User Guide. How to use the Active Security monitoring component for int.eu.grid JRA1

Size: px
Start display at page:

Download "User Guide. How to use the Active Security monitoring component for int.eu.grid JRA1"

Transcription

1 User Guide How to use the Active Security monitoring component for int.eu.grid JRA1 Document Filename: Workpackage: Partner(s): Lead Partner: Config ID: Document classification: User Guide JRA1 TCD TCD i2g-asi-monitoring-user PUBLIC Abstract: This document describes what you need to know as a user of the Active Security monitoring component.

2 Delivery Slip Name Partner Date Signature From Stuart Kenny TCD Feb 2007 Verified By Approved By Document Log Version Date Summary of changes Author Feb 2007 First public version Stuart Kenny 2/13 PUBLIC User Guide

3 Contents Contents CopyrightNotice 4 1 About the Software Abbreviations and Acronyms References and Source Code Product Usage Running the Product Basic Operation Advanced Features EDG License Agreement 10 A ASI R-GMA Table Schema 11 A.1 Table: ASIAnalyzer A.2 Table: ASIAlert A.3 Table: ASIService User Guide PUBLIC 3/13

4 Contents Copyright Notice Copyright (c) 2006 by Stuart Kenny. All rights reserved. Use of this product is subject to the terms and licenses stated in the EDG license agreement. Please refer to Chapter 3 for details. Snort is a registered trademark of SourceFire, INC. All rights reserved. This research is partly funded by the European Commission IST-RI Project Interactive European Grid. 4/13 PUBLIC User Guide

5 1 About the Software The Active Security task proposes to consider security measures for an interactive framework, and subsequently to enhance interactive operation with active security tools. The architecture of the Active Security Infrastructure (ASI), is divided into two layers: Monitoring and control layer Analysis layer Communication between the two layers is provided by R-GMA, a grid monitoring and information system, originally developed by the European DataGrid project (EDG), and currently being re-engineered as part of EGEE. R-GMA is a relational implementation of the Global Grid Forums (GGF) Grid Monitoring Architecture. The monitoring and control layer resides at site level, i.e., the components contained in this level are to be installed on the gateway components at all sites within the int.eu.grid testbed. The layer consists of two components, Security Monitoring (SM) and the Control Engine. The purpose of the second layer of the ASI is to filter and analyse the alerts collected by the Security Monitoring component, in order to detect patterns that would signify an attempted attack on the Grid infrastructure. Because it is expected that a significant number of alerts will be generated and logged it is intended to automate this analysis as much as possible. This layer resides at the Operations Centre level, i.e., the services contained in this layer are installed only at the site responsible for grid operations, or the site responsible for overall security of the Grid testbed. This layer is composed of a series of filtering steps, from which the output of each should be a single alert of higher priority, composed from an input of multiple lower priority alerts. The first of these filtering steps is the Alert Analysis; the second is the Alert Correlation Engine. Installation of the Security Monitoring component is described in the installation guide [3]. 1.1 Abbreviations and Acronyms API DN EDG EGEE GMA RDBMS R-GMA SQL Application Programming Interface Distinguished Name European DataGrid Enabling Grids for e-science in Europe Grid Monitoring Architecture Relational Database Management System Relational Grid Monitoring Architecture Structured Query Language 1.2 References and Source Code The full source code for the Security Monitoring component can be found in the int.eu.grid repository. Please refer to for details on how to obtain it. The source code can also be browsed at the following address: References can be found in the bibliography. User Guide PUBLIC 5/13

6 Chapter 2. Product Usage 2 Product Usage The Security Monitoring component (SM) is responsible for monitoring the state of security of the site, and for reporting detected security events to the Operations Centre. The monitoring is performed by standard security tools (e.g., Snort [5], Tripwire [6]), which have been R-GMA-enabled. In the current implementation the security tool used is Snort, an open-source network-based intrusion detection system. An output-plugin has been provided for Snort that makes use of the R-GMA Producer API to stream any alerts logged by Snort to the R-GMA. In order for the security events detected and published by the SM to be collected at the operations centre a second R-GMA component, a SecondaryProducer is used. A SecondaryProducer aggregates streams from multiple Producers and stores the information into a MySQL database. By running a SecondaryProducer at the Operations Centre that queries for the events being published by the SM, all the events can be aggregated to form a security alert archive. 2.1 Running the Product Operating Requirements Local Software Requirements A full dependency list for the SM is given in the installation guide. RPMs have currently only been tested on Scientific Linux v3.0.x and v4.3. Grid Infrastructure Requirements In order to operate the SM access is required to an R-GMA server. Currently a centralised R-GMA server is hosted at TCD for the int.eu.grid testbed. This hosts the R-GMA Registry (used to store the locations of the producers of information). It also hosts the producer servlets needed by the producers. If the SM is being setup outside the int.eu.grid testbed then an R-GMA server must be available for it to use. The machine hosting the SM must have a valid host certificate Step-by-Step User Setup This section will describe how to configure the system in order to operate the SM. The SM provides an output plugin for the open-source network intrusion detection system Snort. A detailed description of the usage of Snort can be found in the Snort user guide [4]. To configure the Snort R-GMA output plugin the Snort configuration file /etc/snort/snort.conf should be edited. If Snort has been configured using YAIM, then no modifications should be necessary. The format of the configuration for the R-GMA output module is as follows: output rgma: <log alert>, <site id>, <parameter list> The logging method and site ID must be defined. There are two logging types available, log and alert. Setting the type to log attaches the logging functionality to the log facility within the program. If you set the type to log, the plugin will be called on the log output chain. Setting the type to alert attaches the plugin to the alert output chain within the program. The site ID should be set to the correct value for 6/13 PUBLIC User Guide

7 2.2. Basic Operation the site on which the monitoring component is running (e.g., TCD-I2G). The available parameters are described below. The parameter list consists of key value pairs. The proper format is a space separated list of key=value pairs. x509userproxy Specify the location of the proxy file to use for secure connections to R-GMA. trustfile Specify the location of the trustfile to use for secure connections. encoding hex (default) Represent binary data as a hex string. base64 Represent binary data as a base64 string. ascii Represent binary data as an ASCII string. detail full (default) Log all details of a packet that caused an alert (including IP/TCP options and the payload) Example: fast Log only a minimum amount of data. output rgma: log, TCD-I2G, trustfile=/opt/glite/etc/rgma/clientauthentication.props detail=full The value for x509userproxy or trustfile should be set. An example of the format of a trustfile is as follows: sslcertfile=/etc/grid-security/hostcert.pem sslkey=/etc/grid-security/hostkey.pem crlenabled=true crlfiles=/etc/grid-security/certificates/*.r0 sslcafiles=/etc/grid-security/certificates/*.0 It is important that the host certficate and key used can be read by the Snort user. Otherwise Snort must be started as root. 2.2 Basic Operation During installation a link should have been created from /usr/sbin/snort to /usr/sbin/snort-rgma. If this is so, the Snort service can be controlled using the init.d script /etc/init.d/snortd. The usage is as follows: /etc/init.d/snortd {start stop reload restart condrestart status stats (long opt)} Once started Snort will begin publishing any detected alerts to the R-GMA information system. 2.3 Advanced Features This section deals with the more advanced use of the SM, i.e., the addition of new security monitoring tools. In order for a security tool to add its information to the system it must be enabled to publish detected alerts to the ASI R-GMA tables. To do this the R-GMA Producer API must be used. This API is available in a several languages, Java, C, C++, Perl, and Python. Full documentation of the APIs is available on the R-GMA website [2]. Three tables are currently used by the SM to publish alert data: User Guide PUBLIC 7/13

8 Chapter 2. Product Usage ASIAnalyser Stores information about the security tool that detected the alert. ASIAlert Stores details about the alert. ASIService Stores more detailed information about the service involved in the alert. The format of these tables is based on the IDMEF standard [1]. To send an alert to the ASI, the security tool should format its alert output to match the schema of these tables, and then use the Producer API to publish to them. In the case of Snort, an output plugin has been provided that performs these steps. If more application specific information is required that cannot be accommodated by the exisiting table structures, additional tables can be easily added to the system. This is accomplished by declaring the tables using the R-GMA Schema API. In this instance an additional SecondaryProducer would also be required in order to archive the additional tables. The following code shows how to publish an alert to the ASIAlert table using the R-GMA Java API. private void p u b l i s h A l e r t ( ) { ProducerFactory f a c t o r y = new ProducerFactoryStub ( ) ; TimeInterval t i = new TimeInterval (20, Units.MINUTES) ; TimeInterval rp = new TimeInterval ( 5, Units.MINUTES) ; ProducerProperties props = new ProducerProperties ( Storage.MEMORY, 0 ) ; PrimaryProducer pp ; try { pp = f a c t o r y. createprimaryproducer ( t i, props ) ; pp. d e c l a r e T a b l e ( ASIAlert, WHERE ( s i t e i d = TCD I2G ), rp, rp ) ; } S t r i n g a l e r t = INSERT INTO ASIAlert ( s i t e i d, a n a l y z e r i d, ident, createtime, c l a s s i f i c a t i o n, detecttime, analyzertime, source, target, s e v e r i t y ) VALUES ( TCD I2G, Snort Analyzer 1, 1, : 2 3 : , ( portscan ) TCP Portsweep, : 2 3 : , : 2 3 : , , , low ) ; pp. i n s e r t ( i n s e r t ) ; pp. c l o s e ( ) ; } catch ( RemoteException ex ) { System. e r r. p r i n t l n ( Unable to p u b l i s h to R GMA: + ex. getmessage ( ) ) ; } catch ( UnknownResourceException ex ) { System. e r r. p r i n t l n ( Unable to p u b l i s h to R GMA: + ex. getmessage ( ) ) ; } catch ( RGMAException ex ) { System. e r r. p r i n t l n ( Unable to p u b l i s h to R GMA: + ex. getmessage ( ) ) ; } 8/13 PUBLIC User Guide

9 2.3. Advanced Features In this code, first a continuous PrimaryProducer is first created. This producer type will stream published tuples to the R-GMA information system. Next the table that we wish to publish to, ASIAlert, is declared. The SQL INSERT statement is then created for the alert, and inserted using the created PrimaryProducer. Once the insert is completed the PrimaryProducer is closed. This alert has now been published to the R-GMA. The SecondaryProducer of the Alert Analysis component, which should be running at the Operations Centre, will now receive and archive this alert in the security alert archive database. The full schema for the current set of ASI R-GMA tables is given in the Appendix A. User Guide PUBLIC 9/13

10 Chapter 3. EDG License Agreement 3 EDG License Agreement Copyright (c) 2005 CrossGrid. All rights reserved. This software includes voluntary contributions made to the CrossGrid Project. For more information on CrossGrid, please see Installation, use, reproduction, display, modification and redistribution of this software, with or without modification, in source and binary forms, are permitted. Any exercise of rights under this license by you or your sub-licensees is subject to the following conditions: 1. Redistributions of this software, with or without modification, must reproduce the above copyright notice and the above license statement as well as this list of conditions, in the software, the user documentation and any other materials provided with the software. 2. The user documentation, if any, included with a redistribution, must include the following notice: This product includes software developed by the CrossGrid Project ( Alternatively, if that is where third-party acknowledgments normally appear, this acknowledgment must be reproduced in the software itself. 3. The names CrossGrid and CG may not be used to endorse or promote software, or products derived therefrom, except with prior written permission by cgoffice@cyfronet.krakow.pl. 4. You are under no obligation to provide anyone with any bug fixes, patches, upgrades or other modifications, enhancements or derivatives of the features, functionality or performance of this software that you may develop. However, if you publish or distribute your modifications, enhancements or derivative works without contemporaneously requiring users to enter into a separate written license agreement, then you are deemed to have granted participants in the CrossGrid Project a worldwide, non-exclusive, royalty-free, perpetual license to install, use, reproduce, display, modify, redistribute and sub-license your modifications, enhancements or derivative works, whether in binary or source code form, under the license conditions stated in this list of conditions. 5. DISCLAIMER THIS SOFTWARE IS PROVIDED BY THE CROSSGRID PROJECT AND CONTRIBUTORS S ISAND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, OF SATISFACTORY QUALITY, AND FIT- NESS FOR A PARTICULAR PURPOSE OR USE ARE DISCLAIMED. THE CROSSGRID PROJECT AND CONTRIBUTORS MAKE NO REPRESENTATION THAT THE SOFTWARE, MODIFICA- TIONS, ENHANCEMENTS OR DERIVATIVE WORKS THEREOF, WILL NOT INFRINGE ANY PATENT, COPYRIGHT, TRADE SECRET OR OTHER PROPRIETARY RIGHT. 6. LIMITATION OF LIABILITY THE CROSSGRID PROJECT AND CONTRIBUTORS SHALL HAVE NO LIABILITY TO LICENSEE OR OTHER PERSONS FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL, EXEMPLARY, OR PUNITIVE DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIM- ITATION, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, LOSS OF USE, DATA OR PROFITS, OR BUSINESS INTERRUPTION, HOWEVER CAUSED AND ON ANY THEORY OF CONTRACT, WARRANTY, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY OR OTH- ERWISE, ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 10/13 PUBLIC User Guide

11 A ASI R-GMA Table Schema A.1 Table: ASIAnalyzer siteid NOT NULL PRIMARY KEY analyzerid NOT NULL PRIMARY KEY name manufacturer model version class ostype osversion MeasurementDate DATE NOT NULL MeasurementTime TIME NOT NULL A.2 Table: ASIAlert siteid NOT NULL PRIMARY KEY analyzerid NOT NULL PRIMARY KEY ident INTEGER createtime classification detecttime analyzertime source target severity additional data VARCHAR(5000) correlation VARCHAR(5000) MeasurementDate DATE NOT NULL MeasurementTime TIME NOT NULL A.3 Table: ASIService siteid analyzerid ident ip addr ip version iana protocol number iana protocol name name port NOT NULL PRIMARY KEY NOT NULL PRIMARY KEY INTEGER VARCHAR(50) INTEGER INTEGER INTEGER User Guide PUBLIC 11/13

12 Appendix A. ASI R-GMA Table Schema MeasurementDate DATE NOT NULL MeasurementTime TIME NOT NULL 12/13 PUBLIC User Guide

13 Bibliography Bibliography [1] IETF Intrusion Detection Exchange Format Working Group. The intrusion detection message exchange format. [2] EGEE JRA1. R-gma. [3] Security monitoring installation guide. [4] Snort. Snort users manual. htmanuals/htmanual 261/. [5] Snort. April [6] Open source Tripwire. April User Guide PUBLIC 13/13

Installation Guide. How to install the Active Security monitoring component for int.eu.grid JRA1

Installation Guide. How to install the Active Security monitoring component for int.eu.grid JRA1 Installation Guide How to install the Active Security monitoring component for int.eu.grid JRA1 Document Filename: Workpackage: Partner(s): Lead Partner: Config ID: Document classification: Installation

More information

IETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008

IETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008 IETF TRUST Legal Provisions Relating to IETF Documents Approved November 6, 2008 Effective Date: November 10, 2008 1. Background The IETF Trust was formed on December 15, 2005, for, among other things,

More information

IETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009

IETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009 IETF TRUST Legal Provisions Relating to IETF Documents February 12, 2009 Effective Date: February 15, 2009 1. Background The IETF Trust was formed on December 15, 2005, for, among other things, the purpose

More information

Ecma International Policy on Submission, Inclusion and Licensing of Software

Ecma International Policy on Submission, Inclusion and Licensing of Software Ecma International Policy on Submission, Inclusion and Licensing of Software Experimental TC39 Policy This Ecma International Policy on Submission, Inclusion and Licensing of Software ( Policy ) is being

More information

Ecma International Policy on Submission, Inclusion and Licensing of Software

Ecma International Policy on Submission, Inclusion and Licensing of Software Ecma International Policy on Submission, Inclusion and Licensing of Software Experimental TC39 Policy This Ecma International Policy on Submission, Inclusion and Licensing of Software ( Policy ) is being

More information

Bar Code Discovery. Administrator's Guide

Bar Code Discovery. Administrator's Guide Bar Code Discovery Administrator's Guide November 2012 www.lexmark.com Contents 2 Contents Overview...3 Configuring the application...4 Configuring the application...4 Configuring Bar Code Discovery...4

More information

US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Service Data Objects (SDO) DFED Sample Application README Copyright IBM Corporation, 2012, 2013 US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract

More information

Intel Stress Bitstreams and Encoder (Intel SBE) 2017 AVS2 Release Notes (Version 2.3)

Intel Stress Bitstreams and Encoder (Intel SBE) 2017 AVS2 Release Notes (Version 2.3) Intel Stress Bitstreams and Encoder (Intel SBE) 2017 AVS2 Release Notes (Version 2.3) Overview Changes History Installation Package Contents Known Limitations Attributions Legal Information Overview The

More information

Open Source Used In TSP

Open Source Used In TSP Open Source Used In TSP 3.5.11 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices.

More information

OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA)

OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA) OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA) This is a License Agreement (the "Agreement") for certain code (the Software ) owned by Akamai Technologies, Inc. ( Akamai ) that is useful in connection

More information

SMS2CMDB Project Summary v1.6

SMS2CMDB Project Summary v1.6 SMS2CMDB Project Summary v1.6 Project Abstract SMS2CMDB provides the capability to integrate Microsoft Systems Management Server (MS- SMS) data with BMC Atrium CMDB (Atrium CMDB) and the BMC Remedy Asset

More information

License, Rules, and Application Form

License, Rules, and Application Form Generic Interface for Cameras License, Rules, and Application Form GenICam_License.doc Page 1 of 11 Table of Contents 1 OVERVIEW... 4 2 SUBJECT OF THE GENICAM LICENSE... 4 3 RULES FOR STANDARD COMPLIANCY...

More information

Open Source Used In Cisco Configuration Professional for Catalyst 1.0

Open Source Used In Cisco Configuration Professional for Catalyst 1.0 Open Source Used In Cisco Configuration Professional for Catalyst 1.0 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on

More information

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program )

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program ) PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program ) IN ADDITION TO THE LICENSE TERMS SET OUT IN THE SYBASE LICENSE AGREEMENT, THE FOLLOWING ADDITIONAL OR DIFFERENT

More information

Grid-wide Intrusion Detection

Grid-wide Intrusion Detection Grid-wide Intrusion Detection Stuart Kenny and Brian Coghlan Trinity College Dublin, Ireland email: [stuart.kenny, coghlan]@cs.tcd.ie phone: (+353 1) 6081797, fax: (+353 1) 6772204 Abstract We describe

More information

SDLC INTELLECTUAL PROPERTY POLICY

SDLC INTELLECTUAL PROPERTY POLICY SDLC INTELLECTUAL PROPERTY POLICY Last Revised: 11/14/17 1. Introduction. This Intellectual Property Policy ( Policy ) governs intellectual property rights of the SDL Consortium ( SDLC ) and its Members

More information

Compatibility Matrix. Good Control and Good Proxy. June 4, 2018

Compatibility Matrix. Good Control and Good Proxy. June 4, 2018 Compatibility Matrix Good Control and Good Proxy June 4, 2018 Published: 2018-06-04 SWD-20180604161707961 Contents Introduction... 4 Legend... 4 Good Control server... 5 Operating system...5 Database server...5

More information

User Manual for Video Codec

User Manual for Video Codec User Manual for Video Codec CONTENTS OF THIS DOCUMENT This document contains the following sections: 1 Overview 2 System Requirements 3 Language Support 4 Installing the Software jdk installation jmf installation

More information

Panasonic Audio Player 2 User Guide

Panasonic Audio Player 2 User Guide Panasonic Audio Player 2 User Guide ASIO is a trademark and software of Steinberg Media Technologies GmbH. Overview Panasonic Audio Player 2 is simple GUI audio player software for Windows and Mac OS with

More information

Additional License Authorizations for HPE OneView for Microsoft Azure Log Analytics

Additional License Authorizations for HPE OneView for Microsoft Azure Log Analytics Additional License Authorizations for HPE OneView for Microsoft Azure Log Analytics Product Use Authorizations This document provides Additional License Authorizations for HPE OneView for Microsoft Azure

More information

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Enterprise Edition ( Program )

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Enterprise Edition ( Program ) PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Enterprise Edition ( Program ) IN ADDITION TO THE LICENSE TERMS SET OUT IN THE SYBASE LICENSE AGREEMENT, THE FOLLOWING ADDITIONAL OR DIFFERENT

More information

QuarkXPress Server Manager 8.0 ReadMe

QuarkXPress Server Manager 8.0 ReadMe QuarkXPress Server Manager 8.0 ReadMe CONTENTS Contents QuarkXPress Server Manager 8.0 ReadMe...3 What's New in QuarkXPress Server Manager 8...4 Deprecated features, new stubs, and deploying SDK classes...4

More information

Technics Audio Player User Guide

Technics Audio Player User Guide Technics Audio Player User Guide Overview Technics Audio Player is simple GUI audio player software for Windows and Mac OS with high-resolution audio data processing capabilities. When connected to Technics

More information

HALCoGen TMS570LS31x Help: example_sci_uart_9600.c

HALCoGen TMS570LS31x Help: example_sci_uart_9600.c Page 1 of 6 example_sci_uart_9600.c This example code configures SCI and transmits a set of characters. An UART receiver can be used to receive this data. The scilin driver files should be generated with

More information

APPLICATION NOTE. Atmel AT03261: SAM D20 System Interrupt Driver (SYSTEM INTERRUPT) SAM D20 System Interrupt Driver (SYSTEM INTERRUPT)

APPLICATION NOTE. Atmel AT03261: SAM D20 System Interrupt Driver (SYSTEM INTERRUPT) SAM D20 System Interrupt Driver (SYSTEM INTERRUPT) APPLICATION NOTE Atmel AT03261: SAM D20 System Interrupt Driver (SYSTEM INTERRUPT) ASF PROGRAMMERS MANUAL SAM D20 System Interrupt Driver (SYSTEM INTERRUPT) This driver for SAM D20 devices provides an

More information

ANZ TRANSACTIVE MOBILE for ipad

ANZ TRANSACTIVE MOBILE for ipad ANZ TRANSACTIVE MOBILE for ipad CORPORATE CASH AND TRADE MANAGEMENT ON THE GO QUICK REFERENCE GUIDE April 2016 HOME SCREEN The home screen provides immediate visibility of your favourite accounts and transactions

More information

HYDRODESKTOP VERSION 1.4 QUICK START GUIDE

HYDRODESKTOP VERSION 1.4 QUICK START GUIDE HYDRODESKTOP VERSION 1.4 QUICK START GUIDE A guide to using this free and open source application for discovering, accessing, and using hydrologic data February 8, 2012 by: Tim Whiteaker Center for Research

More information

SkyPilot OS Installation: Fedora Core 5

SkyPilot OS Installation: Fedora Core 5 SkyPilot OS Installation: Fedora Core 5 PN 671-00024-01 2006 SkyPilot Networks, Inc. All rights reserved This publication, or parts thereof, may not be reproduced in any form, by any method, for any purpose.

More information

ColdFusion Builder 3.2 Third Party Software Notices and/or Additional Terms and Conditions

ColdFusion Builder 3.2 Third Party Software Notices and/or Additional Terms and Conditions ColdFusion Builder 3.2 Third Party Software Notices and/or Additional Terms and Conditions Date Generated: 2018/09/10 Apache Tomcat ID: 306 Apache Foundation and Contributors This product includes software

More information

Packet Trace Guide. Packet Trace Guide. Technical Note

Packet Trace Guide. Packet Trace Guide. Technical Note Packet Trace Guide Technical Note VERSION: 2.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo

More information

TECHNICAL REPORT TR-027. SNMP-based ADSL LINE MIB. Issue: 1.0 Issue Date: September The Broadband Forum. All rights reserved.

TECHNICAL REPORT TR-027. SNMP-based ADSL LINE MIB. Issue: 1.0 Issue Date: September The Broadband Forum. All rights reserved. TECHNICAL REPORT Issue: 1.0 Issue Date: September 1999 The Broadband Forum. All rights reserved. Notice The Broadband Forum is a non-profit corporation organized to create guidelines for broadband network

More information

KEMP Driver for Red Hat OpenStack. KEMP LBaaS Red Hat OpenStack Driver. Installation Guide

KEMP Driver for Red Hat OpenStack. KEMP LBaaS Red Hat OpenStack Driver. Installation Guide KEMP LBaaS Red Hat OpenStack Driver Installation Guide VERSION: 2.0 UPDATED: AUGUST 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP

More information

Installation and Configuration Guide Simba Technologies Inc.

Installation and Configuration Guide Simba Technologies Inc. Simba JDBC Driver with SQL Connector for Cloud Spanner Installation and Configuration Guide Simba Technologies Inc. Version 1.0.7 May 19, 2017 Copyright 2017 Simba Technologies Inc. All Rights Reserved.

More information

TERMS & CONDITIONS. Complied with GDPR rules and regulation CONDITIONS OF USE PROPRIETARY RIGHTS AND ACCEPTABLE USE OF CONTENT

TERMS & CONDITIONS. Complied with GDPR rules and regulation CONDITIONS OF USE PROPRIETARY RIGHTS AND ACCEPTABLE USE OF CONTENT TERMS & CONDITIONS www.karnevalkings.com (the "Site") is a website and online service owned and operated by the ViisTek Media group of companies (collectively known as "Karnevalkings.com", "we," "group",

More information

Oracle Auto Service Request

Oracle Auto Service Request Oracle Auto Service Request Exadata Database Machine Quick Installation Guide Release 4.5 E23333-07 July 2013 Oracle Auto Service Request (ASR) is a secure, scalable, customer-installable software feature

More information

Distributed Intelligent Capture. Integration Guide

Distributed Intelligent Capture. Integration Guide Distributed Intelligent Capture Integration Guide July 2014 www.lexmark.com Contents 2 Contents Overview... 3 Getting started... 4 Understanding the integration process... 4 Configuring the engines...

More information

pyserial-asyncio Documentation

pyserial-asyncio Documentation pyserial-asyncio Documentation Release 0.4 pyserial-team Feb 12, 2018 Contents 1 Short introduction 3 2 pyserial-asyncio API 5 2.1 asyncio.................................................. 5 3 Appendix

More information

iwrite technical manual iwrite authors and contributors Revision: 0.00 (Draft/WIP)

iwrite technical manual iwrite authors and contributors Revision: 0.00 (Draft/WIP) iwrite technical manual iwrite authors and contributors Revision: 0.00 (Draft/WIP) June 11, 2015 Chapter 1 Files This section describes the files iwrite utilizes. 1.1 report files An iwrite report consists

More information

MUMPS IO Documentation

MUMPS IO Documentation MUMPS IO Documentation Copyright (c) 1999, 2000, 2001, 2002, 2003 Raymond Douglas Newman. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted

More information

Intercloud Federation using via Semantic Resource Federation API and Dynamic SDN Provisioning

Intercloud Federation using via Semantic Resource Federation API and Dynamic SDN Provisioning Intercloud Federation using via Semantic Resource Federation API and Dynamic SDN Provisioning David Bernstein Deepak Vij Copyright 2013, 2014 IEEE. All rights reserved. Redistribution and use in source

More information

Table of Contents Overview...2 Selecting Post-Processing: ColorMap...3 Overview of Options Copyright, license, warranty/disclaimer...

Table of Contents Overview...2 Selecting Post-Processing: ColorMap...3 Overview of Options Copyright, license, warranty/disclaimer... 1 P a g e ColorMap Post-Processing Plugin for OpenPolScope software ColorMap processing with Pol-Acquisition and Pol-Analyzer plugin v. 2.0, Last Modified: April 16, 2013; Revision 1.00 Copyright, license,

More information

Open Source Used In c1101 and c1109 Cisco IOS XE Fuji

Open Source Used In c1101 and c1109 Cisco IOS XE Fuji Open Source Used In c1101 and c1109 Cisco IOS XE Fuji 16.8.1 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco

More information

Copyright PFU LIMITED

Copyright PFU LIMITED -------------------------------------------------------- PaperStream Capture 1.0.12 README File -------------------------------------------------------- Copyright PFU LIMITED 2013-2015 This file contains

More information

Installing the Shrew Soft VPN Client

Installing the Shrew Soft VPN Client Windows Install Installing the Shrew Soft VPN Client ShrewVPNWindows201211-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:

More information

CA File Master Plus. Release Notes. Version

CA File Master Plus. Release Notes. Version CA File Master Plus Release Notes Version 9.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for

More information

NemHandel Referenceklient 2.3.1

NemHandel Referenceklient 2.3.1 OIO Service Oriented Infrastructure NemHandel Referenceklient 2.3.1 Release Notes Contents 1 Introduction... 3 2 Release Content... 3 3 What is changed?... 4 3.1 NemHandel Referenceklient version 2.3.1...

More information

JD Edwards EnterpriseOne 8.12 Standalone Client Installation Guide. for the Oracle Application Server

JD Edwards EnterpriseOne 8.12 Standalone Client Installation Guide. for the Oracle Application Server JD Edwards EnterpriseOne 8.12 Standalone Client Installation Guide for the Oracle Application Server April 2006 JD Edwards EnterpriseOne 8.12 Standalone Client Installation Guide Copyright 2006, Oracle.

More information

NemHandel Referenceklient 2.3.0

NemHandel Referenceklient 2.3.0 OIO Service Oriented Infrastructure OIO Service Oriented Infrastructure NemHandel Referenceklient 2.3.0 Release Notes Contents 1 Introduction... 3 2 Release Content... 3 3 What is changed?... 4 3.1 NemHandel

More information

Towards a Grid-wide Intrusion Detection System

Towards a Grid-wide Intrusion Detection System Towards a Grid-wide Intrusion Detection System Stuart Kenny and Brian Coghlan {stuart.kenny, coghlan}@cs.tcd.ie Trinity College Dublin, Ireland Abstract. We describe SANTA-G (Grid-enabled System Area Networks

More information

AT03262: SAM D/R/L/C System Pin Multiplexer (SYSTEM PINMUX) Driver. Introduction. SMART ARM-based Microcontrollers APPLICATION NOTE

AT03262: SAM D/R/L/C System Pin Multiplexer (SYSTEM PINMUX) Driver. Introduction. SMART ARM-based Microcontrollers APPLICATION NOTE SMART ARM-based Microcontrollers AT03262: SAM D/R/L/C System Pin Multiplexer (SYSTEM PINMUX) Driver APPLICATION NOTE Introduction This driver for Atmel SMART ARM -based microcontrollers provides an interface

More information

FOR TCG ACPI Specification

FOR TCG ACPI Specification ERRATA Errata Version 0.3 August 25, 2017 FOR TCG ACPI Specification Specification Version 1.20 Revision 8 January 19th, 2017 Contact: admin@trustedcomputinggroup.org Copyright TCG 2017 Disclaimers, Notices,

More information

Scott Auge

Scott Auge Scott Auge sauge@amduus.com Amduus Information Works, Inc. http://www.amduus.com Page 1 of 14 LICENSE This is your typical BSD license. Basically it says do what you want with it - just don't sue me. Written

More information

Explaining & Accessing the SPDX License List

Explaining & Accessing the SPDX License List Explaining & Accessing the SPDX License List SOFTWARE PACKAGE DATA EXCHANGE Gary O Neall Source Auditor Inc. Jilayne Lovejoy ARM August, 2014 Copyright Linux Foundation 2014 1 The SPDX License List 2 The

More information

Copyright PFU LIMITED 2016

Copyright PFU LIMITED 2016 -------------------------------------------------------- PaperStream Capture Lite 1.0.1 README File -------------------------------------------------------- Copyright PFU LIMITED 2016 This file contains

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide BlackBerry Blend Version 1.2 Published: 2015-07-06 SWD-20150706173035792 Contents About BlackBerry Blend... 4 BlackBerry Blend architecture... 4 Security... 5 IT policy

More information

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0 Maintenance Release: 1. Release Notes

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0 Maintenance Release: 1. Release Notes BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Maintenance Release: 1 Release Notes Published: 2013-07-18 SWD-20130718144837059 Contents 1 New in this release...4 2 Fixed issues...5

More information

System Log NextAge Consulting Pete Halsted

System Log NextAge Consulting Pete Halsted System Log NextAge Consulting Pete Halsted 110 East Center St. #1035 Madison, SD 57042 pete@thenextage.com www.thenextage.com www.thenextage.com/wordpress Table of Contents Table of Contents BSD 3 License

More information

ERRATA FOR. Protection Profile PC Client Specific TPM. Errata Version 1.0 June 16, 2018 DRAFT. Specification Version 1.

ERRATA FOR. Protection Profile PC Client Specific TPM. Errata Version 1.0 June 16, 2018 DRAFT. Specification Version 1. ERRATA Errata Version 1.0 June 16, 2018 DRAFT FOR Protection Profile PC Client Specific TPM June 16, 2018 Contact: admin@trustedcomputinggroup.org Copyright TCG 2003-2018 Disclaimers, Notices, and License

More information

Site Impact Policies for Website Use

Site Impact Policies for Website Use Site Impact Policies for Website Use Thank you for visiting the Site Impact website (the Website ). We have set up some ground rules to ensure protection of our rights and yours. Site Impact reserves the

More information

Documentation Roadmap for Cisco Prime LAN Management Solution 4.2

Documentation Roadmap for Cisco Prime LAN Management Solution 4.2 Documentation Roadmap for Cisco Prime LAN Thank you for purchasing Cisco Prime LAN Management Solution (LMS) 4.2. This document provides an introduction to the Cisco Prime LMS and lists the contents of

More information

Open Source and Standards: A Proposal for Collaboration

Open Source and Standards: A Proposal for Collaboration ETSI Workshop on Open Source and ization: Legal Interactions September 16, 2016 Sophia Antipolis Open Source and s: A Proposal for Collaboration David Marr VP & Legal Counsel Open Source Group Qualcomm

More information

RTI Secure WAN Transport

RTI Secure WAN Transport RTI Secure WAN Transport Core Libraries and Utilities Release Notes Version 5.1.0 2013 Real-Time Innovations, Inc. All rights reserved. Printed in U.S.A. First printing. December 2013. Trademarks Real-Time

More information

Avaya VPN Client Software Release 10.05_100

Avaya VPN Client Software Release 10.05_100 Avaya VPN Client Software Release 10.05_100 1. Release Summary Release Date: September 1 st, 2011 Purpose: Software maintenance release to address customer requests and software issues. 2. Important Notes

More information

Customer Support: For more information or support, please visit or at Product Release Information...

Customer Support: For more information or support, please visit   or  at Product Release Information... Product Release Information Product: Cyberoam Release Number: 9.3.0 build 5 Release Date: 19th July 2006 Compatible versions: 9.2.0 build 2 Upgrade Mode: Manual 1 Important note Upgrade removes all the

More information

Mile Terms of Use. Effective Date: February, Version 1.1 Feb 2018 [ Mile ] Mileico.com

Mile Terms of Use. Effective Date: February, Version 1.1 Feb 2018 [ Mile ] Mileico.com Mile Terms of Use Effective Date: February, 2018 Version 1.1 Feb 2018 [ Mile ] Overview The following are the terms of an agreement between you and MILE. By accessing, or using this Web site, you acknowledge

More information

MQ Port Scan Installation and Operation Manual

MQ Port Scan Installation and Operation Manual MQ Port Scan Installation and Operation Manual Capitalware Inc. Unit 11, 1673 Richmond Street, PMB524 London, Ontario N6G2N3 Canada sales@capitalware.com http://www.capitalware.com MQPS Installation and

More information

Bar Code Discovery. Administrator's Guide

Bar Code Discovery. Administrator's Guide Bar Code Discovery Administrator's Guide September 2016 www.lexmark.com Contents 2 Contents Overview... 3 Optimizing bar code detection...4 Optimizing bar code detection...4 Configuring the application...5

More information

Release Notes. BlackBerry UEM Client for Android Version

Release Notes. BlackBerry UEM Client for Android Version Release Notes BlackBerry UEM Client for Android Version 12.27.0.153083 Published: 2017-01-13 SWD-20170113121937594 Contents What's new...4 Fixed issues...5 Known issues... 6 Legal notice...7 What's new

More information

D3.5 Mockups of the CROWD4ROADS mobile app

D3.5 Mockups of the CROWD4ROADS mobile app CROWD4ROADS CROWD sensing and ride sharing FOR ROAD Sustainability Project Number: 687959 D3.5 Mockups of the CROWD4ROADS mobile app Lead Beneficiary: Nature/Dissemination Level: Work Package/Task: Editor:

More information

SAM4 Reset Controller (RSTC)

SAM4 Reset Controller (RSTC) APPLICATION NOTE AT06864: SAM4 Reset Controller (RSTC) ASF PROGRAMMERS MANUAL SAM4 Reset Controller (RSTC) This driver for SAM devices provides an interface for the configuration and management of the

More information

Quick Start Guide. BlackBerry Workspaces app for Android. Version 5.0

Quick Start Guide. BlackBerry Workspaces app for Android. Version 5.0 Quick Start Guide BlackBerry Workspaces app for Android Version 5.0 Published: 2017-01-22 SWD-20170122060917401 Contents Overview... 4 Browse workspaces, folders, and files... 5 Create new workspaces,

More information

Tenable Hardware Appliance Upgrade Guide

Tenable Hardware Appliance Upgrade Guide Tenable Hardware Appliance Upgrade Guide June 4, 2012 (Revision 3) The newest version of this document is available at the following URL: http://static.tenable.com/prod_docs/tenable_hardware_appliance_upgrade.pdf

More information

VMware vcenter Log Insight Manager. Deployment Guide

VMware vcenter Log Insight Manager. Deployment Guide VMware vcenter Log Insight Manager Deployment Guide VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

Watch 4 Size v1.0 User Guide By LeeLu Soft 2013

Watch 4 Size v1.0 User Guide By LeeLu Soft 2013 Watch 4 Size v1.0 User Guide By LeeLu Soft 2013 Introduction Installation Start using W4S Selecting a folder to monitor Setting the threshold Setting actions Starting the monitor Live Log Using monitor

More information

User Guide. Calibrated Software, Inc.

User Guide. Calibrated Software, Inc. User Guide Calibrated Software, Inc. Copyright 2008 Calibrated Software, Inc. All rights reserved. www.calibratedsoftware.com Your rights to the software are governed by the accompanying Software License

More information

Definiens. Image Miner bit and 64-bit Editions. Release Notes

Definiens. Image Miner bit and 64-bit Editions. Release Notes Definiens Image Miner 2.0.2 32-bit and 64-bit Editions Release Notes Definiens Documentation: Image Miner 2.0.2 Release Notes Imprint 2012 Definiens AG. All rights reserved. This document may be copied

More information

AT11512: SAM L Brown Out Detector (BOD) Driver. Introduction. SMART ARM-based Microcontrollers APPLICATION NOTE

AT11512: SAM L Brown Out Detector (BOD) Driver. Introduction. SMART ARM-based Microcontrollers APPLICATION NOTE SMART ARM-based Microcontrollers AT11512: SAM L Brown Out Detector (BOD) Driver APPLICATION NOTE Introduction This driver for Atmel SMART ARM -based microcontrollers provides an interface for the configuration

More information

Migration Tool. Migration Tool (Beta) Technical Note

Migration Tool. Migration Tool (Beta) Technical Note Migration Tool (Beta) Technical Note VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo

More information

Preface. Audience. Cisco IOS Software Documentation. Organization

Preface. Audience. Cisco IOS Software Documentation. Organization This preface describes the audience, organization, and conventions of this publication, and provides information on how to obtain related documentation. Cisco documentation and additional literature are

More information

BlackBerry Enterprise Service 10. September 10, 2014 Version: 10 and 10.1.x. Compatibility Matrix

BlackBerry Enterprise Service 10. September 10, 2014 Version: 10 and 10.1.x. Compatibility Matrix BlackBerry Enterprise Service 10 September 10, 2014 Version: 10 and 10.1.x Compatibility Matrix Published: 2014-09-10 SWD-20140910144217710 Contents 1...4 Introduction...4 Legend... 4 Operating system...

More information

HYDROOBJECTS VERSION 1.1

HYDROOBJECTS VERSION 1.1 o HYDROOBJECTS VERSION 1.1 July, 2008 by: Tim Whiteaker Center for Research in Water Resources The University of Texas at Austin Distribution The HydroObjects software, source code, and documentation are

More information

OKI DICOM Embedded Printer DICOM Printing Function User's Guide

OKI DICOM Embedded Printer DICOM Printing Function User's Guide OKI DICOM Embedded Printer DICOM Printing Function User's Guide C610 DM / C711 DM / C831 DM / C910 DM ES6410 DM / ES7411 DM / ES8431 DM / ES9410 DM Important note: This manual describes all the functionalities

More information

SNP Launchpad. Version: December SNP Schneider-Neureither & Partner AG

SNP Launchpad. Version: December SNP Schneider-Neureither & Partner AG Version: 12.10 December 2012 SNP Schneider-Neureither & Partner AG Dossenheimer Landstr. 100 D-69121 Heidelberg Tel.: +49 6221 6425-0 Fax: +49 6221 6425-20 E-Mail: info@snp-ag.com www.snp-ag.com Page 1

More information

Entrust WAP Server Certificate Relying Party Agreement

Entrust WAP Server Certificate Relying Party Agreement Entrust WAP Server Certificate Relying Party Agreement The WAP/WTLS specification v1.1 does not provide a means for certificate revocation checking. The following Relying Party Agreement" provides further

More information

Data Deduplication Metadata Extension

Data Deduplication Metadata Extension Data Deduplication Metadata Extension Version 1.1c ABSTRACT: This document describes a proposed extension to the SNIA Cloud Data Management Interface (CDMI) International Standard. Publication of this

More information

AT10942: SAM Configurable Custom Logic (CCL) Driver. Introduction. SMART ARM-based Microcontrollers APPLICATION NOTE

AT10942: SAM Configurable Custom Logic (CCL) Driver. Introduction. SMART ARM-based Microcontrollers APPLICATION NOTE SMART ARM-based Microcontrollers AT10942: SAM Configurable Custom Logic (CCL) Driver APPLICATION NOTE Introduction This driver for Atmel SMART SAM devices provides an interface for the configuration and

More information

TWAIN driver User s Guide

TWAIN driver User s Guide 4037-9571-05 TWAIN driver User s Guide Contents 1 Introduction 1.1 System requirements...1-1 2 Installing the TWAIN Driver 2.1 Installation procedure...2-1 To install the software...2-1 2.2 Uninstalling...2-1

More information

python Roll: Users Guide 5.5 Edition

python Roll: Users Guide 5.5 Edition python Roll: Users Guide 5.5 Edition python Roll: Users Guide : 5.5 Edition Published May 08 2012 Copyright 2012 The copyright holder, and UC Regents Table of Contents Preface...iv 1. Installing the python

More information

Python Roll Users Guide. 6.2 Edition

Python Roll Users Guide. 6.2 Edition Python Roll Users Guide 6.2 Edition Python Roll Users Guide: 6.2 Edition Published May 07 2015 Copyright 2015 The copyright holder, and UC Regents Table of Contents Preface...iv 1. Installing the Python

More information

Release Information. Revision History. Version: build 018 Release Date: 23 rd November 2011

Release Information. Revision History. Version: build 018 Release Date: 23 rd November 2011 Version: 02.00.2 build 018 Release Date: 23 rd November 2011 Release Date Version 02.00.2 Build 018 23 rd November 2011 Release Information Release Type: General Availability Supported Cyberoam Versions:

More information

Static analysis for quality mobile applications

Static analysis for quality mobile applications Static analysis for quality mobile applications Julia Perdigueiro MOTODEV Studio for Android Project Manager Instituto de Pesquisas Eldorado Eric Cloninger Product Line Manager Motorola Mobility Life.

More information

RSA Two Factor Authentication

RSA Two Factor Authentication RSA Two Factor Authentication Feature Description VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

User Manual. Date Aug 30, Enertrax DAS Download Client

User Manual. Date Aug 30, Enertrax DAS Download Client EnertraxDL - DAS Download Client User Manual Date Aug 30, 2004 Page 1 Copyright Information Copyright 2004, Obvius Holdings, LLC. All rights reserved. Redistribution and use in source and binary forms,

More information

openresty / array-var-nginx-module

openresty / array-var-nginx-module 1 of 6 2/17/2015 11:20 AM Explore Gist Blog Help itpp16 + openresty / array-var-nginx-module 4 22 4 Add support for array variables to nginx config files 47 commits 1 branch 4 releases 2 contributors array-var-nginx-module

More information

Compatibility Matrix. BlackBerry UEM. March 26, 2018

Compatibility Matrix. BlackBerry UEM. March 26, 2018 Compatibility Matrix BlackBerry UEM March 26, 2018 Published: 2018-03-26 SWD-20180326105755902 Contents Introduction... 4 Legend... 4 BlackBerry UEM server...5 Operating system...5 Database server...5

More information

BlackBerry Enterprise Server Express for Microsoft Exchange

BlackBerry Enterprise Server Express for Microsoft Exchange BlackBerry Enterprise Server Express for Microsoft Exchange Compatibility Matrix March 25, 2013 2013 Research In Motion Limited. All rights reserved. www.rim.com Page: 1 Operating Systems: BlackBerry Enterprise

More information

MyCreditChain Terms of Use

MyCreditChain Terms of Use MyCreditChain Terms of Use Date: February 1, 2018 Overview The following are the terms of an agreement between you and MYCREDITCHAIN. By accessing, or using this Web site, you acknowledge that you have

More information

ServerStatus Installation and Operation Manual

ServerStatus Installation and Operation Manual ServerStatus Installation and Operation Manual Capitalware Inc. Unit 11, 1673 Richmond Street, PMB524 London, Ontario N6G2N3 Canada sales@capitalware.com http://www.capitalware.com ServerStatus Installation

More information

Fujitsu ScandAll PRO V2.1.5 README

Fujitsu ScandAll PRO V2.1.5 README -------------------------------------------------------- Fujitsu ScandAll PRO V2.1.5 README -------------------------------------------------------- Copyright PFU Limited 2007-2017 This file contains information

More information

TCG. TCG Certification Program. TNC Certification Program Suite. Document Version 1.1 Revision 1 26 September 2011

TCG. TCG Certification Program. TNC Certification Program Suite. Document Version 1.1 Revision 1 26 September 2011 TCG Certification Program TNC Certification Program Suite Document Version 1.1 Revision 1 26 September 2011 Contact: admin@trustedcomputinggroup.org TCG TCG PUBLISHED Copyright TCG 2009-2011 Copyright

More information