Implementation of Authentication Mechanism for a Virtual File System

Size: px
Start display at page:

Download "Implementation of Authentication Mechanism for a Virtual File System"

Transcription

1 Implementatin f Authenticatin Mechanism fr a Virtual File System Prject fr Operating Systems Curse (CS 5204) Implemented by- Vinth Jagannathan Abhishek Ram Under the guidance f Dr Dennis Kafura

2 Abstract The aim f the prject is the implementatin f an authenticatin mechanism t cntrl access t a virtual file system Our authenticatin mechanism is mdeled n Kerbers The PGP algrithm is used fr encryptin and decryptin The virtual file system emulates the VFAT file structure used in Unix The disk layut f the files stred in the VFS is placed in the index blcks f VFS that are similar t the inde structure in Unix file system Access cntrl lists are implemented fr each file in the file system t cntrl access The purpse f ding the prject was t gain an insight int the wrking f security mechanisms and hw t apply a security layer t a file system in a distributed envirnment

3 Prject Design Kerbers Mechanism Kerbers Server (Ticket Granting Server Authenticatin Server) Key distributin service Wrkstatin User File Server The design f the Kerbers mechanism can be divided int three basic mdules 1 Wrkstatin This is the mdule that interacts with the user It allws the user t lgin and participates, alng with the Kerbers server, in the verificatin f the user s identity Each time the user subsequently requests a service ver the netwrk, it perfrms the validatin f the user in a way transparent t the user 2 Kerbers Server This mdule is respnsible fr verifying the user s identity and granting tickets t the user whenever the user needs sme service ver the netwrk The tickets are used in authenticatin f the user 3 File Server This mdule takes care f the maintenance f the virtual file system It receives the users requests fr peratins n files and checks whether they have the permissins fr executing thse Permissins are checked by referring t the access cntrl matrix that is maintained fr each file in the virtual file system Kerbers authenticatin mechanism When the user lgs in User name is sent by wrkstatin t the Kerbers server The Kerbers server btains frm the database an encryptin key fr the user and fr the service name

4 The Kerbers server frms a ticket that is in the frmat Ticket=(lgin-name, net address f wrkstatin, TGS sessin key) The TGS sessin key is a randm number generated fr that sessin The ticket is encrypted using the service key A message is then frmed as fllws Message=(TGS sessin key, sealed-ticket) The message is encrypted using the user encryptin key and sent t the wrkstatin The wrkstatin then prmpts the user fr his passwrd, which wuld be the user key The passwrd is used t decrypt the message and then deleted The TGS sessin key and the sealed ticket are extracted frm the message and then stred When the user requests sme netwrk service The wrkstatin builds the fllwing message t be sent t the Kerbers server Message=(sealed-ticket,sealed-authenticatr) The authenticatr, which is sealed using the TGS sessin key, has the fllwing frmat Authenticatr=(lgin-name, wrkstatin net address) The Kerbers server decrypts the sealed ticket using the servic key and extracts the sessin key frm the sealed ticket It then decrypts the sealed authenticatr using the sessin key and cmpares the lgin name and wrkstatin address in the ticket and the authenticatr t validate the user If the user is validated a new sessin key is generated randmly and a new ticket is built- Ticket=(lgin-name, net address f wrkstatin, new sessin key) The ticket is encrypted using the encryptin key fr the file server

5 A new message is frmed- Message=(new sessin key, sealed-ticket) The message is encrypted using the TGS sessin key and sent t the wrkstatin The wrkstatin decrypts the message using the TGS sessin key and extracts the new key It builds an authenticatr as fllws Authenticatr=(lgin-name, wrkstatin net address) The authenticatr is encrypted using the new sessin key The wrkstatin builds the fllwing message t be sent t the file server Message=(sealed-ticket,sealed-authenticatr) The file server, n receiving the message, decrypts the sealed ticket using its key and extracts the new sessin key Using this it decrypts the authenticatr It then vaildates the user by cmparing the lgin name and the wrkstatin address in the ticket and the authenticatr Encryptin and Decryptin Functins int encrypt(char * data, char *pwd) The functin encrypts data using the given key It takes a pinter t the data and a pinter t the key as parameters and returns the length f the encrypted data int decrypt(char *data, char *pwd, int len) The functin decrypts data using the given key It takes a pinter t the data, the passwrd, and the length f the encrypted data as parameters Returns length f decrypted data

6 Virtual File System The Virtual File System (VFS) is used t stre the files It is a simple emulatin f the VFAT structure in Unix file system The file server perates n the VFS t cntrl the access mechanism The structure f VFS is depicted in the figure shwn belw Super blck Index blck Index blck Index blck Index blck Data blck Data blck Data blck Data blck Structure f VFS

7 The Virtual File System (VFS) cntains ne super blck, 100 index blcks and 1000 data blcks Structure f Super blck: Number f files Free space available Starting address f free space Access Matrix Number f files: This cunt is used t enhance searching thrugh the VFS This cunt is updated whenever a file is written in t the VFS r deleted frm the VFS (this is dne by the update functin) Free space available: This is used t check whether the incming file can be written in t the VFS r nt If the file s size is greater than the ttal free space available, then the file cannt be written int the VFS Starting address f free space: This specifies the starting lcatin f the free pl When a file is deleted frm VFS, the memry allcated t that file is attached t the beginning f the free pl and the starting address f free pl is mdified accrdingly Access Matrix: This matrix cntains the access permissin values fr (file, user) pairs This is implemented as a tw dimensinal array Structure f Index blck: Name f the file Size f the file Starting blck f the file

8 The index blck cntains the disk layut f the files stred in the VFS This is similar t the inde in the Unix file system Size f the file: The size f the file (in bytes) is stred in this variable When a file is deleted frm VFS, the free space variable is incremented by the size f the file Structure f Data blck: Data (100 Characters) Link t next data blck As the name says, the data blck is used t hld the cntents f the files The data blcks are implemented using the linked list mechanism Functins used t access the VFS READ: int read (char *fname, char *uname, char *buffer) The access permissins are checked using the fname and uname, and if the user (uname) has READ_ONLY permissin t the file (fname), the cntent f the file is returned in the buffer WRITE: int write (char *fname, char *uname, char *buffer) This functin is used t create a new file and stre it in the VFS When a file is created, the wner is autmatically assigned with FULL_CONTROL and all ther users are granted with READ_ONLY access S when a file is created, nly the wner f the file can change the access cntrl settings SET_ACCESS: int set_access (char *wner, char *fname, char *uname, int access) The access cntrl settings fr the file (fname) can be changed nly if wner has FULL_CONTROL access t the file

9 Access Cntrl Mechanism A simple access cntrl mechanism is implemented in the file server The access mechanism has three levels f access, i N access ii iii Read nly Full Cntrl (Read and set access permissins t ther users) The access mechanism is implemented as an access cntrl matrix that is f the frm (file_name, user_name) If a user X has READ_ONLY access t a file A, then in the access matrix the psitin (A, X) will have the value set fr READ_ONLY (ie 1 Fr NO_ACCESS it is 0 and fr FULL_CONTROL it is 2) If the user X wants t change the access cntrl settings f the file A, as he des nt have the permissin t change access cntrl settings, he will nt be allwed t perfrm the task Pretty Gd Privacy PGP r Pretty Gd Privacy is a pwerful cryptgraphic prduct family that enables peple t securely exchange messages, and t secure files, disk vlumes and netwrk cnnectins with bth privacy and strng authenticatin Privacy means that nly the intended recipient f a message can read it By prviding the ability t encrypt messages, PGP prvides prtectin against anyne eavesdrpping n the netwrk Even if the infrmatin is intercepted, it is cmpletely unreadable t the snper Authenticatin identifies the rigin f the infrmatin, certainty that it is authentic, and that it has nt been altered Authenticatin als prvides an extremely valuable tl in netwrk security: verificatin f the identity f an individual

10 Summary The prject has enabled us t understand the key issues that are invlved in the develpment f an authenticatin mechanism The wrking f the Kerbers and the PGP encryptin algrithm has been understd We gt an insight abut the Unix file system architecture and strage mechanism by implementing the Virtual File System Thugh the VFS was a simple and small file system, it gave a cmplete verview abut mst f the features f the actual file system, such as memry allcatin, free pl management, etc The implementatin f the access cntrl lists fr files expsed us t the file prtectin cncept as well Sme extensins f the prject may be t implement the same fr a distributed file systems Maintaining capability lists fr the users f the systems is anther mdificatin pssible

Department of Computer Information Systems KEMU

Department of Computer Information Systems KEMU Advanced DBMS: CISY 423 Department f Cmputer Infrmatin Systems KEMU Database Security OBJECTIVES Database Security and Authrizatin Database Users Creating Users/Accunts in cmmercial DBMS Discretinary Access

More information

INSTALLING CCRQINVOICE

INSTALLING CCRQINVOICE INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a

More information

CaseWare Working Papers. Data Store user guide

CaseWare Working Papers. Data Store user guide CaseWare Wrking Papers Data Stre user guide Index 1. What is a Data Stre?... 3 1.1. When using a Data Stre, the fllwing features are available:... 3 1.1.1.1. Integratin with Windws Active Directry... 3

More information

Ascii Art Capstone project in C

Ascii Art Capstone project in C Ascii Art Capstne prject in C CSSE 120 Intrductin t Sftware Develpment (Rbtics) Spring 2010-2011 Hw t begin the Ascii Art prject Page 1 Prceed as fllws, in the rder listed. 1. If yu have nt dne s already,

More information

Demand Forecasting. For. Microsoft Dynamics 365 for Operations. Technical Guide. Release 7.1. December 2017

Demand Forecasting. For. Microsoft Dynamics 365 for Operations. Technical Guide. Release 7.1. December 2017 Demand Frecasting Fr Micrsft Dynamics 365 fr Operatins Technical Guide Release 7.1 December 2017 2017 Farsight Slutins Limited All Rights Reserved. Prtins cpyright Business Frecast Systems, Inc. This dcument

More information

Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.

Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools. Q.1 What is Trubleshting Tls? List their types? Trubleshting f netwrk prblems is find and slve with the help f hardware and sftware is called trubleshting tls. Trubleshting Tls - Hardware Tls They are

More information

Contents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the.

Contents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the. 1 f 22 26/09/2016 15:58 Mdule Cnsideratins Cntents: Lessn 1: Lessn 2: Mdule Befre yu start with almst any planning. apprpriately. As benefit f gd T appreciate architecture. it places n the understanding

More information

Assignment #5: Rootkit. ECE 650 Fall 2018

Assignment #5: Rootkit. ECE 650 Fall 2018 General Instructins Assignment #5: Rtkit ECE 650 Fall 2018 See curse site fr due date Updated 4/10/2018, changes nted in green 1. Yu will wrk individually n this assignment. 2. The cde fr this assignment

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This

More information

Exosoft Backup Manager

Exosoft Backup Manager Exsft Backup Manager 2018 Exsft Backup Manager Ensuring databases are backed up regularly is a critical part f any cmpany data recvery prcess. Mst mnth end as well as end f financial year prcesses shuld

More information

Admin Report Kit for Exchange Server

Admin Report Kit for Exchange Server Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses

More information

Level 2 Development Training

Level 2 Development Training Level 2 Develpment Training Level 2 Develpment Training Level 2 Develpment Training Vide Capture RSS 4000 Level 2 Develpment Training Vide Capture Cntents 1 Intrductin... 3 Intrductin... 3 Available Resurces...

More information

Please contact technical support if you have questions about the directory that your organization uses for user management.

Please contact technical support if you have questions about the directory that your organization uses for user management. Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP

More information

CITI Technical Report 08-1 Parallel NFS Block Layout Module for Linux

CITI Technical Report 08-1 Parallel NFS Block Layout Module for Linux CITI Technical Reprt 08-1 Parallel NFS Blck Layut Mdule fr Linux William A. Adamsn, University f Michigan andrs@citi.umich.edu Frederic Isaman, University f Michigan iisaman@citi.umich.edu Jasn Glasgw,

More information

Data Structure Interview Questions

Data Structure Interview Questions Data Structure Interview Questins A list f tp frequently asked Data Structure interview questins and answers are given belw. 1) What is Data Structure? Explain. Data structure is a way that specifies hw

More information

Users, groups, collections and submissions in DSpace. Contents

Users, groups, collections and submissions in DSpace. Contents Users, grups, cllectins and submissins in DSpace Cntents Key cncepts... 2 User accunts and authenticatin... 2 Authrisatin and privileges... 2 Resurce plicies... 2 User rles and grups... 3 Submissin wrkflws...

More information

INTELLISNAP. TECHNOLOGY QUICK START GUIDE Pure Storage FlashArray. Publish Date: July 30, 2015 Distribution: Public Author: Jonathan Howard

INTELLISNAP. TECHNOLOGY QUICK START GUIDE Pure Storage FlashArray. Publish Date: July 30, 2015 Distribution: Public Author: Jonathan Howard INTELLISNAP TECHNOLOGY QUICK START GUIDE Pure Strage FlashArray Publish Date: July 30, 2015 Distributin: Public Authr: Jnathan Hward Quick Start Guide This quick start guide is intended t launch users

More information

- Replacement of a single statement with a sequence of statements(promotes regularity)

- Replacement of a single statement with a sequence of statements(promotes regularity) ALGOL - Java and C built using ALGOL 60 - Simple and cncise and elegance - Universal - Clse as pssible t mathematical ntatin - Language can describe the algrithms - Mechanically translatable t machine

More information

Project 4: System Calls 1

Project 4: System Calls 1 CMPT 300 1. Preparatin Prject 4: System Calls 1 T cmplete this assignment, it is vital that yu have carefully cmpleted and understd the cntent in the fllwing guides which are psted n the curse website:

More information

Overview of Data Furnisher Batch Processing

Overview of Data Furnisher Batch Processing Overview f Data Furnisher Batch Prcessing Nvember 2018 Page 1 f 9 Table f Cntents 1. Purpse... 3 2. Overview... 3 3. Batch Interface Implementatin Variatins... 4 4. Batch Interface Implementatin Stages...

More information

Getting Started with the Web Designer Suite

Getting Started with the Web Designer Suite Getting Started with the Web Designer Suite The Web Designer Suite prvides yu with a slew f Dreamweaver extensins that will assist yu in the design phase f creating a website. The tls prvided in this suite

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Designing a mdule with multiple memries Designing and using a bitmap fnt Designing a memry-mapped display Cmp 541 Digital

More information

CCNA Security v2.0 Chapter 2 Exam Answers

CCNA Security v2.0 Chapter 2 Exam Answers CCNA Security v2.0 Chapter 2 Exam Answers 1. An administratr defined a lcal user accunt with a secret passwrd n ruter R1 fr use with SSH. Which three additinal steps are required t cnfigure R1 t accept

More information

One reason for controlling access to an object is to defer the full cost of its creation and initialization until we actually need to use it.

One reason for controlling access to an object is to defer the full cost of its creation and initialization until we actually need to use it. Prxy 1 Intent Prvide a surrgate r placehlder fr anther bject t cntrl access t it. Als Knwn As Surrgate Mtivatin One reasn fr cntrlling access t an bject is t defer the full cst f its creatin and initializatin

More information

Campuses that access the SFS nvision Windows-based client need to allow outbound traffic to:

Campuses that access the SFS nvision Windows-based client need to allow outbound traffic to: Summary This dcument is a guide intended t guide yu thrugh the prcess f installing and cnfiguring PepleTls 8.55.27 (r current versin) via Windws Remte Applicatin (App). Remte App allws the end user t run

More information

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide Xilinx Answer 65444 Xilinx PCI Express DMA Drivers and Sftware Guide Imprtant Nte: This dwnladable PDF f an Answer Recrd is prvided t enhance its usability and readability. It is imprtant t nte that Answer

More information

Using SPLAY Tree s for state-full packet classification

Using SPLAY Tree s for state-full packet classification Curse Prject Using SPLAY Tree s fr state-full packet classificatin 1- What is a Splay Tree? These ntes discuss the splay tree, a frm f self-adjusting search tree in which the amrtized time fr an access,

More information

Managing User Accounts

Managing User Accounts A variety f user types are available in Lighthuse Transactin Manager (LTM) with cnfigurable permissins that allw the Accunt Administratr and administratr-type users fr the accunt t manage the abilities

More information

Summary. Server environment: Subversion 1.4.6

Summary. Server environment: Subversion 1.4.6 Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin

More information

Creating a TES Encounter/Transaction Entry Batch

Creating a TES Encounter/Transaction Entry Batch Creating a TES Encunter/Transactin Entry Batch Overview Intrductin This mdule fcuses n hw t create batches fr transactin entry in TES. Charges (transactins) are entered int the system in grups called batches.

More information

Guidance for Applicants: Submitting an application in AAS Ishango Grants Management

Guidance for Applicants: Submitting an application in AAS Ishango Grants Management Guidance fr Applicants: Submitting an applicatin in AAS Ishang Grants Management Histry f changes Versin Date Changes 1 Nv 2016 Current versin Pushing the centre f gravity t Africa 1 Table f Cntents 1

More information

Manual for installation and usage of the module Secure-Connect

Manual for installation and usage of the module Secure-Connect Mdule Secure-Cnnect Manual fr installatin and usage f the mdule Secure-Cnnect Page 1 / 1 5 Table f Cntents 1)Cntents f the package...3 2)Features f the mdule...4 3)Installatin f the mdule...5 Step 1: Installatin

More information

Application Note. Digi Connect Wi-SP Troubleshooting Guide. Digi Technical Support 10 May 2016

Application Note. Digi Connect Wi-SP Troubleshooting Guide. Digi Technical Support 10 May 2016 Applicatin Nte Digi Cnnect Wi-SP Trubleshting Guide Digi Technical Supprt 10 May 2016 Cntents 1 Intrductin... 3 1.1 Assumptins... 3 1.2 Crrectins... 3 2 Quick Facts... 3 2.1 Cmmn Questins Abut the Cnnect

More information

BMC Remedyforce Integration with Bomgar Remote Support

BMC Remedyforce Integration with Bomgar Remote Support BMC Remedyfrce Integratin with Bmgar Remte Supprt 2017 Bmgar Crpratin. All rights reserved wrldwide. BOMGAR and the BOMGAR lg are trademarks f Bmgar Crpratin; ther trademarks shwn are the prperty f their

More information

LiveEngage and Microsoft Dynamics Integration Guide Document Version: 1.0 September 2017

LiveEngage and Microsoft Dynamics Integration Guide Document Version: 1.0 September 2017 LiveEngage and Micrsft Dynamics Integratin Guide Dcument Versin: 1.0 September 2017 Cntents Intrductin... 3 Step 1: Sign Up... 3 CRM Widget Signing Up... 3 Step 2: Cnfiguring the CRM Widget... 4 Accessing

More information

History of Java. VM (Java Virtual Machine) What is JVM. What it does. 1. Brief history of Java 2. Java Version History

History of Java. VM (Java Virtual Machine) What is JVM. What it does. 1. Brief history of Java 2. Java Version History Histry f Java 1. Brief histry f Java 2. Java Versin Histry The histry f Java is very interesting. Java was riginally designed fr interactive televisin, but it was t advanced technlgy fr the digital cable

More information

SITEDIARY.org. User Manual PLANIUM Oy

SITEDIARY.org. User Manual PLANIUM Oy SITEDIARY.rg User Manual Cntents 1. General... 3 1.1 Rles... 3 2 Lgin t the system... 4 3 Prject selectin... 4 4 Start page... 5 5 Diary... 6 5.1 Weather... 6 5.2 General Fields... 7 5.3 Wrks... 7 5.4

More information

PAGE NAMING STRATEGIES

PAGE NAMING STRATEGIES PAGE NAMING STRATEGIES Naming Yur Pages in SiteCatalyst May 14, 2007 Versin 1.1 CHAPTER 1 1 Page Naming The pagename variable is used t identify each page that will be tracked n the web site. If the pagename

More information

Test Pilot User Guide

Test Pilot User Guide Test Pilt User Guide Adapted frm http://www.clearlearning.cm Accessing Assessments and Surveys Test Pilt assessments and surveys are designed t be delivered t anyne using a standard web brwser and thus

More information

Forcepoint UEBA Management of Personal Data

Forcepoint UEBA Management of Personal Data Frcepint UEBA Management f Persnal Data 2018 Frcepint LLC. All Rights Reserved Dcument Classificatin: Public FPWSCMPD-2018MAY24 Frcepint UEBA Management f Persnal Data CONTENTS Disclaimer... 2 General...

More information

Skype Meetings

Skype Meetings http://www.jeffersnstate.edu/resurces-fr-instructrs-de/ Skype Meetings Skype-t-Skype is used fr cmmunicatin thrugh vice, vide, chat (Instant Messaging) and/r desktp sharing fr ne-n-ne cnferences, meetings,

More information

Reference Guide. Service Pack 3 Cumulative Update 2. Revision J Issued October DocAve 6: Control Panel

Reference Guide. Service Pack 3 Cumulative Update 2. Revision J Issued October DocAve 6: Control Panel DcAve 6 Cntrl Panel Reference Guide Service Pack 3 Cumulative Update 2 Revisin J Issued Octber 2013 DcAve 6: Cntrl Panel 1 Table f Cntents Abut Cntrl Panel... 6 Submitting Dcumentatin Feedback t AvePint...

More information

Access the site directly by navigating to in your web browser.

Access the site directly by navigating to   in your web browser. GENERAL QUESTIONS Hw d I access the nline reprting system? Yu can access the nline system in ne f tw ways. G t the IHCDA website at https://www.in.gv/myihcda/rhtc.htm and scrll dwn the page t Cmpliance

More information

McGill University School of Computer Science COMP-206. Software Systems. Due: September 29, 2008 on WEB CT at 23:55.

McGill University School of Computer Science COMP-206. Software Systems. Due: September 29, 2008 on WEB CT at 23:55. Schl f Cmputer Science McGill University Schl f Cmputer Science COMP-206 Sftware Systems Due: September 29, 2008 n WEB CT at 23:55 Operating Systems This assignment explres the Unix perating system and

More information

Guidance for Submitting an application or Nomination in AAS Ishango Online System

Guidance for Submitting an application or Nomination in AAS Ishango Online System Guidance fr Submitting an applicatin r Nminatin in AAS Ishang Online System Histry f changes Versin Date Changes 1 Nv 2016 Current versin Pushing the centre f gravity t Africa 1 Table f Cntents 1 General

More information

DIVAR IP 3000 Field Installation Guide

DIVAR IP 3000 Field Installation Guide CCTV IP Netwrk Vide Technical Brief DIVAR IP 3000 Field Installatin Guide 1 DIVAR IP 3000 Field Installatin Guide Overview The purpse f this guide is t prvide the step-by-step prcess f installing a DIVAR

More information

USER MANUAL. RoomWizard Administrative Console

USER MANUAL. RoomWizard Administrative Console USER MANUAL RmWizard Administrative Cnsle Cntents Welcme... 3 Administer yur RmWizards frm ne lcatin... 3 Abut This Manual... 4 Setup f the Administrative Cnsle... 4 Installatin... 4 The Cnsle Windw...

More information

Agilent Technologies, Inc. TCC Programming Search Interface

Agilent Technologies, Inc. TCC Programming Search Interface Agilent TCC Prgramming Search Interface 1 Agilent Technlgies, Inc. TCC Prgramming Search Interface TJ Taylr Daniel Jhnsn June 23, 2011 Agilent TCC Prgramming Search Interface 2 Cntents Abstract... 4 Intrductin...

More information

These tasks can now be performed by a special program called FTP clients.

These tasks can now be performed by a special program called FTP clients. FTP Cmmander FAQ: Intrductin FTP (File Transfer Prtcl) was first used in Unix systems a lng time ag t cpy and mve shared files. With the develpment f the Internet, FTP became widely used t uplad and dwnlad

More information

BMC Remedyforce Integration with Remote Support

BMC Remedyforce Integration with Remote Support BMC Remedyfrce Integratin with Remte Supprt 2003-2018 BeyndTrust, Inc. All Rights Reserved. BEYONDTRUST, its lg, and JUMP are trademarks f BeyndTrust, Inc. Other trademarks are the prperty f their respective

More information

An Introduction to Crescendo s Maestro Application Delivery Platform

An Introduction to Crescendo s Maestro Application Delivery Platform An Intrductin t Crescend s Maestr Applicatin Delivery Platfrm Intrductin This dcument is intended t serve as a shrt intrductin t Crescend s Maestr Platfrm and its cre features/benefits. The dcument will

More information

CIM System Virtualization Model

CIM System Virtualization Model DMTF Server Management Wrking Grup CIM System Virtualizatin Mdel Steve Hand DMTF System Virtualizatin Partitining and Clustering Wrkgrup (SVPC) Symantec Thanks t Rn Gering, C-Chair SVPC, Distinguished

More information

Point-to-Point Encryption (P2PE)

Point-to-Point Encryption (P2PE) Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard

More information

Chapter 6 Delivery and Routing of IP Packets. PDF created with FinePrint pdffactory Pro trial version

Chapter 6 Delivery and Routing of IP Packets. PDF created with FinePrint pdffactory Pro trial version Chapter 6 Delivery and Ruting f IP Packets PDF created with FinePrint pdffactry Pr trial versin www.pdffactry.cm Outline Cnnectin Delivery Ruting methds Static and dynamic ruting Ruting table and mdule

More information

softpanel generic installation and operation instructions for nanobox products

softpanel generic installation and operation instructions for nanobox products 1 f 10 System Requirements... 3 Installatin... 3 Java... 3 RxTx Serial Drivers... 3 Granting a user permissin t pen a COM Prt in Mac OS X... 3 USB t Serial Drivers... 4 Mac OS X 10.6 Snw Lepard... 4 Operatin...

More information

MediaTek LinkIt Development Platform for RTOS Memory Layout Developer's Guide

MediaTek LinkIt Development Platform for RTOS Memory Layout Developer's Guide MediaTek LinkIt Develpment Platfrm fr RTOS Memry Layut Develper's Guide Versin: 1.1 Release date: 31 March 2016 2015-2016 MediaTek Inc. MediaTek cannt grant yu permissin fr any material that is wned by

More information

Privacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services

Privacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services Privacy Plicy Last Mdified: September 26, 2016 Pictry is a fast and fun way t share memes with yur friends and the wrld arund yu. Yu can send a Pictry game t friends and view the pictures they submit in

More information

ClassFlow Administrator User Guide

ClassFlow Administrator User Guide ClassFlw Administratr User Guide ClassFlw User Engagement Team April 2017 www.classflw.cm 1 Cntents Overview... 3 User Management... 3 Manual Entry via the User Management Page... 4 Creating Individual

More information

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins)

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins) Intrductin This reference guide is aimed at managers wh will be respnsible fr managing users within RiskMan where RiskMan is nt cnfigured t use netwrk lgins. This guide is used in cnjunctin with the respective

More information

Dynamic Storage (ECS)

Dynamic Storage (ECS) User Guide Dynamic Strage (ECS) Swisscm (Schweiz) AG 1 / 10 Cntent 1 Abut Dynamic Strage... 3 2 Virtual drive, the EMC CIFS-ECS Tl... 4 3 Amazn S3 Brwer... 6 4 Strage Gateway Appliance... 9 5 Amazn S3

More information

Mission Antyodaya Android Mobile & Web Application. Frequently Asked Questions

Mission Antyodaya Android Mobile & Web Application. Frequently Asked Questions Missin Antydaya Andrid Mbile & Web Applicatin Frequently Asked Questins Natinal Infrmatics Centre v1.0 Missin Antydaya Mbile & Web Applicatin 1 Intrductin What is the name f Mbile applicatin? Earlier it

More information

Log shipping is a HA option. Log shipping ensures that log backups from Primary are

Log shipping is a HA option. Log shipping ensures that log backups from Primary are LOG SHIPPING Lg shipping is a HA ptin. Lg shipping ensures that lg backups frm Primary are cntinuusly applied n standby. Lg shipping fllws a warm standby methd because manual prcess is invlved t ensure

More information

Kaltura MediaSpace Installation and Upgrade Guide. Version: 5.0

Kaltura MediaSpace Installation and Upgrade Guide. Version: 5.0 Kaltura MediaSpace Installatin and Upgrade Guide Versin: 5.0 Kaltura Business Headquarters 5 Unin Square West, Suite 602, New Yrk, NY, 10003, USA Tel.: +1 800 871 5224 Cpyright 2013 Kaltura Inc. All Rights

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Prf. Mntek Singh Spring 2019 Lab #7: A Basic Datapath; and a Sprite-Based Display Issued Fri 3/1/19; Due Mn 3/25/19

More information

CS4500/5500 Operating Systems Computer and Operating Systems Overview

CS4500/5500 Operating Systems Computer and Operating Systems Overview Operating Systems Cmputer and Operating Systems Overview Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOS4E, OS@Austin, Clumbia, UWisc Overview Recap

More information

Stealing passwords via browser refresh

Stealing passwords via browser refresh Stealing passwrds via brwser refresh Authr: Karmendra Khli [karmendra.khli@paladin.net] Date: August 07, 2004 Versin: 1.1 The brwser s back and refresh features can be used t steal passwrds frm insecurely

More information

DocAve 6 Service Pack 2 Control Panel

DocAve 6 Service Pack 2 Control Panel DcAve 6 Service Pack 2 Cntrl Panel Reference Guide Revisin D Issued February 2013 DcAve 6: Cntrl Panel 1 Table f Cntents Abut Cntrl Panel... 6 Submitting Dcumentatin Feedback t AvePint... 6 Befre Yu Begin...

More information

DocAve 6 Control Panel

DocAve 6 Control Panel DcAve 6 Cntrl Panel DcAve 6 Cntrl Panel Reference Guide Reference Guide Service Pack 4, Cumulative Update 3 Revisin T Service Pack 4, Cumulative Update 3 Issued Nvember 2014 Revisin S Issued September

More information

Paraben s Phone Recovery Stick

Paraben s Phone Recovery Stick Paraben s Phne Recvery Stick v. 4.3 User Manual Cntents Abut Phne Recvery Stick... 3 What s New!... 3 Getting Started... 4 System Requirements... 4 Hw t Use the Phne Recvery Stick... 4 Applicatin User

More information

IBM SPSS Interviewer Setting up Data Entry Supervisor machines for Synchronization

IBM SPSS Interviewer Setting up Data Entry Supervisor machines for Synchronization IBM SPSS Interviewer 6.0.1 Setting up Data Entry Supervisr machines fr Synchrnizatin V e r s i n 1. 1 P a g e 1 Table f Cntents 1 Overview... 3 2 Create Data Entry Supervisr s ISA (aka DimensinNet) User

More information

Paraben s Phone Recovery Stick

Paraben s Phone Recovery Stick Paraben s Phne Recvery Stick v. 3.0 User manual Cntents Abut Phne Recvery Stick... 3 What s new!... 3 System Requirements... 3 Applicatin User Interface... 4 Understanding the User Interface... 4 Main

More information

Lab 5 Sorting with Linked Lists

Lab 5 Sorting with Linked Lists UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C WINTER 2013 Lab 5 Srting with Linked Lists Intrductin Reading This lab intrduces

More information

Setting up the ncipher nshield HSM for use with Kerberized Certificate Authority

Setting up the ncipher nshield HSM for use with Kerberized Certificate Authority Setting up the ncipher nshield HSM fr use with Kerberized Certificate Authrity Intrductin This dcument cntains instructins fr setting up ncipher nshield hardware security mdules (HSM) fr use with the Kerberized

More information

CCNA Security v2.0 Chapter 3 Exam Answers

CCNA Security v2.0 Chapter 3 Exam Answers CCNA Security v2.0 Chapter 3 Exam Answers 1. Because f implemented security cntrls, a user can nly access a server with FTP. Which AAA cmpnent accmplishes this? accunting accessibility auditing authrizatin

More information

HP Server Virtualization Solution Planning & Design

HP Server Virtualization Solution Planning & Design Cnsulting & Integratin Infrastructure Services HP Server Virtualizatin Slutin Planning & Design Service descriptin Hewlett-Packard Cnsulting & Integratin Infrastructure Cnsulting Packaged Services (HP

More information

DUO LINK 4 APP User Manual V- A PNY Technologies, Inc. 1. PNY Technologies, Inc. 34.

DUO LINK 4 APP User Manual V- A PNY Technologies, Inc. 1. PNY Technologies, Inc. 34. 34. 1. Table f Cntents Page 1. Prduct Descriptin 4 2. System Requirements 5 3. DUO LINK App Installatin 5 4. DUO LINK App Mving Screens 7 5. File Management 5.1. Types f views 8 5.2. Select Files t Cpy,

More information

Qualtrics Instructions

Qualtrics Instructions Create a Survey/Prject G t the Ursinus Cllege hmepage and click n Faculty and Staff. Click n Qualtrics. Lgin t Qualtrics using yur Ursinus username and passwrd. Click n +Create Prject. Chse Research Cre.

More information

Performance of VSA in VMware vsphere 5

Performance of VSA in VMware vsphere 5 Perfrmance f VSA in VMware vsphere 5 Perfrmance Study TECHNICAL WHITE PAPER Table f Cntents Intrductin... 3 Executive Summary... 3 Test Envirnment... 3 Key Factrs f VSA Perfrmance... 4 Cmmn Strage Perfrmance

More information

Low-level Software Security: Attacks and Countermeasures

Low-level Software Security: Attacks and Countermeasures Lw-level Sftware Security: Attacks and Cuntermeasures Prf Frank PIESSENS These slides are based n the paper: Lw-level Sftware Security by Example by Erlingssn, Yunan and Piessens Overview Intrductin Example

More information

Managing Your Access To The Open Banking Directory How To Guide

Managing Your Access To The Open Banking Directory How To Guide Managing Yur Access T The Open Banking Directry Hw T Guide Date: June 2018 Versin: v2.0 Classificatin: PUBLIC OPEN BANKING LIMITED 2018 Page 1 f 32 Cntents 1. Intrductin 3 2. Signing Up 4 3. Lgging In

More information

Dolby Conference Phone Support Frequently Asked Questions

Dolby Conference Phone Support Frequently Asked Questions Dlby Cnference Phne Supprt Frequently Asked Questins Versin 1.0, 1 Intrductin This dcument prvides sme answers t frequently asked questins abut the Dlby Cnference Phne. Fr mre detailed infrmatin n any

More information

Avigilon Control Center Server User Guide. Version 6.8

Avigilon Control Center Server User Guide. Version 6.8 Avigiln Cntrl Center Server User Guide Versin 6.8 2006-2018, Avigiln Crpratin. All rights reserved. AVIGILON, the AVIGILON lg, AVIGILON CONTROL CENTER, ACC, and TRUSTED SECURITY SOLUTIONS.AVIGILON, the

More information

CAMPBELL COUNTY GILLETTE, WYOMING

CAMPBELL COUNTY GILLETTE, WYOMING CAMPBELL COUNTY GILLETTE, WYOMING System Supprt Analyst I System Supprt Analyst II Senir System Supprt Analyst Class specificatins are intended t present a descriptive list f the range f duties perfrmed

More information

Business Directory. User Guide. User Guide Page 1

Business Directory. User Guide. User Guide Page 1 Business Directry CmmerceExtensins Business Directry User Guide User Guide Page 1 Business Directry CmmerceExtensins Imprtant Ntice CmmerceExtensins reserves the right t make crrectins, mdificatins, enhancements,

More information

The Login Page Designer

The Login Page Designer The Lgin Page Designer A new Lgin Page tab is nw available when yu g t Site Cnfiguratin. The purpse f the Admin Lgin Page is t give fundatin staff the pprtunity t build a custm, yet simple, layut fr their

More information

Introduction to Oracle Business Intelligence Enterprise Edition: OBIEE Answers 11g

Introduction to Oracle Business Intelligence Enterprise Edition: OBIEE Answers 11g Intrductin t Oracle Business Intelligence Enterprise Editin: OBIEE Answers 11g Crnell Custmized Versin April 2012 Minr crrectins were made n page 2, fr the Oct 20, 2017 OBIEE 12c Upgrade April, 2012 All

More information

E-Lock Policy Manager White Paper

E-Lock Policy Manager White Paper White Paper Table f Cntents 1 INTRODUCTION... 3 2 ABOUT THE POLICY MANAGER... 3 3 HOW E-LOCK POLICY MANAGER WORKS... 3 4 WHAT CAN I DO WITH THE POLICY MANAGER?... 4 4.1 THINGS YOU CONTROL IN SIGNING...

More information

Adobe Connect 8 Event Organizer Guide

Adobe Connect 8 Event Organizer Guide Adbe Cnnect 8 Event Organizer Guide Questins fr Meeting HOST t ask at rganizatin meeting: Date (r dates) f event including time. Presenting t where Lcal ffice cubicles, reginal r glbal ffices, external

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 11 2016 v5.1 Answers 100% 1. A newly hired netwrk technician is given the task f rdering new hardware fr a small business with a large grwth frecast. Which primary factr shuld the technician

More information

BANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu

BANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu BANNER BASICS What is Banner? Definitin Prduct Mdules Self-Service-Fish R Net Lg int Banner Banner Envirnment The Main Windw My Banner Pages What is it? What frm d yu use? Steps t create a persnal menu

More information

LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C

LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C Due: July 9 (Sun) 11:59 pm 1. Prblem A Subject: Structure declaratin, initializatin and assignment. Structure

More information

High Security SaaS Concept Software as a Service (SaaS) for Life Science

High Security SaaS Concept Software as a Service (SaaS) for Life Science Sftware as a Service (SaaS) fr Life Science Cpyright Cunesft GmbH Cntents Intrductin... 3 Data Security and Islatin in the Clud... 3 Strage System Security and Islatin... 3 Database Security and Islatin...

More information

B Tech Project First Stage Report on

B Tech Project First Stage Report on B Tech Prject First Stage Reprt n GPU Based Image Prcessing Submitted by Sumit Shekhar (05007028) Under the guidance f Prf Subhasis Chaudhari 1. Intrductin 1.1 Graphic Prcessr Units A graphic prcessr unit

More information

Student participation Students can register online, track progress, express interest and demonstrate proficiency.

Student participation Students can register online, track progress, express interest and demonstrate proficiency. Page 1 f 31 Intrductin Our MAG 10 Learning Management System (LMS) is a Web based technlgy used t plan, implement, and assess a specific learning prcess. LMS is a training prgram which prvides cmplete

More information

ADSS Server Evaluation Quick Guide

ADSS Server Evaluation Quick Guide ADSS Server Evaluatin Quick Guide This dcument aims t prvide a quick d this and it wrks guide t evaluating ADSS Enterprise Server as a PDF Signing Server bth fr server-side signing and als fr client-side

More information

Update: Users are updated when their information changes (examples: Job Title or Department). o

Update: Users are updated when their information changes (examples: Job Title or Department). o Learn Basic User Integratin Batch File Prcessing The Learn Basic User Integratin is designed t manage the rganizatinal changes cmpanies are challenged with n a daily basis. Withut a basic type f integratin,

More information

Systems & Operating Systems

Systems & Operating Systems McGill University COMP-206 Sftware Systems Due: Octber 1, 2011 n WEB CT at 23:55 (tw late days, -5% each day) Systems & Operating Systems Graphical user interfaces have advanced enugh t permit sftware

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Spring 2016 Lab Prject (PART A): A Full Cmputer! Issued Fri 4/8/16; Suggested

More information

Oracle CPQ Cloud Release 1. New Feature Summary

Oracle CPQ Cloud Release 1. New Feature Summary Oracle CPQ Clud 2017 Release 1 New Feature Summary April 2017 1 TABLE OF CONTENTS REVISION HISTORY... 3 ORACLE CPQ CLOUD... 4 MODERN SELLING EXPERIENCE... 4 Deal Negtiatin... 4 REST API Services... 4 ENTERPRISE

More information

Click Studios. Passwordstate. RSA SecurID Configuration

Click Studios. Passwordstate. RSA SecurID Configuration Passwrdstate RSA SecurID Cnfiguratin This dcument and the infrmatin cntrlled therein is the prperty f Click Studis. It must nt be reprduced in whle/part, r therwise disclsed, withut prir cnsent in writing

More information