Potentially Malicious URLs
|
|
- Barry Chandler
- 5 years ago
- Views:
Transcription
1 FORENSIC INSIGHT; DIGITAL FORENSICS COMMUNITY IN KOREA Potentially Malicious URLs 13lackc4t 13lackc4t.blog.me
2 Index 1. First Get Permission If Needed 2. Unshortening 3. Obfuscating URI Tricks IP Obfuscation URL Encoding 4. Deobfuscating 5. Challenge! Manual Safe Deconstruction Automatic Safe Deconstruction Obfuscation Process Tracing the Click Browser Compatibility Conclusion forensicinsight.org Page 2
3 First Get Permission If Needed forensicinsight.org Page 3
4 First Get Permission If Needed Major issues You don't always know if that data you are transmitting is sensitive There is no expectation of privacy when utilizing a third party site forensicinsight.org Page 4
5 Unshortening forensicinsight.org Page 5
6 Unshortening URL shorteners Name URL Ex TinyURL Tiny Bitly Google Shortener Ow.ly Twitter Shortener is.gd McAfee Shortener forensicinsight.org Page 6
7 Unshortening URL unshorteners Unshorten.it forensicinsight.org Page 7
8 Unshortening URL unshorteners LongURL forensicinsight.org Page 8
9 Unshortening URL unshorteners Unshort.me forensicinsight.org Page 9
10 Unshortening URL unshorteners Unshorten.com forensicinsight.org Page 10
11 Obfuscating - URI Tricks - IP Obfuscation - URL Encoding forensicinsight.org Page 11
12 Obfuscating URI Tricks The general URL format Simple examples 1) 2) 3) forensicinsight.org Page 12
13 Obfuscating URI Tricks Chrome v23 Understood the URL and correctly sent us Internet Explorer 8, 9, 10 Not working (only ) Firefox Warning forensicinsight.org Page 13
14 Obfuscating IP obfuscation (one of Google s IP addresses) DWORD conversion (((((74*256) + 125) * 256) + 131) * 256) = Hex conversion 74 = 0x4a 125 = 0x7d 131=0x83 105=0x69 Octal conversion 74 = = = = 0151 forensicinsight.org Page 14
15 Obfuscating URL Encoding converts characters into a format that can be transmitted over the Internet Be used in URLs to confuse the user and hide intention ftp://foo:foo%40example.com@ftp.example.com/pub/a.txt %40 forensicinsight.org Page 15
16 Deobfuscating forensicinsight.org Page 16
17 Deobfuscating These can still be done by hand, but can be time consuming There are some third-party sites that will help you figure out what the URL is doing forensicinsight.org Page 17
18 Deobfuscating Netdemon forensicinsight.org Page 18
19 Deobfuscating URL decoder forensicinsight.org Page 19
20 - Manual Safe Deconstruction - Automatic Safe Deconstruction - Obfuscation Process - Tracing the Click - Browser Compatibility - Conclusion forensicinsight.org Page 20
21 forensicinsight.org Page 21
22 Manual Safe Deconstruction 1. Unshorten the URL 2. Discard URL trickery 3. Convert Octal to Decimal 4. URL decode 5. WHOIS attribution forensicinsight.org Page 22
23 Manual Safe Deconstruction Unshorten the URL Use one of the URL shorteners called tinyurlchecker forensicinsight.org Page 23
24 Manual Safe Deconstruction Unshorten the URL Result =%68%74%74%70%3A%2F%2F%77%77%77%2E%79%6F%75%74%75%62%65%2E%63%6F%6D %2F%77%61%74%63%68%3Fv%3%44%6F%48%67%35%53%4A%59%52%48%41%30 forensicinsight.org Page 24
25 Manual Safe Deconstruction Discard URL trickery Remove anything from the up to and including the Result %74%74%70%3A%2F%2F%77%77%77%2E%79%6F%75%74%75%62%65%2E%63%6F%6D%2F%7 7%61%74%63%68%3Fv%3%44%6F%48%67%35%53%4A%59%52%48%41%30 forensicinsight.org Page 25
26 Manual Safe Deconstruction Convert Octal to Decimal Address: Convert: = = = = 105 Becomes: Result %77%77%77%2E%79%6F%75%74%75%62%65%2E%63%6F%6D%2F%77%61%74%63%68%3Fv% 3%44%6F%48%67%35%53%4A%59%52%48%41%30 forensicinsight.org Page 26
27 Manual Safe Deconstruction URL decode forensicinsight.org Page 27
28 Manual Safe Deconstruction URL decode Result forensicinsight.org Page 28
29 Manual Safe Deconstruction WHOIS attribution forensicinsight.org Page 29
30 Automatic Safe Deconstruction LongURL forensicinsight.org Page 30
31 Automatic Safe Deconstruction Unshorten.it forensicinsight.org Page 31
32 Automatic Safe Deconstruction Netdemon forensicinsight.org Page 32
33 Obfuscation Process URL Redirection Octal IP Representation URL Encoding URL Trickery URL Shortening forensicinsight.org Page 33
34 Obfuscation Process URL Redirection An application that accepts a parameter that allows the end user to be redirected to another page It happens so quickly that the user does not have time to react and stop the next page from loading A simple example of a URL redirect: forensicinsight.org Page 34
35 Obfuscation Process URL Redirection The URL redirect we used in our special link is against Google (with their gracious permission for educational purposes): g5sjyrha0 forensicinsight.org Page 35
36 Obfuscation Process Octal IP Representation 1. nslookup resolved one of Google's web servers to Using Microsoft's Calculator, we converted the IP address - 74 = = = = After adding some zero padding (any number of zeros can be used), we come up with 4. Replace " in our redirect URL Result : %2Fwatch%3Fv%3DoHg5SJYRHA0 forensicinsight.org Page 36
37 Obfuscation Process URL Encoding ASCII URL Encoded url %75%72%6C sa %73%61 t %74 http %68%74%74%70 %77%77%77%2E%79%6F%75%74%75%62%65%2E%63%6F%6D watch %77%61%74%63%68 DoHg5SJYRHA0 %44%6F%48%67%35%53%4A%59%52%48%41%30 forensicinsight.org Page 37
38 Obfuscation Process URL Encoding om%2fwatch%3fv%3dohg5sjyrha0 68%74%74%70%3A%2F%2F%77%77%77%2E%79%6F%75%74%75%62%65%2E%63%6F%6D% 2F%77%61%74%63%68%3Fv%3%44%6F%48%67%35%53%4A%59%52%48%41%30 forensicinsight.org Page 38
39 Obfuscation Process URL trickery Chrome is the only browser that will send the user to the destination page without a warning when the URL is formatted as follows: forensicinsight.org Page 39
40 Obfuscation Process URL trickery 68%74%74%70%3A%2F%2F%77%77%77%2E%79%6F%75%74%75%62%65%2E%63%6F%6D% 2F%77%61%74%63%68%3Fv%3%44%6F%48%67%35%53%4A%59%52%48%41%30 6C=%68%74%74%70%3A%2F%2F%77%77%77%2E%79%6F%75%74%75%62%65%2E%63%6F %6D%2F%77%61%74%63%68%3Fv%3%44%6F%48%67%35%53%4A%59%52%48%41%30 forensicinsight.org Page 40
41 Obfuscation Process URL Shortening Used TinyUrl because it allows us to specify a memorable link such as TonysChallenge Result : forensicinsight.org Page 41
42 Tracing the Click forensicinsight.org Page 42
43 Browser Compatibility Only Chrome! forensicinsight.org Page 43
44 Question and Answer forensicinsight.org Page 44
FORENSIC INSIGHT SEMINAR. Digital Times. dorumugs. Malware.co.kr. And yet it does move
FORENSIC INSIGHT SEMINAR Digital Times dorumugs Malware.co.kr And yet it does move Index 1. UTC and GMT 2. Time Unit 3. Digital Times 4. Many Kinds of Times 5. Tool : time_maker 6. Q&A forensicinsight.org
More information1 of 10 3/31/2012 8:38 AM
1 of 10 3/31/2012 8:38 AM search your bitly links Shorten & Share Analyze Public Timeline symphil bitly basics: Getting started What is bitly? How does bitly work? How do I use bitly to shorten a link?
More informationIFRS KMA KNOWLEDGE MANAGEMENT APPLICATION INSTALLATION GUIDE
IFRS KMA KNOWLEDGE MANAGEMENT APPLICATION INSTALLATION GUIDE The KMA INSTALLATION GUIDE STEP 1. Download the installation file from the link in your email. When you click on the KMA link to begin the installation
More informationAY SECOND TERM Technology Education Revision Sheet
AY 2017 2018 SECOND TERM Technology Education Revision Sheet Name: Date: Grade 10 Teacher: I. Fill in the blanks using correct answer: 1. WWW is World Wide Web. 2. The short form of Hyper Text Transfer
More informationWhat Is It? Instruction Register Address Register Data Register
What Is It? Consider the following set of 32 binary digits, written in blocks of four so that the example is not impossible to read. 0010 0110 0100 1100 1101 1001 1011 1111 How do we interpret this sequence
More informationCourse Folder and Files Instructions for download and use
Course Folder and Files Instructions for download and use About course folders and files Please read this page carefully! Most, but not all of our courses, at certain points in each chapter, instruct you
More informationBROWSER CLICK TO DIAL
BROWSER CLICK TO DIAL CONTENTS 1 Background... 1 2 How It Works... 2 2.1 Microsoft Internet Explorer... 2 2.2 Mozilla Firefox... 3 2.3 Google Chrome... 3 3 Portal Configuration... 4 4 Testing & Troubleshooting...
More informationGame100 Networking Lab 4. Part 1 (5.1.4) Using the Windows Calculator with Network Addresses
Game100 Networking Lab 4 Name: Part 1 (5.1.4) Using the Windows Calculator with Network Addresses Objectives Switch between the two Windows Calculator modes. Use Windows Calculator to convert between decimal,
More informationAdvanced Evidence Collection and Anal ysis of Web Browser Activity
Advanced Evidence Collection and Anal ysis of Web Browser Activity J. Oh, S. Lee and S. Lee Digital Forensics Research Center, Korea University Junghoon Oh blue0226@korea.ac.kr Agenda 1. Introduction 2.
More informationCM Social Post Documentation
CM Social Post Documentation Release 1.0.1 CMExtension March 15, 2016 Contents 1 Overview 3 2 Install & update 5 3 Facebook application 7 4 Facebook personal timeline plugin 13 5 Facebook page timeline
More informationPackage urlshortener
Type Package Package urlshortener December 5, 2016 Title R Wrapper for the 'Bit.ly', 'Goo.gl' and 'Is.gd' URL Shortening Services Allows using different URL shortening services, which also provide expanding
More informationBase64 The Security Killer
Base64 The Security Killer Kevin Fiscus NWN Corporation Session ID: DAS-203 Session Classification: Intermediate A Short (Made Up) Security Story Helix Pharmaceuticals is concerned about security Industrial
More informationHow Do I Manage Active Directory
How Do I Manage Active Directory Your Red Box Recorder supports Windows Active Directory integration and Single Sign-On. This Quick Question topic is provided for system administrators and covers the setup
More informationRochester Regional Library Council
Rochester Regional Library Council Google Analytics Training 1/23/17 Introduction Matt Weaver Digital Director Mason Digital, LLC Mason Digital is an official Google Agency Partner Google Analytics and
More informationDownload norton toolbar for google chrome
Download norton toolbar for google chrome Our Norton Toolbar is not compatible with Google Chrome 32. helps if you browse responsibly -- do not download or install anything that is. Mar 29, 2018. If you
More information5/19/2015. Objectives. JavaScript, Sixth Edition. Saving State Information with Query Strings. Understanding State Information
Objectives JavaScript, Sixth Edition When you complete this chapter, you will be able to: Save state information with query strings, hidden form fields, and cookies Describe JavaScript security issues
More informationBrowser Support Internet Explorer
Browser Support Internet Explorer Consumers Online Banking offers you more enhanced features than ever before! To use the improved online banking, you may need to change certain settings on your device
More information4/14/2015. Architecture of the World Wide Web. During this session we will discuss: Structure of the World Wide Web
Internet Gambling Investigations Architecture of the World Wide Web Ω Objectives During this session we will discuss: The term world wide web User interaction on the world wide web The purpose of gateways
More informationEx-Ray: Detection of History-Leaking Browser Extensions
Ex-Ray: Detection of History-Leaking Browser Extensions Michael Weissbacher, Enrico Mariconti, Guillermo Suarez-Tangil, Gianluca Stringhini, William Robertson, Engin Kirda Northeastern University, University
More informationLooking at the Internet with Google Chrome & Firefox. Scoville Memorial Library Claudia Cayne - September, 2010
Looking at the Internet with Google Chrome & Firefox Scoville Memorial Library Claudia Cayne - ccayne@biblio.org September, 2010 Google Chrome & Firefox are web browsers - the decoder you need to view
More informationStefan Heule, Devon Rifkin, Alejandro Russo, Deian Stefan. Stanford University, Chalmers University of Technology
Stefan Heule, Devon Rifkin, Alejandro Russo, Deian Stefan Stanford University, Chalmers University of Technology One of the most popular application platforms Easy to deploy and access Almost anything
More informationExternal HTTPS Trigger AXIS Camera Station 5.06 and above
HOW TO External HTTPS Trigger AXIS Camera Station 5.06 and above Created: October 17, 2016 Last updated: November 19, 2016 Rev: 1.2 1 Please note that AXIS does not take any responsibility for how this
More informationNavigate by Using Windows Explorer
Navigate by Using Windows Explorer Pinning a location to a Jump List 2013 Pearson Education, Inc. Publishing as Prentice Hall 26 Navigate by Using Windows Explorer Navigating using the address bar 2013
More informationHTTP Reading: Section and COS 461: Computer Networks Spring 2013
HTTP Reading: Section 9.1.2 and 9.4.3 COS 461: Computer Networks Spring 2013 1 Recap: Client-Server Communication Client sometimes on Initiates a request to the server when interested E.g., Web browser
More information1 Post-Installation Configuration Tasks
1 Post-Installation Configuration Tasks 1.1 Overview The previous chapters provide instructions on how to set up Appeon system architecture, including installing Appeon for PowerBuilder components, as
More informationHow to Configure an SSH Tunnel on PuTTY
How to Configure an SSH Tunnel on PuTTY YOU CAN USE A DYNAMIC TUNNEL TO ACCESS ALL REMOTE INFRASTRUCTURE. Most of you have probably used a tunnel with an SSH connection. What you probably weren t aware
More informationIntroduction to Twitter
Introduction to Twitter Objectives After completing this class you will be able to: Identify what Twitter is Create a Twitter Account Customize your Twitter profile and settings Follow other users on Twitter
More informationConfiguring Microsoft Edge Browser By Tom Krauser
Configuring Microsoft Edge Browser By Tom Krauser Browsers are the interface between the computer and internet. They provide the frame in which the website content is displayed. Having more than one browser
More informationBT Cloud Phone. App for Desk user guide. A user guide for running BT Cloud Phone with Desk.com customer service software.
BT Cloud Phone. App for Desk user guide. A user guide for running BT Cloud Phone with Desk.com customer service software. 2 What s in this guide. 1 Introduction. 3 1.1 About BT Cloud Phone for Desk. 3
More informationPalo Alto Networks PAN-OS
RSA Security Analytics Ready Implementation Guide Partner Information Last Modified: November 24 th, 2014 Product Information Partner Name Palo Alto Networks Web Site www.paloaltonetworks.com Product Name
More informationThe Most Dangerous Code in the Browser. Stefan Heule, Devon Rifkin, Alejandro Russo, Deian Stefan
The Most Dangerous Code in the Browser Stefan Heule, Devon Rifkin, Alejandro Russo, Deian Stefan Modern web experience Modern web experience Modern web experience Web apps Extensions NYTimes Chase AdBlock
More informationE-statement Settings Guide
E-statement Settings Guide Contents Windows PC... 3 Google Chrome... 3 Internet Explorer... 7 Mozilla Firefox... 10 Apple Macintosh... 14 Safari for Mac... 14 Apple ios (iphone/ipad)... 21 Safari for ios
More informationHTTP Security. CSC 482/582: Computer Security Slide #1
HTTP Security CSC 482/582: Computer Security Slide #1 Topics 1. How HTTP works 2. HTTP methods, headers, and responses 3. URIs, URLs, and URNs 4. Statelessness 5. Cookies 6. More HTTP methods and headers
More informationGetting Started with Panopto (Windows and OSX)
Table of Contents Setting up Panopto in Blackboard... 2 Setting up Panopto... 6 For Windows... 8 For OSX:... 11 Removing Panopto RSS Feeds in Blackboard... 14 Creating Placeholders for Future Lectures...
More informationLive Guide Co-browsing
TECHNICAL PAPER Live Guide Co-browsing Netop develops and sells software solutions that enable swift, secure and seamless transfer of video, screens, sounds and data between two or more computers over
More informationVisual Workflow Implementation Guide
Version 30.0: Spring 14 Visual Workflow Implementation Guide Note: Any unreleased services or features referenced in this or other press releases or public statements are not currently available and may
More informationCNIT 129S: Securing Web Applications. Ch 12: Attacking Users: Cross-Site Scripting (XSS) Part 2
CNIT 129S: Securing Web Applications Ch 12: Attacking Users: Cross-Site Scripting (XSS) Part 2 Finding and Exploiting XSS Vunerabilities Basic Approach Inject this string into every parameter on every
More informationHow to View Saved Passwords in Mozilla Firefox
Submitted by Jess on Wed, 07/23/2014-14:45 If you are using Mozilla Firefox web browser to surf the internet, then that is a very good decision as Firefox is safe, reliable, fast and stable browser. But
More informationSaumil Shah. net-square DEEPS E C
when Bad Things come Good in packages Saumil Shah DEEPS E C 2 0 1 2 # who am i Saumil Shah, CEO Net-Square. Hacker, Speaker, Trainer, Author - 15 yrs in Infosec. M.S. Computer Science Purdue University.
More informationPhishing Attacks. Mendel Rosenblum. CS142 Lecture Notes - Phishing Attack
Phishing Attacks Mendel Rosenblum Phishing Basic idea: Get unsuspecting users to visit an evil Web site Convince them that the evil Web site is actually a legitimate site (such as a bank or PayPal) Trick
More informationSign-in with UM CaneID
Sign-in with UM CaneID Section 1.1: Overview When you need to sign in with your CaneID to access application such as Workday, CaneLink, Box, and many others, you will be authenticated by the UM Single
More informationUploading and Embedding Your Digital Story (YouTube/Wordpress Version)
Uploading and Embedding Your Digital Story (YouTube/Wordpress Version) If you were using digital stories in your classroom, you wouldn't even need to upload the videos to the Internet; you could just watch
More informationFAQ. Safe Anywhere PC 12. Disclaimer:
FAQ Safe Anywhere PC 12 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch pad, F-Secure
More informationComprehensive Technical SEO Site Audit. PolyTab.com
Comprehensive Technical SEO Site Audit PolyTab.com Conclusion - The competition in this segment is HIGH (There are many authority sites competing for a similar set of keywords). With strong content - strong
More informationCS 120 Digital Literacy, Chapter 5: p
CS 120 Digital Literacy, Chapter 5: p. 287-344 CS 120, Digital Literacy, Ch 5, p.1 Browsing & Searching the Internet: Web browser a software program that is used to display web pages. IE, Safari, Firefox,
More informationLab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail
More informationPublish Content & Measure Success 1
Publish Content & Measure Success 1 Publish Content & Measure Success Meltwater Engage gives businesses scalability and control over content publishing across all of their social channels. The built- in
More informationJersey City Free Public Library WIFI Hotspot
1. Windows 2000, XP, 7 and Vista Users: a. Select the wireless icon in the system tray. or or or b. Select the SSID of the library you are currently located: JCPL- c. Launch a web browser (Internet Explorer,
More informationOctal & Hexadecimal Number Systems. Digital Electronics
Octal & Hexadecimal Number Systems Digital Electronics What, More Number Systems? Why do we need more number systems? Humans understand decimal Check out my ten digits! Digital electronics (computers)
More informationHow things work college course/turing machine quiz/testbank/mirror
How things work college course/turing machine quiz/testbank/mirror From Wikiversity Contents 1 BusyBeaver 1.1 BusyBeaver v1s1 1.1.1 Key to BusyBeaver v1s1 1.2 BusyBeaver v2s1 1.2.1 Key to BusyBeaver v2s1
More informationCANVAS OBSERVER GUIDE
CANVAS OBSERVER GUIDE This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License Table of Contents Introduction...3 What is the Observer role?...4 How can I use Canvas
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More informationPortal User Guide. Best practice tips and shortcuts Icon Legend Informational notes about functions. Important warnings about a function
Portal User Guide Tips Best practice tips and shortcuts Icon Legend Notes Warning Informational notes about functions Important warnings about a function Your Portal https://www.clientaxcess.com Your Portal
More informationMinistry of Education EFIS User Set Up Guide Version 1.9
Ministry of Education EFIS 2.0 - User Set Up Guide Version 1.9 August 22, 2016 1 Table of Contents 1 Table of Contents... 2 2 Document History... 3 3 Description and System Requirements... 4 3.1 Description...
More informationSAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide
SAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide Introduction This onboarding guide covers tasks that account administrators need to perform to set up SAS Visual Statistics and SAS Visual Analytics
More informationPRINTING IN ESCRIBE...2
PRINTING IN ESCRIBE...2 PRINTING FROM MOZILLA FIREFOX...2 ALLOWING POPUPS IN MOZILLA FIREFOX...3 PRINTING FROM GOOGLE CHROME...4 ALLOWING POPUPS IN GOOGLE CHROME...5 PRINTING FROM APPLE SAFARI...6 ALLOWING
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More informationCan HTTP Strict Transport Security Meaningfully Help Secure the Web? nicolle neulist June 2, 2012 Security B-Sides Detroit
Can HTTP Strict Transport Security Meaningfully Help Secure the Web? nicolle neulist June 2, 2012 Security B-Sides Detroit 1 2 o hai. 3 Why Think About HTTP Strict Transport Security? Roadmap what is HSTS?
More informationFIREFOX MENU REFERENCE This menu reference is available in a prettier format at
FIREFOX MENU REFERENCE This menu reference is available in a prettier format at http://support.mozilla.com/en-us/kb/menu+reference FILE New Window New Tab Open Location Open File Close (Window) Close Tab
More informationThe Paperless Classroom with Google Docs by - Eric Curts
The Paperless Classroom with Google Docs by - Eric Curts Table of Contents Overview How to name documents and folders How to choose sharing options: Edit, Comment, and View How to share a document with
More informationYU Kaltura Media Package User's Guide For version 1.1.x. Written by Media and Information Technology Center, Yamaguchi University.
YU Kaltura Media Package User's Guide For version 1.1.x Written by Media and Information Technology Center, Yamaguchi University. May 22th, 2018 Table of contents 1. Summary... 2 2. Installation... 4 2.1
More informationBasic Internet Skills
The Internet might seem intimidating at first - a vast global communications network with billions of webpages. But in this lesson, we simplify and explain the basics about the Internet using a conversational
More informationNeehr Perfect EHR Quick Guide on Installing the Citrix Plugin
Neehr Perfect EHR Quick Guide on Installing the Citrix Plugin The first time you log in to Neehr Perfect on any computer, you will be prompted to install the Citrix plugin for your web browser. The installation
More informationWeb Architecture Review Sheet
Erik Wilde (School of Information, UC Berkeley) INFO 190-02 (CCN 42509) Spring 2009 May 11, 2009 Available at http://dret.net/lectures/web-spring09/ Contents 1 Introduction 2 1.1 Setup.................................................
More informationMAGLOCLEN MOCIC NESPIN RMIN ROCIC WSIN Newtown, PA Springfield, MO Franklin, MA Phoenix, AZ Nashville, TN Sacramento, CA
Regional Information Sharing Systems RISS Technology Support Center RISSNET Logon Procedure May 4, 2012 Introduction The purpose of this document is to provide instructions to users of the Regional Information
More informationSoftware Installation Manual
Software Installation Manual Page 1 of 5 Hardware Requirements The ProxnetPro application is installed on a single, dedicated* Host PC, that will then provide Web Server access to any number of connected
More informationIBM Trusteer Rapport Solution Update
IBM Trusteer Rapport Solution Update In July 2017, Trusteer released an update to Rapport that uses a new extensions-based architecture for browser protection. We are pleased to announce that they are
More informationServer-Side Web Programming: Python (Part 1) Copyright 2017 by Robert M. Dondero, Ph.D. Princeton University
Server-Side Web Programming: Python (Part 1) Copyright 2017 by Robert M. Dondero, Ph.D. Princeton University 1 Objectives You will learn about Server-side web programming in Python Common Gateway Interface
More informationI cannot launch my Web Conferencing session and recordings on Mac OS X
I cannot launch my Web Conferencing session and recordings on Mac OS X 10.8.4 Affected Platforms: Mac OS X 10.8.4 Issue Recent security changes released by Apple may prevent web conferencing customers
More informationLINK2FEED INSTRUCTION AID TOPIC: (1) User Log In & Password Reset
PURPOSE This instruction aid covers user login and password renewal and password reset. AUDIENCE Agency employees and volunteers who access Link2Feed PREREQUISITES Notification of account creation and
More informationUsing SourceTree on the Development Server
Using SourceTree on the Development Server This content has been modified to exclude client information. Such omissions include the client name and details of the client s infrastructure, such as domain
More informationSIP Session Initiation Protocol
Session Initiation Protocol ITS 441 - VoIP; 2009 P. Campbell, H.Kruse HTTP Hypertext Transfer Protocol For transfer of web pages encoded in html: Hypertext Markup Language Our interest: primarily as model
More informationNetwork Performance Analysis System. White Paper
Network Performance Analysis System White Paper Copyright Copyright 2018 Colasoft. All rights reserved. Information in this document is subject to change without notice. No part of this document may be
More informationApplication Level Protocols
Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application
More informationTCP/IP Diagnostic Utilities on Windows 2008 Server
TCP/IP Diagnostic Utilities on Windows 2008 Server June 20, 2012 Copyright 2012 by World Class CAD, LLC. All Rights Reserved. TCP/IP Utilities In this lesson, we will learn about how to use the TCP/IP
More informationDNS and HTTP. A High-Level Overview of how the Internet works
DNS and HTTP A High-Level Overview of how the Internet works Adam Portier Fall 2017 How do I Google? Smaller problems you need to solve 1. Where is Google? 2. How do I access the Google webpage? 3. How
More informationZotero for Law. Installation Guide: Mac. UTS Library University of Technology Sydney UTS CRICOS PROVIDER CODE 00099F
UTS CRICOS PROVIDER CODE 00099F Zotero for Law Installation Guide: Mac UTS Library University of Technology Sydney Zotero for Law - Installation Guide: Mac What you will need: Apple Macintosh computer
More informationInstallation & Configuration Guide Enterprise/Unlimited Edition
Installation & Configuration Guide Enterprise/Unlimited Edition Version 2.3 Updated January 2014 Table of Contents Getting Started... 3 Introduction... 3 Requirements... 3 Support... 4 Recommended Browsers...
More informationÖzgür ZEYDAN (PhD.)
Özgür ZEYDAN (PhD.) http://cevre.beun.edu.tr/zeydan/ Computer Network A group of computer systems and other computing hardware devices that are linked together through communication channels. Purpose:
More information4. Web-based Switch Configuration
4. Web-based Switch Configuration Management Options Connecting using the Web User Interface Logging onto the Web Manager Smart Wizard Web User Interface (Web UI) Management Options The Switch provides
More informationFree Download Dev. Virto Workflow Activities Kit for SP2010 computer software free download ]
Free Download Dev. Virto Workflow Activities Kit for SP2010 computer software free download ] Description: Although customized working processes are included in Microsoft Office SharePoint 2007, 2010 and
More informationStudent/Project Portfolios Using The NEW Google Sites
Student/Project Portfolios Using The NEW Google Sites Barbara Burke, Associate Professor, Communication, Media & Rhetoric Pam Gades, Technology for Teaching & Learning Coordinator, Instructional and Media
More informationH O W T O I N S T A L L A N S S L C E R T I F I C A T E V I A C P A N E L
H O W T O I N S T A L L A N S S L C E R T I F I C A T E V I A C P A N E L A R E S O U R C E F R O M M A K E M E B A I T. C O M B Y R A K T I M D U T T A How to Activate & Install an SSL Certificate in
More informationPerceptive Enterprise Search
Perceptive Enterprise Search Technical Specifications Version: 10.4 Written by: Product Knowledge, R&D Date: September 2016 2015 Lexmark International Technology, S.A. All rights reserved. Lexmark is a
More informationSOAP Integration - 1
SOAP Integration - 1 SOAP (Simple Object Access Protocol) can be used to import data (actual values) from Web Services that have been published by companies or organizations that want to provide useful
More informationSession 8. Reading and Reference. en.wikipedia.org/wiki/list_of_http_headers. en.wikipedia.org/wiki/http_status_codes
Session 8 Deployment Descriptor 1 Reading Reading and Reference en.wikipedia.org/wiki/http Reference http headers en.wikipedia.org/wiki/list_of_http_headers http status codes en.wikipedia.org/wiki/_status_codes
More informationMinistry of Education
Ministry of Education EFIS 2.0 Troubleshooting Guide Version 1.1 October 29, 2014 Table of Contents 1 DOCUMENT HISTORY... 3 2 GUIDE INFORMATION... 4 2.1 PURPOSE AND INTENTION... 4 2.2 EFIS 2.0 SUPPORT
More informationPrint Management Cloud
Print Management Cloud Version 1.0 Configuration Guide January 2018 www.lexmark.com Contents 2 Contents Change history... 4 Overview... 5 Deployment readiness checklist...6 Getting started...7 Accessing
More informationStep 1: Upload a video (skip to Step 2 if you ve already uploaded a video directly from your ipod, Uploading to YouTube and Posting in Blackboard
Uploading to YouTube and Posting in Blackboard This document will explain 1. How to upload videos from your computer to YouTube 2. How to obtain the URL (web link) or embed code for your video 3. How to
More informationHow to Register as a New Person Working with Monies (Registration, Background and Credit Check)
Welcome to the Diocese of Davenport. In our diocese we require all those working and or volunteering to work with monies complete a credit check. You will need to register with VIRTUS and then you will
More informationIf you're having any trouble accessing Cayuse 424 or the Research Suite, you may want to clear your cookies [1].
Published on Cayuse Support (http://support.cayuse.com) Home > Browser Support & Configuration Browser Support & Configuration The Research Suite is supported in recent versions of Firefox and Internet
More informationCleanMyPC User Guide
CleanMyPC User Guide Copyright 2017 MacPaw Inc. All rights reserved. macpaw.com CONTENTS Overview 3 About CleanMyPC... 3 System requirements... 3 Download and installation 4 Activation and license reset
More informationBig Tobacco: Tiny Targets Web Application Guide
Adding The App to Your Home Screen For Step 1: Launch Safari Launch the Safari browser and visit https://ee.kobotoolbox.org/x/#yehn Big Tobacco: Tiny Targets Web Application Guide This guide will explain
More informationNetwork setup and troubleshooting
ACTi Knowledge Base Category: Application Note Sub-category: Application Model: All Firmware: All Software: NVR Published: 2009/12/21 Reviewed: 2010/06/10 Network setup and troubleshooting Contents Introduction
More information[Type text] RELEASE NOTES. Version 5.1.1
[Type text] RELEASE NOTES Version 5.1.1 i Compliance Sheriff V4.3 Copyright 2015 Cryptzone North America Inc. Copyright information Copyright 2016 Cryptzone North America Inc. All rights reserved. Information
More informationCOMP 2000 W 2012 Lab no. 3 Page 1 of 11
COMP 2000 W 2012 Lab no. 3 Page 1 of 11 Lab Introduction Background The Internet is based on packet-switched protocols. Information is carried in packets (it is divided into packets), which can be imagined
More informationSecure Access Troubleshooting Rewrite related issues (Core/Web Based Access)
Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Published June 2015 Why do certain web-based applications have issues through the rewrite engine compared to accessing the resource
More informationCS 161 Computer Security
Nick Weaver Fall 2018 CS 161 Computer Security Homework 3 Due: Friday, 19 October 2018, at 11:59pm Instructions. This homework is due Friday, 19 October 2018, at 11:59pm. No late homeworks will be accepted
More informationSQL Troubleshooting. ACTi Knowledge Base. Contents. Introduction.
ACTi Knowledge Base Category: Troubleshooting Note Sub-category: Integration Model: N/A Firmware: N/A Software: NVR2.2.47 (SP2) Author: Ando.Meritee Published: 2009/10/26 Reviewed: 2009/12/07 SQL Troubleshooting
More informationLast modified on Author Reason 3/11/2019 Stanislaus Training team Final Revision
Helpful Tips Revision history Last modified on Author Reason 3/11/2019 Stanislaus Training team Final Revision Introduction This guide includes general tips and tricks that you should know when you are
More information