Degree
More informationECM-VNA Convergence Connector
ECM-VNA Convergence Connector Installation and Setup Guide Version: 1.0.x Written by: Product Knowledge, R&D Date: September 2016 2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International
More informationSafeGuard LAN Crypt Client help
SafeGuard LAN Crypt Client help Product version: 3.95 Document date: September 2016 Contents 1 What is SafeGuard LAN Crypt?...3 1.1 Data protection using SafeGuard LAN Crypt...3 1.2 SafeGuard LAN Crypt
More informationInstalling and Configuring VMware vcenter Orchestrator
Installing and Configuring VMware vcenter Orchestrator vcenter Orchestrator 4.2.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationSilk Performance Manager Installation and Setup Help
Silk Performance Manager 18.5 Installation and Setup Help Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright 2004-2017 Micro Focus. All rights reserved.
More informationEnterprise Registry Repository
BEAAquaLogic Enterprise Registry Repository Exchange Utility Version 3.0 Revised: February 2008 Contents 1. Getting Started With the ALRR Exchange Utility What is the ALRR Exchange Utility?.......................................
More informationClearspan Hosted Thin Call Center R Release Notes JANUARY 2019 RELEASE NOTES
Clearspan Hosted Thin Call Center R22.0.39 Release Notes JANUARY 2019 RELEASE NOTES NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by
More informationCS348: Computer Networks (SMTP, POP3, IMAP4); FTP
CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange
More informationJavaScript By: A. Mousavi & P. Broomhead SERG, School of Engineering Design, Brunel University, UK
Programming for Digital Media EE1707 JavaScript By: A. Mousavi & P. Broomhead SERG, School of Engineering Design, Brunel University, UK 1 References and Sources 1. Javascript & JQuery: interactive front-end
More informationSignicat Connector for Java Version 4.x. Document version 1
Signicat Connector for Java Version 4.x Document version 1 About this document Purpose Target This document is a guideline for using Signicat Connector for Java. Signicat Connector for Java is a client
More informationWeb Access Management Token Translator. Version 2.0. User Guide
Web Access Management Token Translator Version 2.0 User Guide 2014 Ping Identity Corporation. All rights reserved. PingFederate Web Access Management Token Translator User Guide Version 2.0 August, 2014
More informationJava Plugin Windows Xp 32 Bit Full Version With Key
Java Plugin Windows Xp 32 Bit Full Version With Key Answers the 64-bit question: Running 32-bit Java on 64-bit Windows involves If you're running 64-bit Windows, check your Java version and update it if
More informationFUJITSU Software Interstage Studio V11.1. Installation Guide
FUJITSU Software Interstage Studio V11.1 Installation Guide B1WD-3159-02ENZ0(00) November 2013 Preface Purpose This manual, the Interstage Studio Installation Guide, explains how to setup Interstage Studio.
More informationDeveloping with VMware vcenter Orchestrator
Developing with VMware vcenter Orchestrator vcenter Orchestrator 4.2.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
More informationCA Gen. Gen Studio Overview Guide. Release 8.5. Third Edition
CA Gen Gen Studio Overview Guide Release 8.5 Third Edition This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation
More informationGetting Started with Cisco UCS Director Open Automation
Getting Started with Cisco UCS Director Open Automation Cisco UCS Director Open Automation, page 1 Upgrading Your Connector to the Current Release, page 5 Modules, page 5 Cisco UCS Director Open Automation
More informationPerceptive Connect Runtime
Perceptive Connect Runtime Installation and Setup Guide Version: 1.0.x Compatible with ImageNow: Version 6.7.x or higher Written by: Product Knowledge, R&D Date: August 2016 2015 Perceptive Software. All
More informationIBM WebSphere Java Batch Lab
IBM WebSphere Java Batch Lab What are we going to do? First we are going to set up a development environment on your workstation. Download and install Eclipse IBM WebSphere Developer Tools IBM Liberty
More informationBPS BIRT General Designer Usability Improvements Specification
BPS 1131 - BIRT General Designer Usability Improvements Specification Feature Specification Abstract This is the feature specification for BIRT general designer usability improvements. Revisions Version
More informationMarkLogic Server. Information Studio Developer s Guide. MarkLogic 8 February, Copyright 2015 MarkLogic Corporation. All rights reserved.
Information Studio Developer s Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Information
More informationClient 2. Authentication 5
Pipeline Pilot Web Port Support Guide April 2011 Contents Requirements 2 Requirements 2 Server 2 Client 2 Web Port Access 3 Authentication 5 Introduction Pipeline Pilot Web Port is a web-based application
More informationAddoro for Axapta 2009
Addoro for Axapta 2009 Installation and Configuration Overview of Addoro for Axapta 2009 Addoro for Axapta 2009 consists of two Windows Service applications that Addoro customers installs on their local
More informationEMC Documentum Composer
EMC Documentum Composer Version 6 SP1 User Guide P/N 300 005 253 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 2008 EMC Corporation. All rights
More informationMend for Eclipse quick start guide local analysis
The Semmle Mend for Eclipse plugin allows users to view Semmle results in Eclipse. This document describes how to install and use the plugin for local analysis. You can install the plugin using a Semmle
More informationOpenOffice.org and XUL Embedding Gecko in OOo Stephan Schäfer
OpenOffice.org and XUL Embedding Gecko in OOo Stephan Schäfer Project Lead GSL Sun microsystems About Me StarOffice developer since 2000 Project Lead GSL, main topic VCL > VCL architecture and Win32 support
More informationUsing the VMware vrealize Orchestrator Client
Using the VMware vrealize Orchestrator Client vrealize Orchestrator 7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationWA1735 Java Persistence (JPA) Programming using Rational Application Developer 7.5. Classroom Setup Guide. Web Age Solutions Inc.
WA1735 Java Persistence (JPA) Programming using Rational Application Developer 7.5 Classroom Setup Guide Web Age Solutions Inc. Copyright 2012 Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum
More informationEUSurvey OSS Installation Guide
Prerequisites... 2 Tools... 2 Java 7 SDK... 2 MySQL 5.6 DB and Client (Workbench)... 4 Tomcat 7... 8 Spring Tool Suite... 11 Knowledge... 12 Control System Services... 12 Prepare the Database... 14 Create
More informationBrowser Settings. Updated 4/30/ SSF
Browser Settings Updated 4/30/2014 - SSF Contents How to Locate the Online Banking URL... 3 Initial Steps for Browser Settings... 8 Internet Explorer... 9 Firefox... 13 Chrome... 18 Safari 6.0.5 and up...
More informationIn order to support developers, there needs to be a number of tools available which may be involved in the ultimate solution.
Problem Statement J2ME or Java ME is ripe with device fragmentation. Add to that the limited memory available for midlet suites, it is imperative that developer tools provide developers with the help necessary
More informationAspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1
Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...
More informationIntroduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...
Oracle Access Manager Configuration Guide for On-Premises Version 17 October 2017 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing
More informationClient Configuration Guide
Email Client Configuration Guide Contents Prerequisites... 1 Microsoft Outlook 2007... 2 Microsoft Outlook 2002/XP and 2003... 7 Microsoft Windows Mail (available with Vista only)... 11 Microsoft Outlook
More informationMetasploit. Installation Guide Release 4.4
Metasploit Installation Guide Release 4.4 TABLE OF CONTENTS About this Guide Target Audience...1 Organization...1 Document Conventions...1 Support...2 Support for Metasploit Pro and Metasploit Express...2
More informationQlik Sense Desktop. Qlik Sense September 2018 Copyright QlikTech International AB. All rights reserved.
Qlik Sense Desktop Qlik Sense September 2018 Copyright 1993-2018 QlikTech International AB. All rights reserved. Copyright 1993-2018 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik
More informationContents. BEA WebLogic Mobility Server Mobilize Your Portal Guide
Contents BEA WebLogic Mobility Server Mobilize Your Portal Guide Version 3.3 December 2005 Copyright Copyright 1995-2005 BEA Systems, Inc. All Rights Reserved. Restricted Rights Legend This software is
More informationEMC Documentum Composer
EMC Documentum Composer Version 6.5 SP2 User Guide P/N 300-009-462 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2008 2009 EMC Corporation. All
More informationAccess Gateway 9.3, Enterprise Edition
Access Gateway 9.3, Enterprise Edition 2015-05-03 05:23:10 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Access Gateway 9.3, Enterprise Edition...
More informationClearspan Hosted Thin Call Center R Release Notes APRIL 2015 RELEASE NOTES
Clearspan Hosted Thin Call Center R20.0.32 Release Notes APRIL 2015 RELEASE NOTES Clearspan Hosted Thin Call Center R20.0.32 Release Notes The information conveyed in this document is confidential and
More informationHealthcare Database Connector
Healthcare Database Connector Installation and Setup Guide Version: 1.0.x Written by: Product Knowledge, R&D Date: September 2016 2015 Lexmark International Technology, S.A. All rights reserved. Lexmark
More information/****************************************************************************\ DAS Release for Solaris, Linux, and Windows
/****************************************************************************\ DAS Release 3.0.0 for Solaris, Linux, and Windows Copyright 1991-2012 Information Security Corp. All rights reserved. This
More informationi2b2 Workbench Developer s Guide: Eclipse Neon & i2b2 Source Code
i2b2 Workbench Developer s Guide: Eclipse Neon & i2b2 Source Code About this guide Informatics for Integrating Biology and the Bedside (i2b2) began as one of the sponsored initiatives of the NIH Roadmap
More informationJDT Plug in Developer Guide. Programmer's Guide
JDT Plug in Developer Guide Programmer's Guide Table of Contents Java Development Tooling overview...1 Java elements and resources...1 Java elements...1 Java elements and their resources...3 Java development
More informationClass Dependency Analyzer CDA Developer Guide
CDA Developer Guide Version 1.4 Copyright 2007-2017 MDCS Manfred Duchrow Consulting & Software Author: Manfred Duchrow Table of Contents: 1 Introduction 3 2 Extension Mechanism 3 1.1. Prerequisites 3 1.2.
More informationSignicat Connector for Java Version 2.6. Document version 3
Signicat Connector for Java Version 2.6 Document version 3 About this document Purpose Target This document is a guideline for using Signicat Connector for Java. Signicat Connector for Java is a client
More informationJahia Studio JAHIA DOCUMENTION
JAHIA DOCUMENTION Jahia Studio Rooted in Open Source CMS, Jahia s Digital Industrialization paradigm is about streamlining Enterprise digital projects across channels to truly control time-to-market and
More informationINSTALL GUIDE BIOVIA INSIGHT 2.6
INSTALL GUIDE BIOVIA INSIGHT 2.6 Copyright Notice 2015 Dassault Systèmes. All rights reserved. 3DEXPERIENCE, the Compass icon and the 3DS logo, CATIA, SOLIDWORKS, ENOVIA, DELMIA, SIMULIA, GEOVIA, EXALEAD,
More informationCopyright 2017 Softerra, Ltd. All rights reserved
Copyright 2017 Softerra, Ltd. All rights reserved Contents Introduction Security Considerations Installation Configuration Uninstallation Automated Bulk Enrollment Troubleshooting Introduction Adaxes Self-Service
More informationDell EMC ME4 Series vsphere Client Plug-in
Dell EMC ME4 Series vsphere Client Plug-in User's Guide Regulatory Model: E09J, E10J, E11J Regulatory Type: E09J001, E10J001, E11J001 Notes, cautions, and warnings NOTE: A NOTE indicates important information
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationCSE 101 Introduction to Computers Development / Tutorial / Lab Environment Setup
CSE 101 Introduction to Computers Development / Tutorial / Lab Environment Setup Purpose: The purpose of this lab is to setup software that you will be using throughout the term for learning about Python
More informationStreamSets Control Hub Installation Guide
StreamSets Control Hub Installation Guide Version 3.2.1 2018, StreamSets, Inc. All rights reserved. Table of Contents 2 Table of Contents Chapter 1: What's New...1 What's New in 3.2.1... 2 What's New in
More informationEUSurvey Installation Guide
EUSurvey Installation Guide Guide to a successful installation of EUSurvey May 20 th, 2015 Version 1.2 (version family) 1 Content 1. Overview... 3 2. Prerequisites... 3 Tools... 4 Java SDK... 4 MySQL Database
More informationEDGE, MICROSOFT S BROWSER
EDGE, MICROSOFT S BROWSER To launch Microsoft Edge, click the Microsoft Edge button (it s the solid blue E) on the Windows Taskbar. Edge Replaces Internet Explorer Internet Explorer is no longer the default
More informationWA1884 Introduction to Java. using Oracle JDeveloper 11g. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc.
WA1884 Introduction to Java using Oracle JDeveloper 11g Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Classroom Requirements...3 Part 1 - Minimum Hardware
More informationInternet Security Mail Anti-Virus
Internet Security 2012 Mail Anti-Virus Table of Contents Mail Anti-Virus... 2 What is Mail Anti-Virus... 2 Enabling/disabling Mail Anti-Virus... 2 Operation algorithm of Mail Anti-Virus... 2 Changing Mail
More informationUsing the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1
Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationInternet Explorer Script Error Invalid Character Code 0
Internet Explorer Script Error Invalid Character Code 0 _title_websocket Handling QUnit Tests_/title script type="text/javascript" Error: global failure (1, 0, 1)Rerun1 ms1.invalid character@ 1 mssource:
More informationUsing Smart Tools to Write Good Code
B Using Smart Tools to Write Good Code All software development methodologies, with no exception, do include at least one stage of testing of the code. This is because the code most programmers write,
More informationLab 1 - Getting started with OIM 11g
Lab 1 - Getting started with OIM 11g Contents Lab 1 - Getting started with OIM 11g... 1 1. Introduction... 1 2. Contents... 3 2.1 VM Accessibility... 3 2.2 Understand directory structures... 4 2.3 Database
More informationFluenta DITA Translation Manager. Copyright Maxprograms
Copyright 2015-2018 Maxprograms Table of Contents Introduction... 1 Fluenta DITA Translation Manager... 1 Translating DITA Projects... 2 Create Project... 2 Generate XLIFF... 4 Import XLIFF... 5 Project
More information