CALIFORNIA SOFTWARE LABS

Size: px
Start display at page:

Download "CALIFORNIA SOFTWARE LABS"

Transcription

1 CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite 100 Pleasanton CA 94566, USA. Phone (925) Fax (925) info@cswl.com

2 A Technical Report Technical Expertise Level : Intermediate INDEX INTRODUCTION... 3 COM ADD-IN... 3 COM ADD-IN ARCHITECTURE... 4 ADD-IN REGISTRATION... 4 COM ADD-IN EVENT PROCEDURES... 5 ADD-IN OBJECT MODEL... 6 OUTLOOK OBJECT MODEL... 7 ENCRYPTION AND DECRYPTION FUNCTIONALITIES... 8 WORKING MODEL OF ENCRYPTION BASIC ARCHITECTURE Host Application COM Add-in Encryption/Decryption DLL STORAGE AND RETRIEVAL OF PASSWORD CONCLUSION CSWL Inc, Pleasanton, California - 2

3 INTRODUCTION Microsoft Office 2000, which is one of the widely used desktop applications, provides the solution provider the privilege for extending the capabilities of Office applications. Outlook 2000 supports COM Add-in, which extends the capabilities of an application in a tightly integrated way by taking advantage of that application s extensibility model, for this purpose. The security measures like digital ID or private /public-key pair that are implemented for the security is cumbersome to setup and is complicate for an average user to understand. So to make the task more users friendly, the encryption of the s using only public key, which can be a password, is recommended. In this article we have covered how a COM Add-in can be written so that it enhance the security of s send from the outlook 2000 by providing a security option which enables the user to encrypt and decrypt the s using password as the key. These passwords may be decided between the parties over the phone or some communication channels. COM Add-in COM Add-in is a technology introduced by Microsoft to help the developers to extend the already rich functionality found in the office applications. COM add-ins are DLLs or EXEs that are specially registered so they can be loaded by Office 2000 applications at startup. More tech-nically, a COM add-in for Office 2000 is any in-process or out-of-process COM object that implements the IDT-Extensibility2 interface and is set up properly in the registry. COM add-ins are compatible across all Microsoft Office products. This support across all Office products means you can write your add-in once, and then use the add-in in not only Outlook but also other Office products. CSWL Inc, Pleasanton, California - 3

4 COM Add-in Architecture In this COM Add-in architecture, the outlook application serves as the host for the Add-in and the Add-in that we write acts as the in-process COM server. Here we have used COM Add-in as a compiled DLL that has been registered so that Outlook knows how to load and communicate with the Add-in. Writing the add-in as a DLL, enhances the speed by running the code in-process with the host application and provides performance benefits. Since the Office application loads and connects to the add-in it controls the lifetime of the add-in. Add-in Registration The COM add-in technology also relies heavily on the system registry to determine which add-ins are available for the different Office products. The registry also tells the Outlook application how to load the add-in by putting certain configuration information into the registry. When writing registration information to the registry for the add-in, there are three values we need to write. They are 1)FriendlyName which specifies the name of the Add-in that will appear to the user in the Add-in Manager. 2)Description, this property contains the string that will appear at the bottom of the Add-in Manager when the user selects the addin.3)loadbehavior,which specifies the way the COM add-in should be loaded. The registry also specifies the users for whom the add-in should load. If we register the add-in under HKEY_LOCAL_MACHINE, it's made available to every user on the machine. And if it s under HKEY_CURRENT_USER, the add-in will be available to that particular user only. Office now stores the list of registered and connected add-ins in a sub key under the Office root. Office now uses the registry strictly to list all add-ins in the COM add-ins collection and uses the registry to store connected/disconnected state as well as boot or demand loaded information. Initially, once the Dll is made for the COM Add-in it is registered manually bycreating the keys for the respective office application (say,outlook) and set the CSWL Inc, Pleasanton, California - 4

5 values like FriendlyName, Description and LoadBehavior for the key. But Visual Studio 6.0 introduces an add-in registration mechanism that improves the add-in user's experience.visual Basic and Visual Studio improve the new registration mechanism by creating add-ins that auto-register via the DllRegisterServer entry point. Outlook 2000 uses the same solution for the Outlook 2000 add-ins. The Add-In Designer, included with Visual Basic 6.0, Visual Studio 6.0, and Outlook2000 Developer, will register Addin by itself under: HKEY_LOCAL_MACHINE\Software\Microsoft\Shared Tools\Addin Designer.Each application thereafter registered on the machine registers an Application Name key under the Addin Designer. The value under the Application Name key is used in the UI of the Add-in Designer in Visual Basic 6.0. When a designer is added to a Visual Basic 6.0 project, the user selects which application the add-in should be registered for and what the load behavior is. If the add-in works for multiple applications, more than one designer instance is added to the Visual Basic project, and each designer project item is set to a specific application. In the case of COM Add-ins in VC++ the registration is done manually by running regsvr32 which calls DllRegisterServer for creating the key and setting the properties. COM Add-in Event Procedures To work with Outlook 2000,the COM Add-ins must implement IDTExtensibility2 interface. The IDTExtensibility2 interface provides five event procedures that we must implement in our add-ins. The host, the outlook application, communicate with the add-in through these interface to tell it when the host application is done initializing, when the add-in has been loaded and disconnected etc. Outlook calls the methods of the interface, which are implemented when an add-in is connected to the application, whether through the Add-Ins dialog box or some other manner. Event procedures that we must implement in the COM add-in are CSWL Inc, Pleasanton, California - 5

6 OnConnection-Occurs when the Add-in is connected to the host application OnAddinsUpdate-fires whenever any changes are made to add-ins in the Add-in Manager. OnStarupComplete-fires when the start up of the host application is complete. OnBeginShutdown-fires before the host application begins its unloading process. OnDisconnection-fires when the add-in is disconnected from the host application. Add-In Object Model Add-in object Model has been used for the design of COM Add-in. Hierarchy of this model has been shown below. Hierarchy Application +---COMAddIns +---COMAddIn +---Application +---Connect +---Creator +---Description CSWL Inc, Pleasanton, California - 6

7 +---Guid +---Object +---Parent +---ProgID Outlook Object Model Outlook Object Model exposes many Objects with its properties, Collections and methods that can be made use of by any COM Add-ins for the Outlook. The COM Add-in that we have made for adding the security option for the s sent from outlook 2000, makes use of the following objects of the Outlook object model. Application Object-which is the root object in the object model, represents the entire Microsoft Outlook application and allows access to other objects in the Outlook hierarchy. NameSpace Object- represents an abstract root object for any data source. The object itself provides methods for logging in and out, accessing storage objects directly by ID, accessing certain special default folders directly, and accessing data sources owned by other users. Items Collection Object which comes under the Folders collection object of the NameSpace Object, represents a collection of Outlook item objects in a folder. Use items(index),where index is the name or index number, to return a single Outlook item. Explorers Collection Objects-which comes under the application Object, contains a set of explorer objects representing all explorers. Explorers property is used to return the Explorers collection from the Application object. Explorer Object- represents the window in which the contents of a folder are displayed. ActiveExplorer is used to return the currently active explorer. CommandBars Collection Objects-which comes under the explorers collection objects, contains a collection of CommandBar objects presented in the container application. This is used to get the toolbar or the CSWL Inc, Pleasanton, California - 7

8 menubar present in the container application. By using CommandBars (index), we can get the toolbar or the menubar. Then apply the CommandBar property to the pop-up control to return the command bar that represents that menu. Inspectors Collection Object-which comes under the application object, represents all set of inspector objects representing all inspectors. Inspectors collection is returned from the Application object by using Inspectors property. Inspector Object-represents the window in which an Outlook is displayed. The Active Inspector method is used to return the handle for currently active child window. Encryption And Decryption Functionalities Crypto API functions, which can make use of password as the public, key for the encryption and decryption is used here for the purpose. Here we have chosen RC4- Stream cipher algorithm. The two crypto API functions used for these purpose are. CryptEncrypt -which encrypts a block or stream of data using the specified encryption key and CryptDecrypt.-which decrypts a block or stream of data using the specified encryption key. Encrypting a Message The steps involved in the encryption of message are : Creating a Key The symmetric key(session key) used for encryption is obtained by using the following functions. CryptAcquireContext-This function is used to get a handle to a particular key container within a particular cryptographic service provider(csp),which is needed for the function that creates the symmetric key for encryption by using the password. CSWL Inc, Pleasanton, California - 8

9 CryptAcquireContext (& phprov, szcontainer,szprovider,provtype,dwflags). phprov parameter of this function gives the handle to cryptographic service provider. To use password for creating the symmetric key, first hashing of the password is to be done. This is done by the following two functions. CryptCreateHash- It creates and returns to the calling application a handle to a CSP hash object. CryptCreateHash( hprov, Algid, hkey, dwflags,&phhash) CryptHashData- This function adds password to the hash object,returned by the above function. CryptHashData( hhash, &pbdata, dwdatalen, dwflags) CryptDeriveKey-This function transforms the password that has been fed to the hash object to the symmetric key, which is used for encryption. Here through the parameter Algid we have to specify the type of symmetric algorithm i.e. RC4. CryptDeriveKey( hprov, Algid, hbasedata, dwflags, &phkey ).The parameter phkey returns the symmetric key that is used for encryption. Message Encryption CryptEncrypt-This function performs encryption operation on the message using the symmetric key returned by the above function. CryptEncrypt ( hkey, hhash, Final, dwflags, &pbdata, &pdwdatalen,dwbuflen) The parameter pbdata returns the encrypted message. CSWL Inc, Pleasanton, California - 9

10 Decrypting a Message Here also the symmetric key need to be generated for decryption. The steps involved in the decryption of message are : Creating a Key The symmetric key(session key) used for decryption is obtained by using the following functions. CryptAcquireContext-This function is used to get a handle to a particular key container within a particular cryptographic service provider(csp),which is needed for the function that creates the symmetric key for decryption by using the password. CryptAcquireContext (& phprov, szcontainer, szprovider,provtype,dwflags). CSWL Inc, Pleasanton, California - 10

11 phprov parameter of this function gives the handle to cryptographic service provider.? To use password for creating the symmetric key, first hashing of the password is to be done. This is done by the following two functions. CryptCreateHash- It creates and returns to the calling application a handle to a CSP hash object. CryptCreateHash( hprov, Algid, hkey, dwflags,&phhash) CryptHashData-This function adds password to the hash object, returned by the above function. CryptHashData( hhash, &pbdata, dwdatalen, dwflags) CryptDeriveKey-This function transforms the password that has been fed to the hash object to the symmetric key, which is used for decryption. CryptDeriveKey( hprov, Algid, hbasedata, dwflags, &phkey ). The parameter phkey returns the symmetric key that is used for decryption. Message Decryption CryptDecrypt-This function performs decryption operation on the message that is encrypted by CryptEncrypt, by using the symmetric key returned by the above function. CryptDecrypt(hkey,hHash,Final,dwFlags,&pbData,&pdwDataLen) The parameter pbdata returns the decrypted message. CSWL Inc, Pleasanton, California - 11

12 When a large amount of data needs to be encrypted/decrypted, it can be done in sections. This is done by calling CryptEncrypt / CryptDecrypt repeatedly. The Final parameter should be set to TRUE only on the last invocation of CryptEncrypt/CryptDecrypt, so the encyption/decryption engine can properly finish the encryption/decryption process. The following extra actions are performed when Final is TRUE: If the key is a block cipher key, the data will be padded to a multiple of the block size of the cipher. To find the block size of a cipher, use CryptGetKeyParam to get the KP_BLOCKLEN parameter of the key. If the cipher is operating in a chaining mode, the next CryptEncrypt/CryptDecrypt operation will reset the cipher's feedback register to the KP_IV value of the key. If the cipher is a stream cipher, the next CryptEncrypt/CryptDecrypt call will reset the cipher to its initial state. CSWL Inc, Pleasanton, California - 12

13 Working Model Of Encryption Basic Architecture The architecture of encryption process comprises the following parts. Host Application COM Add-in Encryption/Decryption DLL Host Application Any Office 2000 application can act as a host application. Here, Outlook 2000 acts as the host application. All the COM Add-ins that are registered under this gets loaded whenever this application starts. And the host application uses the methods of IDTExtensibility2 interface, which are implemented in the COM Add-in to communicate with the same. After registering the COM Add-in, the host application will have the following appearance when it is loaded. CSWL Inc, Pleasanton, California - 13

14 Once we select the option whether to encrypt the mail body or the attachment,it will show a dialogbox (as shown below) asking to enter the password, which will be used as the public key for encryption/decryption. The message will be encrypted using this password and the encrypted message will be set back to the mail body as shown below. To decrypt the encrypted message,again the user will be asked to enter the password as in encryption and the decrypted message will be set back to the mail body. COM Add-in The COM Add-in, a DLL registered for Outlook 2000, is used for adding security option in the menu bar of the Outlook 2000.The COM Add-in makes use of the objects that are exposed by Outlook 2000 Object model for this purpose. The CSWL Inc, Pleasanton, California - 14

15 encryption and decryption options in the security calls another DLL which implements the crypto API functions for encryption and decryption to perform the task, whenever the respective options are selected. The steps involved in extending the mail message window of Outlook 2000 to handle the encryption process in a simpler way, are as follows. 1. Sink event operations for the new mail message window of Outlook 2000 to identify it. 2. Provide Security custom options to the mail message for encryption / decryption process. 3. Sink event operations for the Security option. 4. Retrieve the mail message/attachment and perform encryption /decryption. Sink event operations for the new mail message window To trap invocation of the new mail message window a new class is derived from the IDISPATCH class providing the event operations. Calling the user-defined function of this class by passing the inspectors object does such mapping. m_pinshandler=new CInspectorHandler(); m_pinshandler->addref(); m_pinshandler->inspectoreventhandling(vtactiveinspectors.pdispval); All the events are exposed as objects by Outlook object model and every such object has GUID. By making use of this GUID, respective events could be mapped. When the event occurs, the callback method invoke() gets fired as a result of mapping. Invoke (DISPID dispidmember, REFIID riid, LCID lcid, WORD wflags, DISPPARAMS* pdispparams, VARIANT* pvarresult, EXCEPINFO* pexcepinfo, UINT* puargerr) CSWL Inc, Pleasanton, California - 15

16 The equivalent code in VB is as follows: Public WithEvents myolinspectors As Outlook.Inspectors And then override the new mail message event function. myolinspectors _NewInspector(ByVal ocurrentinspector As Outlook.Inspector) Provide Security custom options for the mail message Through the above invoke() function,specific callback functions are called for doing operations like providing Security custom buttons. Encrypt/Decrypt buttons are created on the Standard Bar for providing security option in VC. m_pmyaddinref=(cmyaddin*)(this); intvaluecheck=m_pmyaddinref->createcommandbutton (pdispparams); vtinsparam.vt=vt_i4; vtinsparam.lval = 1; hr =CallMethod(vtInsCtrls.pdispVal, L"Add",&vtInsButton, 1, &vtinsparam); The VB equivalent of the above is as follows. A Popup item Security with Encrypt/Decrypt sub items is created on the Menu Bar for the security purpose. Write the following codes in the NewInspector event. Dim WithEvents odecryptas Office.CommandBarButton Dim ocmenubar As Office.CommandBar Set ocmycontrol = ocmenubar.controls.add(msocontrolpopup,,,, True) ocmycontrol.caption = "&Security" Set odecrypt = ocmycontrol.controls.add ( Type:=msoControlButton,Temporary:=True, Before:=1) CSWL Inc, Pleasanton, California - 16

17 odecrypt.caption = "&Decrypt" Sink event operations for the Security option It is also done in the similar way as that of new mail message window. A class derived from the IDISPATCH provides functionalities to sink events. Calling the user-defined function of this class by passing the control object does such mapping. m_pbtnhandler=new CButtonHandler(); m_pbtnhandler->addref(); m_pbtnhandler->sinkevents(vtinsbutton.pdispval); The VB equivalent of this is as follows. Declare a CommandBarButton object with withevent option. Following is the event procedure for event operation of controls: odecrypt_click (ByVal Ctrl As Office.CommandBarButton, CancelDefault As Boolean) Retrieve the mail message and perform encryption /decryption Using the reference of the currently active mail message window, mail item is obtained by the following code. HRESULT hr=getproperty(m_phostapp, L"ActiveInspector,&vtDecActiveInspector); hr=getproperty(vtdecactiveinspector.pdispval,l"currentitem",&vtdecmaildesc) ; Finally mail message body is received by using the code below. hr=getproperty(vtdecmaildesc.pdispval,l"body",&vtdecparam); CSWL Inc, Pleasanton, California - 17

18 To perform encryption / decryption call the user defined function which in turn calls the Encryption/Decryption DLL to encrypt/decrypt the message retrieved from the mail message body. m_pencbtnaddinref=(cmyaddin*)(this); intvaluecheck=m_pencbtnaddinref->messageencrypt(); The equivalent code in VB is as follows. Using the reference of the currently active mail message window mail item is obtained by the following code. Dim WithEventsoMyInspector As Outlook.Inspector Dim omailmsg As Outlook.MailItem Set omyinspector = oapp.activeinspector Set omailmsg = omyinspector.currentitem Finally mail message body is received by using the code below. strmsgtosend = omailmsg.body To retrieve the data from the attachment use the following code to get the attachment name. Set oattach=omailmsg.attachments.item(1) strfilename=oattach.filename Encryption/Decryption DLL CSWL Inc, Pleasanton, California - 18

19 This DLL have well defined methods, which can implement any symmetric encryption/decryption algorithms. All crypto API functions for encryption and decryption discussed above are implemented as DLL which exposes the functions messageencrypt and messagedecrypt,which takes three parameters such as the text to be encrypted/decrypted,the password to be used as the public key and the output data, for encryption and decryption respectively, that are used by COM Add-in whenever encryption and decryption is selected. Any symmetric encryption algorithm can be used instead of RC4 stream cipher algorithm. To incorporate this change, implement the required algorithm in the above mentioned two functions. Storage And Retrieval Of Password All messages that are received in the inbox are uniquely identified by an entry id. To read an encrypted message for the first time, the user will be asked to enter the password which is already have been set between the sender and the receiver, using phone or some other communication medium and this password will be stored with the entry id which is unique with each message in the database. Database for this purpose is created in MS Access. By using this password (only if it matches)the encrypted message is decrypted to the original message. For all subsequent reading of the encrypted message the user will not be asked to enter the password again,but password is retrieved from the database depending on the entry id of the message and is decrypted. In addition, authentication of the database access is done by prompting the user to enter password for the database for all subsequent readings. CSWL Inc, Pleasanton, California - 19

20 Conclusion The features of COM Add-in, for desktop applications has enabled the development of extensive solutions more easier.especially, Outlook can possess much more customized functionalities like simple mail encryption, by means of having good interaction with COM Add-in Copyright Notice: 2002 California Software Labs. All rights Reserved. The contents on the document are not to be reproduced or duplicated in any form or kind, either in part or full, without the written permission of California Software labs. Product and company names mentioned here in are the trademarks of their respective companies. CSWL Inc, Pleasanton, California - 20

Windows NT Operating System

Windows NT Operating System Windows NT Operating System Microsoft DSS/Diffie-Hellman Enhanced Cryptographic Provider FIPS 140-1 Documentation: Security Policy Abstract The Microsoft DSS/Diffie-Hellman Enhanced Cryptographic Provider

More information

CALIFORNIA SOFTWARE LABS

CALIFORNIA SOFTWARE LABS Using the JetSend SDK CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite 100 Pleasanton CA 94566, USA. Phone (925) 249 3000 Fax (925) 426

More information

maxbox /09/ :44:02

maxbox /09/ :44:02 1: ///////////////////////////////////////////////////// 2: How to get a SHA256 or SHA256D for Blockchains 3: 4: maxbox Starter 54 - MS Cryptographic Service Provider 5: 6: As you may know a SHA (Secure

More information

CALIFORNIA SOFTWARE LABS

CALIFORNIA SOFTWARE LABS Wrapping Jini Services in ActiveX CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite 100 Pleasanton CA 94566, USA. Phone (925) 249 3000 Fax

More information

CS551 Object Oriented Middleware (IV) Dynamic Requests (Chap. 6 of EDO) Outline. Why Dynamic Request?

CS551 Object Oriented Middleware (IV) Dynamic Requests (Chap. 6 of EDO) Outline. Why Dynamic Request? CS551 Object Oriented Middleware (IV) Dynamic Requests (Chap. 6 of EDO) Yugi Lee STB #555 (816) 235-5932 yugi@cstp.umkc.edu www.cstp.umkc.edu/~yugi 1 Outline Dynamic Invocation The CORBA Dynamic Invocation

More information

How to Create a MindManager Add-in With Visual Studio in 7 Steps

How to Create a MindManager Add-in With Visual Studio in 7 Steps How to Create a MindManager Add-in With Visual Studio in 7 Steps Prerequisites: MindManager 7, 8 or 9 installed Visual Studio 2005, 2008 or 2010 installed Step One The first thing to do is download this

More information

Forensics Challenges. Windows Encrypted Content John Howie CISA CISM CISSP Director, Security Community, Microsoft Corporation

Forensics Challenges. Windows Encrypted Content John Howie CISA CISM CISSP Director, Security Community, Microsoft Corporation Forensics Challenges Windows Encrypted Content John Howie CISA CISM CISSP Director, Security Community, Microsoft Corporation Introduction Encrypted content is a challenge for investigators Makes it difficult

More information

Step-by-step installation guide for monitoring untrusted servers using Operations Manager

Step-by-step installation guide for monitoring untrusted servers using Operations Manager Step-by-step installation guide for monitoring untrusted servers using Operations Manager Most of the time through Operations Manager, you may require to monitor servers and clients that are located outside

More information

Add Address User s Manual

Add  Address User s Manual Add Email Address User s Manual Contents Welcome... 2 Configuring the Add-in... 3 Settings Tab... 4 Scan Now Tab... 6 Advanced Tab... 7 Troubleshooting... 8 Add Email Address Copyright 2008 2017 Sperry

More information

PI ProcessBook Add-ins and PI ActiveView, Making them work together January 2009

PI ProcessBook Add-ins and PI ActiveView, Making them work together January 2009 PI ProcessBook Add-ins and PI ActiveView, Making them work together January 2009 1994-2009 OSIsoft, Inc. All rights reserved OSIsoft, Inc. 777 Davis St., Suite 250 San Leandro, CA 94577 USA (01) 510-297-5800

More information

CALIFORNIA SOFTWARE LABS

CALIFORNIA SOFTWARE LABS Real-time Implementation of NAT and Firewall in VxWorks CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite 100 Pleasanton CA 94566, USA. Phone

More information

CA ERwin Data Modeler. API Reference Guide

CA ERwin Data Modeler. API Reference Guide CA ERwin Data Modeler API Reference Guide r8 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your

More information

YubiKey Smart Card Minidriver User Guide. Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n

YubiKey Smart Card Minidriver User Guide. Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n YubiKey Smart Card Minidriver User Guide Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n Copyright 2017 Yubico Inc. All rights reserved. Trademarks

More information

CALIFORNIA SOFTWARE LABS

CALIFORNIA SOFTWARE LABS JetSend Viewer for Windows CE CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite 100 Pleasanton CA 94566, USA. Phone (925) 249 3000 Fax (925)

More information

FIPS Security Policy

FIPS Security Policy FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided

More information

Jumble for Microsoft Outlook

Jumble for Microsoft Outlook Jumble for Microsoft Outlook Jumble provides truly usable and secure email encryption by integrating with existing email clients. Users can easily and securely communicate from their email client simply

More information

Amyuni PDF Creator for ActiveX

Amyuni PDF Creator for ActiveX Amyuni PDF Creator for ActiveX For PDF and XPS Version 4.5 Professional Quick Start Guide for Developers Updated October 2010 AMYUNI Consultants AMYUNI Technologies www.amyuni.com Contents Legal Information...

More information

YubiKey Smart Card Minidriver User Guide. Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n

YubiKey Smart Card Minidriver User Guide. Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n YubiKey Smart Card Minidriver User Guide Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n Copyright 2017 Yubico Inc. All rights reserved. Trademarks

More information

DBT-120 Bluetooth USB Adapter

DBT-120 Bluetooth USB Adapter DBT-120 Bluetooth USB Adapter Rev.2.1 (09/25/2002) 2 Contents Introduction... 5 Package Contents... 6 Installing Bluetooth Software... 6 Hardware Installation... 8 Introduction to Bluetooth Software...

More information

Implementing Messaging Security for Exchange Server Clients

Implementing Messaging Security for Exchange Server Clients Implementing Messaging Security for Exchange Server Clients Objectives Scenario At the end of this lab, you will be able to: Protect e-mail messages using S/MIME signing and encryption Manage e-mail attachment

More information

SECARDEO. certbox. Help-Manual. Secardeo GmbH Release:

SECARDEO. certbox. Help-Manual. Secardeo GmbH Release: certbox Help-Manual Secardeo GmbH Release: 02.12.2014 certbox Help Manual 02.12.2014 Table of Contents 1 Search and retrieve Public Key Certificates... 1 1.1 Search by an e-mail address... 1 1.2 Download

More information

erwin Data Modeler API Reference Guide Release 9.7

erwin Data Modeler API Reference Guide Release 9.7 erwin Data Modeler API Reference Guide Release 9.7 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation ), is

More information

Team Helpdesk for Outlook Agent Installation and Configuration (for version 9 and above)

Team Helpdesk for Outlook Agent Installation and Configuration (for version 9 and above) Team Helpdesk for Outlook Agent Installation and Configuration (for version 9 and above) Page 1 This install is meant for agents and technicians who would be working on support cases in the configured

More information

SQL Server Express Installation Guide

SQL Server Express Installation Guide SQL Server Express Installation Guide For SQL Server Express 2014 Last Updated 12/22/2016 All user guides are available for download on our support site at www.1-stepsoftware.com. This publication is the

More information

FRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc.

FRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc. FRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc. TABLE OF CONTENTS System Requirements... 2 I. Determining the.bit version of your Microsoft Office Suite... 2 III. Configuring the Outlook

More information

Jumble Encryption for Microsoft Outlook

Jumble  Encryption for Microsoft Outlook Jumble Email Encryption for Microsoft Outlook Jumble provides truly usable and secure email encryption by integrating with existing email clients. Users can easily and securely communicate from their email

More information

Running a Calculation Script using a MaxL Script

Running a Calculation Script using a MaxL Script Well, now that you know how to code a basic Essbase Command Script, we will describe the various methods for executing it. They are as follows: Chapter 5 1. EssCmd Drag and Drop: Your client software should

More information

CO-LaN Annual meeting Sept 2014, Frankfurt, Germany

CO-LaN Annual meeting Sept 2014, Frankfurt, Germany Slide 1 IUnknown IDispatch ICapeIdentification ICape. A.k.a. the boring stuff CO-LaN Annual meeting Sept 2014, Frankfurt, Germany Slide 2 IUnknown IDispatch ICapeIdentification ICape. MicroSoft Visual

More information

ZoomText 9.1. User s Guide Addendum. Ai Squared

ZoomText 9.1. User s Guide Addendum. Ai Squared ZoomText 9.1 User s Guide Addendum Ai Squared Copyrights ZoomText Magnifier Copyright 2008, Algorithmic Implementations, Inc. All Rights Reserved. ZoomText Magnifier/Reader Copyright 2008, Algorithmic

More information

Using on Your Sprint PCS Vision Smart Device PPC-6700

Using  on Your Sprint PCS Vision Smart Device PPC-6700 Using Email on Your Sprint PCS Vision Smart Device PPC-6700 2006 Sprint Nextel. All rights reserved. SPRINT, the "Going Forward" logo, and other trademarks are trademarks of Sprint Nextel. June 7, 2006

More information

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc.

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc. Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0 Juniper Networks, Inc. September 10, 2009 Copyright Juniper Networks, Inc. 2009. May be reproduced only in

More information

Download the Driver software from the following link: Establish Bluetooth Connection

Download the Driver software from the following link: Establish Bluetooth Connection Download the Driver software from the following link: http://files.microinv.com/micro_drivers/usb50bt%20driver.zip Establish Bluetooth Connection A connection is normally initiated from the client. On

More information

keyon / PKCS#11 to MS-CAPI Bridge User Guide V2.4

keyon / PKCS#11 to MS-CAPI Bridge User Guide V2.4 / PKCS#11 to MS-CAPI Bridge V2.4 April 2017 Table of Contents Copyright 2017 by AG All rights reserved. No part of the contents of this manual may be reproduced or transmitted in any form or by any means

More information

Encrypting and Decrypting using CTR and CBC Modes in C# with BouncyCastle

Encrypting and Decrypting using CTR and CBC Modes in C# with BouncyCastle SE425: Communication and Information Security Recitation 5 Semester 2 5778 16 April 2018 Encrypting and Decrypting using CTR and CBC Modes in C# with BouncyCastle In this week s recitation we ll learn

More information

Hands-On Lab. Getting Started with Office 2010 Development. Lab version: Last updated: 2/23/2011

Hands-On Lab. Getting Started with Office 2010 Development. Lab version: Last updated: 2/23/2011 Hands-On Lab Getting Started with Office 2010 Development Lab version: 1.0.0 Last updated: 2/23/2011 CONTENTS OVERVIEW... 3 Starting Materials 3 EXERCISE 1: CUSTOMIZING THE OFFICE RIBBON IN OFFICE... 4

More information

MailEnable Connector for Microsoft Outlook

MailEnable Connector for Microsoft Outlook MailEnable Connector for Microsoft Outlook Version 1.41 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for

More information

Command Prompt Codes Bypass System Error 5 Has Occurred Access Denied

Command Prompt Codes Bypass System Error 5 Has Occurred Access Denied Command Prompt Codes Bypass System Error 5 Has Occurred Access Denied Close the Command Prompt window and reboot the machine, retry to connect the networks which are It says Access is denied system error

More information

EMC White Paper Documentum Client for Outlook (DCO)

EMC White Paper Documentum Client for Outlook (DCO) EMC White Paper Documentum Client for Outlook (DCO) Troubleshooting Guide Copyright 2005 EMC Corporation. All rights reserved. EMC believes the information in this publication is accurate as of its publication

More information

SafeGuard LAN Crypt: Loading Profile Troubleshooting Guide

SafeGuard LAN Crypt: Loading Profile Troubleshooting Guide 1 Troubleshooting Guide SafeGuard LAN Crypt: Loading Profile Troubleshooting Guide Document date: 26/11/2014 Contents 1 Introduction... 4 2 SafeGuard LAN Crypt User application... 4 3 Loading the user

More information

CorpSystem Workpaper Manager

CorpSystem Workpaper Manager CorpSystem Workpaper Manager Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

Yubikey Configuration COM API

Yubikey Configuration COM API Yubikey Configuration COM API YubiKey device Windows configuration component Version: 2.2 May 22, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection.

More information

Industrial Strength Add-Ins: Creating Commands in Autodesk Inventor

Industrial Strength Add-Ins: Creating Commands in Autodesk Inventor Industrial Strength Add-Ins: Creating Commands in Autodesk Inventor Brian Ekins Autodesk, Inc. DE211-4 This session focuses on techniques that will help you produce an industrial strength add-in application.

More information

This Security Policy describes how this module complies with the eleven sections of the Standard:

This Security Policy describes how this module complies with the eleven sections of the Standard: Vormetric, Inc Vormetric Data Security Server Module Firmware Version 4.4.1 Hardware Version 1.0 FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation May 24 th, 2012 2011 Vormetric Inc. All rights

More information

VMware Horizon JMP Server Installation and Setup Guide. 13 DEC 2018 VMware Horizon 7 7.7

VMware Horizon JMP Server Installation and Setup Guide. 13 DEC 2018 VMware Horizon 7 7.7 VMware Horizon JMP Server Installation and Setup Guide 13 DEC 2018 VMware Horizon 7 7.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you

More information

Managing Certificates

Managing Certificates CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer

More information

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1 ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation April 2012 Copyright 2012 Algorithmic Research This document

More information

Optional Lab: Customize Settings in Windows Vista

Optional Lab: Customize Settings in Windows Vista 12.2.4 Optional Lab: Customize Settings in Windows Vista Introduction Print and complete this lab. This lab is comprised of five parts. This lab is designed to be completed in multiple lab sessions. Part

More information

ProtectV StartGuard. FIPS Level 1 Non-Proprietary Security Policy

ProtectV StartGuard. FIPS Level 1 Non-Proprietary Security Policy ProtectV StartGuard FIPS 140-2 Level 1 Non-Proprietary Security Policy DOCUMENT NUMBER: 002-010841-001 AUTHOR: DEPARTMENT: LOCATION OF ISSUE: SafeNet Certification Team R & D Program Managaement Redwood

More information

MODULE 5.1 PLATFORMS VS. STATIONS

MODULE 5.1 PLATFORMS VS. STATIONS MODULE 5.1 PLATFORMS VS. STATIONS Platform According to www.bellevuelinux.org The term platform as used in a computer context can refer to: (1) the type of processor and/or other hardware on which a given

More information

Hands-On Lab. Sensors & Location Platform - Native. Lab version: 1.0.0

Hands-On Lab. Sensors & Location Platform - Native. Lab version: 1.0.0 Hands-On Lab Sensors & Location Platform - Native Lab version: 1.0.0 Last updated: 12/3/2010 CONTENTS OVERVIEW... 3 EXERCISE 1: ADJUSTING FONT SIZE IN RESPONSE TO AMBIENT LIGHT INTENSITY... 5 Task 1 Adding

More information

Team TimeSheet for Outlook & SharePoint Client Installation and Configuration ( Per User Installation and Per Machine Installation )

Team TimeSheet for Outlook & SharePoint Client Installation and Configuration ( Per User Installation and Per Machine Installation ) Team TimeSheet for Outlook & SharePoint Client Installation and Configuration ( Per User Installation and Per Machine Installation ) Page 1 This install is meant for normal users who would be preparing

More information

Client Configuration Cookbook

Client Configuration Cookbook Sitecore CMS 6.2 Client Configuration Cookbook Rev: 2009-10-20 Sitecore CMS 6.2 Client Configuration Cookbook Features, Tips and Techniques for CMS Architects and Developers Table of Contents Chapter 1

More information

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide Microsoft Office Groove Server 2007 Groove Manager Domain Administrator s Guide Copyright Information in this document, including URL and other Internet Web site references, is subject to change without

More information

PaperVision Message Manager. User Guide. PaperVision Message Manager Release 71

PaperVision Message Manager. User Guide. PaperVision Message Manager Release 71 PaperVision Message Manager User Guide PaperVision Message Manager Release 71 June 2010 Information in this document is subject to change without notice and does not represent a commitment on the part

More information

DCOM. Distributed Component Object Model (White Paper)

DCOM. Distributed Component Object Model (White Paper) DCOM Distributed Component Object Model (White Paper) 1 Summary 1 Summary...2 2 About This Document...3 2.1 Scope of the Document...3 2.2 Copyright...3 2.3 Revision History...3 2.4 Product Reference...3

More information

Administrator s Guide (CA QIWI Bank)

Administrator s Guide (CA QIWI Bank) PUT&GET MAIL (PGM) Administrator s Guide (CA QIWI Bank) MOSCOW March 2017 PGM Administrator s Guide (QIWI) INDEX 1. SETTING UP... 2 1.1. COMMON SETTINGS... 2 1.2. POINT CONFIGURATIONS... 2 1.2.1. Options

More information

Mobile MOUSe.NET SECURITY FOR DEVELOPERS PART 2 ONLINE COURSE OUTLINE

Mobile MOUSe.NET SECURITY FOR DEVELOPERS PART 2 ONLINE COURSE OUTLINE Mobile MOUSe.NET SECURITY FOR DEVELOPERS PART 2 ONLINE COURSE OUTLINE COURSE TITLE.NET SECURITY FOR DEVELOPERS PART 2 COURSE DURATION 15 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW In the.net

More information

GIGABYTE Remote Management Console User s Guide. Version: 1.0

GIGABYTE Remote Management Console User s Guide. Version: 1.0 GIGABYTE Remote Management Console User s Guide Version: 1.0 Table of Contents Using Your GIGABYTE Remote Management Console...2 Software Install...3 Prerequisites on remote management PC...3 Install Java

More information

The following are required to duplicate the process outlined in this document.

The following are required to duplicate the process outlined in this document. Technical Note ClientAce WPF Project Example 1. Introduction Traditional Windows forms are being replaced by Windows Presentation Foundation 1 (WPF) forms. WPF forms are fundamentally different and designed

More information

User Guide. 3CX Audio Scheduler. Version

User Guide. 3CX Audio Scheduler. Version User Guide 3CX Audio Scheduler Version 15.5.21 "Copyright VoIPTools, LLC 2011-2018" Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted

More information

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography Code No: RR410504 Set No. 1 1. Write short notes on (a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography 3. (a) Illustrate Diffie-hellman Key Exchange scheme for GF(P) [6M] (b) Consider

More information

Cipher Suite Configuration Mode Commands

Cipher Suite Configuration Mode Commands The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables

More information

CHAPTER 8 Scripting. Here are just a few examples of things you can do with ZoomText scripting:

CHAPTER 8 Scripting. Here are just a few examples of things you can do with ZoomText scripting: CHAPTER 8 Scripting In todayʹs computer centric world, visually impaired individuals are challenged to meet the same performance goals as their normal sighted peers. In many situations, especially job

More information

YubiKey Smart Card Deployment Guide

YubiKey Smart Card Deployment Guide YubiKey Smart Card Deployment Guide Best Practices and Basic Setup YubiKey 4 Series (YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano) YubiKey NEO Series (YubiKey NEO, YubiKey NEO-n) Last Updated:

More information

Lab - System Utilities in Windows

Lab - System Utilities in Windows Introduction In this lab, you will use Windows utilities to configure operating system settings. Recommended Equipment The following equipment is required for this exercise: A computer running Windows

More information

Imprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016

Imprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016 Imprivata FIPS 140-2 Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016 Copyright Imprivata 2016, all rights reserved Imprivata FIPS Crypto Module 1 Table of Contents

More information

4D WebSTAR V User Guide for Mac OS. Copyright (C) D SA / 4D, Inc. All rights reserved.

4D WebSTAR V User Guide for Mac OS. Copyright (C) D SA / 4D, Inc. All rights reserved. 4D WebSTAR V User Guide for Mac OS Copyright (C) 2002 4D SA / 4D, Inc. All rights reserved. The software described in this manual is governed by the grant of license provided in this package. The software

More information

FRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc.

FRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc. FRM FOR OUTLOOK PLUGIN INSTALLATION GUIDE FRM Solutions, Inc. TABLE OF CONTENTS System Requirements... 2 I. Determining the.bit version of your Microsoft Office Suite... 2 II. Determine your version of

More information

EL-USB-RT API Guide V1.0

EL-USB-RT API Guide V1.0 EL-USB-RT API Guide V1.0 Contents 1 Introduction 2 C++ Sample Dialog Application 3 C++ Sample Observer Pattern Application 4 C# Sample Application 4.1 Capturing USB Device Connect \ Disconnect Events 5

More information

Best Practice - Programming Ribbons

Best Practice - Programming Ribbons Best Practice - Programming Ribbons Copyright 2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc., registered in the U.S. and/or other countries. All other trademarks

More information

User Manual Zultys Outlook Communicator V.2

User Manual Zultys Outlook Communicator V.2 Technical Publications January 13 User Manual Zultys Outlook Communicator V.2 Author: Zultys Technical Support Department. Z Z u l t y s, I n c. 7 8 5 L u c e r n e S u n n y v a l e, C a l i f o r n i

More information

SAS Simulation Studio 14.1: User s Guide. Introduction to SAS Simulation Studio

SAS Simulation Studio 14.1: User s Guide. Introduction to SAS Simulation Studio SAS Simulation Studio 14.1: User s Guide Introduction to SAS Simulation Studio This document is an individual chapter from SAS Simulation Studio 14.1: User s Guide. The correct bibliographic citation for

More information

Browser Configuration Reference

Browser Configuration Reference Sitecore CMS 7.0 or later Browser Configuration Reference Rev: 2013-09-30 Sitecore CMS 7.0 or later Browser Configuration Reference Optimizing Internet Explorer and other web browsers to work with Sitecore

More information

But where'd that extra "s" come from, and what does it mean?

But where'd that extra s come from, and what does it mean? SSL/TLS While browsing Internet, some URLs start with "http://" while others start with "https://"? Perhaps the extra "s" when browsing websites that require giving over sensitive information, like paying

More information

Using the SSM Administration Console

Using the SSM Administration Console CHAPTER 6 Your user role controls whether you can access the SSM Administration Console. The following information is included in this section: SSM Administration Console Overview, page 6-1 Launching the

More information

OpenText RightFax 10.0 SecureDocs Guide

OpenText RightFax 10.0 SecureDocs Guide OpenText RightFax 10.0 SecureDocs Guide OpenText RightFax 10.0 SecureDocs Guide ii Edition OpenText RightFax 10.0 SecureDocs. This document was last updated May 25, 2011. Trademarks OpenText is a registered

More information

Configuring Microsoft Outlook to Connect to Hosted Exchange Service

Configuring Microsoft Outlook to Connect to Hosted Exchange Service Configuring Microsoft Outlook to Connect to Hosted Exchange Service Configuring Microsoft Outlook for Hosted Exchange Service Version: 1.0 Updated on: April 27, 2011 Page 1 of 7 TABLE OF CONTENTS Configuring

More information

Project management integrated into Outlook

Project management integrated into Outlook Project management integrated into Outlook InLoox PM 7.x off-line operation An InLoox Whitepaper Published: November 2011 Copyright: 2011 InLoox GmbH. You can find up-to-date information at http://www.inloox.com

More information

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/grpolwt.htm

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/grpolwt.htm Page 1 of 17 Windows 2000 Server Step-by-Step Guide to Understanding the Group Policy Feature Set Operating System Abstract Group Policy is the central component of the Change and Configuration Management

More information

Application of Cryptography in.net Framework

Application of Cryptography in.net Framework Application of Cryptography in.net Framework Paul Lo Software Engineer in Cyberwisdom.net M.Math(CS), MCSD..net Overview Basic Cryptography CryptoAPI enhancement in.net AES support in.net XML Signature

More information

Interfacing Ada 95 to Microsoft COM and DCOM Technologies

Interfacing Ada 95 to Microsoft COM and DCOM Technologies Interfacing Ada 95 to Microsoft COM and DCOM Technologies Interactive Intelligence, Inc. 600 West Hillsboro Blvd., Suit 325 Deerfield Beach, Florida 33441 (954) 698-0030x187 David Botton David@Botton.com

More information

USER GUIDE. We hope you enjoy using the product, and please don t hesitate to send us questions or provide feedback at Thank You.

USER GUIDE. We hope you enjoy using the product, and please don t hesitate to send us questions or provide feedback at Thank You. USER GUIDE Introduction This User Guide is designed to serve as a brief overview to help you get started. There is also information available under the Help option in the various Contributor interface

More information

Crypto Library. Microchip Libraries for Applications (MLA) Copyright (c) 2012 Microchip Technology Inc. All rights reserved.

Crypto Library. Microchip Libraries for Applications (MLA) Copyright (c) 2012 Microchip Technology Inc. All rights reserved. Crypto Library Microchip Libraries for Applications (MLA) Copyright (c) 2012 Microchip Technology Inc. All rights reserved. MLA - Crypto Library Help Table of Contents 1 Crypto Library 6 1.1 Introduction

More information

Client Configuration Cookbook

Client Configuration Cookbook Sitecore CMS 6.4 or later Client Configuration Cookbook Rev: 2013-10-01 Sitecore CMS 6.4 or later Client Configuration Cookbook Features, Tips and Techniques for CMS Architects and Developers Table of

More information

Teradici PCoIP Virtual Channel Software Development Kit

Teradici PCoIP Virtual Channel Software Development Kit Teradici PCoIP Virtual Channel Software Development Kit Version 1.1 Developers' Guide TER1502008-1.1 Document History The following table records changes and revisions made to this document since the inaugural

More information

How to create an Add-In extension.dll file and make it available from Robot pull down menu. (language C#)

How to create an Add-In extension.dll file and make it available from Robot pull down menu. (language C#) 2018 Autodesk, Inc. All Rights Reserved. Except as otherwise permitted by Autodesk, Inc., this publication, or parts thereof, may not be reproduced in any form, by any method, for any purpose. Certain

More information

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8 Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.8 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1 Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

CollabNet Desktop - Microsoft Windows Edition

CollabNet Desktop - Microsoft Windows Edition CollabNet Desktop - Microsoft Windows Edition User Guide 2009 CollabNet Inc. CollabNet Desktop - Microsoft Windows Edition TOC 3 Contents Legal fine print...7 CollabNet, Inc. Trademark and Logos...7 Chapter

More information

TxEIS on Internet Explorer 8

TxEIS on Internet Explorer 8 TxEIS on Internet Explorer 8 General Set Up Recommendations: Several modifications will need to be made to the computer settings in Internet Explorer to ensure TxEIS runs smoothly, reports pop up as desired,

More information

Version 9.0 SecureDocs Module Guide

Version 9.0 SecureDocs Module Guide Version 9.0 SecureDocs Module Guide RightFax 9.0 SecureDocs Module Guide ii Edition Information in this document applies to version 9.0 of the SecureDocs Module Guide. Copyright Notice 2004 Captaris. All

More information

ImageNow Interact for Microsoft Office Installation and Setup Guide

ImageNow Interact for Microsoft Office Installation and Setup Guide ImageNow Interact for Microsoft Office Installation and Setup Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive

More information

PageScope Box Operator Ver. 3.2 User s Guide

PageScope Box Operator Ver. 3.2 User s Guide PageScope Box Operator Ver. 3.2 User s Guide Box Operator Contents 1 Introduction 1.1 System requirements...1-1 1.2 Restrictions...1-1 2 Installing Box Operator 2.1 Installation procedure...2-1 To install

More information

Assureon Installation Guide Client Certificates. for Version 6.4

Assureon Installation Guide Client Certificates. for Version 6.4 Client Certificates for Version 6.4 Publication info 2011 Nexsan Technologies Canada Inc. All rights reserved. Published by: Nexsan Technologies Canada Inc. 1405 Trans Canada Highway, Suite 300 Dorval,

More information

Workspace ONE UEM Certificate Authority Integration with Microsoft ADCS Using DCOM. VMware Workspace ONE UEM 1811

Workspace ONE UEM Certificate Authority Integration with Microsoft ADCS Using DCOM. VMware Workspace ONE UEM 1811 Workspace ONE UEM Certificate Authority Integration with Microsoft ADCS Using DCOM VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Security Policy for FIPS KVL 3000 Plus

Security Policy for FIPS KVL 3000 Plus Security Policy for FIPS 140-2 KVL 3000 Plus Version 01.01.19 Motorola General Business Information 1 of 21 Motorola General Business Information 2 of 21 1 INTRODUCTION... 4 1.1 SCOPE... 4 1.2 OVERVIEW...

More information

MailEnable Connector for Microsoft Outlook

MailEnable Connector for Microsoft Outlook MailEnable Connector for Microsoft Outlook Version 1.36 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for

More information

Creative USB Adapter CB2431 with Bluetooth Wireless Technology. User s Guide

Creative USB Adapter CB2431 with Bluetooth Wireless Technology. User s Guide Creative USB Adapter CB2431 with Bluetooth Wireless Technology User s Guide Application Setup & User s Guide Information in this document is subject to change without notice and does not represent a commitment

More information

Using VMware View Client for Mac

Using VMware View Client for Mac May 2012 View Client for Mac This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information