Fingerprinting Information in JavaScript Implementations. Keaton Mowery, Dillon Bogenreif, Scott Yilek, and Hovav Shacham
|
|
- Beverly Taylor
- 5 years ago
- Views:
Transcription
1 Fingerprinting Information in JavaScript Implementations Keaton Mowery, Dillon Bogenreif, Scott Yilek, and Hovav Shacham
2 Authentication Usernames and Passwords weakening Third-party data loss can compromise your user accounts
3 Extra Authentication Two-Factor Authentication Secure but inconvenient User Fingerprinting Geolocation Browser Metadata System Architecture Browser Environment
4 Fingerprinting for Good and Evil User Authentication Protect high-value accounts User Identification Deanonymize, track across sessions
5 Browser Metadata Examine and record browser family, version, and operating system If the configuration changes, check for account compromise Easy data to collect
6 Many Techniques for Browser Fingerprinting
7 Near Future NoScript Whitelist Fingerprinting JavaScript Performance Fingerprinting
8 Near Future NoScript Whitelist Fingerprinting JavaScript Performance Fingerprinting
9 Extension Verification Users customize browser behavior with extensions Previously-observed extension behavior provides an identity signal Sudden absence of extensions increases likelihood of account hijack
10 NoScript NoScript provides JavaScript policy Default Deny Whitelisted domains may execute code Whitelist contents are user-defined Radical changes may indicate account hijack Entries could reveal private information
11 Example NoScript Probe <html> <head> <script type="text/javascript" src=" js/tooltips/tooltiploader.js"> </script> <script type="text/javascript"> if ("XML_STATUS_OKAY" in window) { // google.com can run JavaScript } else { // google.com cannot run JavaScript } </script> </head><body></body> </html>
12 Example NoScript Probe <html> <head> <script type="text/javascript" src=" js/tooltips/tooltiploader.js"> </script> <script type="text/javascript"> if ("XML_STATUS_OKAY" in window) { // google.com can run JavaScript } else { // google.com cannot run JavaScript } </script> </head><body></body> </html>
13 Example NoScript Probe <html> <head> <script type="text/javascript" src=" js/tooltips/tooltiploader.js"> </script> <script type="text/javascript"> if ("XML_STATUS_OKAY" in window) { // google.com can run JavaScript } else { // google.com cannot run JavaScript } </script> </head><body></body> </html>
14 At Scale Crawled Alexa Top 1,000 Domains Generated 689 whitelist probes Created test suite for all 689 domains 120s with NoScript disabled 23s with NoScript enabled
15 Near Future NoScript Whitelist Fingerprinting JavaScript Performance Fingerprinting
16 Near Future NoScript Whitelist Fingerprinting JavaScript Performance Fingerprinting
17 JavaScript Fingerprinting Fingerprint JavaScript performance 1. Measure time to execute various JS snippets 2. Normalize to build fingerprint vector Unforgeable Agnostic to JavaScript features
18 Snippet Selection Off-the-Shelf JavaScript Benchmarks 26 tests from SunSpider 9 tests from V8 Benchmark Suite 4 custom tests Benchmarks characterize browser performance
19 Browser Detection
20 Ask Everyone You Know Collected 1,015 data samples on Amazon Mechanical Turk JavaScript Fingerprint User reported: Operating System CPU Architecture, Speed, and Cores RAM
21 Browser Classification 24 Major Browser Versions Chrome, Firefox, IE, Safari, Opera, SeaMonkey Generated characteristic fingerprint for each 79.8% accuracy on all 1,015 samples
22 Chrome Versioning Over 85% of misclassifications Chrome 6.0 to Chrome 11.0 in 7+ months Chrome Chrome Chrome Chrome Chrome Chrome
23 Operating System Detection Small effect on fingerprints Examined 403 Firefox 3.6 samples Windows: 98.5% correct OS X: 100% correct Linux: 25% correct
24 Processor Architecture Detection Unavailable through JavaScript APIs JITs expose low-level behavior 15 processor architectures Core 2, Pentium Dual Core, Pentium 4, Athlon % accuracy
25 Conclusions NoScript Whitelist Fingerprinting Extensions can be fingerprinted User-defined state can be extracted JavaScript Performance Fingerprinting Proof-of-concept based on JS benchmarks Browser, OS, and Architecture detection Unforgable fingerprint
26 Thank You! Questions?
HTML5 MOCK TEST HTML5 MOCK TEST I
http://www.tutorialspoint.com HTML5 MOCK TEST Copyright tutorialspoint.com This section presents you various set of Mock Tests related to HTML5 Framework. You can download these sample mock tests at your
More informationUndermining Information Hiding (And What to do About it)
Undermining Information Hiding (And What to do About it) Enes Göktaş, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos Overview Mitigating
More informationBrowser fingerprinting
Browser fingerprinting (how did we get here) SecAppDev February 2014 Nick Nikiforakis www.securitee.org echo `whoami` Postdoctoral researcher at KU Leuven Working, mainly, on web security and privacy Identify
More informationOnline Geometry Computer Requirements (For students using computers other than the HCPS Dell issued laptops)
Online Geometry Computer Requirements (For students using computers other than the HCPS Dell issued laptops) What are the SchoolSpace System Requirements for a PC? Microsoft Windows XP or Microsoft Windows
More informationRicoh Managed File Transfer (MFT) User Guide
Ricoh Managed File Transfer (MFT) User Guide -- TABLE OF CONTENTS 1 ACCESSING THE SITE... 3 1.1. WHAT IS RICOH MFT... 3 1.2. SUPPORTED BROWSERS... 3 1.3. LOG IN... 3 1.4. NAVIGATION... 4 1.5. FORGOTTEN
More informationNetTeller Online Banking. Archdiocese of Chicago Parish Operations Archdiocesan Bank
NetTeller Online Banking Archdiocese of Chicago Parish Operations Archdiocesan Bank Introducing Online Account Access NetTeller Online Banking is your online access to your Archdiocesan Bank accounts anytime,
More informationEnroll in Two factor Authentication - iphone
OVERVIEW Passwords are increasingly easy to compromise. They can often be stolen, guessed, or hacked you might not even know someone is accessing your account. Two factor authentication adds a second layer
More informationClient Information Portal New User Security & Sign-On Guide. 500 West Jefferson Street Suite 700 Louisville, KY (888)
Client Information Portal New User Security & Sign-On Guide 500 West Jefferson Street Suite 700 Louisville, KY 40202 (888) 878-7845 1 Getting Started 1. Obtain the Access ID and initial Password from your
More informationFingerprinting mobile devices: A short analysis
Fingerprinting mobile devices: A short analysis Alejandro Gómez-Boix, Pierre Laperdrix, Benoit Baudry To cite this version: Alejandro Gómez-Boix, Pierre Laperdrix, Benoit Baudry. Fingerprinting mobile
More informationXerte. Guide to making responsive webpages with Bootstrap
Xerte Guide to making responsive webpages with Bootstrap Introduction The Xerte Bootstrap Template provides a quick way to create dynamic, responsive webpages that will work well on any device. Tip: Webpages
More informationChrome and IE comparisons
Last updated September 16, 2016 Copyright Copyright ezdi, Inc 2016 All Rights Reserved All rights reserved. No part of this manual may be photocopied or reproduced in any form without written permission
More informationUser Guide. Browser Password Recovery Pro. Contents
Browser Password Recovery Pro User Guide Contents About Benefits Requirements Installation Using GUI Version Right Click Menu Options Browser Password Removal Feature Browser Password Report Browser Settings
More informationConnecting to Cisco Insight Reporter v3.1
CHAPTER 2 Connecting to Cisco Insight Reporter v3.1 This chapter provides instructions on how to launch the Cisco Insight Reporter v3.1 application after it is installed on a server and describes the various
More informationUser s Guide. This User Guide contains information that can help you navigate through your professional development session.
This User Guide contains information that can help you navigate through your professional development session. The Table of Contents, found on the left of your screen, allows you to navigate to the major
More informationPerceptive Process Mining
Perceptive Process Mining Technical s Version: 2.13.x Written by: Product Knowledge, R&D Date: March 2018 2015-2018 Hyland Software, Inc. and its affiliates. Table of Contents About the technical specifications...
More informationPerceptive DataTransfer
Perceptive DataTransfer System Overview Guide Version: 6.5.x Written by: Product Knowledge, R&D Date: May 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc.,
More information4. Web-based Switch Configuration
4. Web-based Switch Configuration Management Options Connecting using the Web User Interface Logging onto the Web Manager Smart Wizard Web User Interface (Web UI) Management Options The Switch provides
More informationRegistering in Energiapeili Reporting Service
Ins Instruction 1 (5) Registering in Energiapeili Reporting Service Registering To register in Energiapeili Reporting Service, you will need your personal online banking codes. We accept the identification
More informationBrowser Based Defenses
Browser Based Defenses Introducing x06d james@bluenotch.com Browser Based Defenses - (c) 2010 All Rights Reserved 1 The Problem: Re-Anonymizing You! Overall State of the Web Client/Browser issues Hard
More informationetrac Guide System Requirements Global DMS, 1555 Bustard Road, Suite 300, Lansdale, PA , All Rights Reserved.
etrac Guide to System Requirements Version: 2.5 Published: 05/18/2015 Global DMS, 1555 Bustard Road, Suite 300, Lansdale, PA 19446 2015, All Rights Reserved. Table of Contents Minimum System Requirements...
More informationSpeeding up Web Page Loads with Shandian. Sophia Wang University of Washington
Speeding up Web Page Loads with Shandian Sophia Wang University of Washington Why is page load time (PLT) slow? 3/27/16 2
More informationThe security of Mozilla Firefox s Extensions. Kristjan Krips
The security of Mozilla Firefox s Extensions Kristjan Krips Topics Introduction The extension model How could extensions be used for attacks - website defacement - phishing attacks - cross site scripting
More informationAuthentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1
Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1 CIA Triad Confidentiality Prevent disclosure of information to unauthorized parties Integrity Detect data tampering Availability
More informationIntroduction. System Requirements. Compatibility. Course OnLine Silverlight Player User Manual (Beta) DePaul University, College of CDM April 2011
Course OnLine Silverlight Player User Manual (Beta) DePaul University, College of CDM April 2011 Introduction The CDM COL Silverlight Player is a web-based and/or desktop application based on Microsoft
More informationBut before understanding the Selenium WebDriver concept, we need to know about the Selenium first.
As per the today s scenario, companies not only desire to test software adequately, but they also want to get the work done as quickly and thoroughly as possible. To accomplish this goal, organizations
More informationEverything you always wanted to know about web-based device fingerprinting
Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask) Nick Nikiforakis echo `whoami` Postdoctoral researcher at KU Leuven Working, mainly, on web security
More informationThe Cisco HCM-F Administrative Interface
CHAPTER 5 This chapter contains information on the following topics: Overview of Cisco HCM-F Administrative Interface, page 5-1 Browser Support, page 5-2 Login and Logout, page 5-4 Online Help, page 5-5
More informationProduct Information
Product Information 17.0.0.500 TOBESOFT strives to maintain the accuracy of information provided in this document and will consistently modify and supplement it. However, we cannot guarantee accuracy of
More informationUNIT 3 SECTION 1 Answer the following questions Q.1: What is an editor? editor editor Q.2: What do you understand by a web browser?
UNIT 3 SECTION 1 Answer the following questions Q.1: What is an editor? A 1: A text editor is a program that helps you write plain text (without any formatting) and save it to a file. A good example is
More informationEnterprise Forms Server - Hardware/Software Requirements
Server O/S The application requires Windows Server 2008 (32 or 64 Bit) and above. The webserver software required is Microsoft IIS7 and above (included free with Windows Server). Application Software The
More informationHow to assign an IP address and access your device
User Manual Table of Contents Get started................................................ 3 Browser support................................................ 3 About default IP addresses........................................
More informationWednesday, 10 October 2012 PRELIMINARY SLIDES
PRELIMINARY SLIDES THIS WAY NO, it is not about horror stories concerning JavaScript WE ALL LOVE FEAR- MONGERING. Wednesday, 10 October 2012 starting with the credits... A Short History of the javascript
More informationSystem Requirements. NovaBACKUP NovaStor. All Rights Reserved.
System Requirements NovaBACKUP 19 NovaBACKUP PC, Server & Business Essentials... 3 Requirements... 3 Supported Operating Systems... 3 NovaBACKUP Virtual Dashboard Requirements... 3 Supported Applications
More informationCourse Request Form - Step by Step Print this page for your convenience!
Course Request Form - Step by Step Print this page for your convenience! Step 1 User Information Open up an internet browser. Preferably Chrome or Firefox (Safari is not compatible with the form at this
More informationQUICK SET-UP VERIFICATION...3
TABLE OF CONTENTS 1 QUICK SET-UP VERIFICATION...3 2 INSTALLING CERTIFICATES...3 3 IF YOU USE MS INTERNET EXPLORER...3 3.1 INSTALLING THE CERTIFICATE...3 3.2 SSL3 ACTIVATION:...3 3.3 JAVASCRIPT ACTIVATION...3
More informationAlliance Key Manager AKM for AWS Quick Start Guide. Software version: Documentation version:
Alliance Key Manager AKM for AWS Quick Start Guide Software version: 4.0.0 Documentation version: 4.0.0.002 Townsend Security www.townsendsecurity.com 800.357.1019 +1 360.359.4400 Alliance Key Manager
More informationJohn Coggeshall Copyright 2006, Zend Technologies Inc.
PHP Security Basics John Coggeshall Copyright 2006, Zend Technologies Inc. Welcome! Welcome to PHP Security Basics Who am I: John Coggeshall Lead, North American Professional Services PHP 5 Core Contributor
More informationAccessing the Curriculum Management System Off-campus Process for obtaining and installing a CMS certificate on a home Mac
INFORMATION SERVICES ICT Service Delivery Accessing the Curriculum Management System Off-campus Process for obtaining and installing a CMS certificate on a home Mac Introduction This service enables staff
More informationVDI Users Guide. Mac OS X
Mac OS X VDI Users Guide NOTICE: Access to electronic resources at Moraine Park Technical College is restricted to employees, students, or other individuals authorized by the College. By connecting to
More informationestatements Help Document October 2016
estatements Help Document October 2016 Table of Contents Section 1 - Accessing estatements.... 2 Section 2 - Requirements..... 3 Section 3 - Viewing estatements. 3 Section 4 - Printing and Saving estatements
More informationYour guide to MyBrewin. For financial advisers
Your guide to MyBrewin For financial advisers Contents Registering for MyBrewin 4 Using MyBrewin 9 Frequently Asked Questions and System Requirements 26 Registering for MyBrewin Step 1 Type the following
More informationPerceptive DataTransfer
Perceptive DataTransfer System Overview Version: 6.2.x Written by: Product Documentation, R&D Date: January 2013 2013 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact, and WebNow
More informationSystem Requirements. NovaStor xsp 19" Client NovaStor. All Rights Reserved.
System Requirements NovaStor xsp 19" Client NovaStor xsp Client Licenses... 3 Requirements... 3 Supported Operating Systems... 3 Virtual Dashboard Requirements... 3 Supported Applications (Dashboard)...
More informationWeb Enabling Solution for Windows Desktop Applications. White Paper
Web Enabling Solution for Windows Desktop Applications White Paper 1. Introduction Thinfinity VirtualUI offers a GUI remoting solution for in house Windows desktop developments, allowing them to be delivered
More informationWEB SECURITY WORKSHOP TEXSAW Presented by Solomon Boyd and Jiayang Wang
WEB SECURITY WORKSHOP TEXSAW 2014 Presented by Solomon Boyd and Jiayang Wang Introduction and Background Targets Web Applications Web Pages Databases Goals Steal data Gain access to system Bypass authentication
More informationPANOPTO GUIDE Version 1.2 October 2016
Version 1.2 October 2016 Contents INTRODUCTION:... 2 PREREQUISITES... 2 INSTRUCTIONS... 2 Log into Panopto Online... 2 Using the Recorder... 2 Larger Recorder Preview (Broadcast)... 5 View Your Session...
More informationPortal Recipient Guide. The Signature Approval Process
Portal Recipient Guide The Signature Approval Process Contents 1 Introduction... 3 2 Account Activation... 3 3 Document Signing... Error! Bookmark not defined. 4 Authenticating your Device & Browser...
More informationThe Rockefeller University I NFORMATION T ECHNOLOGY E DUCATION & T RAINING. VPN Web Portal Usage Guide
The Rockefeller University I NFORMATION T ECHNOLOGY E DUCATION & T RAINING VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING
More informationWriting your first Web Data Connector
Welcome # T C 1 8 Writing your first Web Data Connector Brett Taylor Staff Software Engineer Tableau Ashwin Sekar Software Engineer Tableau Enabling Integrations for Developers Embedded Analytics Integrations
More informationNovaBACKUP CMon v19.0
June 2017 NovaBACKUP CMon v19.0 User Manual Features and specifications are subject to change without notice. The information provided herein is provided for informational and planning purposes only. 2017
More informationOn the effectiveness of mitigations against floating-point timing channels. David Kohlbrenner Hovav Shacham UC San Diego
On the effectiveness of mitigations against floating-point timing channels David Kohlbrenner Hovav Shacham UC San Diego How effective are On the effectiveness of mitigations? against floating-point timing
More informationChrome Extension Security Architecture
Chrome Extension Security Architecture Presenter: Jienan Liu Network, Intelligence & security Lab outline Chrome extension introduction Threats towards extension Chrome extension s security architecture
More informationLooking at the Internet with Google Chrome & Firefox. Scoville Memorial Library Claudia Cayne - September, 2010
Looking at the Internet with Google Chrome & Firefox Scoville Memorial Library Claudia Cayne - ccayne@biblio.org September, 2010 Google Chrome & Firefox are web browsers - the decoder you need to view
More informationSage 300 People & Web Self Service Technical Information & System Requirements
Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People Architecture The Sage 300 People application is a 2-tier application with the program and database residing
More informationC1: Define Security Requirements
OWASP Top 10 Proactive Controls IEEE Top 10 Software Security Design Flaws OWASP Top 10 Vulnerabilities Mitigated OWASP Mobile Top 10 Vulnerabilities Mitigated C1: Define Security Requirements A security
More informationRequesting Accommodations
PURPOSE: To provide instructions on the process for Testers. IMPORTANT: It is important that Testers use Chrome, Safari, Firefox, IE11 or higher. Also, you can use mobile browsers for all of the above
More informationUser Guide. Social Password Recovery Pro. Contents
Social Password Recovery Pro User Guide Contents About Benefits Requirements Installation Using GUI Version Right Click Menu Options Social Password Removal Feature Social Network Password Report Settings
More informationPrivate Browsing: an Inquiry on Usability and Privacy Protection
Private Browsing: an Inquiry on Usability and Privacy Protection Xianyi Gao*, Yulong Yang*, Huiqing Fu*, Janne Lindqvist*, Yang Wang+ *Rutgers University +Syracuse University Published in WPES 2014 What
More informationInternet programming Lab. Lecturer Mariam A. Salih
Internet programming Lab. Lecturer Mariam A. Salih The Internet : The Internet is a worldwide network of computer systems through which information can be easily shared. Browsers : To view information
More informationAuthor: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0
Author: Tonny Rabjerg Version: 20150730 Company Presentation WSF 4.0 WSF 4.0 Cybercrime is a growth industry. The returns are great, and the risks are low. We estimate that the likely annual cost to the
More informationPatients' FAQs. Patient Portal Version 2.7 NEXTMD.COM
Patients' FAQs Patient Portal Version 2.7 NEXTMD.COM November 2018 Enrollment How do I enroll in the NextGen Patient Portal website? Your practice can enroll you in NextGen Patient Portal in one of the
More informationSAS STUDIO. JUNE 2014 PRESENTER: MARY HARDING Education SAS Canada. Copyr i g ht 2014, SAS Ins titut e Inc. All rights res er ve d.
JUNE 2014 PRESENTER: MARY HARDING Education SAS Canada NEW SAS PROGRAMMING ENVIRONMENT Available Consistent Assistive AVAILABLE THROUGH ALL MODERN WEB BROWSERS Available Consistent Assistive ONE INTERFACE
More information1 Post-Installation Configuration Tasks
1 Post-Installation Configuration Tasks 1.1 Overview The previous chapters provide instructions on how to set up Appeon system architecture, including installing Appeon for PowerBuilder components, as
More informationStop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico
1 Stop sweating the password and learn to love public key cryptography Chris Streeks Solutions Engineer, Yubico Stop Sweating the Password! 2 Agenda Introduction The modern state of Phishing How to become
More informationChanging The User Agent String In Safari User Guide For Web Developers
Changing The User Agent String In Safari User Guide For Web Developers If you wish to simulate another type of browser by changing the User Agent or UA String in the Safari web browser for Windows or Mac
More informationProtecting users against XSS-based password manager abuse. AsiaCCS 2014, Kyoto Ben Stock, Martin Johns
Protecting users against XSS-based password manager abuse AsiaCCS 2014, Kyoto Ben Stock, Martin Johns Agenda Basics on Password Managers Intention & Implementation Automating attacks on Password Managers
More informationInformation Security CS 526 Topic 11
Information Security CS 526 Topic 11 Web Security Part 1 1 Readings for This Lecture Wikipedia HTTP Cookie Same Origin Policy Cross Site Scripting Cross Site Request Forgery 2 Background Many sensitive
More informationCeedo Client Family Products Security
ABOUT THIS DOCUMENT Ceedo Client Family Products Security NOTE: This document DOES NOT apply to Ceedo Desktop family of products. ABOUT THIS DOCUMENT The purpose of this document is to define how a company
More informationSCHULICH MEDICINE & DENTISTRY Website Updates August 30, Administrative Web Editor Guide v6
SCHULICH MEDICINE & DENTISTRY Website Updates August 30, 2012 Administrative Web Editor Guide v6 Table of Contents Chapter 1 Web Anatomy... 1 1.1 What You Need To Know First... 1 1.2 Anatomy of a Home
More informationestatements Help Document October 2016
estatements Help Document October 2016 Table of Contents Section 1 - Accessing estatements.... 2 Section 2 - Requirements..... 3 Section 3 - Viewing estatements. 3 Section 4 - Printing and Saving estatements
More informationSupported Platforms & Technologies. Product Version:
Supported Platforms & Technologies Released By: Product Version: Grapevine Solutions Ltd. 1.7.x Release Date: March 2014 Copyright Grapevine Solutions 2014. All rights reserved. No part of this documentation
More informationElasterStack 3.2 User Administration Guide - Advanced Zone
ElasterStack 3.2 User Administration Guide - Advanced Zone With Advance Zone Configuration TCloud Computing Inc. 6/22/2012 Copyright 2012 by TCloud Computing, Inc. All rights reserved. This document is
More informationUsing the Web Graphical User Interface
Prerequisites for Using the Web GUI, page 1 Information About Using The Web GUI, page 2 Connecting the Console Port of the Switch, page 3 Logging On to the GUI, page 4 Enabling Web and Secure Web Modes,
More informationVerizon Internet Security Suite Powered by McAfee. Installation Guide for Home Users (Mac)
Verizon Internet Security Suite Powered by McAfee Installation Guide for Home Users (Mac) ii Contents Introduction 3 System requirements 5 Installing Verizon Internet Security Suite 7 Signing in to your
More informationKerio Control. User Guide. Kerio Technologies
Kerio Control User Guide Kerio Technologies 2012 Kerio Technologies s.r.o. All Rights Reserved. This guide provides detailed description on user interfaces of Kerio Control, version 7.4. The Kerio VPN
More informationLogin Troubleshooting
Login Troubleshooting Scenario #1: I cannot log into my account and I am pretty sure I am using the correct credentials. Problem Solving Steps: 1. Check with your scheduler to ensure you are using the
More informationTWO-STEP VERIFICATION USER GUIDE
TWO-STEP VERIFICATION USER GUIDE TWO-STEP PROTECTS YOUR DATA EVEN IF YOUR PENNKEY PASSWORD IS COMPROMISED PROTECT YOUR PENN & PERSONAL DATA! Table of Contents Two-Step Verification User Guide... 2 1. Introduction...
More informationSahi. Cost effective Web Automation
Sahi Cost effective Web Automation What is Sahi? Automates web applications Started in 2005 Mature business ready product Aimed at testers in Agile and traditional environments Focus Aimed at testers For
More informationMediaocean Aura Technical Overview
Mediaocean Aura Technical Overview January 2017 Samir Sadikhov +61 (2) 9879 8200 apac_operations@mediaocean.com Contents INTRODUCTION... 2 APPLICATION ARCHITECTURE OVERVIEW... 3 DATA LAYER...3 APPLICATION
More informationPerceptive Experience Web Scan
Perceptive Experience Web Scan Technical Specifications Version: 2.2.x Written by: Product Knowledge, R&D Date: Wednesday, April 05, 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark
More informationUsing the EN-2000 s Management System
EN-2000 Reference Manual Document 2 Using the EN-2000 s Management System T he EN-2000 provides wireless and wired connections to a local area network (LAN), to a wide area network (WAN, and to peripheral
More informationInstallation & Configuration Guide Enterprise/Unlimited Edition
Installation & Configuration Guide Enterprise/Unlimited Edition Version 2.3 Updated January 2014 Table of Contents Getting Started... 3 Introduction... 3 Requirements... 3 Support... 4 Recommended Browsers...
More informationCloud Control Panel (CCP) User Guide
Cloud Control Panel (CCP) User Guide Version 1.0: 01.01.11 Copyright 2011 DNS Europe Ltd. All rights reserved. Cloud Control Panel (CCP) User Guide v1.0 Table of Contents 1 Introduction 3 1.1 Intended
More informationEkran System System Requirements and Performance Numbers
Ekran System System Requirements and Performance Numbers Table of Contents System Requirements... 3 Performance Numbers... 6 Database Statistics... 8 2 System Requirements Ekran System claims different
More informationetrac Guide Vendor Module to the Version: 2.0 Published: 06/22/2014
etrac Guide to the Vendor Module Version: 2.0 Published: 06/22/2014 Global DMS, 1555 Bustard Road, Suite 300, Lansdale, PA 19446 2014, All Rights Reserved. Table of Contents Minimum System Requirements...
More informationSpeechPlanner. Systems Support. Other Software or Hardware Needs. Speakers or headphones are required for audio and video playback. v1.
SpeechPlanner Systems Support Yes No Operating Systems Windows Mac Operating System: Windows 98, 2000, ME, XP, Vista: 7, 8; Mac OS x v.1 O.1.x, 10.2.x, 10.3.x, or 10A.x, 10.5.x CPU: Windows-Intel Pentium
More informationMITEL PERFORMANCE ANALYTICS
MITEL PERFORMANCE ANALYTICS RELEASE 2.1 ENGINEERING GUIDELINES NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel Networks Corporation
More informationInSite Client Configuration IPP 8.0
InSite Client Configuration IPP 8.0 Exported on 05/15/2018 Table of Contents 1 InSite Client Configuration overview...4 1.1 Determining Your Client Computer Configuration... 4 1.2 Internet Connection...
More informationWeb Fingerprinting. How, Who, and Why? Nick Nikiforakis
Web Fingerprinting How, Who, and Why? Nick Nikiforakis echo `whoami` Final year PhD student at KU Leuven Working, mainly, on web security and privacy Identify online ecosystems Players Interactions Common
More informationCSIRO Publishing Ebook Collections
Library Patron User Guide CSIRO Publishing Ebook Collections Powered by Ebooks Corporation s CSIRO Publishing Ebook Collections is powered by Ebooks Corporation Ebook Collections September 2014 Contents
More informationMobile Web Appplications Development with HTML5
Mobile Web Appplications Development with HTML5 Lab 1: The Challenge Claudio Riva Aalto University - Fall 2012 1 / 36 THE CHALLENGE OVERVIEW OF THE ASSIGNMENT WAY OF WORKING TEAMS DEVEVELOPMENT ENVIRONMENT
More informationVerizon Internet Security Suite Powered by McAfee. Installation Guide for Home Users (Mac)
Verizon Internet Security Suite Powered by McAfee Installation Guide for Home Users (Mac) ii Contents Introduction 3 System requirements 5 Installing Verizon Internet Security Suite 7 Signing in to your
More informationRegistration Guide for the UNESCAP Event Portal
Registration Guide for the UNESCAP Event Portal This guide will assist you with: Creating an account Register for an event Click on any of the above links to skip to the relevant section. Primary address
More informationMITEL PERFORMANCE ANALYTICS
MITEL PERFORMANCE ANALYTICS RELEASE 3.0 ENGINEERING GUIDELINES NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel Networks Corporation
More informationDeprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018
Deprecating the Password: A Progress Report Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 The password problem Alpha-numeric passwords are hard for humans to remember and easy
More informationChapter 8. User Authentication
Chapter 8. User Authentication This chapter describes how NetDefendOS implements user authentication. Overview, page 220 Authentication Setup, page 221 8.1. Overview In situations where individual users
More informationREHAU SUPPLIER PORTAL
REHAU Group REHAU SUPPLIER PORTAL BROWSER COMPATIBILITY & REQUIREMENTS BPE-IBS Revision 1 vom 15.02.2018 5923DE 03.06 - 2 - TABLE OF CONTENT 1 REHAU SUPPLIER PORTAL - INTRODUCTION... 3 2 GENERAL BROWSER
More informationWorkstation Configuration
Workstation Configuration September 22, 2015 - Version 9 & 9.1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More informationManual Html A Href Onclick Submit Form
Manual Html A Href Onclick Submit Form JS HTML DOM. DOM Intro DOM Methods HTML form validation can be done by a JavaScript. If a form field _input type="submit" value="submit" /form_. As shown in a previous
More informationXFINITY On Campus: Campus Technical Support Guide
XFINITY On Campus Campus Technical Support Guide 1 AGENDA XFINITY On Campus Overview Navigation Upgrades & Features Support and Escalation Troubleshooting Steps Support Portal https://support.xfinityoncampus.com
More information