CALIFORNIA SOFTWARE LABS
|
|
- Silas Stafford
- 5 years ago
- Views:
Transcription
1 CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite 100 Pleasanton CA 94566, USA. Phone (925) Fax (925) info@cswl.com
2 A Technical Report Technical Expertise Level : Intermediate INDEX INTRODUCTION... 3 COM ADD-IN... 3 COM ADD-IN ARCHITECTURE... 4 ADD-IN REGISTRATION... 4 COM ADD-IN EVENT PROCEDURES... 5 ADD-IN OBJECT MODEL... 6 OUTLOOK OBJECT MODEL... 7 ENCRYPTION AND DECRYPTION FUNCTIONALITIES... 8 WORKING MODEL OF ENCRYPTION BASIC ARCHITECTURE Host Application COM Add-in Encryption/Decryption DLL STORAGE AND RETRIEVAL OF PASSWORD CONCLUSION CSWL Inc, Pleasanton, California - 2
3 INTRODUCTION Microsoft Office 2000, which is one of the widely used desktop applications, provides the solution provider the privilege for extending the capabilities of Office applications. Outlook 2000 supports COM Add-in, which extends the capabilities of an application in a tightly integrated way by taking advantage of that application s extensibility model, for this purpose. The security measures like digital ID or private /public-key pair that are implemented for the security is cumbersome to setup and is complicate for an average user to understand. So to make the task more users friendly, the encryption of the s using only public key, which can be a password, is recommended. In this article we have covered how a COM Add-in can be written so that it enhance the security of s send from the outlook 2000 by providing a security option which enables the user to encrypt and decrypt the s using password as the key. These passwords may be decided between the parties over the phone or some communication channels. COM Add-in COM Add-in is a technology introduced by Microsoft to help the developers to extend the already rich functionality found in the office applications. COM add-ins are DLLs or EXEs that are specially registered so they can be loaded by Office 2000 applications at startup. More tech-nically, a COM add-in for Office 2000 is any in-process or out-of-process COM object that implements the IDT-Extensibility2 interface and is set up properly in the registry. COM add-ins are compatible across all Microsoft Office products. This support across all Office products means you can write your add-in once, and then use the add-in in not only Outlook but also other Office products. CSWL Inc, Pleasanton, California - 3
4 COM Add-in Architecture In this COM Add-in architecture, the outlook application serves as the host for the Add-in and the Add-in that we write acts as the in-process COM server. Here we have used COM Add-in as a compiled DLL that has been registered so that Outlook knows how to load and communicate with the Add-in. Writing the add-in as a DLL, enhances the speed by running the code in-process with the host application and provides performance benefits. Since the Office application loads and connects to the add-in it controls the lifetime of the add-in. Add-in Registration The COM add-in technology also relies heavily on the system registry to determine which add-ins are available for the different Office products. The registry also tells the Outlook application how to load the add-in by putting certain configuration information into the registry. When writing registration information to the registry for the add-in, there are three values we need to write. They are 1)FriendlyName which specifies the name of the Add-in that will appear to the user in the Add-in Manager. 2)Description, this property contains the string that will appear at the bottom of the Add-in Manager when the user selects the addin.3)loadbehavior,which specifies the way the COM add-in should be loaded. The registry also specifies the users for whom the add-in should load. If we register the add-in under HKEY_LOCAL_MACHINE, it's made available to every user on the machine. And if it s under HKEY_CURRENT_USER, the add-in will be available to that particular user only. Office now stores the list of registered and connected add-ins in a sub key under the Office root. Office now uses the registry strictly to list all add-ins in the COM add-ins collection and uses the registry to store connected/disconnected state as well as boot or demand loaded information. Initially, once the Dll is made for the COM Add-in it is registered manually bycreating the keys for the respective office application (say,outlook) and set the CSWL Inc, Pleasanton, California - 4
5 values like FriendlyName, Description and LoadBehavior for the key. But Visual Studio 6.0 introduces an add-in registration mechanism that improves the add-in user's experience.visual Basic and Visual Studio improve the new registration mechanism by creating add-ins that auto-register via the DllRegisterServer entry point. Outlook 2000 uses the same solution for the Outlook 2000 add-ins. The Add-In Designer, included with Visual Basic 6.0, Visual Studio 6.0, and Outlook2000 Developer, will register Addin by itself under: HKEY_LOCAL_MACHINE\Software\Microsoft\Shared Tools\Addin Designer.Each application thereafter registered on the machine registers an Application Name key under the Addin Designer. The value under the Application Name key is used in the UI of the Add-in Designer in Visual Basic 6.0. When a designer is added to a Visual Basic 6.0 project, the user selects which application the add-in should be registered for and what the load behavior is. If the add-in works for multiple applications, more than one designer instance is added to the Visual Basic project, and each designer project item is set to a specific application. In the case of COM Add-ins in VC++ the registration is done manually by running regsvr32 which calls DllRegisterServer for creating the key and setting the properties. COM Add-in Event Procedures To work with Outlook 2000,the COM Add-ins must implement IDTExtensibility2 interface. The IDTExtensibility2 interface provides five event procedures that we must implement in our add-ins. The host, the outlook application, communicate with the add-in through these interface to tell it when the host application is done initializing, when the add-in has been loaded and disconnected etc. Outlook calls the methods of the interface, which are implemented when an add-in is connected to the application, whether through the Add-Ins dialog box or some other manner. Event procedures that we must implement in the COM add-in are CSWL Inc, Pleasanton, California - 5
6 OnConnection-Occurs when the Add-in is connected to the host application OnAddinsUpdate-fires whenever any changes are made to add-ins in the Add-in Manager. OnStarupComplete-fires when the start up of the host application is complete. OnBeginShutdown-fires before the host application begins its unloading process. OnDisconnection-fires when the add-in is disconnected from the host application. Add-In Object Model Add-in object Model has been used for the design of COM Add-in. Hierarchy of this model has been shown below. Hierarchy Application +---COMAddIns +---COMAddIn +---Application +---Connect +---Creator +---Description CSWL Inc, Pleasanton, California - 6
7 +---Guid +---Object +---Parent +---ProgID Outlook Object Model Outlook Object Model exposes many Objects with its properties, Collections and methods that can be made use of by any COM Add-ins for the Outlook. The COM Add-in that we have made for adding the security option for the s sent from outlook 2000, makes use of the following objects of the Outlook object model. Application Object-which is the root object in the object model, represents the entire Microsoft Outlook application and allows access to other objects in the Outlook hierarchy. NameSpace Object- represents an abstract root object for any data source. The object itself provides methods for logging in and out, accessing storage objects directly by ID, accessing certain special default folders directly, and accessing data sources owned by other users. Items Collection Object which comes under the Folders collection object of the NameSpace Object, represents a collection of Outlook item objects in a folder. Use items(index),where index is the name or index number, to return a single Outlook item. Explorers Collection Objects-which comes under the application Object, contains a set of explorer objects representing all explorers. Explorers property is used to return the Explorers collection from the Application object. Explorer Object- represents the window in which the contents of a folder are displayed. ActiveExplorer is used to return the currently active explorer. CommandBars Collection Objects-which comes under the explorers collection objects, contains a collection of CommandBar objects presented in the container application. This is used to get the toolbar or the CSWL Inc, Pleasanton, California - 7
8 menubar present in the container application. By using CommandBars (index), we can get the toolbar or the menubar. Then apply the CommandBar property to the pop-up control to return the command bar that represents that menu. Inspectors Collection Object-which comes under the application object, represents all set of inspector objects representing all inspectors. Inspectors collection is returned from the Application object by using Inspectors property. Inspector Object-represents the window in which an Outlook is displayed. The Active Inspector method is used to return the handle for currently active child window. Encryption And Decryption Functionalities Crypto API functions, which can make use of password as the public, key for the encryption and decryption is used here for the purpose. Here we have chosen RC4- Stream cipher algorithm. The two crypto API functions used for these purpose are. CryptEncrypt -which encrypts a block or stream of data using the specified encryption key and CryptDecrypt.-which decrypts a block or stream of data using the specified encryption key. Encrypting a Message The steps involved in the encryption of message are : Creating a Key The symmetric key(session key) used for encryption is obtained by using the following functions. CryptAcquireContext-This function is used to get a handle to a particular key container within a particular cryptographic service provider(csp),which is needed for the function that creates the symmetric key for encryption by using the password. CSWL Inc, Pleasanton, California - 8
9 CryptAcquireContext (& phprov, szcontainer,szprovider,provtype,dwflags). phprov parameter of this function gives the handle to cryptographic service provider. To use password for creating the symmetric key, first hashing of the password is to be done. This is done by the following two functions. CryptCreateHash- It creates and returns to the calling application a handle to a CSP hash object. CryptCreateHash( hprov, Algid, hkey, dwflags,&phhash) CryptHashData- This function adds password to the hash object,returned by the above function. CryptHashData( hhash, &pbdata, dwdatalen, dwflags) CryptDeriveKey-This function transforms the password that has been fed to the hash object to the symmetric key, which is used for encryption. Here through the parameter Algid we have to specify the type of symmetric algorithm i.e. RC4. CryptDeriveKey( hprov, Algid, hbasedata, dwflags, &phkey ).The parameter phkey returns the symmetric key that is used for encryption. Message Encryption CryptEncrypt-This function performs encryption operation on the message using the symmetric key returned by the above function. CryptEncrypt ( hkey, hhash, Final, dwflags, &pbdata, &pdwdatalen,dwbuflen) The parameter pbdata returns the encrypted message. CSWL Inc, Pleasanton, California - 9
10 Decrypting a Message Here also the symmetric key need to be generated for decryption. The steps involved in the decryption of message are : Creating a Key The symmetric key(session key) used for decryption is obtained by using the following functions. CryptAcquireContext-This function is used to get a handle to a particular key container within a particular cryptographic service provider(csp),which is needed for the function that creates the symmetric key for decryption by using the password. CryptAcquireContext (& phprov, szcontainer, szprovider,provtype,dwflags). CSWL Inc, Pleasanton, California - 10
11 phprov parameter of this function gives the handle to cryptographic service provider.? To use password for creating the symmetric key, first hashing of the password is to be done. This is done by the following two functions. CryptCreateHash- It creates and returns to the calling application a handle to a CSP hash object. CryptCreateHash( hprov, Algid, hkey, dwflags,&phhash) CryptHashData-This function adds password to the hash object, returned by the above function. CryptHashData( hhash, &pbdata, dwdatalen, dwflags) CryptDeriveKey-This function transforms the password that has been fed to the hash object to the symmetric key, which is used for decryption. CryptDeriveKey( hprov, Algid, hbasedata, dwflags, &phkey ). The parameter phkey returns the symmetric key that is used for decryption. Message Decryption CryptDecrypt-This function performs decryption operation on the message that is encrypted by CryptEncrypt, by using the symmetric key returned by the above function. CryptDecrypt(hkey,hHash,Final,dwFlags,&pbData,&pdwDataLen) The parameter pbdata returns the decrypted message. CSWL Inc, Pleasanton, California - 11
12 When a large amount of data needs to be encrypted/decrypted, it can be done in sections. This is done by calling CryptEncrypt / CryptDecrypt repeatedly. The Final parameter should be set to TRUE only on the last invocation of CryptEncrypt/CryptDecrypt, so the encyption/decryption engine can properly finish the encryption/decryption process. The following extra actions are performed when Final is TRUE: If the key is a block cipher key, the data will be padded to a multiple of the block size of the cipher. To find the block size of a cipher, use CryptGetKeyParam to get the KP_BLOCKLEN parameter of the key. If the cipher is operating in a chaining mode, the next CryptEncrypt/CryptDecrypt operation will reset the cipher's feedback register to the KP_IV value of the key. If the cipher is a stream cipher, the next CryptEncrypt/CryptDecrypt call will reset the cipher to its initial state. CSWL Inc, Pleasanton, California - 12
13 Working Model Of Encryption Basic Architecture The architecture of encryption process comprises the following parts. Host Application COM Add-in Encryption/Decryption DLL Host Application Any Office 2000 application can act as a host application. Here, Outlook 2000 acts as the host application. All the COM Add-ins that are registered under this gets loaded whenever this application starts. And the host application uses the methods of IDTExtensibility2 interface, which are implemented in the COM Add-in to communicate with the same. After registering the COM Add-in, the host application will have the following appearance when it is loaded. CSWL Inc, Pleasanton, California - 13
14 Once we select the option whether to encrypt the mail body or the attachment,it will show a dialogbox (as shown below) asking to enter the password, which will be used as the public key for encryption/decryption. The message will be encrypted using this password and the encrypted message will be set back to the mail body as shown below. To decrypt the encrypted message,again the user will be asked to enter the password as in encryption and the decrypted message will be set back to the mail body. COM Add-in The COM Add-in, a DLL registered for Outlook 2000, is used for adding security option in the menu bar of the Outlook 2000.The COM Add-in makes use of the objects that are exposed by Outlook 2000 Object model for this purpose. The CSWL Inc, Pleasanton, California - 14
15 encryption and decryption options in the security calls another DLL which implements the crypto API functions for encryption and decryption to perform the task, whenever the respective options are selected. The steps involved in extending the mail message window of Outlook 2000 to handle the encryption process in a simpler way, are as follows. 1. Sink event operations for the new mail message window of Outlook 2000 to identify it. 2. Provide Security custom options to the mail message for encryption / decryption process. 3. Sink event operations for the Security option. 4. Retrieve the mail message/attachment and perform encryption /decryption. Sink event operations for the new mail message window To trap invocation of the new mail message window a new class is derived from the IDISPATCH class providing the event operations. Calling the user-defined function of this class by passing the inspectors object does such mapping. m_pinshandler=new CInspectorHandler(); m_pinshandler->addref(); m_pinshandler->inspectoreventhandling(vtactiveinspectors.pdispval); All the events are exposed as objects by Outlook object model and every such object has GUID. By making use of this GUID, respective events could be mapped. When the event occurs, the callback method invoke() gets fired as a result of mapping. Invoke (DISPID dispidmember, REFIID riid, LCID lcid, WORD wflags, DISPPARAMS* pdispparams, VARIANT* pvarresult, EXCEPINFO* pexcepinfo, UINT* puargerr) CSWL Inc, Pleasanton, California - 15
16 The equivalent code in VB is as follows: Public WithEvents myolinspectors As Outlook.Inspectors And then override the new mail message event function. myolinspectors _NewInspector(ByVal ocurrentinspector As Outlook.Inspector) Provide Security custom options for the mail message Through the above invoke() function,specific callback functions are called for doing operations like providing Security custom buttons. Encrypt/Decrypt buttons are created on the Standard Bar for providing security option in VC. m_pmyaddinref=(cmyaddin*)(this); intvaluecheck=m_pmyaddinref->createcommandbutton (pdispparams); vtinsparam.vt=vt_i4; vtinsparam.lval = 1; hr =CallMethod(vtInsCtrls.pdispVal, L"Add",&vtInsButton, 1, &vtinsparam); The VB equivalent of the above is as follows. A Popup item Security with Encrypt/Decrypt sub items is created on the Menu Bar for the security purpose. Write the following codes in the NewInspector event. Dim WithEvents odecryptas Office.CommandBarButton Dim ocmenubar As Office.CommandBar Set ocmycontrol = ocmenubar.controls.add(msocontrolpopup,,,, True) ocmycontrol.caption = "&Security" Set odecrypt = ocmycontrol.controls.add ( Type:=msoControlButton,Temporary:=True, Before:=1) CSWL Inc, Pleasanton, California - 16
17 odecrypt.caption = "&Decrypt" Sink event operations for the Security option It is also done in the similar way as that of new mail message window. A class derived from the IDISPATCH provides functionalities to sink events. Calling the user-defined function of this class by passing the control object does such mapping. m_pbtnhandler=new CButtonHandler(); m_pbtnhandler->addref(); m_pbtnhandler->sinkevents(vtinsbutton.pdispval); The VB equivalent of this is as follows. Declare a CommandBarButton object with withevent option. Following is the event procedure for event operation of controls: odecrypt_click (ByVal Ctrl As Office.CommandBarButton, CancelDefault As Boolean) Retrieve the mail message and perform encryption /decryption Using the reference of the currently active mail message window, mail item is obtained by the following code. HRESULT hr=getproperty(m_phostapp, L"ActiveInspector,&vtDecActiveInspector); hr=getproperty(vtdecactiveinspector.pdispval,l"currentitem",&vtdecmaildesc) ; Finally mail message body is received by using the code below. hr=getproperty(vtdecmaildesc.pdispval,l"body",&vtdecparam); CSWL Inc, Pleasanton, California - 17
18 To perform encryption / decryption call the user defined function which in turn calls the Encryption/Decryption DLL to encrypt/decrypt the message retrieved from the mail message body. m_pencbtnaddinref=(cmyaddin*)(this); intvaluecheck=m_pencbtnaddinref->messageencrypt(); The equivalent code in VB is as follows. Using the reference of the currently active mail message window mail item is obtained by the following code. Dim WithEventsoMyInspector As Outlook.Inspector Dim omailmsg As Outlook.MailItem Set omyinspector = oapp.activeinspector Set omailmsg = omyinspector.currentitem Finally mail message body is received by using the code below. strmsgtosend = omailmsg.body To retrieve the data from the attachment use the following code to get the attachment name. Set oattach=omailmsg.attachments.item(1) strfilename=oattach.filename Encryption/Decryption DLL CSWL Inc, Pleasanton, California - 18
19 This DLL have well defined methods, which can implement any symmetric encryption/decryption algorithms. All crypto API functions for encryption and decryption discussed above are implemented as DLL which exposes the functions messageencrypt and messagedecrypt,which takes three parameters such as the text to be encrypted/decrypted,the password to be used as the public key and the output data, for encryption and decryption respectively, that are used by COM Add-in whenever encryption and decryption is selected. Any symmetric encryption algorithm can be used instead of RC4 stream cipher algorithm. To incorporate this change, implement the required algorithm in the above mentioned two functions. Storage And Retrieval Of Password All messages that are received in the inbox are uniquely identified by an entry id. To read an encrypted message for the first time, the user will be asked to enter the password which is already have been set between the sender and the receiver, using phone or some other communication medium and this password will be stored with the entry id which is unique with each message in the database. Database for this purpose is created in MS Access. By using this password (only if it matches)the encrypted message is decrypted to the original message. For all subsequent reading of the encrypted message the user will not be asked to enter the password again,but password is retrieved from the database depending on the entry id of the message and is decrypted. In addition, authentication of the database access is done by prompting the user to enter password for the database for all subsequent readings. CSWL Inc, Pleasanton, California - 19
20 Conclusion The features of COM Add-in, for desktop applications has enabled the development of extensive solutions more easier.especially, Outlook can possess much more customized functionalities like simple mail encryption, by means of having good interaction with COM Add-in Copyright Notice: 2002 California Software Labs. All rights Reserved. The contents on the document are not to be reproduced or duplicated in any form or kind, either in part or full, without the written permission of California Software labs. Product and company names mentioned here in are the trademarks of their respective companies. CSWL Inc, Pleasanton, California - 20
Windows NT Operating System
Windows NT Operating System Microsoft DSS/Diffie-Hellman Enhanced Cryptographic Provider FIPS 140-1 Documentation: Security Policy Abstract The Microsoft DSS/Diffie-Hellman Enhanced Cryptographic Provider
More informationCALIFORNIA SOFTWARE LABS
Using the JetSend SDK CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite 100 Pleasanton CA 94566, USA. Phone (925) 249 3000 Fax (925) 426
More informationmaxbox /09/ :44:02
1: ///////////////////////////////////////////////////// 2: How to get a SHA256 or SHA256D for Blockchains 3: 4: maxbox Starter 54 - MS Cryptographic Service Provider 5: 6: As you may know a SHA (Secure
More informationCALIFORNIA SOFTWARE LABS
Wrapping Jini Services in ActiveX CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite 100 Pleasanton CA 94566, USA. Phone (925) 249 3000 Fax
More informationCS551 Object Oriented Middleware (IV) Dynamic Requests (Chap. 6 of EDO) Outline. Why Dynamic Request?
CS551 Object Oriented Middleware (IV) Dynamic Requests (Chap. 6 of EDO) Yugi Lee STB #555 (816) 235-5932 yugi@cstp.umkc.edu www.cstp.umkc.edu/~yugi 1 Outline Dynamic Invocation The CORBA Dynamic Invocation
More informationHow to Create a MindManager Add-in With Visual Studio in 7 Steps
How to Create a MindManager Add-in With Visual Studio in 7 Steps Prerequisites: MindManager 7, 8 or 9 installed Visual Studio 2005, 2008 or 2010 installed Step One The first thing to do is download this
More informationForensics Challenges. Windows Encrypted Content John Howie CISA CISM CISSP Director, Security Community, Microsoft Corporation
Forensics Challenges Windows Encrypted Content John Howie CISA CISM CISSP Director, Security Community, Microsoft Corporation Introduction Encrypted content is a challenge for investigators Makes it difficult
More informationStep-by-step installation guide for monitoring untrusted servers using Operations Manager
Step-by-step installation guide for monitoring untrusted servers using Operations Manager Most of the time through Operations Manager, you may require to monitor servers and clients that are located outside
More informationAdd Address User s Manual
Add Email Address User s Manual Contents Welcome... 2 Configuring the Add-in... 3 Settings Tab... 4 Scan Now Tab... 6 Advanced Tab... 7 Troubleshooting... 8 Add Email Address Copyright 2008 2017 Sperry
More informationPI ProcessBook Add-ins and PI ActiveView, Making them work together January 2009
PI ProcessBook Add-ins and PI ActiveView, Making them work together January 2009 1994-2009 OSIsoft, Inc. All rights reserved OSIsoft, Inc. 777 Davis St., Suite 250 San Leandro, CA 94577 USA (01) 510-297-5800
More informationCALIFORNIA SOFTWARE LABS
Real-time Implementation of NAT and Firewall in VxWorks CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite 100 Pleasanton CA 94566, USA. Phone
More informationCA ERwin Data Modeler. API Reference Guide
CA ERwin Data Modeler API Reference Guide r8 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
More informationYubiKey Smart Card Minidriver User Guide. Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n
YubiKey Smart Card Minidriver User Guide Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n Copyright 2017 Yubico Inc. All rights reserved. Trademarks
More informationCALIFORNIA SOFTWARE LABS
JetSend Viewer for Windows CE CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite 100 Pleasanton CA 94566, USA. Phone (925) 249 3000 Fax (925)
More informationFIPS Security Policy
FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided
More informationJumble for Microsoft Outlook
Jumble for Microsoft Outlook Jumble provides truly usable and secure email encryption by integrating with existing email clients. Users can easily and securely communicate from their email client simply
More informationAmyuni PDF Creator for ActiveX
Amyuni PDF Creator for ActiveX For PDF and XPS Version 4.5 Professional Quick Start Guide for Developers Updated October 2010 AMYUNI Consultants AMYUNI Technologies www.amyuni.com Contents Legal Information...
More informationYubiKey Smart Card Minidriver User Guide. Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n
YubiKey Smart Card Minidriver User Guide Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n Copyright 2017 Yubico Inc. All rights reserved. Trademarks
More informationDBT-120 Bluetooth USB Adapter
DBT-120 Bluetooth USB Adapter Rev.2.1 (09/25/2002) 2 Contents Introduction... 5 Package Contents... 6 Installing Bluetooth Software... 6 Hardware Installation... 8 Introduction to Bluetooth Software...
More informationImplementing Messaging Security for Exchange Server Clients
Implementing Messaging Security for Exchange Server Clients Objectives Scenario At the end of this lab, you will be able to: Protect e-mail messages using S/MIME signing and encryption Manage e-mail attachment
More informationSECARDEO. certbox. Help-Manual. Secardeo GmbH Release:
certbox Help-Manual Secardeo GmbH Release: 02.12.2014 certbox Help Manual 02.12.2014 Table of Contents 1 Search and retrieve Public Key Certificates... 1 1.1 Search by an e-mail address... 1 1.2 Download
More informationerwin Data Modeler API Reference Guide Release 9.7
erwin Data Modeler API Reference Guide Release 9.7 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation ), is
More informationTeam Helpdesk for Outlook Agent Installation and Configuration (for version 9 and above)
Team Helpdesk for Outlook Agent Installation and Configuration (for version 9 and above) Page 1 This install is meant for agents and technicians who would be working on support cases in the configured
More informationSQL Server Express Installation Guide
SQL Server Express Installation Guide For SQL Server Express 2014 Last Updated 12/22/2016 All user guides are available for download on our support site at www.1-stepsoftware.com. This publication is the
More informationFRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc.
FRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc. TABLE OF CONTENTS System Requirements... 2 I. Determining the.bit version of your Microsoft Office Suite... 2 III. Configuring the Outlook
More informationJumble Encryption for Microsoft Outlook
Jumble Email Encryption for Microsoft Outlook Jumble provides truly usable and secure email encryption by integrating with existing email clients. Users can easily and securely communicate from their email
More informationRunning a Calculation Script using a MaxL Script
Well, now that you know how to code a basic Essbase Command Script, we will describe the various methods for executing it. They are as follows: Chapter 5 1. EssCmd Drag and Drop: Your client software should
More informationCO-LaN Annual meeting Sept 2014, Frankfurt, Germany
Slide 1 IUnknown IDispatch ICapeIdentification ICape. A.k.a. the boring stuff CO-LaN Annual meeting Sept 2014, Frankfurt, Germany Slide 2 IUnknown IDispatch ICapeIdentification ICape. MicroSoft Visual
More informationZoomText 9.1. User s Guide Addendum. Ai Squared
ZoomText 9.1 User s Guide Addendum Ai Squared Copyrights ZoomText Magnifier Copyright 2008, Algorithmic Implementations, Inc. All Rights Reserved. ZoomText Magnifier/Reader Copyright 2008, Algorithmic
More informationUsing on Your Sprint PCS Vision Smart Device PPC-6700
Using Email on Your Sprint PCS Vision Smart Device PPC-6700 2006 Sprint Nextel. All rights reserved. SPRINT, the "Going Forward" logo, and other trademarks are trademarks of Sprint Nextel. June 7, 2006
More informationJuniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc.
Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0 Juniper Networks, Inc. September 10, 2009 Copyright Juniper Networks, Inc. 2009. May be reproduced only in
More informationDownload the Driver software from the following link: Establish Bluetooth Connection
Download the Driver software from the following link: http://files.microinv.com/micro_drivers/usb50bt%20driver.zip Establish Bluetooth Connection A connection is normally initiated from the client. On
More informationkeyon / PKCS#11 to MS-CAPI Bridge User Guide V2.4
/ PKCS#11 to MS-CAPI Bridge V2.4 April 2017 Table of Contents Copyright 2017 by AG All rights reserved. No part of the contents of this manual may be reproduced or transmitted in any form or by any means
More informationEncrypting and Decrypting using CTR and CBC Modes in C# with BouncyCastle
SE425: Communication and Information Security Recitation 5 Semester 2 5778 16 April 2018 Encrypting and Decrypting using CTR and CBC Modes in C# with BouncyCastle In this week s recitation we ll learn
More informationHands-On Lab. Getting Started with Office 2010 Development. Lab version: Last updated: 2/23/2011
Hands-On Lab Getting Started with Office 2010 Development Lab version: 1.0.0 Last updated: 2/23/2011 CONTENTS OVERVIEW... 3 Starting Materials 3 EXERCISE 1: CUSTOMIZING THE OFFICE RIBBON IN OFFICE... 4
More informationMailEnable Connector for Microsoft Outlook
MailEnable Connector for Microsoft Outlook Version 1.41 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for
More informationCommand Prompt Codes Bypass System Error 5 Has Occurred Access Denied
Command Prompt Codes Bypass System Error 5 Has Occurred Access Denied Close the Command Prompt window and reboot the machine, retry to connect the networks which are It says Access is denied system error
More informationEMC White Paper Documentum Client for Outlook (DCO)
EMC White Paper Documentum Client for Outlook (DCO) Troubleshooting Guide Copyright 2005 EMC Corporation. All rights reserved. EMC believes the information in this publication is accurate as of its publication
More informationSafeGuard LAN Crypt: Loading Profile Troubleshooting Guide
1 Troubleshooting Guide SafeGuard LAN Crypt: Loading Profile Troubleshooting Guide Document date: 26/11/2014 Contents 1 Introduction... 4 2 SafeGuard LAN Crypt User application... 4 3 Loading the user
More informationCorpSystem Workpaper Manager
CorpSystem Workpaper Manager Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationYubikey Configuration COM API
Yubikey Configuration COM API YubiKey device Windows configuration component Version: 2.2 May 22, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection.
More informationIndustrial Strength Add-Ins: Creating Commands in Autodesk Inventor
Industrial Strength Add-Ins: Creating Commands in Autodesk Inventor Brian Ekins Autodesk, Inc. DE211-4 This session focuses on techniques that will help you produce an industrial strength add-in application.
More informationThis Security Policy describes how this module complies with the eleven sections of the Standard:
Vormetric, Inc Vormetric Data Security Server Module Firmware Version 4.4.1 Hardware Version 1.0 FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation May 24 th, 2012 2011 Vormetric Inc. All rights
More informationVMware Horizon JMP Server Installation and Setup Guide. 13 DEC 2018 VMware Horizon 7 7.7
VMware Horizon JMP Server Installation and Setup Guide 13 DEC 2018 VMware Horizon 7 7.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you
More informationManaging Certificates
CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer
More informationARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1
ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation April 2012 Copyright 2012 Algorithmic Research This document
More informationOptional Lab: Customize Settings in Windows Vista
12.2.4 Optional Lab: Customize Settings in Windows Vista Introduction Print and complete this lab. This lab is comprised of five parts. This lab is designed to be completed in multiple lab sessions. Part
More informationProtectV StartGuard. FIPS Level 1 Non-Proprietary Security Policy
ProtectV StartGuard FIPS 140-2 Level 1 Non-Proprietary Security Policy DOCUMENT NUMBER: 002-010841-001 AUTHOR: DEPARTMENT: LOCATION OF ISSUE: SafeNet Certification Team R & D Program Managaement Redwood
More informationMODULE 5.1 PLATFORMS VS. STATIONS
MODULE 5.1 PLATFORMS VS. STATIONS Platform According to www.bellevuelinux.org The term platform as used in a computer context can refer to: (1) the type of processor and/or other hardware on which a given
More informationHands-On Lab. Sensors & Location Platform - Native. Lab version: 1.0.0
Hands-On Lab Sensors & Location Platform - Native Lab version: 1.0.0 Last updated: 12/3/2010 CONTENTS OVERVIEW... 3 EXERCISE 1: ADJUSTING FONT SIZE IN RESPONSE TO AMBIENT LIGHT INTENSITY... 5 Task 1 Adding
More informationTeam TimeSheet for Outlook & SharePoint Client Installation and Configuration ( Per User Installation and Per Machine Installation )
Team TimeSheet for Outlook & SharePoint Client Installation and Configuration ( Per User Installation and Per Machine Installation ) Page 1 This install is meant for normal users who would be preparing
More informationClient Configuration Cookbook
Sitecore CMS 6.2 Client Configuration Cookbook Rev: 2009-10-20 Sitecore CMS 6.2 Client Configuration Cookbook Features, Tips and Techniques for CMS Architects and Developers Table of Contents Chapter 1
More informationMicrosoft Office Groove Server Groove Manager. Domain Administrator s Guide
Microsoft Office Groove Server 2007 Groove Manager Domain Administrator s Guide Copyright Information in this document, including URL and other Internet Web site references, is subject to change without
More informationPaperVision Message Manager. User Guide. PaperVision Message Manager Release 71
PaperVision Message Manager User Guide PaperVision Message Manager Release 71 June 2010 Information in this document is subject to change without notice and does not represent a commitment on the part
More informationDCOM. Distributed Component Object Model (White Paper)
DCOM Distributed Component Object Model (White Paper) 1 Summary 1 Summary...2 2 About This Document...3 2.1 Scope of the Document...3 2.2 Copyright...3 2.3 Revision History...3 2.4 Product Reference...3
More informationAdministrator s Guide (CA QIWI Bank)
PUT&GET MAIL (PGM) Administrator s Guide (CA QIWI Bank) MOSCOW March 2017 PGM Administrator s Guide (QIWI) INDEX 1. SETTING UP... 2 1.1. COMMON SETTINGS... 2 1.2. POINT CONFIGURATIONS... 2 1.2.1. Options
More informationMobile MOUSe.NET SECURITY FOR DEVELOPERS PART 2 ONLINE COURSE OUTLINE
Mobile MOUSe.NET SECURITY FOR DEVELOPERS PART 2 ONLINE COURSE OUTLINE COURSE TITLE.NET SECURITY FOR DEVELOPERS PART 2 COURSE DURATION 15 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW In the.net
More informationGIGABYTE Remote Management Console User s Guide. Version: 1.0
GIGABYTE Remote Management Console User s Guide Version: 1.0 Table of Contents Using Your GIGABYTE Remote Management Console...2 Software Install...3 Prerequisites on remote management PC...3 Install Java
More informationThe following are required to duplicate the process outlined in this document.
Technical Note ClientAce WPF Project Example 1. Introduction Traditional Windows forms are being replaced by Windows Presentation Foundation 1 (WPF) forms. WPF forms are fundamentally different and designed
More informationUser Guide. 3CX Audio Scheduler. Version
User Guide 3CX Audio Scheduler Version 15.5.21 "Copyright VoIPTools, LLC 2011-2018" Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted
More information(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography
Code No: RR410504 Set No. 1 1. Write short notes on (a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography 3. (a) Illustrate Diffie-hellman Key Exchange scheme for GF(P) [6M] (b) Consider
More informationCipher Suite Configuration Mode Commands
The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables
More informationCHAPTER 8 Scripting. Here are just a few examples of things you can do with ZoomText scripting:
CHAPTER 8 Scripting In todayʹs computer centric world, visually impaired individuals are challenged to meet the same performance goals as their normal sighted peers. In many situations, especially job
More informationYubiKey Smart Card Deployment Guide
YubiKey Smart Card Deployment Guide Best Practices and Basic Setup YubiKey 4 Series (YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano) YubiKey NEO Series (YubiKey NEO, YubiKey NEO-n) Last Updated:
More informationLab - System Utilities in Windows
Introduction In this lab, you will use Windows utilities to configure operating system settings. Recommended Equipment The following equipment is required for this exercise: A computer running Windows
More informationImprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016
Imprivata FIPS 140-2 Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016 Copyright Imprivata 2016, all rights reserved Imprivata FIPS Crypto Module 1 Table of Contents
More information4D WebSTAR V User Guide for Mac OS. Copyright (C) D SA / 4D, Inc. All rights reserved.
4D WebSTAR V User Guide for Mac OS Copyright (C) 2002 4D SA / 4D, Inc. All rights reserved. The software described in this manual is governed by the grant of license provided in this package. The software
More informationFRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc.
FRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc. TABLE OF CONTENTS System Requirements... 2 I. Determining the.bit version of your Microsoft Office Suite... 2 II. Determine your version of
More informationEL-USB-RT API Guide V1.0
EL-USB-RT API Guide V1.0 Contents 1 Introduction 2 C++ Sample Dialog Application 3 C++ Sample Observer Pattern Application 4 C# Sample Application 4.1 Capturing USB Device Connect \ Disconnect Events 5
More informationBest Practice - Programming Ribbons
Best Practice - Programming Ribbons Copyright 2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc., registered in the U.S. and/or other countries. All other trademarks
More informationUser Manual Zultys Outlook Communicator V.2
Technical Publications January 13 User Manual Zultys Outlook Communicator V.2 Author: Zultys Technical Support Department. Z Z u l t y s, I n c. 7 8 5 L u c e r n e S u n n y v a l e, C a l i f o r n i
More informationSAS Simulation Studio 14.1: User s Guide. Introduction to SAS Simulation Studio
SAS Simulation Studio 14.1: User s Guide Introduction to SAS Simulation Studio This document is an individual chapter from SAS Simulation Studio 14.1: User s Guide. The correct bibliographic citation for
More informationBrowser Configuration Reference
Sitecore CMS 7.0 or later Browser Configuration Reference Rev: 2013-09-30 Sitecore CMS 7.0 or later Browser Configuration Reference Optimizing Internet Explorer and other web browsers to work with Sitecore
More informationBut where'd that extra "s" come from, and what does it mean?
SSL/TLS While browsing Internet, some URLs start with "http://" while others start with "https://"? Perhaps the extra "s" when browsing websites that require giving over sensitive information, like paying
More informationUsing the SSM Administration Console
CHAPTER 6 Your user role controls whether you can access the SSM Administration Console. The following information is included in this section: SSM Administration Console Overview, page 6-1 Launching the
More informationOpenText RightFax 10.0 SecureDocs Guide
OpenText RightFax 10.0 SecureDocs Guide OpenText RightFax 10.0 SecureDocs Guide ii Edition OpenText RightFax 10.0 SecureDocs. This document was last updated May 25, 2011. Trademarks OpenText is a registered
More informationConfiguring Microsoft Outlook to Connect to Hosted Exchange Service
Configuring Microsoft Outlook to Connect to Hosted Exchange Service Configuring Microsoft Outlook for Hosted Exchange Service Version: 1.0 Updated on: April 27, 2011 Page 1 of 7 TABLE OF CONTENTS Configuring
More informationProject management integrated into Outlook
Project management integrated into Outlook InLoox PM 7.x off-line operation An InLoox Whitepaper Published: November 2011 Copyright: 2011 InLoox GmbH. You can find up-to-date information at http://www.inloox.com
More informationms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/grpolwt.htm
Page 1 of 17 Windows 2000 Server Step-by-Step Guide to Understanding the Group Policy Feature Set Operating System Abstract Group Policy is the central component of the Change and Configuration Management
More informationApplication of Cryptography in.net Framework
Application of Cryptography in.net Framework Paul Lo Software Engineer in Cyberwisdom.net M.Math(CS), MCSD..net Overview Basic Cryptography CryptoAPI enhancement in.net AES support in.net XML Signature
More informationInterfacing Ada 95 to Microsoft COM and DCOM Technologies
Interfacing Ada 95 to Microsoft COM and DCOM Technologies Interactive Intelligence, Inc. 600 West Hillsboro Blvd., Suit 325 Deerfield Beach, Florida 33441 (954) 698-0030x187 David Botton David@Botton.com
More informationUSER GUIDE. We hope you enjoy using the product, and please don t hesitate to send us questions or provide feedback at Thank You.
USER GUIDE Introduction This User Guide is designed to serve as a brief overview to help you get started. There is also information available under the Help option in the various Contributor interface
More informationCrypto Library. Microchip Libraries for Applications (MLA) Copyright (c) 2012 Microchip Technology Inc. All rights reserved.
Crypto Library Microchip Libraries for Applications (MLA) Copyright (c) 2012 Microchip Technology Inc. All rights reserved. MLA - Crypto Library Help Table of Contents 1 Crypto Library 6 1.1 Introduction
More informationClient Configuration Cookbook
Sitecore CMS 6.4 or later Client Configuration Cookbook Rev: 2013-10-01 Sitecore CMS 6.4 or later Client Configuration Cookbook Features, Tips and Techniques for CMS Architects and Developers Table of
More informationTeradici PCoIP Virtual Channel Software Development Kit
Teradici PCoIP Virtual Channel Software Development Kit Version 1.1 Developers' Guide TER1502008-1.1 Document History The following table records changes and revisions made to this document since the inaugural
More informationHow to create an Add-In extension.dll file and make it available from Robot pull down menu. (language C#)
2018 Autodesk, Inc. All Rights Reserved. Except as otherwise permitted by Autodesk, Inc., this publication, or parts thereof, may not be reproduced in any form, by any method, for any purpose. Certain
More informationSetting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.8 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationUsing the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1
Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationCollabNet Desktop - Microsoft Windows Edition
CollabNet Desktop - Microsoft Windows Edition User Guide 2009 CollabNet Inc. CollabNet Desktop - Microsoft Windows Edition TOC 3 Contents Legal fine print...7 CollabNet, Inc. Trademark and Logos...7 Chapter
More informationTxEIS on Internet Explorer 8
TxEIS on Internet Explorer 8 General Set Up Recommendations: Several modifications will need to be made to the computer settings in Internet Explorer to ensure TxEIS runs smoothly, reports pop up as desired,
More informationVersion 9.0 SecureDocs Module Guide
Version 9.0 SecureDocs Module Guide RightFax 9.0 SecureDocs Module Guide ii Edition Information in this document applies to version 9.0 of the SecureDocs Module Guide. Copyright Notice 2004 Captaris. All
More informationImageNow Interact for Microsoft Office Installation and Setup Guide
ImageNow Interact for Microsoft Office Installation and Setup Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive
More informationPageScope Box Operator Ver. 3.2 User s Guide
PageScope Box Operator Ver. 3.2 User s Guide Box Operator Contents 1 Introduction 1.1 System requirements...1-1 1.2 Restrictions...1-1 2 Installing Box Operator 2.1 Installation procedure...2-1 To install
More informationAssureon Installation Guide Client Certificates. for Version 6.4
Client Certificates for Version 6.4 Publication info 2011 Nexsan Technologies Canada Inc. All rights reserved. Published by: Nexsan Technologies Canada Inc. 1405 Trans Canada Highway, Suite 300 Dorval,
More informationWorkspace ONE UEM Certificate Authority Integration with Microsoft ADCS Using DCOM. VMware Workspace ONE UEM 1811
Workspace ONE UEM Certificate Authority Integration with Microsoft ADCS Using DCOM VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationSecurity Policy for FIPS KVL 3000 Plus
Security Policy for FIPS 140-2 KVL 3000 Plus Version 01.01.19 Motorola General Business Information 1 of 21 Motorola General Business Information 2 of 21 1 INTRODUCTION... 4 1.1 SCOPE... 4 1.2 OVERVIEW...
More informationMailEnable Connector for Microsoft Outlook
MailEnable Connector for Microsoft Outlook Version 1.36 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for
More informationCreative USB Adapter CB2431 with Bluetooth Wireless Technology. User s Guide
Creative USB Adapter CB2431 with Bluetooth Wireless Technology User s Guide Application Setup & User s Guide Information in this document is subject to change without notice and does not represent a commitment
More informationUsing VMware View Client for Mac
May 2012 View Client for Mac This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
More information