IJARCCE. International Journal of Advanced Research in Computer and Communication Engineering ISO 3297:2007 Certified Vol. 7, Issue 1, January 2018

Size: px
Start display at page:

Download "IJARCCE. International Journal of Advanced Research in Computer and Communication Engineering ISO 3297:2007 Certified Vol. 7, Issue 1, January 2018"

Transcription

1 Internatinal Jurnal f Advanced Research in Cmputer and Cmmunicatin Engineering Vl. 7, Issue 1, January 2018 An Anatmy f Windws Executable File (EXE) and Linux Executable and Linkable Frmat File (ELF) Frmats fr Digital Frensic Analysis and Anti-Virus Design Purpses Mhammed A. Saleh Cmputer Science Department, Cllege f Sciences and Arts in Ar Rass, Qassim University, Kingdm f Saudi Arabia Abstract: The era f frensic analysis and anti-virus design requires a clear anatmy f Windws Executable File (EXE) and Linux Executable Linkable Frmat File (ELF) Frmats, especially fr beginners t these fields; thus, this research cmes ut. First, this research identifies data structures fr bth files frmats, namely EXE and ELF files frmats. After that, it classifies them accrding t headers, sectins, and resurces based n specific features and functinalities. Finally, this research prpses analysis guidelines fr EXE and ELF files frmats frensic analysis and anti-virus design purpses. Keywrds: Anatmy f EXE frmat file, anatmy f ELF frmat file, anti-virus design, digital frensic analysis. I. INTRODUCTION Windws Executable File (EXE) and Linux Executable and Linkable Frmat File (ELF) files frmats dminate executable files in cmputer era. Windws Executable File (EXE) in an executable file fr Windws perating system, while Linux Executable and Linkable Frmat File (ELF) is an executable file fr Unix-Like perating systems, such as Linux and BSD. Since Windws and Linux perating systems are the mst widely used perating systems n the glbe, EXE and ELF are cmmnly spread, t [1][2]. Hwever, digital frensic analyst and anti-virus designer seek t be familiar with EXE and ELF file frmats in rder t analyse them prperly, and adpt their slutins accrdingly. Digital frensic analyst needs t identify file frmat and architecture, and then investigate it. After that, in case the malicius executable file is detected, an anti-virus needs t update its database, s it be able t detect it later n. The fllwing sectins analyse and discuss an anatmy f Windws Executable File (EXE) and Linux Executable and Linkable Frmat File (ELF) frmats fr digital frensic analysis and anti-virus design purpses in granular details [2][3][4][5][6]. II. LITERATURE REVIEW In reality, Windws Executable File (EXE), and Linux Executable and Linkable Frmat File (ELF) structures have many identical features and functinalities, and n the ther hand, they have nt. Bth f EXE and ELF frmat s files are frmed and cnstructed thrughut data structures. In general, ELF frmat s file cmprises f three main successive structures, namely Elfxx_Ehdr structure, Elfxx_Phdr structure, and Elfxx_Shdr structure, where xx is 32 fr 32-bits structure, r 64 fr 64-bits structure. On the ther hand, EXE frmat s file encmpasses f five main cnsecutive structures, such as IMAGE_DOS_HEADER structure, IMAGE_NT_HEADERS structure, IMAGE_FILE_HEADER structure, IMAGE_OPTIONAL_HEADER structure, and IMAGE_SECTION_HEADER structure. In additin, IMAGE_OPTIONAL_HEADER structure cntains sub structure called DataDirectry used t include further sub structures like IMAGE_EXPORT_DIRECTORY structure, IMAGE_IMPORT_DESCRIPTOR structure, and IMAGE_RESOURCE_DATA_ENTRY structure. The fllwing Table 1 summarizes structures f EXE and ELF frmat s files [7][8][4][9][10][11][12][13][14]. Cpyright t IJARCCE DOI /IJARCCE

2 Internatinal Jurnal f Advanced Research in Cmputer and Cmmunicatin Engineering Vl. 7, Issue 1, January 2018 TABLE 1: A Summary f Windws Executable File (EXE) Data Structures, and Linux Executable and Linkable Frmat File (ELF) Data Structures ELF File Frmat Elf32_Ehdr e_ident (0x7f ELF) e_type (relc, exe, ) e_machine (Arch.) e_entry (virtaddr f.text) e_phff (ph table s ffset) e_shff (sh table s ffset) e_ehsize e_phentsize e_phnum e_shentsize e_shnum Elf32_Phdr p_type (LOAD, DYNAMIC, INTERP) p_ffset (beginning f file) p_vaddr p_paddr p_filesz p_memsz p_flags (X, W, R) p_align Elf32_Shdr sh_name (.data,.text,.bss) sh_type (PROGBITS, SYMTAB, NOBITS, REL) sh_flags (Data_w, Cde_X) sh_addr sh_size sh_ffset (beginning f file) sh_addralign sh_entsize EXE File Frmat IMAGE_DOS_HEADER e_magic (MZ) e_ss e_sp e_ip e_cs e_lfanew (PE file header Offset) MS-DOS 2.0 Stub Prgram IMAGE_NT_HEADERS Signature (PE00) FileHeader OptinalHeader IMAGE_FILE_HEADER Machine (Arch.) NumberOfSectins TimeDateStamp SizeOfOptinalHeader acteristics (exe, dll, system files,...) IMAGE_OPTIONAL_HEADER Magic (0x10b=PE32, 0x20b=PE32+) SizeOfCde (Size f executable cde) SizeOfInitializedData (Size f Initialized Data) SizeOfUninitializedData (Size f Uninitialized Data) AddressOfEntryPint (virtaddr f.text) BaseOfCde (Relative ffset f cde) BaseOfData (Relative ffset f Data) ImageBase SectinAlignment FileAlignment SizeOfImage SizeOfHeaders NumberOfRvaAndSizes DataDirectry[NumberOfRvaAndSizes] IMAGE_SECTION_HEADER VirtualAddress SizeOfRawData PinterTRawData acteristics (Cde, Initialized data, Uninitialized data, Resurce, +X, +W, +R, ) 7. DataDirectry[NumberOfRvaAndSizes] IMAGE_EXPORT_DIRECTORY Base NumberOfFunctins NumberOfs AddressOfFunctins AddressOfs AddressOfOrdinals IMAGE_IMPORT_DESCRIPTOR Cpyright t IJARCCE DOI /IJARCCE

3 Internatinal Jurnal f Advanced Research in Cmputer and Cmmunicatin Engineering Vl. 7, Issue 1, January 2018 OriginalFirstThunk TimeDateStamp FrwarderChain FirstThunk IMAGE_IMPORT_BY_NAME Hint [1] IMAGE_RESOURCE_DIRECTORY NumberOfdEntries NumberOfIdEntries IMAGE_RESOURCE_DIRECTORY_ENTR Y Id Data IMAGE_RESOURCE_DATA_ENTRY Data Size CdePage Reserved III. CLASSIFYING WINDOWS EXECUTABLE FILE (EXE) AND LINUX EXECUTABLE AND LINKABLE FORMAT FILE (ELF) DATA STRUCTURES The fllwing Table 2 presents a classificatin f identical headers fr Windws Executable File (EXE) and Linux Executable and Linkable Frmat File (ELF) data structures based n a feature/functinality. It shws a Feature/Functinality in the first clumn, ELF Frmat File in the secnd clumn, and EXE Frmat File in the third clumn. These data structures are used t identify file frmat, type, and architecture. In additin, they are used t calculate ffsets t sectins, determine prgram entry pint, and set sectins permissins [4][7][8][4][9][10][11][12][13][14]. TABLE 2: A Classificatin f Identical headers fr Windws Executable File (EXE) and Linux Executable and Linkable Frmat File (ELF) Data Structures based n a Feature/Functinality Feature/Functinality ELF Frmat File EXE Frmat File Magic Value Elf32_Ehdr e_ident (0x7f ELF) Next Structs Offset Elf32_Ehdr e_phff e_shff Machine Architecture Elf32_Ehdr e_machine File Type Elf32_Ehdr Cpyright t IJARCCE DOI /IJARCCE IMAGE_DOS_HEADER e_magic (MZ) IMAGE_DOS_HEADER e_lfanew (Offset t PE) IMAGE_NT_HEADERS Signature (PE00) FileHeader OptinalHeader IMAGE_FILE_HEADER Machine IMAGE_FILE_HEADER acteristics (exe, dll, system files,...)

4 Internatinal Jurnal f Advanced Research in Cmputer and Cmmunicatin Engineering Vl. 7, Issue 1, January 2018 ) e_type (relc, exe, Prgram Entry Pint Elf32_Ehdr e_entry (.text) Prgram Sectins Number Elf32_Ehdr e_shnum Permissins Elf32_Phdr p_flags (X, W, R) Elf32_Shdr sh_flags (Data_w, Cde_X) IMAGE_OPTIONAL_HEADER AddressOfEntryPint (.text) IMAGE_FILE_HEADER NumberOfSectins IMAGE_SECTION_HEADER acteristics (Cde, Initialized data, Uninitialized data, Resurce, +X, +W, +R, ) As well, Table 3 belw presents a classificatin f identical sectins fr Windws Executable File (EXE) and Linux Executable and Linkable Frmat File (ELF) data structures based n a feature/functinality. The purpses f these data structures are used t lcate and lad text sectin, namely.text sectin, and execute it accrdingly, which represents executable instructins. Besides that, they lcate and lad an initialized and uninitialized sectins, such as.data,.rdata,.pdata, and.bss sectins that are used fr string glbal and lcal variables, strings names, and cnstants. In additin, they lcate and lad a resurce sectin, namely.rsrc that is used nly fr Windws Executable File (EXE). Table 4 belw prvides granular details f.rsrc sectin [4][7][8][4][9][10][11][12][13][14]. TABLE 3: A Classificatin f Identical Sectins fr Windws Executable File (EXE) and Linux Executable and Linkable Frmat File (ELF) Data Structures based n a Feature/Functinality Feature/Functinality ELF Frmat File EXE Frmat File Text Sectin (.text) Initialized Data Sectin (.data,.rdata,.pdata, idata, edata) Elf32_Shdr sh_name (.text) sh_type (PROGBITS, REL) sh_flags (Cde_X) sh_addr sh_size sh_ffset (beginning f file) Elf32_Shdr sh_name (.data) sh_type (PROGBITS) sh_flags (Data_w) sh_addr sh_size sh_ffset (beginning f file) IMAGE_OPTIONAL_HEADER SizeOfCde (Size f executable cde) BaseOfCde (Relative ffset f cde) IMAGE_SECTION_HEADER VirtualAddress SizeOfRawData PinterTRawData acteristics (Cde, +X, +W, +R, ) IMAGE_OPTIONAL_HEADER SizeOfInitializedData (Size f Initialized Data) BaseOfData (Relative ffset f Data) IMAGE_SECTION_HEADER VirtualAddress SizeOfRawData PinterTRawData Cpyright t IJARCCE DOI /IJARCCE

5 Internatinal Jurnal f Advanced Research in Cmputer and Cmmunicatin Engineering Vl. 7, Issue 1, January 2018 Uninitialized Data Sectin (.bss) Resurce Sectin (.rsrc) Elf32_Shdr sh_name (.bss) sh_type (PROGBITS) sh_flags (Data_w) sh_addr sh_size sh_ffset (beginning f file) acteristics (Initialized data, +X, +W, +R, ) IMAGE_OPTIONAL_HEADER SizeOfUninitializedData (Size f Uninitialized Data) IMAGE_SECTION_HEADER VirtualAddress SizeOfRawData PinterTRawData acteristics (Uninitialized data, Resurce, +X, +W, +R, ) N/A IMAGE_OPTIONAL_HEADER NumberOfRvaAndSize DataDirectry[NumberOfRvaAndSizes] Sectin Packer, Encryptr, and Prtectr Manipulate sectins, and change prgram entry pint. IMAGE_SECTION_HEADER VirtualAddress SizeOfRawData PinterTRawData acteristics (Resurce, +X, +W, +R, ) Manipulate sectins, and change prgram entry pint. Finally, Table 4 belw details a classificatin f a resurce sectin fr Windws Executable File (EXE) and Linux Executable and Linkable Frmat File (ELF) data structures based n a feature/functinality. The data structures identify a resurce type whether is imprted functins, exprted functins, r merely a resurce like buttns, menus, etc. After that, these sectins are laded accrdingly [4][7][8][4][9][10][11][12][13][14]. TABLE 4: A Classificatin f Resurce Sectin fr Windws Executable File (EXE) and Linux Executable and Linkable Frmat File (ELF) Data Structure based n a Feature/Functinality Feature/Functinality ELF Frmat File EXE Frmat File Resurce Sectin (.rsrc) N/A IMAGE_OPTIONAL_HEADER DataDirectry[NumberOfRvaAndSizes] IMAGE_EXPORT_DIRECTORY Base NumberOfFunctins NumberOfs AddressOfFunctins AddressOfs AddressOfOrdinals Cpyright t IJARCCE DOI /IJARCCE

6 Internatinal Jurnal f Advanced Research in Cmputer and Cmmunicatin Engineering Vl. 7, Issue 1, January 2018 IMAGE_IMPORT_DESCRIPTOR OriginalFirstThunk TimeDateStamp FrwarderChain FirstThunk IMAGE_IMPORT_BY_NAME Hint [1] IMAGE_RESOURCE_DIRECTORY NumberOfdEntries NumberOfIdEntries IMAGE_RESOURCE_DIRECTORY_EN TRY Id Data IMAGE_RESOURCE_DATA_ENTRY Data Size CdePage Reserved IV. MALWARE ANALYSIS GUIDELINES FOR WINDOWS EXECUTABLE FILE (EXE) AND LINUX EXECUTABLE AND LINKABLE FORMAT FILE (ELF) FORMATS FORENSIC ANALYSIS AND ANTI-VIRUS DESIGN PURPOSES 1. Firstly, inspect headers values f EXE and ELF frmats file, as explained in Table 2 abve, in rder t determine the right structures values. Hwever, sme malware authrs bfuscate the written malware by appending r padding varius bytes in begin, specific lcatins, r end f malware sample in rder t prevent malware analysis and make it harder t the experts. Hence, a further deeper inspectin is required t carve the crrect structure values frm malware sample. 2. After that, inspect existence f sectins header values as depicted in Table 3 abve. Here there are tw dissimilar ptins: i. The sectins names are identical t names shwn in Table 3 abve, then fllw step 3 belw. ii. The sectins names are different frm names shwn Table 3 abve, and then fllw step 4 belw. 3. Investigate and analyze.text sectin, which has the executable instructins, using static and dynamic analysis. Additinally, analyze.data,.rdata,.pdata, idata, edata, and ther data sectins, which hld variables names and values, strings names and values, cnstants names and values, imprted functins, and exprted functins. Indeed, this step leads t explain malwares harms and negative impacts. 4. In this case, the default sectins names f a malware sample are changed by malware authrs themselves t bfuscate the analysis and make it harder fr the experts. They accmplish this missin by using a Packer, an Encryptr, r a Prtectr t change the riginal value f Prgram Entry Pint t a new ne. During prgram executin, it returns the riginal sectins names and executes them accrdingly. Therefre, the malware sample needs t be decrypted r unpacked first, and then fllw step iii abve. 5. Afterwards, inspect and investigate any extra sectins names ther than whse mentined abve, which created and adpted by sme malware authrs, by fllwing step iii abve. 6. Then, inspect and investigate.rsrc sectin f exe frmat file, which hld an imprtant data t malware sample. Usually, malware authrs hide harmful instructins inside this sectin. Cpyright t IJARCCE DOI /IJARCCE

7 Internatinal Jurnal f Advanced Research in Cmputer and Cmmunicatin Engineering Vl. 7, Issue 1, January Finally, a frensic analyst writes dwn a detailed frensic analysis based n a malware sample investigatin, especially headers data structures, executable instructins and data sectins, and packing and encrypting f sectins data structures. As well, an anti-virus designer cmputes digest hash values, such as sha256 hash functin, fr a malware sample and it s all sectins t update its anti-virus database, hence an anti-virus detects a malware sample later n. V. CONCLUSION Digital frensic analysis and an anti-virus design are imprtant services and tls in cmputer era, which need a deep understanding f the mst cmmn executable files, namely Windws Executable File (EXE) and Linux Executable Linkable Frmat File (ELF) files frmats. Thus, this research studied, analysed, and discussed an anatmy f Windws Executable File (EXE) and Linux Executable and Linkable Frmat File (ELF) frmats fr digital frensic analysis and anti-virus design purpses. As well, it prpsed analysis guidelines fr EXE and ELF files frmats frensic analysis and anti-virus design purpses. The prpsed guidelines demnstrate sequential steps t be fllwed by digital frensic analyst and an anti-virus designer in rder t analyse and classify any executable files whether is a malicius r benign file. Overall, these guidelines invlve identify data structures fr bth files frmats, and then classify them accrding t headers, sectins, and resurces based n specific features and functinalities. Finally, a frensic analyst writes dwn a detailed frensic analysis, and an anti-virus designer cmputes digest hash values and update its anti-virus database, therefre it detects a malware sample later n. In future wrk, we plan t deign detectable methds based n different appraches fr detecting malicius EXE and ELF executable files. REFERENCES [1] L. Wu, Autmatic Detectin Mdel f Malware Signature fr Anti-virus Clud Cmputing, 10th IEEE/ACIS Int. Cnf. Cmput. Inf. Sci. Autm., pp. 1 3, [2] N. Miramirkhani, M. P. Appini, N. Nikifrakis, and M. Plychrnakis, Sptless Sandbxes : Evading Malware Analysis Systems using Wearand-Tear Artifacts, IEEE Symp. Secur. Priv. Sptless, pp , [3] C. A. Martínez and G. I. Echeverri, Malware Detectin based n Clud Cmputing integrating Intrusin Ontlgy representatin. [4] M. U. AbdelHameed, M. A. Sbh, and A. M. B. Eldin, Prtable executable autmatic prtectin using dynamic infectin and cde redirectin, in 2009 Internatinal Cnference n Cmputer Engineering Systems, 2009, pp [5] A. Jadhav, D. Vidyarthi, and H. M., Evlutin f Evasive Malwares : A Survey, Int. Cnf. Cmput. Tech. Inf. Cmmun. Technl. Evl., [6] A. Agrawal and K. Wahie, Analyzing and Optimizing clud-based antivirus paradigm, Int. Cnf. Cmput. Tech. Inf. Cmmun. Technl. Evl., n. Iciccs, pp , [7] D. Ai, G. Zeng, Y. Yue, and B. Shen, Research f SftMan Migratin Based n Linux Checkpint, in 2009 Fifth Internatinal Cnference n Natural Cmputatin, 2009, vl. 3, pp [8] S. Trri, W. Britt, and J. A. Hamiltn, A cmpiler classificatin framewrk fr use in reverse engineering, in 2009 IEEE Sympsium n Cmputatinal Intelligence in Cyber Security, 2009, pp [9] L. Lu, L. Qiuju, and X. Tingrng, Research and Implementatin f Cmpressin Shell Unpacking Technlgy fr PE File, in 2009 Internatinal Frum n Infrmatin Technlgy and Applicatins, 2009, vl. 1, pp [10] E. H. Hwang, S. J. Ch, K. J. Kim, Y. J. Kim, S. H. Yn, and J. W. Jen, A recvery algrithm fr PE files in a multi-cre system, in th Internatinal Cnference n Cntrl, Autmatin and Systems, 2012, pp [11] R. Msli, R. Li, B. Yuan, and Y. Pan, Autmated malware detectin using artifacts in frensic memry images, in 2016 IEEE Sympsium n Technlgies fr Hmeland Security (HST), 2016, pp [12] A. K. Marnerides, M. R. Watsn, N. Shirazi, A. Mauthe, and D. Hutchisn, Malware Analysis in Clud Cmputing : Netwrk and System Characteristics, Glbecm 2013 Wrk. - Clud Cmput. Syst. Netwrks, Appl. Malware, pp , [13] Linux Prgrammer s Manual, elf - frmat f Executable and Linking Frmat (ELF) files. [Online]. Available: [Accessed: 20-Jan-2018]. [14] Micrsft MSDN, PE Frmat. [Online]. Available: [Accessed: 20-Jan-2018]. Cpyright t IJARCCE DOI /IJARCCE

INSTALLING CCRQINVOICE

INSTALLING CCRQINVOICE INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a

More information

ClassFlow Administrator User Guide

ClassFlow Administrator User Guide ClassFlw Administratr User Guide ClassFlw User Engagement Team April 2017 www.classflw.cm 1 Cntents Overview... 3 User Management... 3 Manual Entry via the User Management Page... 4 Creating Individual

More information

Summary. Server environment: Subversion 1.4.6

Summary. Server environment: Subversion 1.4.6 Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin

More information

Using SPLAY Tree s for state-full packet classification

Using SPLAY Tree s for state-full packet classification Curse Prject Using SPLAY Tree s fr state-full packet classificatin 1- What is a Splay Tree? These ntes discuss the splay tree, a frm f self-adjusting search tree in which the amrtized time fr an access,

More information

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the

More information

August 22, 2006 IPRO Tech Client Services Tip of the Day. Concordance and IPRO Camera Button / Backwards DB Link Setup

August 22, 2006 IPRO Tech Client Services Tip of the Day. Concordance and IPRO Camera Button / Backwards DB Link Setup Cncrdance and IPRO Camera Buttn / Backwards DB Link Setup When linking Cncrdance and IPRO, yu will need t update the DDEIVIEW.CPL file t establish the camera buttn. Setting up the camera buttn feature

More information

Exporting and Importing the Blackboard Vista Grade Book

Exporting and Importing the Blackboard Vista Grade Book Exprting and Imprting the Blackbard Vista Grade Bk Yu can use the Blackbard Vista Grade Bk with a spreadsheet prgram, such as Micrsft Excel, in a number f different ways. Many instructrs wh have used Excel

More information

WinEst 15.2 Installation Guide

WinEst 15.2 Installation Guide WinEst 15.2 Installatin Guide This installatin guide prvides yu with step-by-step instructins n hw t install r upgrade WinEst. Fr a successful installatin, ensure that all machines meet the requirements.

More information

Paraben s Phone Recovery Stick

Paraben s Phone Recovery Stick Paraben s Phne Recvery Stick v. 3.0 User manual Cntents Abut Phne Recvery Stick... 3 What s new!... 3 System Requirements... 3 Applicatin User Interface... 4 Understanding the User Interface... 4 Main

More information

Reverse Engineering III: PE Format

Reverse Engineering III: PE Format Reverse Engineering III: PE Format Gergely Erdélyi Senior Manager, Anti-malware Research Protecting the irreplaceable f-secure.com Introduction to PE PE stands for Portable Executable Microsoft introduced

More information

Municode Website Instructions

Municode Website Instructions Municde Website instructins Municde Website Instructins The new and imprved Municde site allws yu t navigate t, print, save, e-mail and link t desired sectins f the Online Cde f Ordinances with greater

More information

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the

More information

HW4 Software version 3. Device Manager and Data Logging LOG-RC Series Data Loggers

HW4 Software version 3. Device Manager and Data Logging LOG-RC Series Data Loggers Page 1 f 18 HW4 Sftware versin 3 Device Manager and Data Lgging LOG-RC Series Data Lggers 2011; Page 2 f 18 Table f cntents 1 ORGANIZATION OF THE HW4 MANUALS... 3 2 OVERVIEW... 4 3 INITIAL SETUP... 4 3.1

More information

Gemini Intercom Quick Start Guide

Gemini Intercom Quick Start Guide Gemini Intercm Quick Start Guide 2 Quick Start Guide Cntents Cntents... 1 Overview... 3 First Step unpack and inspect... 3 Netwrk plan and IP addresses... 4 Management PC... 5 Install Sftware... 6 Cnfigure

More information

OO Shell for Authoring (OOSHA) User Guide

OO Shell for Authoring (OOSHA) User Guide Operatins Orchestratin Sftware Versin: 10.70 Windws and Linux Operating Systems OO Shell fr Authring (OOSHA) User Guide Dcument Release Date: Nvember 2016 Sftware Release Date: Nvember 2016 Legal Ntices

More information

Admin Report Kit for Exchange Server

Admin Report Kit for Exchange Server Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses

More information

E. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering

E. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering IT2042 - Infrmatin Security 1-1 E. G. S. Pillay Engineering Cllege, Nagapattinam Cmputer Science and Engineering Elective II IT 2042 INFORMATION SECURITY VIII Sem CSE QUESTION BANK - UNIT-IV 1) What is

More information

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist This checklist is used t prvide guidance and clarificatin n aspects f the auxillary Startup Service (G2949CA) including Security Pack Installatin and Familiarizatin f yur Agilent 2100 Bianalyzer System

More information

IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7

IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 Prepared by: March Haber, march@il.ibm.cm Last Updated: January, 2012 IBM MetaData Wrkbench Enablement Series Table f Cntents: Table f

More information

E-Lock Policy Manager White Paper

E-Lock Policy Manager White Paper White Paper Table f Cntents 1 INTRODUCTION... 3 2 ABOUT THE POLICY MANAGER... 3 3 HOW E-LOCK POLICY MANAGER WORKS... 3 4 WHAT CAN I DO WITH THE POLICY MANAGER?... 4 4.1 THINGS YOU CONTROL IN SIGNING...

More information

CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER. Course 10964B; Duration: 5 Days; Instructor-led

CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER. Course 10964B; Duration: 5 Days; Instructor-led CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: www.inf-trek.cm CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER Curse 10964B; Duratin: 5 Days; Instructr-led WHAT YOU WILL LEARN This curse

More information

Use of GIS & GPS in Trail and Land Management

Use of GIS & GPS in Trail and Land Management CLCC Cnference 2014 Intrductin t CT ECO Use f GIS & GPS in Trail and Land Management Explre CT ECO CT ECO is a partnership between the CT Department f Energy and Envirnmental Prtectin (CT DEEP) and the

More information

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide Xilinx Answer 65444 Xilinx PCI Express DMA Drivers and Sftware Guide Imprtant Nte: This dwnladable PDF f an Answer Recrd is prvided t enhance its usability and readability. It is imprtant t nte that Answer

More information

EView/400i Management Pack for Systems Center Operations Manager (SCOM)

EView/400i Management Pack for Systems Center Operations Manager (SCOM) EView/400i Management Pack fr Systems Center Operatins Manager (SCOM) Cncepts Guide Versin 7.0 July 2015 1 Legal Ntices Warranty EView Technlgy makes n warranty f any kind with regard t this manual, including,

More information

Uploading Files with Multiple Loans

Uploading Files with Multiple Loans Uplading Files with Multiple Lans Descriptin & Purpse Reprting Methds References Per the MHA Handbk, servicers are required t prvide peridic lan level data fr activity related t the Making Hme Affrdable

More information

Richard Johnson

Richard Johnson x86 Disassembler Internals Toorcon 7 September 2005 Richard Johnson rjohnson@idefense.com Welcome Who am I? Richard Johnson Senior Security Engineer, idefense Labs Other Research: nologin.org / uninformed.org

More information

1on1 Sales Manager Tool. User Guide

1on1 Sales Manager Tool. User Guide 1n1 Sales Manager Tl User Guide Table f Cntents Install r Upgrade 1n1 Page 2 Setting up Security fr Dynamic Reprting Page 3 Installing ERA-IGNITE Page 4 Cnverting (Imprting) Queries int Dynamic Reprting

More information

Entering an NSERC CCV: Step by Step

Entering an NSERC CCV: Step by Step Entering an NSERC CCV: Step by Step - 2018 G t CCV Lgin Page Nte that usernames and passwrds frm ther NSERC sites wn t wrk n the CCV site. If this is yur first CCV, yu ll need t register: Click n Lgin,

More information

Dashboard Extension for Enterprise Architect

Dashboard Extension for Enterprise Architect Dashbard Extensin fr Enterprise Architect Dashbard Extensin fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins f the free versin f the extensin... 3 Example Dashbard

More information

TaiRox Mail Merge. Running Mail Merge

TaiRox Mail Merge. Running Mail Merge TaiRx Mail Merge TaiRx Mail Merge TaiRx Mail Merge integrates Sage 300 with Micrsft Wrd s mail merge functin. The integratin presents a Sage 300 style interface frm within the Sage 300 desktp. Mail Merge

More information

Vulnerability Protection A Buffer for Patching

Vulnerability Protection A Buffer for Patching Vulnerability Prtectin A Buffer fr Patching A Lucid Security Technical White Paper February 2004 By Vikram Phatak, Chief Technlgy Officer Santsh Pawar, Vulnerability Analyst Lucid Security Crpratin 124

More information

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in this

More information

Verifone MX850 All-In-One Device: Before connecting the MX850 to your PC, the MX850 Driver CD will need to be installed.

Verifone MX850 All-In-One Device: Before connecting the MX850 to your PC, the MX850 Driver CD will need to be installed. Befre the installatin and cnfiguratin f the required prcessing hardware, McAllister Payment Slutins (MPS), and AVImark, the McAllister Payment Slutins PA-DSS Implementatin Guide must be reviewed in its

More information

Using CppSim to Generate Neural Network Modules in Simulink using the simulink_neural_net_gen command

Using CppSim to Generate Neural Network Modules in Simulink using the simulink_neural_net_gen command Using CppSim t Generate Neural Netwrk Mdules in Simulink using the simulink_neural_net_gen cmmand Michael H. Perrtt http://www.cppsim.cm June 24, 2008 Cpyright 2008 by Michael H. Perrtt All rights reserved.

More information

TDR and Trend Micro. Integration Guide

TDR and Trend Micro. Integration Guide TDR and Trend Micr Integratin Guide i WatchGuard Technlgies, Inc. TDR and Trend Micr Deplyment Overview Threat Detectin and Respnse (TDR) is a cllectin f advanced malware defense tls that crrelate threat

More information

Test Pilot User Guide

Test Pilot User Guide Test Pilt User Guide Adapted frm http://www.clearlearning.cm Accessing Assessments and Surveys Test Pilt assessments and surveys are designed t be delivered t anyne using a standard web brwser and thus

More information

TIBCO Statistica Options Configuration

TIBCO Statistica Options Configuration TIBCO Statistica Optins Cnfiguratin Sftware Release 13.3 June 2017 Tw-Secnd Advantage Imprtant Infrmatin SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO

More information

REST; WebSocket (RFC 6455)

REST; WebSocket (RFC 6455) REST; WebScket (RFC 6455) Web Oriented Technlgies and Systems Prf. Michele Ruta Master s Degree Curse in Cmputer Engineering - (A.Y. 2016/2017) REST REST = Representatinal State Transfer. Anther architectural

More information

Courseware Setup. Hardware Requirements. Software Requirements. Prerequisite Skills

Courseware Setup. Hardware Requirements. Software Requirements. Prerequisite Skills The Internet and Cmputing Cre Certificatin Guide cnsists f 64 Lessns, with lessn bjectives, summary and ten review questins. IC³ bjectives are easily lcated by using symbls thrughut the curseware. Curse

More information

Cisco Tetration Analytics, Release , Release Notes

Cisco Tetration Analytics, Release , Release Notes Cisc Tetratin Analytics, Release 1.102.21, Release Ntes This dcument describes the features, caveats, and limitatins fr the Cisc Tetratin Analytics sftware. Additinal prduct Release ntes are smetimes updated

More information

WorldShip PRE-INSTALLATION INSTRUCTIONS: INSTALLATION INSTRUCTIONS: Window (if available) Install on a Single or Workgroup Workstation

WorldShip PRE-INSTALLATION INSTRUCTIONS: INSTALLATION INSTRUCTIONS: Window (if available) Install on a Single or Workgroup Workstation PRE-INSTALLATION INSTRUCTIONS: This dcument discusses using the WrldShip DVD t install WrldShip. Yu can als install WrldShip frm the Web. G t the fllwing Web page and click the apprpriate dwnlad link:

More information

Eastern Mediterranean University School of Computing and Technology Information Technology Lecture2 Functions

Eastern Mediterranean University School of Computing and Technology Information Technology Lecture2 Functions Eastern Mediterranean University Schl f Cmputing and Technlgy Infrmatin Technlgy Lecture2 Functins User Defined Functins Why d we need functins? T make yur prgram readable and rganized T reduce repeated

More information

TDR & Bitdefender. Integration Guide

TDR & Bitdefender. Integration Guide TDR & Bitdefender Integratin Guide TDR and Bitdefender Deplyment Overview Threat Detectin and Respnse (TDR) is a cllectin f advanced malware defense tls that crrelate threat indicatrs frm Firebxes and

More information

CaseWare Working Papers. Data Store user guide

CaseWare Working Papers. Data Store user guide CaseWare Wrking Papers Data Stre user guide Index 1. What is a Data Stre?... 3 1.1. When using a Data Stre, the fllwing features are available:... 3 1.1.1.1. Integratin with Windws Active Directry... 3

More information

Arius 3.0. Release Notes and Installation Instructions. Milliman, Inc Peachtree Road, NE Suite 1900 Atlanta, GA USA

Arius 3.0. Release Notes and Installation Instructions. Milliman, Inc Peachtree Road, NE Suite 1900 Atlanta, GA USA Release Ntes and Installatin Instructins Milliman, Inc. 3424 Peachtree Rad, NE Suite 1900 Atlanta, GA 30326 USA Tel +1 800 404 2276 Fax +1 404 237 6984 actuarialsftware.cm 1. Release ntes Release 3.0 adds

More information

Working With Audacity

Working With Audacity Wrking With Audacity Audacity is a free, pen-surce audi editing prgram. The majr user interface elements are highlighted in the screensht f the prgram s main windw belw. The editing tls are used t edit

More information

It has hardware. It has application software.

It has hardware. It has application software. Q.1 What is System? Explain with an example A system is an arrangement in which all its unit assemble wrk tgether accrding t a set f rules. It can als be defined as a way f wrking, rganizing r ding ne

More information

B Tech Project First Stage Report on

B Tech Project First Stage Report on B Tech Prject First Stage Reprt n GPU Based Image Prcessing Submitted by Sumit Shekhar (05007028) Under the guidance f Prf Subhasis Chaudhari 1. Intrductin 1.1 Graphic Prcessr Units A graphic prcessr unit

More information

Study and Analysis of ELF Vulnerabilities in Linux

Study and Analysis of ELF Vulnerabilities in Linux Study and Analysis of ELF Vulnerabilities in Linux Biswajit Sarma Assistant professor, Department of Computer Science and Engineering, Jorhat Engineering College, Srishti Dasgupta Final year student, Department

More information

TDR and Panda Fusion. Integration Guide

TDR and Panda Fusion. Integration Guide TDR and Panda Fusin Integratin Guide i WatchGuard Technlgies, Inc. TDR and Panda Deplyment Overview Threat Detectin and Respnse (TDR) is a cllectin f advanced malware defense tls that crrelate threat indicatrs

More information

AvePoint Pipeline Pro 2.0 for Microsoft Dynamics CRM

AvePoint Pipeline Pro 2.0 for Microsoft Dynamics CRM AvePint Pipeline Pr 2.0 fr Micrsft Dynamics CRM Installatin and Cnfiguratin Guide Revisin E Issued April 2014 1 Table f Cntents Abut AvePint Pipeline Pr... 3 Required Permissins... 4 Overview f Installatin

More information

Project #1 - Fraction Calculator

Project #1 - Fraction Calculator AP Cmputer Science Liberty High Schl Prject #1 - Fractin Calculatr Students will implement a basic calculatr that handles fractins. 1. Required Behavir and Grading Scheme (100 pints ttal) Criteria Pints

More information

Paraben s Phone Recovery Stick

Paraben s Phone Recovery Stick Paraben s Phne Recvery Stick v. 4.3 User Manual Cntents Abut Phne Recvery Stick... 3 What s New!... 3 Getting Started... 4 System Requirements... 4 Hw t Use the Phne Recvery Stick... 4 Applicatin User

More information

TUTORIAL --- Learning About Your efolio Space

TUTORIAL --- Learning About Your efolio Space TUTORIAL --- Learning Abut Yur efli Space Designed t Assist a First-Time User Available t All Overview Frm the mment yu lg in t yur just created myefli accunt, yu will find help ntes t guide yu in learning

More information

Final Report. Graphical User Interface for the European Transport Model TREMOVE. June 15 th 2010

Final Report. Graphical User Interface for the European Transport Model TREMOVE. June 15 th 2010 Date June 15 th 2010 Authrs Charitn Kuridis Dr Mia Fu Dr Andrew Kelly Thmas Papagergiu Client Eurpean Cmmissin DG Climate Actin Directrate A: Internatinal & Climate Strategy Unit A4: Strategy & Ecnmic

More information

TDR and Kaspersky. Integration Guide

TDR and Kaspersky. Integration Guide TDR and Kaspersky Integratin Guide i WatchGuard Technlgies, Inc. TDR and Kaspersky Deplyment Overview Threat Detectin and Respnse (TDR) is a cllectin f advanced malware defense tls that crrelate threat

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This

More information

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins)

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins) Intrductin This reference guide is aimed at managers wh will be respnsible fr managing users within RiskMan where RiskMan is nt cnfigured t use netwrk lgins. This guide is used in cnjunctin with the respective

More information

IABSE SEI AUTHORING TEMPLATE GUIDELINES

IABSE SEI AUTHORING TEMPLATE GUIDELINES IABSE SEI AUTHORING TEMPLATE GUIDELINES Cntents 1. SEI Authring Template... 2 2. SEI Menu... 2 2.1 Article Categry... 2 2.2 Manuscript Submitted date... 2 2.3 Article Main Title... 3 2.4 Authr Names...

More information

Microsoft Excel Extensions for Enterprise Architect

Microsoft Excel Extensions for Enterprise Architect Excel Extensins User Guide Micrsft Excel Extensins fr Enterprise Architect Micrsft Excel Extensins fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Installatin... 4 Verifying

More information

Data reduction in the ITMS system through a data acquisition model with self-adaptive sampling rate

Data reduction in the ITMS system through a data acquisition model with self-adaptive sampling rate Data reductin in the ITMS system thrugh a data acquisitin mdel with self-adaptive sampling rate M. Ruiz, JM. Lpez, G. de Areas, E. Barrera, R. Melendez, J. Vega Grup de Investigatin en Instrumentatin y

More information

Technical Paper. Installing and Configuring SAS Environment Manager in a SAS Grid Environment with a Shared Configuration Directory

Technical Paper. Installing and Configuring SAS Environment Manager in a SAS Grid Environment with a Shared Configuration Directory Technical Paper Installing and Cnfiguring Envirnment Manager in a Grid Envirnment with a Shared Cnfiguratin Directry Last Mdified: January 2018 Release Infrmatin Cntent Versin: January 2018. Trademarks

More information

Australian Statistics API Specification

Australian Statistics API Specification Australian Statistics API Specificatin Versin: 1.2 Date Mdified: 23 March 2017 Page 1 The cntext... 2 Functins f the API... 2 2.1 Retail Trade API... 2 Input Parameters fr API... 3 Output Specificatin

More information

MyUni Adding Content. Date: 29 May 2014 TRIM Reference: D2013/ Version: 1

MyUni Adding Content. Date: 29 May 2014 TRIM Reference: D2013/ Version: 1 Adding Cntent MyUni... 2 Cntent Areas... 2 Curse Design... 2 Sample Curse Design... 2 Build cntent by creating a flder... 3 Build cntent by creating an item... 4 Cpy r mve cntent in MyUni... 5 Manage files

More information

Creating a TES Encounter/Transaction Entry Batch

Creating a TES Encounter/Transaction Entry Batch Creating a TES Encunter/Transactin Entry Batch Overview Intrductin This mdule fcuses n hw t create batches fr transactin entry in TES. Charges (transactins) are entered int the system in grups called batches.

More information

softpanel generic installation and operation instructions for nanobox products

softpanel generic installation and operation instructions for nanobox products 1 f 10 System Requirements... 3 Installatin... 3 Java... 3 RxTx Serial Drivers... 3 Granting a user permissin t pen a COM Prt in Mac OS X... 3 USB t Serial Drivers... 4 Mac OS X 10.6 Snw Lepard... 4 Operatin...

More information

Importing data. Import file format

Importing data. Import file format Imprting data The purpse f this guide is t walk yu thrugh all f the steps required t imprt data int CharityMaster. The system allws nly the imprtatin f demgraphic date e.g. names, addresses, phne numbers,

More information

Announcing Veco AuditMate from Eurolink Technology Ltd

Announcing Veco AuditMate from Eurolink Technology Ltd Vec AuditMate Annuncing Vec AuditMate frm Eurlink Technlgy Ltd Recrd any data changes t any SQL Server database frm any applicatin Database audit trails (recrding changes t data) are ften a requirement

More information

Privacy Protection for Preventing Mobile Data Over-Collection Meikang Qiu

Privacy Protection for Preventing Mobile Data Over-Collection Meikang Qiu Privacy Prtectin fr Preventing Mbile Data Over-Cllectin Meikang Qiu Dept. f Cmputer Science Pace University Outlines Intrductin Related Wrk Backgrund Study System Mdels Mbile-Clud Framewrk Design Experiments

More information

Implementation of Authentication Mechanism for a Virtual File System

Implementation of Authentication Mechanism for a Virtual File System Implementatin f Authenticatin Mechanism fr a Virtual File System Prject fr Operating Systems Curse (CS 5204) Implemented by- Vinth Jagannathan Abhishek Ram Under the guidance f Dr Dennis Kafura Abstract

More information

UPGRADING TO DISCOVERY 2005

UPGRADING TO DISCOVERY 2005 Centennial Discvery 2005 Why Shuld I Upgrade? Discvery 2005 is the culminatin f ver 18 mnths wrth f research and develpment and represents a substantial leap frward in audit and decisin-supprt technlgy.

More information

Copyrights and Trademarks

Copyrights and Trademarks Cpyrights and Trademarks Sage One Accunting Cnversin Manual 1 Cpyrights and Trademarks Cpyrights and Trademarks Cpyrights and Trademarks Cpyright 2002-2014 by Us. We hereby acknwledge the cpyrights and

More information

IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016

IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 1. What are tw functins f an perating system? (Chse tw.) cntrlling hardware access managing applicatins text prcessing flw chart editing prgram

More information

TDR and Avast Business Antivirus. Integration Guide

TDR and Avast Business Antivirus. Integration Guide TDR and Avast Business Antivirus Integratin Guide i WatchGuard Technlgies, Inc. TDR and Avast Deplyment Overview Threat Detectin and Respnse (TDR) is a cllectin f advanced malware defense tls that crrelate

More information

Getting Started with the SDAccel Environment on Nimbix Cloud

Getting Started with the SDAccel Environment on Nimbix Cloud Getting Started with the SDAccel Envirnment n Nimbix Clud Revisin Histry The fllwing table shws the revisin histry fr this dcument. Date Versin Changes 09/17/2018 201809 Updated figures thrughut Updated

More information

Using the Swiftpage Connect List Manager

Using the Swiftpage Connect List Manager Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts

More information

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems Date: Octber 2018 User guide Integratin thrugh ONVIF driver. Prepared By: Devices & Integratins Team, Milestne Systems 2 Welcme t the User Guide fr Online Test Tl The aim f this dcument is t prvide guidance

More information

USO RESTRITO. SNMP Agent. Functional Description and Specifications Version: 1.1 March 20, 2015

USO RESTRITO. SNMP Agent. Functional Description and Specifications Version: 1.1 March 20, 2015 Functinal Descriptin and Specificatins Versin: 1.1 March 20, 2015 SNMP Agent Simple Netwrk Management Prtcl Optin S fr IE and PM Mdules Supplement t Functinal Descriptin and Specificatins f RUB Ethernet

More information

AvePoint Timeline Enterprise for Microsoft Dynamics CRM

AvePoint Timeline Enterprise for Microsoft Dynamics CRM AvePint Timeline Enterprise 1.0.2 fr Micrsft Dynamics CRM Installatin and Cnfiguratin Guide Revisin B Issued Nvember 2013 Timeline Enterprise fr Micrsft Dynamics CRM Install and Cnfig 1 Table f Cntents

More information

DATABASE SEARCHING. Instructional guide

DATABASE SEARCHING. Instructional guide University f KwaZulu-Natal Library, Pietermaritzburg DATABASE SEARCHING Instructinal guide Databases cntain references t jurnal articles, chapters in bks and in sme cases, theses and dissertatins. Sme

More information

Lecture 6 -.NET Remoting

Lecture 6 -.NET Remoting Lecture 6 -.NET Remting 1. What is.net Remting?.NET Remting is a RPC technique that facilitates cmmunicatin between different applicatin dmains. It allws cmmunicatin within the same prcess, between varius

More information

MOS Access 2013 Quick Reference

MOS Access 2013 Quick Reference MOS Access 2013 Quick Reference Exam 77-424: MOS Access 2013 Objectives http://www.micrsft.cm/learning/en-us/exam.aspx?id=77-424 Create and Manage a Database Create a New Database This bjective may include

More information

TDR and Symantec. Integration Guide

TDR and Symantec. Integration Guide TDR and Symantec Integratin Guide i WatchGuard Technlgies, Inc. TDR and Symantec Deplyment Overview Threat Detectin and Respnse (TDR) is a cllectin f advanced malware defense tls that crrelate threat indicatrs

More information

Graduate Application Review Process Documentation

Graduate Application Review Process Documentation Graduate Applicatin Review Prcess Cntents System Cnfiguratin... 1 Cgns... 1 Banner Dcument Management (ApplicatinXtender)... 2 Banner Wrkflw... 4 Navigatin... 5 Cgns... 5 IBM Cgns Sftware Welcme Page...

More information

Proper Document Usage and Document Distribution. TIP! How to Use the Guide. Managing the News Page

Proper Document Usage and Document Distribution. TIP! How to Use the Guide. Managing the News Page Managing the News Page TABLE OF CONTENTS: The News Page Key Infrmatin Area fr Members... 2 Newsletter Articles... 3 Adding Newsletter as Individual Articles... 3 Adding a Newsletter Created Externally...

More information

Readme for Advanced Road Design V14.01

Readme for Advanced Road Design V14.01 Readme fr Advanced Rad Design V14.01 This readme cntains imprtant infrmatin regarding the installatin and use f Advanced Rad Design versins as described abve. This versin f Advanced Rad Design is available

More information

Intelligence Driven Malware Analysis (IDMA) Malicious Profiling

Intelligence Driven Malware Analysis (IDMA) Malicious Profiling Intelligence Driven Malware Analysis (IDMA) Malicius Prfiling 14 January 2015 Hmeland Natinal Cybersecurity and Cmmunicatins Integratin Center whami Cyber Threat Analyst at Nrthrp Grumman Perfrmed wide

More information

Quick Start Guide. Basic Concepts. DemoPad Designer - Quick Start Guide

Quick Start Guide. Basic Concepts. DemoPad Designer - Quick Start Guide Quick Start Guide This guide will explain the prcess f installing & using the DemPad Designer sftware fr PC, which allws yu t create a custmised Graphical User Interface (GUI) fr an iphne / ipad & embed

More information

Lab 0: Compiling, Running, and Debugging

Lab 0: Compiling, Running, and Debugging UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2012 Lab 0: Cmpiling, Running, and Debugging Intrductin Reading This is the

More information

User Guide. ACE Data Source. OnCommand Workflow Automation (WFA) Abstract PROFESSIONAL SERVICES

User Guide. ACE Data Source. OnCommand Workflow Automation (WFA) Abstract PROFESSIONAL SERVICES PROFESSIONAL SERVICES User Guide OnCmmand Wrkflw Autmatin (WFA) ACE Data Surce Prepared fr: ACE Data Surce - Versin 2.0.0 Date: Octber 2015 Dcument Versin: 2.0.0 Abstract The ACE Data Surce (ACE-DS) is

More information

Using the Swiftpage Connect List Manager

Using the Swiftpage Connect List Manager Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts

More information

Dynamic Storage (ECS)

Dynamic Storage (ECS) User Guide Dynamic Strage (ECS) Swisscm (Schweiz) AG 1 / 10 Cntent 1 Abut Dynamic Strage... 3 2 Virtual drive, the EMC CIFS-ECS Tl... 4 3 Amazn S3 Brwer... 6 4 Strage Gateway Appliance... 9 5 Amazn S3

More information

Telecommunication Protocols Laboratory Course

Telecommunication Protocols Laboratory Course Telecmmunicatin Prtcls Labratry Curse Lecture 2 March 11, 2004 http://www.ab.fi/~lpetre/teleprt/teleprt.html 1 Last time We examined sme key terms: prtcl, service, layer, netwrk architecture We examined

More information

Integration Framework for SAP Business One

Integration Framework for SAP Business One Integratin Framewrk fr SAP Business One DIPrxy Cnfiguratin PUBLIC Glbal Rll-ut Octber 2018, B Zha TABLE OF CONTENTS 1 INTRODUCTION... 3 2 INSTALLATION... 3 3 CONFIGURATION... 5 3.1 Services in Service

More information

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SYSTEM FUNCTIONS... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 ACCESSING THE OASIS SYSTEM... 3 SUBMITTING OASIS DATA FILES... 5 OASIS INITIAL

More information

Web of Science Institutional authored and cited papers

Web of Science Institutional authored and cited papers Web f Science Institutinal authred and cited papers Prcedures written by Diane Carrll Washingtn State University Libraries December, 2007, updated Nvember 2009 Annual review f paper s authred and cited

More information

Speculative Parallelization. Devarshi Ghoshal

Speculative Parallelization. Devarshi Ghoshal Speculative Parallelizatin Devarshi Ghshal Indiana University, Blmingtn 10/10/2011 1 Agenda Speculative Parallelizatin FastFrward-A Speculatin using Checkpint/Restart System Design Sftware-based Speculatin

More information

Faculty Textbook Adoption Instructions

Faculty Textbook Adoption Instructions Faculty Textbk Adptin Instructins The Bkstre has partnered with MBS Direct t prvide textbks t ur students. This partnership ffers ur students and parents mre chices while saving them mney, including ptins

More information

Table of Contents. Introduction... 2 Installing the ABBYY FineReader Engine Library... 3

Table of Contents. Introduction... 2 Installing the ABBYY FineReader Engine Library... 3 Table f Cntents Intrductin... 2 Installing the ABBYY FineReader Engine Library... 3 Wrkstatin Requirements... 3 Installing the Library in Autmatic Mde... 5 Installing the Library in Manual Mde... 6 Activating

More information

AT&T Corporate Voice Mail Unified Messaging (CVM-UM) Quick Start

AT&T Corporate Voice Mail Unified Messaging (CVM-UM) Quick Start AT&T Crprate Vice Mail Unified Messaging (CVM-UM) Quick Start 2011 AT&T Intellectual Prperty. All rights reserved. AT&T the lg and all ther AT&T marks cntained herein are trademarks f AT&T Intellectual

More information