Potentially Malicious URLs

Size: px
Start display at page:

Download "Potentially Malicious URLs"

Transcription

1 FORENSIC INSIGHT; DIGITAL FORENSICS COMMUNITY IN KOREA Potentially Malicious URLs 13lackc4t 13lackc4t.blog.me

2 Index 1. First Get Permission If Needed 2. Unshortening 3. Obfuscating URI Tricks IP Obfuscation URL Encoding 4. Deobfuscating 5. Challenge! Manual Safe Deconstruction Automatic Safe Deconstruction Obfuscation Process Tracing the Click Browser Compatibility Conclusion forensicinsight.org Page 2

3 First Get Permission If Needed forensicinsight.org Page 3

4 First Get Permission If Needed Major issues You don't always know if that data you are transmitting is sensitive There is no expectation of privacy when utilizing a third party site forensicinsight.org Page 4

5 Unshortening forensicinsight.org Page 5

6 Unshortening URL shorteners Name URL Ex TinyURL Tiny Bitly Google Shortener Ow.ly Twitter Shortener is.gd McAfee Shortener forensicinsight.org Page 6

7 Unshortening URL unshorteners Unshorten.it forensicinsight.org Page 7

8 Unshortening URL unshorteners LongURL forensicinsight.org Page 8

9 Unshortening URL unshorteners Unshort.me forensicinsight.org Page 9

10 Unshortening URL unshorteners Unshorten.com forensicinsight.org Page 10

11 Obfuscating - URI Tricks - IP Obfuscation - URL Encoding forensicinsight.org Page 11

12 Obfuscating URI Tricks The general URL format Simple examples 1) 2) 3) forensicinsight.org Page 12

13 Obfuscating URI Tricks Chrome v23 Understood the URL and correctly sent us Internet Explorer 8, 9, 10 Not working (only ) Firefox Warning forensicinsight.org Page 13

14 Obfuscating IP obfuscation (one of Google s IP addresses) DWORD conversion (((((74*256) + 125) * 256) + 131) * 256) = Hex conversion 74 = 0x4a 125 = 0x7d 131=0x83 105=0x69 Octal conversion 74 = = = = 0151 forensicinsight.org Page 14

15 Obfuscating URL Encoding converts characters into a format that can be transmitted over the Internet Be used in URLs to confuse the user and hide intention ftp://foo:foo%40example.com@ftp.example.com/pub/a.txt %40 forensicinsight.org Page 15

16 Deobfuscating forensicinsight.org Page 16

17 Deobfuscating These can still be done by hand, but can be time consuming There are some third-party sites that will help you figure out what the URL is doing forensicinsight.org Page 17

18 Deobfuscating Netdemon forensicinsight.org Page 18

19 Deobfuscating URL decoder forensicinsight.org Page 19

20 - Manual Safe Deconstruction - Automatic Safe Deconstruction - Obfuscation Process - Tracing the Click - Browser Compatibility - Conclusion forensicinsight.org Page 20

21 forensicinsight.org Page 21

22 Manual Safe Deconstruction 1. Unshorten the URL 2. Discard URL trickery 3. Convert Octal to Decimal 4. URL decode 5. WHOIS attribution forensicinsight.org Page 22

23 Manual Safe Deconstruction Unshorten the URL Use one of the URL shorteners called tinyurlchecker forensicinsight.org Page 23

24 Manual Safe Deconstruction Unshorten the URL Result =%68%74%74%70%3A%2F%2F%77%77%77%2E%79%6F%75%74%75%62%65%2E%63%6F%6D %2F%77%61%74%63%68%3Fv%3%44%6F%48%67%35%53%4A%59%52%48%41%30 forensicinsight.org Page 24

25 Manual Safe Deconstruction Discard URL trickery Remove anything from the up to and including the Result %74%74%70%3A%2F%2F%77%77%77%2E%79%6F%75%74%75%62%65%2E%63%6F%6D%2F%7 7%61%74%63%68%3Fv%3%44%6F%48%67%35%53%4A%59%52%48%41%30 forensicinsight.org Page 25

26 Manual Safe Deconstruction Convert Octal to Decimal Address: Convert: = = = = 105 Becomes: Result %77%77%77%2E%79%6F%75%74%75%62%65%2E%63%6F%6D%2F%77%61%74%63%68%3Fv% 3%44%6F%48%67%35%53%4A%59%52%48%41%30 forensicinsight.org Page 26

27 Manual Safe Deconstruction URL decode forensicinsight.org Page 27

28 Manual Safe Deconstruction URL decode Result forensicinsight.org Page 28

29 Manual Safe Deconstruction WHOIS attribution forensicinsight.org Page 29

30 Automatic Safe Deconstruction LongURL forensicinsight.org Page 30

31 Automatic Safe Deconstruction Unshorten.it forensicinsight.org Page 31

32 Automatic Safe Deconstruction Netdemon forensicinsight.org Page 32

33 Obfuscation Process URL Redirection Octal IP Representation URL Encoding URL Trickery URL Shortening forensicinsight.org Page 33

34 Obfuscation Process URL Redirection An application that accepts a parameter that allows the end user to be redirected to another page It happens so quickly that the user does not have time to react and stop the next page from loading A simple example of a URL redirect: forensicinsight.org Page 34

35 Obfuscation Process URL Redirection The URL redirect we used in our special link is against Google (with their gracious permission for educational purposes): g5sjyrha0 forensicinsight.org Page 35

36 Obfuscation Process Octal IP Representation 1. nslookup resolved one of Google's web servers to Using Microsoft's Calculator, we converted the IP address - 74 = = = = After adding some zero padding (any number of zeros can be used), we come up with 4. Replace " in our redirect URL Result : %2Fwatch%3Fv%3DoHg5SJYRHA0 forensicinsight.org Page 36

37 Obfuscation Process URL Encoding ASCII URL Encoded url %75%72%6C sa %73%61 t %74 http %68%74%74%70 %77%77%77%2E%79%6F%75%74%75%62%65%2E%63%6F%6D watch %77%61%74%63%68 DoHg5SJYRHA0 %44%6F%48%67%35%53%4A%59%52%48%41%30 forensicinsight.org Page 37

38 Obfuscation Process URL Encoding om%2fwatch%3fv%3dohg5sjyrha0 68%74%74%70%3A%2F%2F%77%77%77%2E%79%6F%75%74%75%62%65%2E%63%6F%6D% 2F%77%61%74%63%68%3Fv%3%44%6F%48%67%35%53%4A%59%52%48%41%30 forensicinsight.org Page 38

39 Obfuscation Process URL trickery Chrome is the only browser that will send the user to the destination page without a warning when the URL is formatted as follows: forensicinsight.org Page 39

40 Obfuscation Process URL trickery 68%74%74%70%3A%2F%2F%77%77%77%2E%79%6F%75%74%75%62%65%2E%63%6F%6D% 2F%77%61%74%63%68%3Fv%3%44%6F%48%67%35%53%4A%59%52%48%41%30 6C=%68%74%74%70%3A%2F%2F%77%77%77%2E%79%6F%75%74%75%62%65%2E%63%6F %6D%2F%77%61%74%63%68%3Fv%3%44%6F%48%67%35%53%4A%59%52%48%41%30 forensicinsight.org Page 40

41 Obfuscation Process URL Shortening Used TinyUrl because it allows us to specify a memorable link such as TonysChallenge Result : forensicinsight.org Page 41

42 Tracing the Click forensicinsight.org Page 42

43 Browser Compatibility Only Chrome! forensicinsight.org Page 43

44 Question and Answer forensicinsight.org Page 44

FORENSIC INSIGHT SEMINAR. Digital Times. dorumugs. Malware.co.kr. And yet it does move

FORENSIC INSIGHT SEMINAR. Digital Times. dorumugs. Malware.co.kr. And yet it does move FORENSIC INSIGHT SEMINAR Digital Times dorumugs Malware.co.kr And yet it does move Index 1. UTC and GMT 2. Time Unit 3. Digital Times 4. Many Kinds of Times 5. Tool : time_maker 6. Q&A forensicinsight.org

More information

1 of 10 3/31/2012 8:38 AM

1 of 10 3/31/2012 8:38 AM 1 of 10 3/31/2012 8:38 AM search your bitly links Shorten & Share Analyze Public Timeline symphil bitly basics: Getting started What is bitly? How does bitly work? How do I use bitly to shorten a link?

More information

IFRS KMA KNOWLEDGE MANAGEMENT APPLICATION INSTALLATION GUIDE

IFRS KMA KNOWLEDGE MANAGEMENT APPLICATION INSTALLATION GUIDE IFRS KMA KNOWLEDGE MANAGEMENT APPLICATION INSTALLATION GUIDE The KMA INSTALLATION GUIDE STEP 1. Download the installation file from the link in your email. When you click on the KMA link to begin the installation

More information

AY SECOND TERM Technology Education Revision Sheet

AY SECOND TERM Technology Education Revision Sheet AY 2017 2018 SECOND TERM Technology Education Revision Sheet Name: Date: Grade 10 Teacher: I. Fill in the blanks using correct answer: 1. WWW is World Wide Web. 2. The short form of Hyper Text Transfer

More information

What Is It? Instruction Register Address Register Data Register

What Is It? Instruction Register Address Register Data Register What Is It? Consider the following set of 32 binary digits, written in blocks of four so that the example is not impossible to read. 0010 0110 0100 1100 1101 1001 1011 1111 How do we interpret this sequence

More information

Course Folder and Files Instructions for download and use

Course Folder and Files Instructions for download and use Course Folder and Files Instructions for download and use About course folders and files Please read this page carefully! Most, but not all of our courses, at certain points in each chapter, instruct you

More information

BROWSER CLICK TO DIAL

BROWSER CLICK TO DIAL BROWSER CLICK TO DIAL CONTENTS 1 Background... 1 2 How It Works... 2 2.1 Microsoft Internet Explorer... 2 2.2 Mozilla Firefox... 3 2.3 Google Chrome... 3 3 Portal Configuration... 4 4 Testing & Troubleshooting...

More information

Game100 Networking Lab 4. Part 1 (5.1.4) Using the Windows Calculator with Network Addresses

Game100 Networking Lab 4. Part 1 (5.1.4) Using the Windows Calculator with Network Addresses Game100 Networking Lab 4 Name: Part 1 (5.1.4) Using the Windows Calculator with Network Addresses Objectives Switch between the two Windows Calculator modes. Use Windows Calculator to convert between decimal,

More information

Advanced Evidence Collection and Anal ysis of Web Browser Activity

Advanced Evidence Collection and Anal ysis of Web Browser Activity Advanced Evidence Collection and Anal ysis of Web Browser Activity J. Oh, S. Lee and S. Lee Digital Forensics Research Center, Korea University Junghoon Oh blue0226@korea.ac.kr Agenda 1. Introduction 2.

More information

CM Social Post Documentation

CM Social Post Documentation CM Social Post Documentation Release 1.0.1 CMExtension March 15, 2016 Contents 1 Overview 3 2 Install & update 5 3 Facebook application 7 4 Facebook personal timeline plugin 13 5 Facebook page timeline

More information

Package urlshortener

Package urlshortener Type Package Package urlshortener December 5, 2016 Title R Wrapper for the 'Bit.ly', 'Goo.gl' and 'Is.gd' URL Shortening Services Allows using different URL shortening services, which also provide expanding

More information

Base64 The Security Killer

Base64 The Security Killer Base64 The Security Killer Kevin Fiscus NWN Corporation Session ID: DAS-203 Session Classification: Intermediate A Short (Made Up) Security Story Helix Pharmaceuticals is concerned about security Industrial

More information

How Do I Manage Active Directory

How Do I Manage Active Directory How Do I Manage Active Directory Your Red Box Recorder supports Windows Active Directory integration and Single Sign-On. This Quick Question topic is provided for system administrators and covers the setup

More information

Rochester Regional Library Council

Rochester Regional Library Council Rochester Regional Library Council Google Analytics Training 1/23/17 Introduction Matt Weaver Digital Director Mason Digital, LLC Mason Digital is an official Google Agency Partner Google Analytics and

More information

Download norton toolbar for google chrome

Download norton toolbar for google chrome Download norton toolbar for google chrome Our Norton Toolbar is not compatible with Google Chrome 32. helps if you browse responsibly -- do not download or install anything that is. Mar 29, 2018. If you

More information

5/19/2015. Objectives. JavaScript, Sixth Edition. Saving State Information with Query Strings. Understanding State Information

5/19/2015. Objectives. JavaScript, Sixth Edition. Saving State Information with Query Strings. Understanding State Information Objectives JavaScript, Sixth Edition When you complete this chapter, you will be able to: Save state information with query strings, hidden form fields, and cookies Describe JavaScript security issues

More information

Browser Support Internet Explorer

Browser Support Internet Explorer Browser Support Internet Explorer Consumers Online Banking offers you more enhanced features than ever before! To use the improved online banking, you may need to change certain settings on your device

More information

4/14/2015. Architecture of the World Wide Web. During this session we will discuss: Structure of the World Wide Web

4/14/2015. Architecture of the World Wide Web. During this session we will discuss: Structure of the World Wide Web Internet Gambling Investigations Architecture of the World Wide Web Ω Objectives During this session we will discuss: The term world wide web User interaction on the world wide web The purpose of gateways

More information

Ex-Ray: Detection of History-Leaking Browser Extensions

Ex-Ray: Detection of History-Leaking Browser Extensions Ex-Ray: Detection of History-Leaking Browser Extensions Michael Weissbacher, Enrico Mariconti, Guillermo Suarez-Tangil, Gianluca Stringhini, William Robertson, Engin Kirda Northeastern University, University

More information

Looking at the Internet with Google Chrome & Firefox. Scoville Memorial Library Claudia Cayne - September, 2010

Looking at the Internet with Google Chrome & Firefox. Scoville Memorial Library Claudia Cayne - September, 2010 Looking at the Internet with Google Chrome & Firefox Scoville Memorial Library Claudia Cayne - ccayne@biblio.org September, 2010 Google Chrome & Firefox are web browsers - the decoder you need to view

More information

Stefan Heule, Devon Rifkin, Alejandro Russo, Deian Stefan. Stanford University, Chalmers University of Technology

Stefan Heule, Devon Rifkin, Alejandro Russo, Deian Stefan. Stanford University, Chalmers University of Technology Stefan Heule, Devon Rifkin, Alejandro Russo, Deian Stefan Stanford University, Chalmers University of Technology One of the most popular application platforms Easy to deploy and access Almost anything

More information

External HTTPS Trigger AXIS Camera Station 5.06 and above

External HTTPS Trigger AXIS Camera Station 5.06 and above HOW TO External HTTPS Trigger AXIS Camera Station 5.06 and above Created: October 17, 2016 Last updated: November 19, 2016 Rev: 1.2 1 Please note that AXIS does not take any responsibility for how this

More information

Navigate by Using Windows Explorer

Navigate by Using Windows Explorer Navigate by Using Windows Explorer Pinning a location to a Jump List 2013 Pearson Education, Inc. Publishing as Prentice Hall 26 Navigate by Using Windows Explorer Navigating using the address bar 2013

More information

HTTP Reading: Section and COS 461: Computer Networks Spring 2013

HTTP Reading: Section and COS 461: Computer Networks Spring 2013 HTTP Reading: Section 9.1.2 and 9.4.3 COS 461: Computer Networks Spring 2013 1 Recap: Client-Server Communication Client sometimes on Initiates a request to the server when interested E.g., Web browser

More information

1 Post-Installation Configuration Tasks

1 Post-Installation Configuration Tasks 1 Post-Installation Configuration Tasks 1.1 Overview The previous chapters provide instructions on how to set up Appeon system architecture, including installing Appeon for PowerBuilder components, as

More information

How to Configure an SSH Tunnel on PuTTY

How to Configure an SSH Tunnel on PuTTY How to Configure an SSH Tunnel on PuTTY YOU CAN USE A DYNAMIC TUNNEL TO ACCESS ALL REMOTE INFRASTRUCTURE. Most of you have probably used a tunnel with an SSH connection. What you probably weren t aware

More information

Introduction to Twitter

Introduction to Twitter Introduction to Twitter Objectives After completing this class you will be able to: Identify what Twitter is Create a Twitter Account Customize your Twitter profile and settings Follow other users on Twitter

More information

Configuring Microsoft Edge Browser By Tom Krauser

Configuring Microsoft Edge Browser By Tom Krauser Configuring Microsoft Edge Browser By Tom Krauser Browsers are the interface between the computer and internet. They provide the frame in which the website content is displayed. Having more than one browser

More information

BT Cloud Phone. App for Desk user guide. A user guide for running BT Cloud Phone with Desk.com customer service software.

BT Cloud Phone. App for Desk user guide. A user guide for running BT Cloud Phone with Desk.com customer service software. BT Cloud Phone. App for Desk user guide. A user guide for running BT Cloud Phone with Desk.com customer service software. 2 What s in this guide. 1 Introduction. 3 1.1 About BT Cloud Phone for Desk. 3

More information

Palo Alto Networks PAN-OS

Palo Alto Networks PAN-OS RSA Security Analytics Ready Implementation Guide Partner Information Last Modified: November 24 th, 2014 Product Information Partner Name Palo Alto Networks Web Site www.paloaltonetworks.com Product Name

More information

The Most Dangerous Code in the Browser. Stefan Heule, Devon Rifkin, Alejandro Russo, Deian Stefan

The Most Dangerous Code in the Browser. Stefan Heule, Devon Rifkin, Alejandro Russo, Deian Stefan The Most Dangerous Code in the Browser Stefan Heule, Devon Rifkin, Alejandro Russo, Deian Stefan Modern web experience Modern web experience Modern web experience Web apps Extensions NYTimes Chase AdBlock

More information

E-statement Settings Guide

E-statement Settings Guide E-statement Settings Guide Contents Windows PC... 3 Google Chrome... 3 Internet Explorer... 7 Mozilla Firefox... 10 Apple Macintosh... 14 Safari for Mac... 14 Apple ios (iphone/ipad)... 21 Safari for ios

More information

HTTP Security. CSC 482/582: Computer Security Slide #1

HTTP Security. CSC 482/582: Computer Security Slide #1 HTTP Security CSC 482/582: Computer Security Slide #1 Topics 1. How HTTP works 2. HTTP methods, headers, and responses 3. URIs, URLs, and URNs 4. Statelessness 5. Cookies 6. More HTTP methods and headers

More information

Getting Started with Panopto (Windows and OSX)

Getting Started with Panopto (Windows and OSX) Table of Contents Setting up Panopto in Blackboard... 2 Setting up Panopto... 6 For Windows... 8 For OSX:... 11 Removing Panopto RSS Feeds in Blackboard... 14 Creating Placeholders for Future Lectures...

More information

Live Guide Co-browsing

Live Guide Co-browsing TECHNICAL PAPER Live Guide Co-browsing Netop develops and sells software solutions that enable swift, secure and seamless transfer of video, screens, sounds and data between two or more computers over

More information

Visual Workflow Implementation Guide

Visual Workflow Implementation Guide Version 30.0: Spring 14 Visual Workflow Implementation Guide Note: Any unreleased services or features referenced in this or other press releases or public statements are not currently available and may

More information

CNIT 129S: Securing Web Applications. Ch 12: Attacking Users: Cross-Site Scripting (XSS) Part 2

CNIT 129S: Securing Web Applications. Ch 12: Attacking Users: Cross-Site Scripting (XSS) Part 2 CNIT 129S: Securing Web Applications Ch 12: Attacking Users: Cross-Site Scripting (XSS) Part 2 Finding and Exploiting XSS Vunerabilities Basic Approach Inject this string into every parameter on every

More information

How to View Saved Passwords in Mozilla Firefox

How to View Saved Passwords in Mozilla Firefox Submitted by Jess on Wed, 07/23/2014-14:45 If you are using Mozilla Firefox web browser to surf the internet, then that is a very good decision as Firefox is safe, reliable, fast and stable browser. But

More information

Saumil Shah. net-square DEEPS E C

Saumil Shah. net-square DEEPS E C when Bad Things come Good in packages Saumil Shah DEEPS E C 2 0 1 2 # who am i Saumil Shah, CEO Net-Square. Hacker, Speaker, Trainer, Author - 15 yrs in Infosec. M.S. Computer Science Purdue University.

More information

Phishing Attacks. Mendel Rosenblum. CS142 Lecture Notes - Phishing Attack

Phishing Attacks. Mendel Rosenblum. CS142 Lecture Notes - Phishing Attack Phishing Attacks Mendel Rosenblum Phishing Basic idea: Get unsuspecting users to visit an evil Web site Convince them that the evil Web site is actually a legitimate site (such as a bank or PayPal) Trick

More information

Sign-in with UM CaneID

Sign-in with UM CaneID Sign-in with UM CaneID Section 1.1: Overview When you need to sign in with your CaneID to access application such as Workday, CaneLink, Box, and many others, you will be authenticated by the UM Single

More information

Uploading and Embedding Your Digital Story (YouTube/Wordpress Version)

Uploading and Embedding Your Digital Story (YouTube/Wordpress Version) Uploading and Embedding Your Digital Story (YouTube/Wordpress Version) If you were using digital stories in your classroom, you wouldn't even need to upload the videos to the Internet; you could just watch

More information

FAQ. Safe Anywhere PC 12. Disclaimer:

FAQ. Safe Anywhere PC 12. Disclaimer: FAQ Safe Anywhere PC 12 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch pad, F-Secure

More information

Comprehensive Technical SEO Site Audit. PolyTab.com

Comprehensive Technical SEO Site Audit. PolyTab.com Comprehensive Technical SEO Site Audit PolyTab.com Conclusion - The competition in this segment is HIGH (There are many authority sites competing for a similar set of keywords). With strong content - strong

More information

CS 120 Digital Literacy, Chapter 5: p

CS 120 Digital Literacy, Chapter 5: p CS 120 Digital Literacy, Chapter 5: p. 287-344 CS 120, Digital Literacy, Ch 5, p.1 Browsing & Searching the Internet: Web browser a software program that is used to display web pages. IE, Safari, Firefox,

More information

Lab - Observing DNS Resolution

Lab - Observing DNS Resolution Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail

More information

Publish Content & Measure Success 1

Publish Content & Measure Success 1 Publish Content & Measure Success 1 Publish Content & Measure Success Meltwater Engage gives businesses scalability and control over content publishing across all of their social channels. The built- in

More information

Jersey City Free Public Library WIFI Hotspot

Jersey City Free Public Library WIFI Hotspot 1. Windows 2000, XP, 7 and Vista Users: a. Select the wireless icon in the system tray. or or or b. Select the SSID of the library you are currently located: JCPL- c. Launch a web browser (Internet Explorer,

More information

Octal & Hexadecimal Number Systems. Digital Electronics

Octal & Hexadecimal Number Systems. Digital Electronics Octal & Hexadecimal Number Systems Digital Electronics What, More Number Systems? Why do we need more number systems? Humans understand decimal Check out my ten digits! Digital electronics (computers)

More information

How things work college course/turing machine quiz/testbank/mirror

How things work college course/turing machine quiz/testbank/mirror How things work college course/turing machine quiz/testbank/mirror From Wikiversity Contents 1 BusyBeaver 1.1 BusyBeaver v1s1 1.1.1 Key to BusyBeaver v1s1 1.2 BusyBeaver v2s1 1.2.1 Key to BusyBeaver v2s1

More information

CANVAS OBSERVER GUIDE

CANVAS OBSERVER GUIDE CANVAS OBSERVER GUIDE This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License Table of Contents Introduction...3 What is the Observer role?...4 How can I use Canvas

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

Portal User Guide. Best practice tips and shortcuts Icon Legend Informational notes about functions. Important warnings about a function

Portal User Guide. Best practice tips and shortcuts Icon Legend Informational notes about functions. Important warnings about a function Portal User Guide Tips Best practice tips and shortcuts Icon Legend Notes Warning Informational notes about functions Important warnings about a function Your Portal https://www.clientaxcess.com Your Portal

More information

Ministry of Education EFIS User Set Up Guide Version 1.9

Ministry of Education EFIS User Set Up Guide Version 1.9 Ministry of Education EFIS 2.0 - User Set Up Guide Version 1.9 August 22, 2016 1 Table of Contents 1 Table of Contents... 2 2 Document History... 3 3 Description and System Requirements... 4 3.1 Description...

More information

SAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide

SAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide SAS Visual Analytics 7.3 for SAS Cloud: Onboarding Guide Introduction This onboarding guide covers tasks that account administrators need to perform to set up SAS Visual Statistics and SAS Visual Analytics

More information

PRINTING IN ESCRIBE...2

PRINTING IN ESCRIBE...2 PRINTING IN ESCRIBE...2 PRINTING FROM MOZILLA FIREFOX...2 ALLOWING POPUPS IN MOZILLA FIREFOX...3 PRINTING FROM GOOGLE CHROME...4 ALLOWING POPUPS IN GOOGLE CHROME...5 PRINTING FROM APPLE SAFARI...6 ALLOWING

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

Can HTTP Strict Transport Security Meaningfully Help Secure the Web? nicolle neulist June 2, 2012 Security B-Sides Detroit

Can HTTP Strict Transport Security Meaningfully Help Secure the Web? nicolle neulist June 2, 2012 Security B-Sides Detroit Can HTTP Strict Transport Security Meaningfully Help Secure the Web? nicolle neulist June 2, 2012 Security B-Sides Detroit 1 2 o hai. 3 Why Think About HTTP Strict Transport Security? Roadmap what is HSTS?

More information

FIREFOX MENU REFERENCE This menu reference is available in a prettier format at

FIREFOX MENU REFERENCE This menu reference is available in a prettier format at FIREFOX MENU REFERENCE This menu reference is available in a prettier format at http://support.mozilla.com/en-us/kb/menu+reference FILE New Window New Tab Open Location Open File Close (Window) Close Tab

More information

The Paperless Classroom with Google Docs by - Eric Curts

The Paperless Classroom with Google Docs by - Eric Curts The Paperless Classroom with Google Docs by - Eric Curts Table of Contents Overview How to name documents and folders How to choose sharing options: Edit, Comment, and View How to share a document with

More information

YU Kaltura Media Package User's Guide For version 1.1.x. Written by Media and Information Technology Center, Yamaguchi University.

YU Kaltura Media Package User's Guide For version 1.1.x. Written by Media and Information Technology Center, Yamaguchi University. YU Kaltura Media Package User's Guide For version 1.1.x Written by Media and Information Technology Center, Yamaguchi University. May 22th, 2018 Table of contents 1. Summary... 2 2. Installation... 4 2.1

More information

Basic Internet Skills

Basic Internet Skills The Internet might seem intimidating at first - a vast global communications network with billions of webpages. But in this lesson, we simplify and explain the basics about the Internet using a conversational

More information

Neehr Perfect EHR Quick Guide on Installing the Citrix Plugin

Neehr Perfect EHR Quick Guide on Installing the Citrix Plugin Neehr Perfect EHR Quick Guide on Installing the Citrix Plugin The first time you log in to Neehr Perfect on any computer, you will be prompted to install the Citrix plugin for your web browser. The installation

More information

Web Architecture Review Sheet

Web Architecture Review Sheet Erik Wilde (School of Information, UC Berkeley) INFO 190-02 (CCN 42509) Spring 2009 May 11, 2009 Available at http://dret.net/lectures/web-spring09/ Contents 1 Introduction 2 1.1 Setup.................................................

More information

MAGLOCLEN MOCIC NESPIN RMIN ROCIC WSIN Newtown, PA Springfield, MO Franklin, MA Phoenix, AZ Nashville, TN Sacramento, CA

MAGLOCLEN MOCIC NESPIN RMIN ROCIC WSIN Newtown, PA Springfield, MO Franklin, MA Phoenix, AZ Nashville, TN Sacramento, CA Regional Information Sharing Systems RISS Technology Support Center RISSNET Logon Procedure May 4, 2012 Introduction The purpose of this document is to provide instructions to users of the Regional Information

More information

Software Installation Manual

Software Installation Manual Software Installation Manual Page 1 of 5 Hardware Requirements The ProxnetPro application is installed on a single, dedicated* Host PC, that will then provide Web Server access to any number of connected

More information

IBM Trusteer Rapport Solution Update

IBM Trusteer Rapport Solution Update IBM Trusteer Rapport Solution Update In July 2017, Trusteer released an update to Rapport that uses a new extensions-based architecture for browser protection. We are pleased to announce that they are

More information

Server-Side Web Programming: Python (Part 1) Copyright 2017 by Robert M. Dondero, Ph.D. Princeton University

Server-Side Web Programming: Python (Part 1) Copyright 2017 by Robert M. Dondero, Ph.D. Princeton University Server-Side Web Programming: Python (Part 1) Copyright 2017 by Robert M. Dondero, Ph.D. Princeton University 1 Objectives You will learn about Server-side web programming in Python Common Gateway Interface

More information

I cannot launch my Web Conferencing session and recordings on Mac OS X

I cannot launch my Web Conferencing session and recordings on Mac OS X I cannot launch my Web Conferencing session and recordings on Mac OS X 10.8.4 Affected Platforms: Mac OS X 10.8.4 Issue Recent security changes released by Apple may prevent web conferencing customers

More information

LINK2FEED INSTRUCTION AID TOPIC: (1) User Log In & Password Reset

LINK2FEED INSTRUCTION AID TOPIC: (1) User Log In & Password Reset PURPOSE This instruction aid covers user login and password renewal and password reset. AUDIENCE Agency employees and volunteers who access Link2Feed PREREQUISITES Notification of account creation and

More information

Using SourceTree on the Development Server

Using SourceTree on the Development Server Using SourceTree on the Development Server This content has been modified to exclude client information. Such omissions include the client name and details of the client s infrastructure, such as domain

More information

SIP Session Initiation Protocol

SIP Session Initiation Protocol Session Initiation Protocol ITS 441 - VoIP; 2009 P. Campbell, H.Kruse HTTP Hypertext Transfer Protocol For transfer of web pages encoded in html: Hypertext Markup Language Our interest: primarily as model

More information

Network Performance Analysis System. White Paper

Network Performance Analysis System. White Paper Network Performance Analysis System White Paper Copyright Copyright 2018 Colasoft. All rights reserved. Information in this document is subject to change without notice. No part of this document may be

More information

Application Level Protocols

Application Level Protocols Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application

More information

TCP/IP Diagnostic Utilities on Windows 2008 Server

TCP/IP Diagnostic Utilities on Windows 2008 Server TCP/IP Diagnostic Utilities on Windows 2008 Server June 20, 2012 Copyright 2012 by World Class CAD, LLC. All Rights Reserved. TCP/IP Utilities In this lesson, we will learn about how to use the TCP/IP

More information

DNS and HTTP. A High-Level Overview of how the Internet works

DNS and HTTP. A High-Level Overview of how the Internet works DNS and HTTP A High-Level Overview of how the Internet works Adam Portier Fall 2017 How do I Google? Smaller problems you need to solve 1. Where is Google? 2. How do I access the Google webpage? 3. How

More information

Zotero for Law. Installation Guide: Mac. UTS Library University of Technology Sydney UTS CRICOS PROVIDER CODE 00099F

Zotero for Law. Installation Guide: Mac. UTS Library University of Technology Sydney UTS CRICOS PROVIDER CODE 00099F UTS CRICOS PROVIDER CODE 00099F Zotero for Law Installation Guide: Mac UTS Library University of Technology Sydney Zotero for Law - Installation Guide: Mac What you will need: Apple Macintosh computer

More information

Installation & Configuration Guide Enterprise/Unlimited Edition

Installation & Configuration Guide Enterprise/Unlimited Edition Installation & Configuration Guide Enterprise/Unlimited Edition Version 2.3 Updated January 2014 Table of Contents Getting Started... 3 Introduction... 3 Requirements... 3 Support... 4 Recommended Browsers...

More information

Özgür ZEYDAN (PhD.)

Özgür ZEYDAN (PhD.) Özgür ZEYDAN (PhD.) http://cevre.beun.edu.tr/zeydan/ Computer Network A group of computer systems and other computing hardware devices that are linked together through communication channels. Purpose:

More information

4. Web-based Switch Configuration

4. Web-based Switch Configuration 4. Web-based Switch Configuration Management Options Connecting using the Web User Interface Logging onto the Web Manager Smart Wizard Web User Interface (Web UI) Management Options The Switch provides

More information

Free Download Dev. Virto Workflow Activities Kit for SP2010 computer software free download ]

Free Download Dev. Virto Workflow Activities Kit for SP2010 computer software free download ] Free Download Dev. Virto Workflow Activities Kit for SP2010 computer software free download ] Description: Although customized working processes are included in Microsoft Office SharePoint 2007, 2010 and

More information

Student/Project Portfolios Using The NEW Google Sites

Student/Project Portfolios Using The NEW Google Sites Student/Project Portfolios Using The NEW Google Sites Barbara Burke, Associate Professor, Communication, Media & Rhetoric Pam Gades, Technology for Teaching & Learning Coordinator, Instructional and Media

More information

H O W T O I N S T A L L A N S S L C E R T I F I C A T E V I A C P A N E L

H O W T O I N S T A L L A N S S L C E R T I F I C A T E V I A C P A N E L H O W T O I N S T A L L A N S S L C E R T I F I C A T E V I A C P A N E L A R E S O U R C E F R O M M A K E M E B A I T. C O M B Y R A K T I M D U T T A How to Activate & Install an SSL Certificate in

More information

Perceptive Enterprise Search

Perceptive Enterprise Search Perceptive Enterprise Search Technical Specifications Version: 10.4 Written by: Product Knowledge, R&D Date: September 2016 2015 Lexmark International Technology, S.A. All rights reserved. Lexmark is a

More information

SOAP Integration - 1

SOAP Integration - 1 SOAP Integration - 1 SOAP (Simple Object Access Protocol) can be used to import data (actual values) from Web Services that have been published by companies or organizations that want to provide useful

More information

Session 8. Reading and Reference. en.wikipedia.org/wiki/list_of_http_headers. en.wikipedia.org/wiki/http_status_codes

Session 8. Reading and Reference. en.wikipedia.org/wiki/list_of_http_headers. en.wikipedia.org/wiki/http_status_codes Session 8 Deployment Descriptor 1 Reading Reading and Reference en.wikipedia.org/wiki/http Reference http headers en.wikipedia.org/wiki/list_of_http_headers http status codes en.wikipedia.org/wiki/_status_codes

More information

Ministry of Education

Ministry of Education Ministry of Education EFIS 2.0 Troubleshooting Guide Version 1.1 October 29, 2014 Table of Contents 1 DOCUMENT HISTORY... 3 2 GUIDE INFORMATION... 4 2.1 PURPOSE AND INTENTION... 4 2.2 EFIS 2.0 SUPPORT

More information

Print Management Cloud

Print Management Cloud Print Management Cloud Version 1.0 Configuration Guide January 2018 www.lexmark.com Contents 2 Contents Change history... 4 Overview... 5 Deployment readiness checklist...6 Getting started...7 Accessing

More information

Step 1: Upload a video (skip to Step 2 if you ve already uploaded a video directly from your ipod, Uploading to YouTube and Posting in Blackboard

Step 1: Upload a video (skip to Step 2 if you ve already uploaded a video directly from your ipod, Uploading to YouTube and Posting in Blackboard Uploading to YouTube and Posting in Blackboard This document will explain 1. How to upload videos from your computer to YouTube 2. How to obtain the URL (web link) or embed code for your video 3. How to

More information

How to Register as a New Person Working with Monies (Registration, Background and Credit Check)

How to Register as a New Person Working with Monies (Registration, Background and Credit Check) Welcome to the Diocese of Davenport. In our diocese we require all those working and or volunteering to work with monies complete a credit check. You will need to register with VIRTUS and then you will

More information

If you're having any trouble accessing Cayuse 424 or the Research Suite, you may want to clear your cookies [1].

If you're having any trouble accessing Cayuse 424 or the Research Suite, you may want to clear your cookies [1]. Published on Cayuse Support (http://support.cayuse.com) Home > Browser Support & Configuration Browser Support & Configuration The Research Suite is supported in recent versions of Firefox and Internet

More information

CleanMyPC User Guide

CleanMyPC User Guide CleanMyPC User Guide Copyright 2017 MacPaw Inc. All rights reserved. macpaw.com CONTENTS Overview 3 About CleanMyPC... 3 System requirements... 3 Download and installation 4 Activation and license reset

More information

Big Tobacco: Tiny Targets Web Application Guide

Big Tobacco: Tiny Targets Web Application Guide Adding The App to Your Home Screen For Step 1: Launch Safari Launch the Safari browser and visit https://ee.kobotoolbox.org/x/#yehn Big Tobacco: Tiny Targets Web Application Guide This guide will explain

More information

Network setup and troubleshooting

Network setup and troubleshooting ACTi Knowledge Base Category: Application Note Sub-category: Application Model: All Firmware: All Software: NVR Published: 2009/12/21 Reviewed: 2010/06/10 Network setup and troubleshooting Contents Introduction

More information

[Type text] RELEASE NOTES. Version 5.1.1

[Type text] RELEASE NOTES. Version 5.1.1 [Type text] RELEASE NOTES Version 5.1.1 i Compliance Sheriff V4.3 Copyright 2015 Cryptzone North America Inc. Copyright information Copyright 2016 Cryptzone North America Inc. All rights reserved. Information

More information

COMP 2000 W 2012 Lab no. 3 Page 1 of 11

COMP 2000 W 2012 Lab no. 3 Page 1 of 11 COMP 2000 W 2012 Lab no. 3 Page 1 of 11 Lab Introduction Background The Internet is based on packet-switched protocols. Information is carried in packets (it is divided into packets), which can be imagined

More information

Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access)

Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Published June 2015 Why do certain web-based applications have issues through the rewrite engine compared to accessing the resource

More information

CS 161 Computer Security

CS 161 Computer Security Nick Weaver Fall 2018 CS 161 Computer Security Homework 3 Due: Friday, 19 October 2018, at 11:59pm Instructions. This homework is due Friday, 19 October 2018, at 11:59pm. No late homeworks will be accepted

More information

SQL Troubleshooting. ACTi Knowledge Base. Contents. Introduction.

SQL Troubleshooting. ACTi Knowledge Base. Contents. Introduction. ACTi Knowledge Base Category: Troubleshooting Note Sub-category: Integration Model: N/A Firmware: N/A Software: NVR2.2.47 (SP2) Author: Ando.Meritee Published: 2009/10/26 Reviewed: 2009/12/07 SQL Troubleshooting

More information

Last modified on Author Reason 3/11/2019 Stanislaus Training team Final Revision

Last modified on Author Reason 3/11/2019 Stanislaus Training team Final Revision Helpful Tips Revision history Last modified on Author Reason 3/11/2019 Stanislaus Training team Final Revision Introduction This guide includes general tips and tricks that you should know when you are

More information