Malicious Document Analysis Beginners Guide.
|
|
- Wilfrid Derek Randall
- 5 years ago
- Views:
Transcription
1 Malicious Document Analysis Beginners Guide
2 PDF(Portable Document Format) Malicious Document Analysis 2
3 PDF Overview Adobe Systems created the Portable Document Format PDF became an open standard on July 1, 2008 Adobe borrowed heavily from the PostScript page description language Designed to bundle all objects, fonts, images and other related content into a single portable file format. Allows for creators to create dynamic elements so the users can interact with the document Very rich feature set which supports many different embedded file types (U3d, Tiff..) different compression algorithms, scripting language and many other features PDF specifications are documented but Adobe Reader isn't very strict when adhering to them First Exploit outlook.pdfworm.txt aka Peachy August Malicious Document Analysis 3
4 PDF File Structure Header : PDF Version Body : Containing series of object that are used in the document define a numbered top-level object. The first number is the object number, the second number is the revision number Cross-reference table : Specifies the position of the objects Object #1 is at offset 10 Object #2 is at offset Object #5 is at offset Malicious Document Analysis 4
5 PDF File Structure(cont) Trailer : information about where the document starts Malicious Document Analysis 5
6 PDF Object Type Boolean : true / false Number : e.g. 3 Name (/Name) names are identifier Dictionary(<< >>) : this is a unordered list of (Name, Object) pairs. Array([x y z ]) : an ordered list of object, e.g. [ ] String ((text)) : text Stream(<</Length >>stream. endstream) : embedded data, can be compressed null object Indirect reference(n r R) : reference an object, e.g. 5 0 R Malicious Document Analysis 6
7 Stream Filters The stream was here represented directly(as clear text)? This is uncommon: most streams are compressed ASCII85Decode a deprecated filter used to put the stream into 7-bit ASCII ASCIIHexDecode similar to ASCII85Decode but less compact FlateDecode a commonly used filter based on the zlib/deflate algorithm LZWDecode a deprecated filter based on LZW RunLengthDecode/DCTDecode/CCITTFaxDecode/JBIG2Decode/JPXDec ode Malicious Document Analysis 7
8 PDF Analysis Tools pdf-parser.py by Didder Stevens pdfid.py by Didder Stevens peepdf.py by Jose Miguel Esparza pdftk by pdflabs appp.py by inreverse Malicious Document Analysis 8
9 PDF Analysis Analysis using Hex Editor? Analysis Process Search /Javascript Identify objects Dump/Decode objects Analyze script Malicious Document Analysis 9
10 PDF Analysis using pdf-parser.py (cont) Search : -s /Javascript Identify/Dump : -o ObjectID -f Malicious Document Analysis 10
11 Office Files Malicious Document Analysis 11
12 Office File Structured Storage (OLE SS) defines a file system inside the binary Microsoft Office file. Data can be storage (folder) and stream (file). Excel stores data inside the workbook stream. PowerPoint stores data inside the PowerPoint Document stream. Word stores data inside various streams. First Exploit CVE Office 98 Mac Edition
13 OLESS OLESS Header FAT FS SectorNumbers OLESS directory entries Data is divided into directories folder(storages) and files (streams) Depending on the application streams may contain Macros Graphics Tables Sounds Animations. Parsing can be done using the Win32 COM API (StgOpenStorage(), IStorage methods, IStream methods) Malicious Document Analysis 13
14 Malicious MS Office document structure Malicious Document Analysis 14
15 Analysis Tools OfficeMalScanner locates shellcode and VBA macros from MS Office (DOC, XLS, and PPT) files. MalHost-Setup extracts shellcode from a given offset in an MS Office file and embeds it an EXE file for further analysis. (Part of OfficeMalScanner) Offvis shows raw contents and structure of an MS Office file, and identifies some common exploits. Hachoir-urwid can navigate through the structure of binary Office files and view stream contents. Office Binary Translator converts DOC, PPT, and XLS files into Open XML files (includes BiffView tool). pyolescanner.py can examine and decode some aspects of malicious binary Office files. FileHex (not free) and FileInsight hex editors can parse and edit OLE structures Malicious Document Analysis 15
16 Microsoft Office Low Hanging Indicators ASCII HEX Shellcode (nop slide) Embedded Adobe SWF Malicious Document Analysis 16
17 OffVis Malicious Document Analysis 17
18 OfficeMalScanner OfficeMalScanner is a forensic tool for analysts to find malicious traces in MS Office documents. Scan mode Shellcode/Action Scan, Suspicious Strings(UrlDownloadToFile, GetTempPath, WinExec, ) Info mode The INFO mode dumps OLE structures, offsets, length and saves found VB-Macro code to disk Inflate mode(office 2007~) Decompresses Ms Office 2007 documents, into a temp dir and marks potentially malicious files. Documents with macros included (docm, pptm and xlsm) contain.bin files, usually vbaproject.bin (Old MSOffice format) Such files could host malicious macro code and can extracted using the OfficeMalScanner INFO mode. Switch brute/debug Malicious Document Analysis 18
19 OfficeMalScanner : Scan mode GetEIP Find Kernel32 base Find SEH(Structured Exception Handling) API Hashing Indirect Function Call Suspicious Strings Decrypt Trick Embedded OLE Data Function Prolog PE Signature Malicious Document Analysis 19
20 OfficeMalScanner : Inflate mode Malicious Document Analysis 20
21 Thanks Malicious Document Analysis 21
Digital Forensics Lecture 02B Analyzing PDFs. Akbar S. Namin Texas Tech University Spring 2017
Digital Forensics Lecture 02B Analyzing PDFs Akbar S. Namin Texas Tech University Spring 2017 PDF Format and Structure Tools used Text editor (e.g., vi) ClamAV antivirus (http://www.clamav.net/lang/en/download/
More informationObfuscation and (non-)detection of malicious PDF files. Jose Miguel Esparza
Obfuscation and (non-)detection of malicious PDF files Jose Miguel Esparza Agenda Introduction to the PDF format Obfuscation and evasion techniques Obfuscation vs. Antivirus Obfuscation vs. Analysis tools
More informationPDF. Applying File Structure Inspection to Detecting Malicious PDF Files. Received: November 18, 2013, Accepted: July 11, 2014
PDF 1,a) 2,b) 2 2013 11 18, 2014 7 11 MS Rich Text Compound File Binary PDF PDF PDF PDF 164 99.4% PDF Applying File Structure Inspection to Detecting Malicious PDF Files Yuhei Otsubo 1,a) Mamoru Mimura
More informationPortable Document Malware, the Office, and You
Portable Document Malware, the Office, and You Get owned with it, can't do business without it! Seth Hardy Senior Malware Analyst Threat Research and Response shardy@messagelabs.com SecTor 2009 October
More informationDigital Forensics Lecture 02 PDF Structure
Digital Forensics Lecture 02 PDF Structure PDF Files Structure Akbar S. Namin Texas Tech University Spring 2017 PDF Format and Structure Tools used Text editor (e.g., vi) ClamAV antivirus (http://www.clamav.net/lang/en/download/
More informationA Short Introduction to PDF
A Short Introduction to PDF Peter Fischer, ZITI, Uni Heidelberg 1 pdf vs. Postscript pdf describes graphics, text & document structure It uses vector graphics, very similar to postscript Some differences
More informationPDF Essentials. The Structure of PDF Documents
Dr. Edgar Huckert 63773 Goldbach, Germany E-Mail: Huckert@compuserve.com 6-97 PDF Essentials PDF is an acronym for "Portable Document Format". The format has been designed by Adobe for the exchange of
More informationDESIGN OF THE EXCEL VBA PASSWORD CHANGING MODULE
DESIGN OF THE EXCEL VBA PASSWORD CHANGING MODULE Jang, Seung-Ju 1 1 Department of Computer Engineering, Dongeui University, Korea Sjjang@deu.ac.kr ABSTRACT In this paper, I design a module that can change
More informationID: Sample Name: PO xls Cookbook: defaultwindowsofficecookbook.jbs Time: 03:13:36 Date: 08/01/2018 Version:
ID: 41861 Sample Name: PO65445465.xls Cookbook: defaultwindowsofficecookbook.jbs Time: 03::36 Date: 08/01/2018 Version: 20.0.0 Table of Contents Analysis Report Overview Information Detection Confidence
More informationGetting Owned By Malicious PDF - Analysis
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Getting
More informationID: Sample Name: FsQHOWXph8.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 20:31:13 Date: 16/03/2018 Version:
ID: 50648 Sample Name: FsQHOWXph8.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 20:31: Date: 16/03/2018 Version: 22.0.0 Table of Contents Analysis Report Overview Information Detection Confidence
More informationID: Sample Name: SSB SBV Daily Report - Logistics Template DEC '17 (8).xlsm Cookbook: defaultwindowsofficecookbook.jbs Time: 06:35:29 Date:
ID: 41310 Sample Name: SSB SBV Daily Report - Logistics Template DEC '17 (8).xlsm Cookbook: defaultwindowsofficecookbook.jbs Time: 06:35:29 Date: 31/12/2017 Version: 20.0.0 Table of Contents Analysis Report
More informationDOWNLOAD OR READ : FREE FOR IGCSE MATHEMATICS MARK SCHEME PAPER OCTOBER NOVEMBER 2012 PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : FREE FOR IGCSE MATHEMATICS MARK SCHEME PAPER 2 0580 21 OCTOBER NOVEMBER 2012 PDF EBOOK EPUB MOBI Page 1 Page 2 free for igcse mathematics mark scheme paper 2 0580 21 october november
More informationIntroducing PDF/UA. The new International Standard for Accessible PDF Technology. Solving PDF Accessibility Problems
Introducing PDF/UA The new International Standard for Accessible PDF Technology Solving PDF Accessibility Problems Introducing PDF/UA Agenda Why PDF What is PDF What is PDF/UA PDF/UA & WCAG 2.0 CommonLook
More informationID: Sample Name: Luxus.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 10:22:08 Date: 09/01/2018 Version:
ID: 42035 Sample Name: Luxus.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 10:22:08 Date: 09/01/2018 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview Information Detection
More informationID: Sample Name: test.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 18:57:54 Date: 12/04/2018 Version:
ID: 54427 Sample Name: test.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 18:57:54 Date: /04/2018 Version: 22.0.0 Table of Contents Analysis Report Overview Information Detection Confidence Classification
More informationDOWNLOAD OR READ : WHERE TO GET FREE ENGINE DIAGRAMS 1995 SPORT JET MERCURY PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : WHERE TO GET FREE ENGINE DIAGRAMS 1995 SPORT JET MERCURY PDF EBOOK EPUB MOBI Page 1 Page 2 where to get free engine diagrams 1995 sport jet mercury where to get free pdf where to get
More informationID: Sample Name: MSM- 24_Supply_List RU_518.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 17:15:48 Date: 19/06/2018 Version: 22.0.
ID: 64635 Sample Name: MSM- 24_Supply_List RU_518.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 17::48 Date: 1/06/2018 Version: 22.0.0 Table of Contents Analysis Report Overview Information Detection
More informationID: Sample Name: SSI Set Details.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 01:14:07 Date: 13/04/2018 Version: 22.0.
ID: 54478 Sample Name: SSI Set Details.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 01:14:07 Date: /04/2018 Version: 22.0.0 Table of Contents Analysis Report Overview Information Detection Confidence
More informationExeFilter. An open-source framework for active content filtering. CanSecWest /03/2008
ExeFilter An open-source framework for active content filtering CanSecWest 2008 28/03/2008 http://cansecwest.com Philippe Lagadec NATO/NC3A philippe.lagadec(à)nc3a.nato.int ExeFilter Goals To protect sensitive
More informationID: Sample Name: 21PO jpg...js Cookbook: default.jbs Time: 14:32:06 Date: 21/11/2017 Version:
ID: 371 Sample Name: 21PO201745.jpg...js Cookbook: default.jbs Time: 14:32:0 Date: 21/11/2017 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview Information Detection Confidence
More informationDifferences between using a workbook in Excel 2016 Online and in Excel Online
Differences between using a workbook in Excel 2016 Online and in Excel Online File formats that are supported in Excel Online Excel workbook files (.xlsx) Excel 97-2003 workbook files (.xls). Note: When
More informationDetection of Suspicious PDF Document- Embedded Code
Int. J. of Comp. & Info. Tech., (2016) 4(3): 71-78. ISBN: 2345-3877 www.ijocit.org Volume 4, Issue 3 Review Paper Detection of Suspicious PDF Document- Embedded Code Er. Gurjot Singh 1* Received: 13 Jun
More informationID: Sample Name: TO_HM_CROWN PR#U0130NCE MOHAMMED B#U0130N SALMAN - Dear Prime Minister.doc Cookbook: defaultwindowsofficecookbook.
ID: 63341 Sample Name: TO_HM_CROWN PR#U0130NCE MOHAMMED B#U0130N SALMAN - Dear Prime Minister.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 08:43:14 Date: 10/06/2018 Version: 22.0.0 Table of Contents
More informationID: Sample Name: FD-1 Phase Out Notice.doc Cookbook: defaultwindowsofficecookbook.jbs Time: 14:36:29 Date: 04/05/2018 Version: 22.0.
ID: 5762 Sample Name: FD-1 Phase Out Notice.doc Cookbook: defaultwindowsofficecookbook.jbs Time: :36:2 Date: 04/05/2018 Version: 22.0.0 Table of Contents Analysis Report Overview Information Detection
More informationOverview Metadata Extraction Tool Hachoir Sleuthkit Summary CS 6V Metadata Extraction Tools. Junyuan Zeng
CS 6V81-05 Metadata Extraction Tools Junyuan Zeng Department of Computer Science The University of Texas at Dallas September 23 th, 2011 Outline 1 Overview 2 Metadata Extraction Tool Overview 3 Hachoir
More informationDOWNLOAD OR READ : TOOLS FOR TEXT AND IMAGE ANALYSIS AN INTRODUCTION TO APPLIED SEMIOTICS PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : TOOLS FOR TEXT AND IMAGE ANALYSIS AN INTRODUCTION TO APPLIED SEMIOTICS PDF EBOOK EPUB MOBI Page 1 Page 2 tools for text and image analysis an introduction to applied semiotics tools
More informationINSTITUTO SUPERIOR TÉCNICO
INSTITUTO SUPERIOR TÉCNICO DEPARTAMENTO DE ENGENHARIA INFORMÁTICA FORENSICS CYBER-SECURITY MEIC, METI Lab Guide II Evidence Examination 2015/2016 nuno.m.santos@tecnico.ulisboa.pt 1 Introduction This guide
More informationHow to make a PDF from outside Acrobat
How to make a PDF from outside The basics of PDF technology 1. What software do you need to make a PDF? A. If you purchase and install (Standard or Professional) i. Any document that can be printed can
More informationID: Sample Name: ff2c8cadaa0fd8da6138cce6fce37e001f53a5d9ceccd67945b15ae273f4d751.evaljs.js Cookbook: default.jbs Time: 16:44:00 Date:
ID: 33355 Sample Name: ff2c8cadaa0fd8da138ccefce3e001f53a5dceccd45b15ae23f4d51.evaljs.js Cookbook: default.jbs Time: 1:44:00 Date: 04//201 Version: 20.0.0 Table of Contents Table of Contents Analysis Report
More informationTHE LIFE OF AN ENTREPRENEUR IN 90 PAGES PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : THE LIFE OF AN ENTREPRENEUR IN 90 PAGES PDF EBOOK EPUB MOBI Page 1 Page 2 the life of an entrepreneur in 90 pages pdf the life of an entrepreneur in 90 pages Take your PDF tools to go.
More informationJava Oriented Object Programming II Files II - Binary I/O Lesson 3
Java Oriented Object Programming II Files II - Binary I/O Lesson 3 The objectives in this lesson are: Convert Binary to Hexadecimals (vice versa) Understand Binary Code Use Hex Editors Explain how Streams
More informationEXPLOIT KITS. Tech Talk - Fall Josh Stroschein - Dakota State University
EXPLOIT KITS Tech Talk - Fall 2016 Josh Stroschein - Dakota State University Delivery Methods Spam/Spear-phishing Delivery Methods Spam/Spear-phishing Office Documents Generally refer to MS office suite
More informationDESIGN OF THE FILE SEPARATION STRUCTURE FOR EXCEL VBA PROGRAM
DESIGN OF THE FILE SEPARATION STRUCTURE FOR EXCEL VBA PROGRAM Seung Ju Jang College of ICT Engineering, Dong-Eui University Korea sjjang@deu.ac.kr ABSTRACT We use a lot of Excel programs in our daily work.
More informationShellcode Analysis. Chapter 19
Shellcode Analysis Chapter 19 What is Shellcode Shellcode a payload of raw executable code, attackers use this code to obtain interactive shell access. A binary chunk of data Can be generally referred
More informationNational Aeronautics and Space Admin. - FTP Site Statistics. Top 20 Directories Sorted by Disk Space
National Aeronautics and Space Admin. - FTP Site Statistics Property Value FTP Server ftp.hq.nasa.gov Description National Aeronautics and Space Admin. Country United States Scan Date 26/Apr/2014 Total
More informationDOWNLOAD OR READ : CONVERTING WORD DOCUMENT TO FORM PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : CONVERTING WORD DOCUMENT TO FORM PDF EBOOK EPUB MOBI Page 1 Page 2 converting word document to form converting word document to pdf converting word document to form How Do I improve
More informationID: Sample Name: Commercial Card Services CTO Quality Control Checklist v9.docm Cookbook: defaultwindowsofficecookbook.jbs Time: 15:55:50 Date:
ID: 244 Sample Name: Commercial Card Services CTO Quality Control Checklist v9.docm Cookbook: defaultwindowsofficecookbook.jbs Time: 15:55:50 Date: 05/10/201 Version: 24.0.0 Fire Opal Table of Contents
More informationXerox Mobile Print Portal 1.3 User Guide for BlackBerry
Xerox Mobile Print Portal 1.3 User Guide for BlackBerry 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks or trademarks of Xerox Corporation in the US and/or other
More informationExample 1: Denary = 1. Answer: Binary = (1 * 1) = 1. Example 2: Denary = 3. Answer: Binary = (1 * 1) + (2 * 1) = 3
1.1.1 Binary systems In mathematics and digital electronics, a binary number is a number expressed in the binary numeral system, or base-2 numeral system, which represents numeric values using two different
More informationIntroduction. Secondary Storage. File concept. File attributes
Introduction Secondary storage is the non-volatile repository for (both user and system) data and programs As (integral or separate) part of an operating system, the file system manages this information
More informationID: Sample Name: Commercial Card Services CTO Quality Control Checklist v9.docm Cookbook: defaultwindowsofficecookbook.jbs Time: 15:52:31 Date:
ID: 244 Sample Name: Commercial Card Services CTO Quality Control Checklist v9.docm Cookbook: defaultwindowsofficecookbook.jbs Time: 15:52:31 Date: 05/10/201 Version: 24.0.0 Fire Opal Table of Contents
More informationDOWNLOAD OR READ : THE IMAGE OF THE POPULAR FRONT PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : THE IMAGE OF THE POPULAR FRONT PDF EBOOK EPUB MOBI Page 1 Page 2 the image of the popular front the image of the pdf the image of the popular front Software to create pdf, convert pdf,
More informationPlatPal: Detecting Malicious Documents with Platform Diversity
PlatPal: Detecting Malicious Documents with Platform Diversity Meng Xu and Taesoo Kim Georgia Institute of Technology 1 Malicious Documents On the Rise 2 3 4 Adobe Components Exploited Element parser JavaScript
More informationHow to Reduce Large Excel File Size (Ultimate Guide)
Handling a large file is important as it takes a huge amount of time to transfer. A large file takes too much time to open. Any kind of change in a large file takes a long time to update. So, reducing
More informationThreat Modelling Adobe PDF
Threat Modelling Adobe PDF Ron Brandis and Luke Steller Command, Control, Communications and Intelligence Division Defence Science and Technology Organisation ABSTRACT PDF documents are increasingly being
More informationAD07 A Tool to Automate TFL Bundling
AD07 A Tool to Automate TFL Bundling Mark Crangle ICON Clinical Research Introduction Typically, requirement for a TFL package is a bookmarked PDF file with a table of contents Often this means combining
More informationImplementation of the Excel VBA Password ModifyingFunction
Implementation of the Excel VBA Password ModifyingFunction Jang, Seung-Ju Department of Computer Engineering, Dongeui University Abstract : In this paper, if the Excel VBA password is set, this paper implements
More informationMicrosoft Excel 2007 Macros and VBA
Microsoft Excel 2007 Macros and VBA With the introduction of Excel 2007 Microsoft made a number of changes to the way macros and VBA are approached. This document outlines these special features of Excel
More informationID: Sample Name: emotet.exe Cookbook: defaultwindowsofficecookbook.jbs Time: 07:07:14 Date: 07/11/2017 Version:
ID: 3626 Sample Name: emotet.exe Cookbook: defaultwindowsofficecookbook.jbs Time: 0:0:14 Date: 0/11/201 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview Information Detection
More informationDOWNLOAD OR READ : WHEN YOU ARE CONVERTED PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : WHEN YOU ARE CONVERTED PDF EBOOK EPUB MOBI Page 1 Page 2 when you are converted when you are converted pdf when you are converted JPG to PDF Free Online Converter Our JPG to PDF converter
More informationVulnerability Report
Vulnerability Report Attacks bypassing the signature validation in PDF Vladislav Mladenov, Christian Mainka, Karsten Meyer zu Selhausen, Martin Grothe, Jörg Schwenk November 08, 2018 Chair for Network
More informationHUAWEI TECHNOLOGIES CO., LTD. Huawei FireHunter6000 series
HUAWEI TECHNOLOGIES CO., LTD. Huawei 6000 series Huawei 6000 series can detect APT (Advanced Persistent Threat) attacks, which altogether exploit multiple techniques (including zero-day vulnerabilities
More informationLesson 5: Multimedia on the Web
Lesson 5: Multimedia on the Web Lesson 5 Objectives Define objects and their relationships to multimedia Explain the fundamentals of C, C++, Java, JavaScript, JScript, C#, ActiveX and VBScript Discuss
More informationID: Sample Name: Swift details.xls Cookbook: defaultwindowsofficecookbook.jbs Time: 17:14:48 Date: 21/06/2018 Version: 22.0.
ID: 64992 Sample Name: Swift details.xls Cookbook: defaultwindowsofficecookbook.jbs Time: 17::48 Date: 21/06/2018 Version: 22.0.0 Table of Contents Analysis Report Overview Information Detection Confidence
More informationSQL Parsers with Message Analyzer. Eric Bortei-Doku
SQL Parsers with Message Analyzer Eric Bortei-Doku Agenda Message Analyzer Overview Simplified Operation Message Analyzer Parsers Overview Desktop UI Demos Analyzing Local Ping Traffic Analyzing a Capture
More informationDOWNLOAD OR READ : WORD AND IMAGE IN ARTHURIAN LITERATURE PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : WORD AND IMAGE IN ARTHURIAN LITERATURE PDF EBOOK EPUB MOBI Page 1 Page 2 word and image in arthurian literature word and image in pdf word and image in arthurian literature pdf converter,
More informationMicrosoft PowerPoint. - Package for CD Feature (Windows & Macintosh) - Make Movie Feature (Macintosh Only)
Microsoft PowerPoint - Package for CD Feature (Windows & Macintosh) - Make Movie Feature (Macintosh Only) ITS / Center for Teaching & Learning Dr. Luanne Fose Revised October 23, 2007 PowerPoint for Windows
More informationCONVERT EXCEL DOCUMENT INTO
page 1 / 6 page 2 / 6 convert excel document into pdf Plan features No download or software install required Convert almost anything to PDF Combine multiple files into a single PDF Convert PDF to Word
More informationExcel Vba Manually Update Links Automatically On Open File Ignore
Excel Vba Manually Update Links Automatically On Open File Ignore Powerpoint VBA to update links on excel files open by someone else without alerts So I would have to update manually each link so it will
More informationOPSWAT Metadefender. Superior Malware Threat Prevention and Analysis
OPSWAT Metadefender Superior Malware Threat Prevention and Analysis OPSWAT Products Threat protection and security Threat prevention and analysis 30+ anti-malware engines 90+ data sanitization engines
More informationHeaps of Heap-based Memory Attacks
Heaps of Heap-based Memory Attacks Kevin Leach kleach2@gmu.edu Center for Secure Information Systems 3 October 2012 K. Leach (CSIS) Heaps of Heap-based Memory Attacks 3 October 2012 1 / 23 Goals During
More informationDOWNLOAD OR READ : THE WORD OF A LIAR PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : THE WORD OF A LIAR PDF EBOOK EPUB MOBI Page 1 Page 2 the word of a liar the word of a pdf the word of a liar Free PDF to Word Converter is an easy to use utility that does swift conversions
More informationPearson Higher Education - FTP Site Statistics. Top 20 Directories Sorted by Disk Space
Pearson Higher Education - FTP Site Statistics Property Value FTP Server ftp.awl.com Description Pearson Higher Education Country United States Scan Date 11/Jul/2014 Total Dirs 5,605 Total Files 29,960
More informationLesson 5: Multimedia on the Web
Lesson 5: Multimedia on the Web Learning Targets I can: Define objects and their relationships to multimedia Explain the fundamentals of C, C++, Java, JavaScript, JScript, C#, ActiveX and VBScript Discuss
More informationPrecisionID QR Code Barcode Font. User Manual
PrecisionID QR Code Barcode Font User Manual PrecisionID QR Code Barcode Font Copyright 2018 PrecisionID.com All Rights Reserved Legal Notices Page 0 Installation... 2 Microsoft Windows... 2 Mac... 2 Other
More informationSecondary Storage (Chp. 5.4 disk hardware, Chp. 6 File Systems, Tanenbaum)
Secondary Storage (Chp. 5.4 disk hardware, Chp. 6 File Systems, Tanenbaum) Secondary Stora Introduction Secondary storage is the non volatile repository for (both user and system) data and programs. As
More informationADOBE 9A Adobe Acrobat Professional 8.0 ACE.
ADOBE Adobe Acrobat Professional 8.0 ACE http://killexams.com/exam-detail/ QUESTION: 95 You are using PDFMaker to create PDF documents. You do NOT want the PDF documents to open automatically after they
More informationQuick Start Guide. Managing the Service. Converting Files and Folders
PEERNET has been successfully installed as a Windows service on your computer. The mini-tutorials below are designed to get you converting files as soon as possible. Converting Files and Folders Convert
More informationReference Services Division Presents. Saving & Printing
Reference Services Division Presents Saving & Printing Welcome to Saving & Printing. In this class, we will learn how to save and print in a Windows-based PC environment. Basic computer skills, including
More informationDOWNLOAD OR READ : THE WORD AND THE SPIRIT PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : THE WORD AND THE SPIRIT PDF EBOOK EPUB MOBI Page 1 Page 2 the word and the spirit the word and the pdf the word and the spirit Free PDF to Word Converter is an easy to use utility that
More informationID: Sample Name: Liste_az.docx Cookbook: defaultwindowsofficecookbook.jbs Time: 00:17:54 Date: 30/12/2017 Version:
ID: 41280 Sample Name: Liste_az.docx Cookbook: defaultwindowsofficecookbook.jbs Time: 00:17:54 Date: 30/12/2017 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview Information
More informationPDF and Accessibility
PDF and Accessibility Mark Gavin Appligent, Inc. January 11, 2005 Page 1 of 33 Agenda 1. What is PDF? a. What is it not? b. What are its Limitations? 2. Basic Drawing in PDF. 3. PDF Reference Page 2 of
More informationDesktop Crawls. Document Feeds. Document Feeds. Information Retrieval
Information Retrieval INFO 4300 / CS 4300! Web crawlers Retrieving web pages Crawling the web» Desktop crawlers» Document feeds File conversion Storing the documents Removing noise Desktop Crawls! Used
More informationEXCELLENT ACADEMY OF ENGINEERING. Telephone: /
Common file extensions that are good to know, organized by file format. Text Files.doc.log.msg.rtf.txt.wpd.wps Microsoft Word Document Log File Mail Message Rich Text Format Text File WordPerfect Document
More informationJsunpack-n: Network Edition. Blake Hartstein Rapid Response Engineer VeriSign idefense
Jsunpack-n: Network Edition Blake Hartstein blake@jeek.org Rapid Response Engineer VeriSign idefense Outline Attacker Attacker s Perspective Defender s Perspective Jsunpack-n Features and Release Problem
More informationDatasheet Version V7R1M0
Datasheet Version V7R1M0 CoolSpools Datasheet V7R1 Page: 1 Overview CoolSpools is a powerful but highly cost-effective information management toolkit for IBM system i. CoolSpools helps you give your users
More informationID: Sample Name: fly.jse Cookbook: default.jbs Time: 18:17:26 Date: 11/11/2017 Version:
ID: 371 Sample Name: fly.jse Cookbook: default.jbs Time: 1:17:2 Date: 11/11/2017 Version: 20.0.0 Table of Contents Table of Contents Analysis Report Overview Information Detection Confidence Classification
More informationBULK ANALYSIS OF MALICIOUS PDF DOCUMENTS. by Shauna M. Policicchio B.S., Saint Vincent College, 2013
BULK ANALYSIS OF MALICIOUS PDF DOCUMENTS by Shauna M. Policicchio B.S., Saint Vincent College, 2013 Submitted to the Graduate Faculty of the School of Information Science in partial fulfillment of the
More informationIntroductory Visualizing Technology
Introductory Visualizing Technology Seventh Edition Chapter 3 File Management Learning Objectives 3.1 Create Folders to Organize Files 3.2 Explain the Importance of File Extensions 3.3 Explain the Importance
More informationDiskBoss DATA MANAGEMENT
DiskBoss DATA MANAGEMENT Duplicate Files Search Version 9.1 Apr 2018 www.diskboss.com info@flexense.com 1 1 DiskBoss Overview DiskBoss is an automated, policy-based data management solution allowing one
More informationImage coding and compression
Image coding and compression Robin Strand Centre for Image Analysis Swedish University of Agricultural Sciences Uppsala University Today Information and Data Redundancy Image Quality Compression Coding
More informationVISUAL BASIC 2 EDITOR
VISUAL BASI 2 EDITOR hapter SYS-ED/ OMPUTER EDUATION TEHNIQUES, IN. Objectives You will learn: How to edit code in the. How to create, open, and access project(s). How to edit scripts and use the code
More informationM1-R4: IT TOOLS AND BUSINESS SYSTEMS
M1-R4: IT TOOLS AND BUSINESS SYSTEMS NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF
More informationLearn Html Pdf Converter To Excel Software Full Version
Learn Html Pdf Converter To Excel Software Full Version to PDF converter. It lets you convert Word, Excel, or PowerPoint (PPT) docs to PDF with onebutton ease. Learn more about creating PDFs from Microsoft
More informationbbc Overview Adobe Acrobat SDK November 2006 Version 8.0
bbc Overview Adobe Acrobat SDK November 2006 Version 8.0 2006 Adobe Systems Incorporated. All rights reserved. Adobe Acrobat SDK 8.0 Overview for Microsoft Windows, Mac OS, Linux, and UNIX Edition 1.0,
More informationTHE AMERICAN LAW INSTITUTE Continuing Legal Education. Adobe Acrobat for Lawyers October 4, 2017 Video Webcast Studio Recorded August 3, 2017
1 THE AMERICAN LAW INSTITUTE Continuing Legal Education Adobe Acrobat for Lawyers October 4, 2017 Video Webcast Studio Recorded August 3, 2017 By Craig Brody C. Brody Associates, LLC Philadelphia, Pennsylvania
More informationWhite Paper. New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection
White Paper New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection The latest version of the flagship McAfee Gateway Anti-Malware technology adapts to new threats and plans for future
More informationPEERNET File Conversion Center
PEERNET File Conversion Center Automated Document Conversion Using File Conversion Center With Task Scheduler OVERVIEW The sample is divided into two sections: The following sample uses a batch file and
More informationBrief Description of GruanToolRs92 (gt92) 1 Installation. 1.1 System requirements for running GruanToolRS92: 1.2 Download and install Java
Brief Description of GruanToolRs92 (gt92) (Version 0.8.23 2018-01-04 16:36:30) The tool gt92 is a Java-based command-line utility. It provides possibilities for converting and extracting data-tables and
More informationbbc Adobe LiveCycle Content Services Mobile System requirements APPLIES TO Server CONTENTS iphone License information
Getting Started Guide Adobe LiveCycle Content Services Mobile APPLIES TO Adobe LiveCycle Content Services Mobile for iphone April 2010 Adobe LiveCycle Content Services Mobile enables you to use your Apple
More informationHackveda Training - Ethical Hacking, Networking & Security
Hackveda Training - Ethical Hacking, Networking & Security Day1: Hacking windows 7 / 8 system and security Part1 a.) Windows Login Password Bypass manually without CD / DVD b.) Windows Login Password Bypass
More informationContact Information. Contact Center Operating Hours. Other Contact Information. Contact Monday through Thursday Friday
Contact Information Contact Center Operating Hours Contact Monday through Thursday Friday Phone: 1.801.796.0944 8 AM 5 PM Eastern Time 8 AM 3 PM Eastern Time Online chat: http://support.paraben.com 10
More informationScholarOne Manuscripts. Author File Upload Guide
ScholarOne Manuscripts Author File Upload Guide 7-August-2017 Clarivate Analytics ScholarOne Manuscripts Author File Upload Guide Page i Table of Contents INTRODUCTION... 1 SUPPORTED FILE TYPES... 1 HOW
More informationk-depth Mimicry Attack to Secretly Embed Shellcode into PDF Files
k-depth Mimicry Attack to Secretly Embed Shellcode into PDF Files Jaewoo Park and Hyoungshick Kim Department of Software, Sungkyunkwan University 2066 Seobu-ro, Suwon, Republic of Korea {bluereaper,hyoung}@skku.edu
More informationOffice Suites Seminar
- 1 - Seminar a Bowie Senior Center Seminar, July 2007 Teacher: Eric Hein (hein1@verizon.net) Download the seminar slides: Start Internet_Explorer go to http://home.comcast.net/~bscclub/training.htm right-click
More informationPDF PDF PDF PDF PDF internals PDF PDF
PDF Table of Contents Creating a simple PDF file...3 How to create a simple PDF file...4 Fonts explained...8 Introduction to Fonts...9 Creating a simple PDF file 3 Creating a simple PDF file Creating a
More informationGetting started 7. Setting properties 23
Contents 1 2 3 Getting started 7 Introducing Visual Basic 8 Installing Visual Studio 10 Exploring the IDE 12 Starting a new project 14 Adding a visual control 16 Adding functional code 18 Saving projects
More informationAnti-Virus Comparative. Factsheet Business Test (August-September 2018) Last revision: 11 th October
Anti-Virus Comparative Factsheet Business Test Language: English August-September 2018 Last revision: 11 th October 2018 https:// - 1 - Introduction This is a short fact sheet for our Business Main-Test
More informationLearn Well Technocraft
Section 1: Getting started The Word window New documents Document navigation Section 2: Editing text Working with text The Undo and Redo commands Cut, copy, and paste Find and replace Section 3: Text formatting
More information