Implementation of Authentication Mechanism for a Virtual File System
|
|
- Bruce Harvey
- 5 years ago
- Views:
Transcription
1 Implementatin f Authenticatin Mechanism fr a Virtual File System Prject fr Operating Systems Curse (CS 5204) Implemented by- Vinth Jagannathan Abhishek Ram Under the guidance f Dr Dennis Kafura
2 Abstract The aim f the prject is the implementatin f an authenticatin mechanism t cntrl access t a virtual file system Our authenticatin mechanism is mdeled n Kerbers The PGP algrithm is used fr encryptin and decryptin The virtual file system emulates the VFAT file structure used in Unix The disk layut f the files stred in the VFS is placed in the index blcks f VFS that are similar t the inde structure in Unix file system Access cntrl lists are implemented fr each file in the file system t cntrl access The purpse f ding the prject was t gain an insight int the wrking f security mechanisms and hw t apply a security layer t a file system in a distributed envirnment
3 Prject Design Kerbers Mechanism Kerbers Server (Ticket Granting Server Authenticatin Server) Key distributin service Wrkstatin User File Server The design f the Kerbers mechanism can be divided int three basic mdules 1 Wrkstatin This is the mdule that interacts with the user It allws the user t lgin and participates, alng with the Kerbers server, in the verificatin f the user s identity Each time the user subsequently requests a service ver the netwrk, it perfrms the validatin f the user in a way transparent t the user 2 Kerbers Server This mdule is respnsible fr verifying the user s identity and granting tickets t the user whenever the user needs sme service ver the netwrk The tickets are used in authenticatin f the user 3 File Server This mdule takes care f the maintenance f the virtual file system It receives the users requests fr peratins n files and checks whether they have the permissins fr executing thse Permissins are checked by referring t the access cntrl matrix that is maintained fr each file in the virtual file system Kerbers authenticatin mechanism When the user lgs in User name is sent by wrkstatin t the Kerbers server The Kerbers server btains frm the database an encryptin key fr the user and fr the service name
4 The Kerbers server frms a ticket that is in the frmat Ticket=(lgin-name, net address f wrkstatin, TGS sessin key) The TGS sessin key is a randm number generated fr that sessin The ticket is encrypted using the service key A message is then frmed as fllws Message=(TGS sessin key, sealed-ticket) The message is encrypted using the user encryptin key and sent t the wrkstatin The wrkstatin then prmpts the user fr his passwrd, which wuld be the user key The passwrd is used t decrypt the message and then deleted The TGS sessin key and the sealed ticket are extracted frm the message and then stred When the user requests sme netwrk service The wrkstatin builds the fllwing message t be sent t the Kerbers server Message=(sealed-ticket,sealed-authenticatr) The authenticatr, which is sealed using the TGS sessin key, has the fllwing frmat Authenticatr=(lgin-name, wrkstatin net address) The Kerbers server decrypts the sealed ticket using the servic key and extracts the sessin key frm the sealed ticket It then decrypts the sealed authenticatr using the sessin key and cmpares the lgin name and wrkstatin address in the ticket and the authenticatr t validate the user If the user is validated a new sessin key is generated randmly and a new ticket is built- Ticket=(lgin-name, net address f wrkstatin, new sessin key) The ticket is encrypted using the encryptin key fr the file server
5 A new message is frmed- Message=(new sessin key, sealed-ticket) The message is encrypted using the TGS sessin key and sent t the wrkstatin The wrkstatin decrypts the message using the TGS sessin key and extracts the new key It builds an authenticatr as fllws Authenticatr=(lgin-name, wrkstatin net address) The authenticatr is encrypted using the new sessin key The wrkstatin builds the fllwing message t be sent t the file server Message=(sealed-ticket,sealed-authenticatr) The file server, n receiving the message, decrypts the sealed ticket using its key and extracts the new sessin key Using this it decrypts the authenticatr It then vaildates the user by cmparing the lgin name and the wrkstatin address in the ticket and the authenticatr Encryptin and Decryptin Functins int encrypt(char * data, char *pwd) The functin encrypts data using the given key It takes a pinter t the data and a pinter t the key as parameters and returns the length f the encrypted data int decrypt(char *data, char *pwd, int len) The functin decrypts data using the given key It takes a pinter t the data, the passwrd, and the length f the encrypted data as parameters Returns length f decrypted data
6 Virtual File System The Virtual File System (VFS) is used t stre the files It is a simple emulatin f the VFAT structure in Unix file system The file server perates n the VFS t cntrl the access mechanism The structure f VFS is depicted in the figure shwn belw Super blck Index blck Index blck Index blck Index blck Data blck Data blck Data blck Data blck Structure f VFS
7 The Virtual File System (VFS) cntains ne super blck, 100 index blcks and 1000 data blcks Structure f Super blck: Number f files Free space available Starting address f free space Access Matrix Number f files: This cunt is used t enhance searching thrugh the VFS This cunt is updated whenever a file is written in t the VFS r deleted frm the VFS (this is dne by the update functin) Free space available: This is used t check whether the incming file can be written in t the VFS r nt If the file s size is greater than the ttal free space available, then the file cannt be written int the VFS Starting address f free space: This specifies the starting lcatin f the free pl When a file is deleted frm VFS, the memry allcated t that file is attached t the beginning f the free pl and the starting address f free pl is mdified accrdingly Access Matrix: This matrix cntains the access permissin values fr (file, user) pairs This is implemented as a tw dimensinal array Structure f Index blck: Name f the file Size f the file Starting blck f the file
8 The index blck cntains the disk layut f the files stred in the VFS This is similar t the inde in the Unix file system Size f the file: The size f the file (in bytes) is stred in this variable When a file is deleted frm VFS, the free space variable is incremented by the size f the file Structure f Data blck: Data (100 Characters) Link t next data blck As the name says, the data blck is used t hld the cntents f the files The data blcks are implemented using the linked list mechanism Functins used t access the VFS READ: int read (char *fname, char *uname, char *buffer) The access permissins are checked using the fname and uname, and if the user (uname) has READ_ONLY permissin t the file (fname), the cntent f the file is returned in the buffer WRITE: int write (char *fname, char *uname, char *buffer) This functin is used t create a new file and stre it in the VFS When a file is created, the wner is autmatically assigned with FULL_CONTROL and all ther users are granted with READ_ONLY access S when a file is created, nly the wner f the file can change the access cntrl settings SET_ACCESS: int set_access (char *wner, char *fname, char *uname, int access) The access cntrl settings fr the file (fname) can be changed nly if wner has FULL_CONTROL access t the file
9 Access Cntrl Mechanism A simple access cntrl mechanism is implemented in the file server The access mechanism has three levels f access, i N access ii iii Read nly Full Cntrl (Read and set access permissins t ther users) The access mechanism is implemented as an access cntrl matrix that is f the frm (file_name, user_name) If a user X has READ_ONLY access t a file A, then in the access matrix the psitin (A, X) will have the value set fr READ_ONLY (ie 1 Fr NO_ACCESS it is 0 and fr FULL_CONTROL it is 2) If the user X wants t change the access cntrl settings f the file A, as he des nt have the permissin t change access cntrl settings, he will nt be allwed t perfrm the task Pretty Gd Privacy PGP r Pretty Gd Privacy is a pwerful cryptgraphic prduct family that enables peple t securely exchange messages, and t secure files, disk vlumes and netwrk cnnectins with bth privacy and strng authenticatin Privacy means that nly the intended recipient f a message can read it By prviding the ability t encrypt messages, PGP prvides prtectin against anyne eavesdrpping n the netwrk Even if the infrmatin is intercepted, it is cmpletely unreadable t the snper Authenticatin identifies the rigin f the infrmatin, certainty that it is authentic, and that it has nt been altered Authenticatin als prvides an extremely valuable tl in netwrk security: verificatin f the identity f an individual
10 Summary The prject has enabled us t understand the key issues that are invlved in the develpment f an authenticatin mechanism The wrking f the Kerbers and the PGP encryptin algrithm has been understd We gt an insight abut the Unix file system architecture and strage mechanism by implementing the Virtual File System Thugh the VFS was a simple and small file system, it gave a cmplete verview abut mst f the features f the actual file system, such as memry allcatin, free pl management, etc The implementatin f the access cntrl lists fr files expsed us t the file prtectin cncept as well Sme extensins f the prject may be t implement the same fr a distributed file systems Maintaining capability lists fr the users f the systems is anther mdificatin pssible
Department of Computer Information Systems KEMU
Advanced DBMS: CISY 423 Department f Cmputer Infrmatin Systems KEMU Database Security OBJECTIVES Database Security and Authrizatin Database Users Creating Users/Accunts in cmmercial DBMS Discretinary Access
More informationINSTALLING CCRQINVOICE
INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a
More informationCaseWare Working Papers. Data Store user guide
CaseWare Wrking Papers Data Stre user guide Index 1. What is a Data Stre?... 3 1.1. When using a Data Stre, the fllwing features are available:... 3 1.1.1.1. Integratin with Windws Active Directry... 3
More informationAscii Art Capstone project in C
Ascii Art Capstne prject in C CSSE 120 Intrductin t Sftware Develpment (Rbtics) Spring 2010-2011 Hw t begin the Ascii Art prject Page 1 Prceed as fllws, in the rder listed. 1. If yu have nt dne s already,
More informationDemand Forecasting. For. Microsoft Dynamics 365 for Operations. Technical Guide. Release 7.1. December 2017
Demand Frecasting Fr Micrsft Dynamics 365 fr Operatins Technical Guide Release 7.1 December 2017 2017 Farsight Slutins Limited All Rights Reserved. Prtins cpyright Business Frecast Systems, Inc. This dcument
More informationTroubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.
Q.1 What is Trubleshting Tls? List their types? Trubleshting f netwrk prblems is find and slve with the help f hardware and sftware is called trubleshting tls. Trubleshting Tls - Hardware Tls They are
More informationContents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the.
1 f 22 26/09/2016 15:58 Mdule Cnsideratins Cntents: Lessn 1: Lessn 2: Mdule Befre yu start with almst any planning. apprpriately. As benefit f gd T appreciate architecture. it places n the understanding
More informationAssignment #5: Rootkit. ECE 650 Fall 2018
General Instructins Assignment #5: Rtkit ECE 650 Fall 2018 See curse site fr due date Updated 4/10/2018, changes nted in green 1. Yu will wrk individually n this assignment. 2. The cde fr this assignment
More informationVMware AirWatch Certificate Authentication for Cisco IPSec VPN
VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This
More informationExosoft Backup Manager
Exsft Backup Manager 2018 Exsft Backup Manager Ensuring databases are backed up regularly is a critical part f any cmpany data recvery prcess. Mst mnth end as well as end f financial year prcesses shuld
More informationAdmin Report Kit for Exchange Server
Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses
More informationLevel 2 Development Training
Level 2 Develpment Training Level 2 Develpment Training Level 2 Develpment Training Vide Capture RSS 4000 Level 2 Develpment Training Vide Capture Cntents 1 Intrductin... 3 Intrductin... 3 Available Resurces...
More informationPlease contact technical support if you have questions about the directory that your organization uses for user management.
Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP
More informationCITI Technical Report 08-1 Parallel NFS Block Layout Module for Linux
CITI Technical Reprt 08-1 Parallel NFS Blck Layut Mdule fr Linux William A. Adamsn, University f Michigan andrs@citi.umich.edu Frederic Isaman, University f Michigan iisaman@citi.umich.edu Jasn Glasgw,
More informationData Structure Interview Questions
Data Structure Interview Questins A list f tp frequently asked Data Structure interview questins and answers are given belw. 1) What is Data Structure? Explain. Data structure is a way that specifies hw
More informationUsers, groups, collections and submissions in DSpace. Contents
Users, grups, cllectins and submissins in DSpace Cntents Key cncepts... 2 User accunts and authenticatin... 2 Authrisatin and privileges... 2 Resurce plicies... 2 User rles and grups... 3 Submissin wrkflws...
More informationINTELLISNAP. TECHNOLOGY QUICK START GUIDE Pure Storage FlashArray. Publish Date: July 30, 2015 Distribution: Public Author: Jonathan Howard
INTELLISNAP TECHNOLOGY QUICK START GUIDE Pure Strage FlashArray Publish Date: July 30, 2015 Distributin: Public Authr: Jnathan Hward Quick Start Guide This quick start guide is intended t launch users
More information- Replacement of a single statement with a sequence of statements(promotes regularity)
ALGOL - Java and C built using ALGOL 60 - Simple and cncise and elegance - Universal - Clse as pssible t mathematical ntatin - Language can describe the algrithms - Mechanically translatable t machine
More informationProject 4: System Calls 1
CMPT 300 1. Preparatin Prject 4: System Calls 1 T cmplete this assignment, it is vital that yu have carefully cmpleted and understd the cntent in the fllwing guides which are psted n the curse website:
More informationOverview of Data Furnisher Batch Processing
Overview f Data Furnisher Batch Prcessing Nvember 2018 Page 1 f 9 Table f Cntents 1. Purpse... 3 2. Overview... 3 3. Batch Interface Implementatin Variatins... 4 4. Batch Interface Implementatin Stages...
More informationGetting Started with the Web Designer Suite
Getting Started with the Web Designer Suite The Web Designer Suite prvides yu with a slew f Dreamweaver extensins that will assist yu in the design phase f creating a website. The tls prvided in this suite
More informationThe UNIVERSITY of NORTH CAROLINA at CHAPEL HILL
Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Designing a mdule with multiple memries Designing and using a bitmap fnt Designing a memry-mapped display Cmp 541 Digital
More informationCCNA Security v2.0 Chapter 2 Exam Answers
CCNA Security v2.0 Chapter 2 Exam Answers 1. An administratr defined a lcal user accunt with a secret passwrd n ruter R1 fr use with SSH. Which three additinal steps are required t cnfigure R1 t accept
More informationOne reason for controlling access to an object is to defer the full cost of its creation and initialization until we actually need to use it.
Prxy 1 Intent Prvide a surrgate r placehlder fr anther bject t cntrl access t it. Als Knwn As Surrgate Mtivatin One reasn fr cntrlling access t an bject is t defer the full cst f its creatin and initializatin
More informationCampuses that access the SFS nvision Windows-based client need to allow outbound traffic to:
Summary This dcument is a guide intended t guide yu thrugh the prcess f installing and cnfiguring PepleTls 8.55.27 (r current versin) via Windws Remte Applicatin (App). Remte App allws the end user t run
More informationXilinx Answer Xilinx PCI Express DMA Drivers and Software Guide
Xilinx Answer 65444 Xilinx PCI Express DMA Drivers and Sftware Guide Imprtant Nte: This dwnladable PDF f an Answer Recrd is prvided t enhance its usability and readability. It is imprtant t nte that Answer
More informationUsing SPLAY Tree s for state-full packet classification
Curse Prject Using SPLAY Tree s fr state-full packet classificatin 1- What is a Splay Tree? These ntes discuss the splay tree, a frm f self-adjusting search tree in which the amrtized time fr an access,
More informationManaging User Accounts
A variety f user types are available in Lighthuse Transactin Manager (LTM) with cnfigurable permissins that allw the Accunt Administratr and administratr-type users fr the accunt t manage the abilities
More informationSummary. Server environment: Subversion 1.4.6
Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin
More informationCreating a TES Encounter/Transaction Entry Batch
Creating a TES Encunter/Transactin Entry Batch Overview Intrductin This mdule fcuses n hw t create batches fr transactin entry in TES. Charges (transactins) are entered int the system in grups called batches.
More informationGuidance for Applicants: Submitting an application in AAS Ishango Grants Management
Guidance fr Applicants: Submitting an applicatin in AAS Ishang Grants Management Histry f changes Versin Date Changes 1 Nv 2016 Current versin Pushing the centre f gravity t Africa 1 Table f Cntents 1
More informationManual for installation and usage of the module Secure-Connect
Mdule Secure-Cnnect Manual fr installatin and usage f the mdule Secure-Cnnect Page 1 / 1 5 Table f Cntents 1)Cntents f the package...3 2)Features f the mdule...4 3)Installatin f the mdule...5 Step 1: Installatin
More informationApplication Note. Digi Connect Wi-SP Troubleshooting Guide. Digi Technical Support 10 May 2016
Applicatin Nte Digi Cnnect Wi-SP Trubleshting Guide Digi Technical Supprt 10 May 2016 Cntents 1 Intrductin... 3 1.1 Assumptins... 3 1.2 Crrectins... 3 2 Quick Facts... 3 2.1 Cmmn Questins Abut the Cnnect
More informationBMC Remedyforce Integration with Bomgar Remote Support
BMC Remedyfrce Integratin with Bmgar Remte Supprt 2017 Bmgar Crpratin. All rights reserved wrldwide. BOMGAR and the BOMGAR lg are trademarks f Bmgar Crpratin; ther trademarks shwn are the prperty f their
More informationLiveEngage and Microsoft Dynamics Integration Guide Document Version: 1.0 September 2017
LiveEngage and Micrsft Dynamics Integratin Guide Dcument Versin: 1.0 September 2017 Cntents Intrductin... 3 Step 1: Sign Up... 3 CRM Widget Signing Up... 3 Step 2: Cnfiguring the CRM Widget... 4 Accessing
More informationHistory of Java. VM (Java Virtual Machine) What is JVM. What it does. 1. Brief history of Java 2. Java Version History
Histry f Java 1. Brief histry f Java 2. Java Versin Histry The histry f Java is very interesting. Java was riginally designed fr interactive televisin, but it was t advanced technlgy fr the digital cable
More informationSITEDIARY.org. User Manual PLANIUM Oy
SITEDIARY.rg User Manual Cntents 1. General... 3 1.1 Rles... 3 2 Lgin t the system... 4 3 Prject selectin... 4 4 Start page... 5 5 Diary... 6 5.1 Weather... 6 5.2 General Fields... 7 5.3 Wrks... 7 5.4
More informationPAGE NAMING STRATEGIES
PAGE NAMING STRATEGIES Naming Yur Pages in SiteCatalyst May 14, 2007 Versin 1.1 CHAPTER 1 1 Page Naming The pagename variable is used t identify each page that will be tracked n the web site. If the pagename
More informationTest Pilot User Guide
Test Pilt User Guide Adapted frm http://www.clearlearning.cm Accessing Assessments and Surveys Test Pilt assessments and surveys are designed t be delivered t anyne using a standard web brwser and thus
More informationForcepoint UEBA Management of Personal Data
Frcepint UEBA Management f Persnal Data 2018 Frcepint LLC. All Rights Reserved Dcument Classificatin: Public FPWSCMPD-2018MAY24 Frcepint UEBA Management f Persnal Data CONTENTS Disclaimer... 2 General...
More informationSkype Meetings
http://www.jeffersnstate.edu/resurces-fr-instructrs-de/ Skype Meetings Skype-t-Skype is used fr cmmunicatin thrugh vice, vide, chat (Instant Messaging) and/r desktp sharing fr ne-n-ne cnferences, meetings,
More informationReference Guide. Service Pack 3 Cumulative Update 2. Revision J Issued October DocAve 6: Control Panel
DcAve 6 Cntrl Panel Reference Guide Service Pack 3 Cumulative Update 2 Revisin J Issued Octber 2013 DcAve 6: Cntrl Panel 1 Table f Cntents Abut Cntrl Panel... 6 Submitting Dcumentatin Feedback t AvePint...
More informationAccess the site directly by navigating to in your web browser.
GENERAL QUESTIONS Hw d I access the nline reprting system? Yu can access the nline system in ne f tw ways. G t the IHCDA website at https://www.in.gv/myihcda/rhtc.htm and scrll dwn the page t Cmpliance
More informationMcGill University School of Computer Science COMP-206. Software Systems. Due: September 29, 2008 on WEB CT at 23:55.
Schl f Cmputer Science McGill University Schl f Cmputer Science COMP-206 Sftware Systems Due: September 29, 2008 n WEB CT at 23:55 Operating Systems This assignment explres the Unix perating system and
More informationGuidance for Submitting an application or Nomination in AAS Ishango Online System
Guidance fr Submitting an applicatin r Nminatin in AAS Ishang Online System Histry f changes Versin Date Changes 1 Nv 2016 Current versin Pushing the centre f gravity t Africa 1 Table f Cntents 1 General
More informationDIVAR IP 3000 Field Installation Guide
CCTV IP Netwrk Vide Technical Brief DIVAR IP 3000 Field Installatin Guide 1 DIVAR IP 3000 Field Installatin Guide Overview The purpse f this guide is t prvide the step-by-step prcess f installing a DIVAR
More informationUSER MANUAL. RoomWizard Administrative Console
USER MANUAL RmWizard Administrative Cnsle Cntents Welcme... 3 Administer yur RmWizards frm ne lcatin... 3 Abut This Manual... 4 Setup f the Administrative Cnsle... 4 Installatin... 4 The Cnsle Windw...
More informationAgilent Technologies, Inc. TCC Programming Search Interface
Agilent TCC Prgramming Search Interface 1 Agilent Technlgies, Inc. TCC Prgramming Search Interface TJ Taylr Daniel Jhnsn June 23, 2011 Agilent TCC Prgramming Search Interface 2 Cntents Abstract... 4 Intrductin...
More informationThese tasks can now be performed by a special program called FTP clients.
FTP Cmmander FAQ: Intrductin FTP (File Transfer Prtcl) was first used in Unix systems a lng time ag t cpy and mve shared files. With the develpment f the Internet, FTP became widely used t uplad and dwnlad
More informationBMC Remedyforce Integration with Remote Support
BMC Remedyfrce Integratin with Remte Supprt 2003-2018 BeyndTrust, Inc. All Rights Reserved. BEYONDTRUST, its lg, and JUMP are trademarks f BeyndTrust, Inc. Other trademarks are the prperty f their respective
More informationAn Introduction to Crescendo s Maestro Application Delivery Platform
An Intrductin t Crescend s Maestr Applicatin Delivery Platfrm Intrductin This dcument is intended t serve as a shrt intrductin t Crescend s Maestr Platfrm and its cre features/benefits. The dcument will
More informationCIM System Virtualization Model
DMTF Server Management Wrking Grup CIM System Virtualizatin Mdel Steve Hand DMTF System Virtualizatin Partitining and Clustering Wrkgrup (SVPC) Symantec Thanks t Rn Gering, C-Chair SVPC, Distinguished
More informationPoint-to-Point Encryption (P2PE)
Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard
More informationChapter 6 Delivery and Routing of IP Packets. PDF created with FinePrint pdffactory Pro trial version
Chapter 6 Delivery and Ruting f IP Packets PDF created with FinePrint pdffactry Pr trial versin www.pdffactry.cm Outline Cnnectin Delivery Ruting methds Static and dynamic ruting Ruting table and mdule
More informationsoftpanel generic installation and operation instructions for nanobox products
1 f 10 System Requirements... 3 Installatin... 3 Java... 3 RxTx Serial Drivers... 3 Granting a user permissin t pen a COM Prt in Mac OS X... 3 USB t Serial Drivers... 4 Mac OS X 10.6 Snw Lepard... 4 Operatin...
More informationMediaTek LinkIt Development Platform for RTOS Memory Layout Developer's Guide
MediaTek LinkIt Develpment Platfrm fr RTOS Memry Layut Develper's Guide Versin: 1.1 Release date: 31 March 2016 2015-2016 MediaTek Inc. MediaTek cannt grant yu permissin fr any material that is wned by
More informationPrivacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services
Privacy Plicy Last Mdified: September 26, 2016 Pictry is a fast and fun way t share memes with yur friends and the wrld arund yu. Yu can send a Pictry game t friends and view the pictures they submit in
More informationClassFlow Administrator User Guide
ClassFlw Administratr User Guide ClassFlw User Engagement Team April 2017 www.classflw.cm 1 Cntents Overview... 3 User Management... 3 Manual Entry via the User Management Page... 4 Creating Individual
More informationRISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins)
Intrductin This reference guide is aimed at managers wh will be respnsible fr managing users within RiskMan where RiskMan is nt cnfigured t use netwrk lgins. This guide is used in cnjunctin with the respective
More informationDynamic Storage (ECS)
User Guide Dynamic Strage (ECS) Swisscm (Schweiz) AG 1 / 10 Cntent 1 Abut Dynamic Strage... 3 2 Virtual drive, the EMC CIFS-ECS Tl... 4 3 Amazn S3 Brwer... 6 4 Strage Gateway Appliance... 9 5 Amazn S3
More informationMission Antyodaya Android Mobile & Web Application. Frequently Asked Questions
Missin Antydaya Andrid Mbile & Web Applicatin Frequently Asked Questins Natinal Infrmatics Centre v1.0 Missin Antydaya Mbile & Web Applicatin 1 Intrductin What is the name f Mbile applicatin? Earlier it
More informationLog shipping is a HA option. Log shipping ensures that log backups from Primary are
LOG SHIPPING Lg shipping is a HA ptin. Lg shipping ensures that lg backups frm Primary are cntinuusly applied n standby. Lg shipping fllws a warm standby methd because manual prcess is invlved t ensure
More informationKaltura MediaSpace Installation and Upgrade Guide. Version: 5.0
Kaltura MediaSpace Installatin and Upgrade Guide Versin: 5.0 Kaltura Business Headquarters 5 Unin Square West, Suite 602, New Yrk, NY, 10003, USA Tel.: +1 800 871 5224 Cpyright 2013 Kaltura Inc. All Rights
More informationThe UNIVERSITY of NORTH CAROLINA at CHAPEL HILL
The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Prf. Mntek Singh Spring 2019 Lab #7: A Basic Datapath; and a Sprite-Based Display Issued Fri 3/1/19; Due Mn 3/25/19
More informationCS4500/5500 Operating Systems Computer and Operating Systems Overview
Operating Systems Cmputer and Operating Systems Overview Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOS4E, OS@Austin, Clumbia, UWisc Overview Recap
More informationStealing passwords via browser refresh
Stealing passwrds via brwser refresh Authr: Karmendra Khli [karmendra.khli@paladin.net] Date: August 07, 2004 Versin: 1.1 The brwser s back and refresh features can be used t steal passwrds frm insecurely
More informationDocAve 6 Service Pack 2 Control Panel
DcAve 6 Service Pack 2 Cntrl Panel Reference Guide Revisin D Issued February 2013 DcAve 6: Cntrl Panel 1 Table f Cntents Abut Cntrl Panel... 6 Submitting Dcumentatin Feedback t AvePint... 6 Befre Yu Begin...
More informationDocAve 6 Control Panel
DcAve 6 Cntrl Panel DcAve 6 Cntrl Panel Reference Guide Reference Guide Service Pack 4, Cumulative Update 3 Revisin T Service Pack 4, Cumulative Update 3 Issued Nvember 2014 Revisin S Issued September
More informationParaben s Phone Recovery Stick
Paraben s Phne Recvery Stick v. 4.3 User Manual Cntents Abut Phne Recvery Stick... 3 What s New!... 3 Getting Started... 4 System Requirements... 4 Hw t Use the Phne Recvery Stick... 4 Applicatin User
More informationIBM SPSS Interviewer Setting up Data Entry Supervisor machines for Synchronization
IBM SPSS Interviewer 6.0.1 Setting up Data Entry Supervisr machines fr Synchrnizatin V e r s i n 1. 1 P a g e 1 Table f Cntents 1 Overview... 3 2 Create Data Entry Supervisr s ISA (aka DimensinNet) User
More informationParaben s Phone Recovery Stick
Paraben s Phne Recvery Stick v. 3.0 User manual Cntents Abut Phne Recvery Stick... 3 What s new!... 3 System Requirements... 3 Applicatin User Interface... 4 Understanding the User Interface... 4 Main
More informationLab 5 Sorting with Linked Lists
UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C WINTER 2013 Lab 5 Srting with Linked Lists Intrductin Reading This lab intrduces
More informationSetting up the ncipher nshield HSM for use with Kerberized Certificate Authority
Setting up the ncipher nshield HSM fr use with Kerberized Certificate Authrity Intrductin This dcument cntains instructins fr setting up ncipher nshield hardware security mdules (HSM) fr use with the Kerberized
More informationCCNA Security v2.0 Chapter 3 Exam Answers
CCNA Security v2.0 Chapter 3 Exam Answers 1. Because f implemented security cntrls, a user can nly access a server with FTP. Which AAA cmpnent accmplishes this? accunting accessibility auditing authrizatin
More informationHP Server Virtualization Solution Planning & Design
Cnsulting & Integratin Infrastructure Services HP Server Virtualizatin Slutin Planning & Design Service descriptin Hewlett-Packard Cnsulting & Integratin Infrastructure Cnsulting Packaged Services (HP
More informationDUO LINK 4 APP User Manual V- A PNY Technologies, Inc. 1. PNY Technologies, Inc. 34.
34. 1. Table f Cntents Page 1. Prduct Descriptin 4 2. System Requirements 5 3. DUO LINK App Installatin 5 4. DUO LINK App Mving Screens 7 5. File Management 5.1. Types f views 8 5.2. Select Files t Cpy,
More informationQualtrics Instructions
Create a Survey/Prject G t the Ursinus Cllege hmepage and click n Faculty and Staff. Click n Qualtrics. Lgin t Qualtrics using yur Ursinus username and passwrd. Click n +Create Prject. Chse Research Cre.
More informationPerformance of VSA in VMware vsphere 5
Perfrmance f VSA in VMware vsphere 5 Perfrmance Study TECHNICAL WHITE PAPER Table f Cntents Intrductin... 3 Executive Summary... 3 Test Envirnment... 3 Key Factrs f VSA Perfrmance... 4 Cmmn Strage Perfrmance
More informationLow-level Software Security: Attacks and Countermeasures
Lw-level Sftware Security: Attacks and Cuntermeasures Prf Frank PIESSENS These slides are based n the paper: Lw-level Sftware Security by Example by Erlingssn, Yunan and Piessens Overview Intrductin Example
More informationManaging Your Access To The Open Banking Directory How To Guide
Managing Yur Access T The Open Banking Directry Hw T Guide Date: June 2018 Versin: v2.0 Classificatin: PUBLIC OPEN BANKING LIMITED 2018 Page 1 f 32 Cntents 1. Intrductin 3 2. Signing Up 4 3. Lgging In
More informationDolby Conference Phone Support Frequently Asked Questions
Dlby Cnference Phne Supprt Frequently Asked Questins Versin 1.0, 1 Intrductin This dcument prvides sme answers t frequently asked questins abut the Dlby Cnference Phne. Fr mre detailed infrmatin n any
More informationAvigilon Control Center Server User Guide. Version 6.8
Avigiln Cntrl Center Server User Guide Versin 6.8 2006-2018, Avigiln Crpratin. All rights reserved. AVIGILON, the AVIGILON lg, AVIGILON CONTROL CENTER, ACC, and TRUSTED SECURITY SOLUTIONS.AVIGILON, the
More informationCAMPBELL COUNTY GILLETTE, WYOMING
CAMPBELL COUNTY GILLETTE, WYOMING System Supprt Analyst I System Supprt Analyst II Senir System Supprt Analyst Class specificatins are intended t present a descriptive list f the range f duties perfrmed
More informationBusiness Directory. User Guide. User Guide Page 1
Business Directry CmmerceExtensins Business Directry User Guide User Guide Page 1 Business Directry CmmerceExtensins Imprtant Ntice CmmerceExtensins reserves the right t make crrectins, mdificatins, enhancements,
More informationThe Login Page Designer
The Lgin Page Designer A new Lgin Page tab is nw available when yu g t Site Cnfiguratin. The purpse f the Admin Lgin Page is t give fundatin staff the pprtunity t build a custm, yet simple, layut fr their
More informationIntroduction to Oracle Business Intelligence Enterprise Edition: OBIEE Answers 11g
Intrductin t Oracle Business Intelligence Enterprise Editin: OBIEE Answers 11g Crnell Custmized Versin April 2012 Minr crrectins were made n page 2, fr the Oct 20, 2017 OBIEE 12c Upgrade April, 2012 All
More informationE-Lock Policy Manager White Paper
White Paper Table f Cntents 1 INTRODUCTION... 3 2 ABOUT THE POLICY MANAGER... 3 3 HOW E-LOCK POLICY MANAGER WORKS... 3 4 WHAT CAN I DO WITH THE POLICY MANAGER?... 4 4.1 THINGS YOU CONTROL IN SIGNING...
More informationAdobe Connect 8 Event Organizer Guide
Adbe Cnnect 8 Event Organizer Guide Questins fr Meeting HOST t ask at rganizatin meeting: Date (r dates) f event including time. Presenting t where Lcal ffice cubicles, reginal r glbal ffices, external
More informationCCNA 1 Chapter v5.1 Answers 100%
CCNA 1 Chapter 11 2016 v5.1 Answers 100% 1. A newly hired netwrk technician is given the task f rdering new hardware fr a small business with a large grwth frecast. Which primary factr shuld the technician
More informationBANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu
BANNER BASICS What is Banner? Definitin Prduct Mdules Self-Service-Fish R Net Lg int Banner Banner Envirnment The Main Windw My Banner Pages What is it? What frm d yu use? Steps t create a persnal menu
More informationLAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C
LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C Due: July 9 (Sun) 11:59 pm 1. Prblem A Subject: Structure declaratin, initializatin and assignment. Structure
More informationHigh Security SaaS Concept Software as a Service (SaaS) for Life Science
Sftware as a Service (SaaS) fr Life Science Cpyright Cunesft GmbH Cntents Intrductin... 3 Data Security and Islatin in the Clud... 3 Strage System Security and Islatin... 3 Database Security and Islatin...
More informationB Tech Project First Stage Report on
B Tech Prject First Stage Reprt n GPU Based Image Prcessing Submitted by Sumit Shekhar (05007028) Under the guidance f Prf Subhasis Chaudhari 1. Intrductin 1.1 Graphic Prcessr Units A graphic prcessr unit
More informationStudent participation Students can register online, track progress, express interest and demonstrate proficiency.
Page 1 f 31 Intrductin Our MAG 10 Learning Management System (LMS) is a Web based technlgy used t plan, implement, and assess a specific learning prcess. LMS is a training prgram which prvides cmplete
More informationADSS Server Evaluation Quick Guide
ADSS Server Evaluatin Quick Guide This dcument aims t prvide a quick d this and it wrks guide t evaluating ADSS Enterprise Server as a PDF Signing Server bth fr server-side signing and als fr client-side
More informationUpdate: Users are updated when their information changes (examples: Job Title or Department). o
Learn Basic User Integratin Batch File Prcessing The Learn Basic User Integratin is designed t manage the rganizatinal changes cmpanies are challenged with n a daily basis. Withut a basic type f integratin,
More informationSystems & Operating Systems
McGill University COMP-206 Sftware Systems Due: Octber 1, 2011 n WEB CT at 23:55 (tw late days, -5% each day) Systems & Operating Systems Graphical user interfaces have advanced enugh t permit sftware
More informationThe UNIVERSITY of NORTH CAROLINA at CHAPEL HILL
Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Spring 2016 Lab Prject (PART A): A Full Cmputer! Issued Fri 4/8/16; Suggested
More informationOracle CPQ Cloud Release 1. New Feature Summary
Oracle CPQ Clud 2017 Release 1 New Feature Summary April 2017 1 TABLE OF CONTENTS REVISION HISTORY... 3 ORACLE CPQ CLOUD... 4 MODERN SELLING EXPERIENCE... 4 Deal Negtiatin... 4 REST API Services... 4 ENTERPRISE
More informationClick Studios. Passwordstate. RSA SecurID Configuration
Passwrdstate RSA SecurID Cnfiguratin This dcument and the infrmatin cntrlled therein is the prperty f Click Studis. It must nt be reprduced in whle/part, r therwise disclsed, withut prir cnsent in writing
More information