Cisco Firepower Application Detector Reference - VDB 303

Total Page:16

File Type:pdf, Size:1020Kb

Cisco Firepower Application Detector Reference - VDB 303 Cisco Firepower Application Detector Reference - VDB 303 First Published: 2018-08-09 Last Modified: 2018-08-10 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com go trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2018 Cisco Systems, Inc. All rights reserved. CONTENTS CHAPTER 1 Release Notes for Cisco Vulnerability Database (VDB) Update 303 1 About the Cisco Vulnerability Database 2 About the Cisco Firepower Application Detector Reference 3 Supported Platforms and Software Versions 4 Supported Detector Types 5 Total Applications Supported in Vulnerability Database Update 303 6 Vulnerability Database Update 303 Changelog 7 For Assistance 11 About Talos 12 CHAPTER 2 Applications: 0-9 13 050plus 15 1&1 Internet 16 1-800-Flowers 17 1000mercis 18 100Bao 19 100ye.com 20 12306.cn 21 123Movies 22 126.com 23 17173.com 24 1fichier 25 2345.com 26 24/7 Media 27 247 Inc. 28 2channel 29 Cisco Firepower Application Detector Reference - VDB 303 iii Contents 2Leep 30 33Across 31 360 Safeguard 32 39.net 33 3Com AMP3 34 3COM-TSMUX 35 4399.com 36 4chan 37 4shared 38 500px 39 51.com 40 56.com 41 58 City 42 5by5 Radio 43 6.pm 44 7digital 45 914CG 46 9Gag 47 9P 48 9p.com 49 CHAPTER 3 Applications: A 51 ABC 58 Abonti 59 About.com 60 ABS-CBN 61 ACA Services 62 ACAP 63 Access Network 64 AccessBuilder 65 AccuWeather 66 Ace Hardware Corporation 67 Acer 68 AcFun 69 Cisco Firepower Application Detector Reference - VDB 303 iv Contents ACI 70 Acoon.de 71 ACR-NEMA 72 Acrobat.com 73 Active Networks 74 ActiveSync 75 Ad Advisor 76 AD Backup 77 AD DRS 78 AD DSAOP 79 AD DSROL 80 AD File Replication Service 81 Ad Marvel 82 Ad Master 83 Ad Mob 84 Ad Nexus 85 AD NSP 86 Ad Redirector 87 AD Restore 88 Ad Tech 89 AD XDS 90 AD-X Tracking 91 Ad4mat 92 Adap.tv 93 Adaptive Receive Node Scheduling 94 Adblade 95 Adcash 96 Adconion Media Group 97 Addicting Games 98 Addictive Mobility 99 AddThis 100 AddThis Bot 101 AddToAny 102 AdF.ly 103 Cisco Firepower Application Detector Reference - VDB 303 v Contents AdGear 104 Adify 105 AdJuggler 106 Admeld 107 ADMETA 108 Admin5 109 AdNetwork.net 110 ADNStream 111 Ado Tube 112 Adobe Analytics 113 Adobe Connect 114 Adobe Creative Cloud 115 Adobe PostScript 116 Adobe Software 117 AdobeAIR 118 Adorama 119 ADP 120 ADP GlobalView 121 ADP Resource 122 ADP Streamline 123 ADP TotalSource 124 ADP Vantage 125 ADP Workforce Now 126 AdReady 127 ADrive 128 AdRoll 129 adSage 130 AdSame 131 Adtech 132 Adtegrity 133 Adult Friend Finder 134 Adult World 135 Advanced Hosters 136 Advanced Packaging Tool 137 Cisco Firepower Application Detector Reference - VDB 303 vi Contents Advertising.com 138 Adweek 139 AdXpose 140 AED512 141 Aeolon Core Protocol 142 AEP 143 AFP 144 Afreeca 145 After School 146 AgentX 147 Aggregate Knowledge 148 AhrefsBot 149 Aili 150 AIM Express 151 Airbnb 152 AirPlay 153 Airsoft Powerburst 154 Airspace 155 Airtime 156 AirTunes 157 Aizhan 158 AJP 159 Akamai 160 Akamai NetSession Interface 161 Al Jazeera 162 Albawaba 163 Alias 164 Alibaba 165 Aliexpress 166 Alipay 167 Alisoft 168 Aliwangwang 169 Aliyun 170 Allegro.pl 171 Cisco Firepower Application Detector Reference - VDB 303 vii Contents Allmyapps 172 AllRecipes 173 Allstate 174 ALPES 175 ALTools 176 AMANDA 177 Amazon 178 Amazon Ads System 179 Amazon Cloud Drive 180 Amazon Cloud Drive Authenticate 181 Amazon Cloud Drive Download 182 Amazon Cloud Drive Upload 183 Amazon Cloud Player 184 Amazon Instant Video 185 Amazon Unbox 186 Amazon Web Services 187 AMD 188 Ameba 189 American Airlines 190 American Express 191 AMInet 192 AMMYY 193 Amobee 194 AMQP 195 AMQPS 196 Ancestry.com 197 Ando Media 198 Android Asynchronous Http Client 199 Android browser 200 Android Client 201 Android Download Manager 202 Android Music 203 Android.com 204 ANET 205 Cisco Firepower Application Detector Reference - VDB 303 viii Contents Anghami 206 Angry Birds 207 Anipang 208 ANSA Notify 209 ANSA REX Trader 210 ANSI Z39.50 211 Answers.com 212 any host 213 AnyConnect 214 AnyConnect IPSec Client 215 AnyConnect SSL Client 216 AnyDesk 217 AODV 218 AOL 219 AOL Ads 220 AOL Games 221 AOL Instant Messenger 222 AOL Instant Messenger Netscape 223 AOL Mail 224 AOL Video 225 Apache Nutch 226 Apertus Tech Load Distribution 227 APNS 228 AppGlu 229 Apple App Store 230 Apple Developer 231 Apple iForgot 232 Apple Mail 233 Apple Maps 234 Apple Mobile Yahoo API 235 Apple Pipeline 236 Apple PubSub 237 Apple Remote Desktop 238 Apple sites 239 Cisco Firepower Application Detector Reference - VDB 303 ix Contents Apple Stocks 240 Apple Store 241 Apple Syndication 242 Apple Trailers 243 Apple TV 244 Apple Update 245 AppleCoreMedia 246 Applejuice 247 Applejuice GUI 248 appleqtcsrvr 249 AppleShare 250 AppleTalk Routing Maintenance 251 AppleTalk Unused 203 252 AppleTalk Unused 205 253 AppleTalk Unused 207 254 AppleTalk Unused 208 255 AppleTalk Zone Information Protocol 256 ApplianceWare Managment Protocol 257 Applix ac 258 AppNeta 259 AppNexus 260 Aptean 261 ArcGIS 262 ARCISDMS 263 ARCServe 264 Ares 265 Argos 266 Argus 267 Ariel 268 Ariel2 269 Ariel3 270 ARIS 271 Arizona Public Media 272 ARNS 273 Cisco Firepower Application Detector Reference - VDB 303 x Contents Arora 274 ArtStack 275 AS Server Mapper 276 ASA 277 asa-appl-proto 278 Asana 279 ASF 280 Asia Times Online 281 Asipregistry 282 Ask.com 283 ASKfm 284 asos 285 ASProxy 286 Associated Press 287 Asterisk PBX 288 Astraweb 289 Asus 290 AT&T 291 ATEXSSTR 292 ATG Live Help 293 ATI Technologies 294 Atlas Advertiser Suite 295 Atlassian 296 Atom 297 Atom.com 298 Audible.com 299 AudienceScience 300 AudioDocumentary.org 301 AUDIT 302 auditd 303 Auditude 304 Aurora 305 Aurora CMGR 306 AURP 307 Cisco Firepower Application Detector Reference - VDB 303 xi Contents Authentication Service 308 Autoblog 309 Autodesk 310 Autohome.com.cn 311 AutoTrader.com 312 AutoZone 313 Avast 314 Avaya 315 Avaya Audio 316 Avaya Live 317 Avaya Video 318 AVG 319 Avian 320 Avira Download/Update 321 Avito 322 Avocarrot 323 Avocent 324 Avoidr 325 Aweber 326 AX.25 327 Azar Live 328 AZLyrics 329 Azure cloud portal 330 CHAPTER 4 Applications: B 331 B&H Photo Video 336 Babelgum 337 Babylon 338 Babytree 339 Backblaze 340 Backpack 341 Backpage.com 342 Backupgrid 343 BackWeb 344 Cisco Firepower Application Detector Reference - VDB 303 xii Contents BACnet 345 Badoo 346 Baidu 347 Baidu Movies 348 Baidu Yun 349 BaiduHi 350 Baiduspider 351 Baike.com 352 Balatarin 353 Bandcamp 354 Bank of America 355 Banyan VIP 356 banyan-rpc 357 Barnes and Noble 358 Barneys New York 359 Basecamp 360 Battle.net 361 Battle.net Desktop 362 Battle.net Protocol 363 Battle.net site 364 Battlefield 365 Baydin 366 Bazaarvoice 367 BB 368 BBB 369 BBC 370 BBC iPlayer 371 BBN RCC 372 BearShare 373 Bebo 374 Beeg 375 Behance 376 Bejeweled Blitz 377 Bejeweled Chrome Extension 378 Cisco Firepower Application Detector Reference - VDB 303 xiii Contents Benefitfocus 379 beRecruited 380 Best Arabic Games 381 Best Buy 382 BesTV 383 Bet365 384 Betclic 385 Betternet 386 Beweb 387 BFTP 388 BGMP 389 BGP 390 bgs-nsi 391 BH611 392 BHEVENT 393 BHFHS 394 BHMDS 395 BigBlueButton 396 BigUpload 397 Bild.de 398

  3856
Recommended publications
  • Joining Forces Accomplishments Overview
    JOINING FORCES ACCOMPLISHMENTS OVERVIEW COMMUNITIES ACROSS THE COUNTRY JOINING FORCES TO SERVE AND HONOR MILITARY FAMILIES On April 12, 2011, First Lady Michelle Obama and Dr. Jill Biden launched Joining Forces to bring Americans together to recognize, honor and serve our nation’s veterans and military families. The initiative focuses on improving employment, education, and wellness of America’s troops, veterans and military families as well as raising awareness about the service, sacrifice, and needs of all who serve our country, both abroad and here at home. In just one year, Americans from communities across America – our businesses, schools, faith groups, non- profit organizations, and neighborhoods – have stepped up with an overwhelming amount of support for these heroes, not just with words, but with real, concrete actions to make a difference in their lives. Working with Joining Forces, these groups have helped thousands of veterans and military spouses find jobs, improved educational opportunities for military children, supported our nation’s wounded warriors and their caregivers, and honored our nation’s fallen and their families whose strength continues to inspire us all. KEY JOINING FORCES ACCOMPLISHMENTS: Through Joining Forces, American businesses have hired more than 50,000 veterans and military spouses, with a pledge to hire at least 160,000 more in the years ahead. More than 1,600 companies have been involved in this effort, including Microsoft, Comcast, Honeywell, Safeway and Sears. Associations of doctors, nurses, psychologists, social workers and medical schools have committed to educating their memberships on diagnosing and caring for military families affected by post-traumatic stress and traumatic brain injuries – the invisible wounds of our wars in Iraq and Afghanistan.
    [Show full text]
  • Arxiv:1907.07120V1 [Cs.CY] 16 Jul 2019 1 Introduction That China Hindered Access to I2P by Poisoning DNS Resolu- Tions of the I2P Homepage and Three Reseed Servers
    Measuring I2P Censorship at a Global Scale Nguyen Phong Hoang Sadie Doreen Michalis Polychronakis Stony Brook University The Invisible Internet Project Stony Brook University Abstract required flexibility for conducting fine-grained measurements on demand. We demonstrate these benefits by conducting an The prevalence of Internet censorship has prompted the in-depth investigation of the extent to which the I2P (invis- creation of several measurement platforms for monitoring ible Internet project) anonymity network is blocked across filtering activities. An important challenge faced by these different countries. platforms revolves around the trade-off between depth of mea- Due to the prevalence of Internet censorship and online surement and breadth of coverage. In this paper, we present surveillance in recent years [7, 34, 62], many pro-privacy and an opportunistic censorship measurement infrastructure built censorship circumvention tools, such as proxy servers, virtual on top of a network of distributed VPN servers run by vol- private networks (VPN), and anonymity networks have been unteers, which we used to measure the extent to which the developed. Among these tools, Tor [23] (based on onion rout- I2P anonymity network is blocked around the world. This ing [39,71]) and I2P [85] (based on garlic routing [24,25,33]) infrastructure provides us with not only numerous and ge- are widely used by privacy-conscious and censored users, as ographically diverse vantage points, but also the ability to they provide a higher level of privacy and anonymity [42]. conduct in-depth measurements across all levels of the net- In response, censors often hinder access to these services work stack.
    [Show full text]
  • Implementation Single Account Pdc Vpn Based on Ldap
    IMPLEMENTATION SINGLE ACCOUNT PDC VPN BASED ON LDAP Gregorius Hendita Artha Kusuma Teknik Informatika, Fakultas Teknik Universitas Pancasila [email protected] Abstrak Data is an important for the company. Centralized data storage to facilitate users for accessing data in the company. Data will be stored centrally with PDC (Primary Domain Controller). Build communicate between head office and branch office requires high cost for each connection is not enough to ensure safety and security of data. Exchange data between head office and branch office should be kept confidential. VPN (Virtual Private Network) makes communication more efficient, not only the cost affordable that connection, security and safety will be the primary facility of VPN (Virtual Private Network). Service were established in the system will be integrated using LDAP (Lightweight Directory Access Protocol) to create a single account in each services such as PDC (Primary Domain Controller) and VPN (Virtual Private Network). The purposes of this final project to design and implementation a system centralized data storage and build communicate between head office and branch office are integrated with LDAP (Lighweight Active Directory Protocol). Hopefully this system can give more advantage to each network users. Keyword: PDC, VPN, LDAP, Single Account. I. Introduction previous workstations. To support the performance of the employees of the company of course has a Centralized data storage makes it easy for users variety of network services are formed in it such as to access data. many companies need a ftp, mail server, file sharing etc. These services of centralized storage system, because the data is course have their respective accounts.
    [Show full text]
  • Annual Report 2016
    SoftBank Group Corp. ANNUAL REPORT 2016 Corporate Philosophy Information Revolution – Happiness for everyone Vision The corporate group needed most by people around the world SoftBank Group Corp. ANNUAL REPORT 2016 001 A History of Challenges A History of Challenges The view is different when you challenge yourself Continuing to take on new challenges and embrace change without fear. Driving business forward through exhaustive debate. This is the SoftBank Group’s DNA. SoftBank Group Corp. ANNUAL REPORT 2016 002 A History of Challenges Established SoftBank Japan. 1981 Commenced operations as a distributor of packaged software. 1982 Entered the publishing business. Launched Oh! PC and Oh! MZ, monthly magazines introducing PCs and software by manufacturer. 1994 Acquired events division from Ziff Communications Company of the U.S. through SoftBank Holdings Inc. 1996 Acquired Ziff-Davis Publishing Company, U.S. publisher of PC WEEK magazine and provider of leading-edge information on the PC industry. SoftBank Group Corp. ANNUAL REPORT 2016 003 A History of Challenges Established Yahoo Japan through joint investment with Yahoo! Inc. in the U.S. 1996 Began to develop into an Internet company at full scale. Yahoo Japan Net income* 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 FY (Note) Accounting standard: JGAAP up to fiscal 2012; IFRSs from fiscal 2013 onward. * Net income attributable to owners of the parent. SoftBank Group Corp. ANNUAL REPORT 2016 004 A History of Challenges Made full-scale entry into the telecommunications business. 2000s Contributed to faster, more affordable telecommunications services in Japan.
    [Show full text]
  • Microsoft Security Intelligence Report
    Microsoft Security Intelligence Report Volume 20 | July through December, 2015 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet website references, may change without notice. You bear the risk of using it. Copyright © 2016 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Authors Charlie Anthe Dana Kaufman Anthony Penta Cloud and Enterprise Security Azure Active Directory Team Safety Platform Nir Ben Zvi Nasos Kladakis Ina Ragragio Enterprise and Cloud Group Azure Active Directory Team Windows and Devices Group Patti Chrzan Daniel Kondratyuk Tim Rains Microsoft Digital Crimes Unit Azure Active Directory Team Commercial Communications Bulent Egilmez Andrea Lelli Paul Rebriy Office 365 - Information Windows Defender Labs Bing Protection Geoff McDonald Stefan Sellmer Elia Florio Windows Defender Labs Windows Defender Labs Windows Defender Labs Michael McLaughlin Mark Simos Chad Foster Identity Services Enterprise Cybersecurity Bing Group Nam Ng Roger Grimes Enterprise Cybersecurity Vikram Thakur Microsoft IT Group Windows Defender Labs Paul Henry Niall O'Sullivan Alex Weinert Wadeware LLC Microsoft Digital Crimes Unit Azure Active Directory Team Beth Jester Daryl Pecelj Terry Zink Windows Defender Microsoft IT Information
    [Show full text]
  • IJIR Paper Template
    Imperial Journal of Interdisciplinary Research (IJIR) Vol-2, Issue-7, 2016 ISSN: 2454-1362, http://www.onlinejournal.in Are Television and Print media, a high Impact Campaign for E-Commerce Marketing? Mrs. Harshini C S & Dr. Venugopal Research Scholar, Bangalore University, Bangalore Guide/Principal, Government First Grade College, Kanakapura, Bangalore Abstract: Today’s consumers hop from screen to Introduction screen according to their needs of the moment. They don’t give a thought to what “channel” they are Ever since the first display advertisements appeared using to interact with brands, they simply expect on computer screen, the Internet’s challenge over brands to keep up. Newspapers and Television existing advertising has been the ability to target the continues to play a big role in driving sales for E- audience more precisely and measure the impact of commerce clients. TV Attribution not only offers a the advertisements. Although traditional media still new and immediate view of mass media impact, it holds strong ground in the Indian ad space, digital allows people to create more cross-channel synergy. advertising is catching up fast and is expected to Today’s consumers want immediate gratification and overtake traditional media within the next 5-10 years. have high expectations for the brands they pursue. In addition to the increasing adoption of mobile With an increase in internet penetration, more and devices, the increasing connectivity and more marketers are using online advertising improvements in broadband infrastructure will lead business. Traditional advertisers have started to increased investments in more content rich, video allocating more of their marketing budgets to the and social media advertisements.
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • Academic Excellence Celebration April 27, 2017
    Academic Excellence Celebration April 27, 2017 Table of Contents Morning Schedule ................................................................................................................... 2 Afternoon Schedule ................................................................................................................ 4 Session Information ............................................................................................................... 6 Student Presenters ................................................................................................................ 21 Faculty/Staff Sponsors ........................................................................................................ 26 LUNCH and DINNER OPTIONS Ames Dining Hall Cafeteria style Hours: Lunch 11:00 a.m. – 1:30 p.m. Dinner 4:30 – 7:00 p.m. 1828 A la carte deli Hours: 7:30 a.m. – 3:00 p.m. Programs are available in Holman Library, Ames Dining Hall, and Piper Academic Center. Students exhibiting posters should register in Holman Library or Ames Dining Hall at 8 a.m. Students giving presentations should register at the Presenters Check-in Station in Piper Academic Center lounge at least 15 minutes prior to the start of their session. For information, please see a volunteer located in Piper Academic Center. Share your news and pictures: #McKAEC17 1 Morning Schedule CHECK-IN for posters in Holman Library or Ames 8:00 – 8:25 a.m. 8:00 CHECK-IN for presentations in PAC Lounge 9:00 a.m. – 12:00 p.m. Attendees may pick up programs in Holman Library,
    [Show full text]
  • Soziale Netzwerke Und Google Als Grundlage Für Personalentscheidungen
    Eingereicht von Paul Steger Angefertigt am Institut für SOZIALE NETZWERKE UND Datenverarbeitung in den Sozial- und GOOGLE ALS GRUNDLAGE Wirtschaftswissenschaften Beurteiler / Beurteilerin FÜR PERSONALENT- Univ.‐Prof. Mag. Dr. Manfred Pils SCHEIDUNGEN: EINE Juni 2016 WIEDERHOLUNGSSTUDIE IN NIEDERÖSTERREICH Diplomarbeit zur Erlangung des akademischen Grades Magister der Sozial- und Wirtschaftswissenschaften im Diplomstudium Wirtschaftswissenschaften JOHANNES KEPLER UNIVERSITÄT LINZ Altenberger Straße 69 4040 Linz, Österreich www.jku.at DVR 0093696 EIDESSTATTLICHE ERKLÄRUNG Ich erkläre an Eides statt, dass ich die vorliegende Diplomarbeit selbstständig und ohne fremde Hilfe verfasst, andere als die angegebenen Quellen und Hilfsmittel nicht benutzt bzw. die wörtlich oder sinngemäß entnommenen Stellen als solche kenntlich gemacht habe. Die vorliegende Diplomarbeit ist mit dem elektronisch übermittelten Textdokument identisch. Waidhofen an der Ybbs, Juni 2016 Paul Steger Kurzfassung In der vorliegenden Arbeit wird vordergründig der Einfluss des Onlineprofils, also in Suchmaschinen oder auch in sozialen und professionell orientierten Netzwerken auffindbarer Informationen, auf den Bewerbungsprozess niederösterreichischer Unternehmen untersucht. Dies geschieht einerseits auf Basis vieler international durchgeführter quantitativer Untersuchungen, andererseits stellt sie auch eine Wiederholungsstudie zweier nach qualitativen Methoden verfasster Diplomarbeiten aus der Steiermark und Oberösterreich dar. Die auf Basis dieser Vorarbeiten formulierten
    [Show full text]
  • Intrusion Detection Systems for Smart Home Iot Devices: Experimental Comparison Study
    Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study Faisal Alsakran1, Gueltoum Bendiab1, Stavros Shiaeles2, and Nicholas Kolokotronis3 1 CSCAN, University of Plymouth, PL4 8AA, Plymouth, UK [email protected], [email protected] 2 School of Computing, University of Portsmouth, PO1 2UP, Portsmouth, UK [email protected] 3 Department of Informatics and Telecommunications, University of Peloponnese, 22131 Tripolis, Greece [email protected] ABSTRACT Smart homes are one of the most promising applications of the 1 INTRODUCTION emerging Internet of Things (IoT) technology. With the growing Smart home technology also often referred to as home automation number of IoT related devices such as smart thermostats, smart allows the entire home to be automated and therefore, the connected fridges, smart speaker, smart light bulbs and smart locks, smart smart home devices can be remotely controlled and operated, from any homes promise to make our lives easier and more comfortable. location in the world, through a smartphone app, iPads or other network However, the increased deployment of such smart devices brings an devices [13]. In recent years, smart home technology is gaining increase in potential security risks and home privacy breaches. In tremendous ground at all levels. Economic reports affirm that connected order to overcome such risks, Intrusion Detection Systems are home market becomes the largest IoT segment at seven billion related presented as pertinent tools that can provide network-level smart devices in 2018, which present 26% of the global IoT devices protection for smart devices deployed in home environments. These market [14]. According to Gartner [32] this segment is expected to grow systems monitor the network activities of the smart home-connected to 20.4 billion devices by 2020.
    [Show full text]
  • PLATINUM Targeted Attacks in South and Southeast Asia
    PLATINUM Targeted attacks in South and Southeast Asia Windows Defender Advanced Threat Hunting Team This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet website references, may change without notice. You bear the risk of using it. Copyright © 2016 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Table of contents PLATINUM: Targeted attacks in South and Southeast Asia........................................... 4 Adversary profile ............................................................................................................................ 4 Methods of attack .......................................................................................................................... 6 Technical details ............................................................................................................................. 11 Dipsind ................................................................................................................................................................................ 11 JPIN ..................................................................................................................................................................................... 15 adbupd ..............................................................................................................................................................................
    [Show full text]