Instant Messaging

Total Page:16

File Type:pdf, Size:1020Kb

Instant Messaging Network Security Firewall Application Control Signatures NetDefendOS SecurSityec urity Ver. 2.60.02 Network Security Solution http://www.dlink.com Application Control Signatures DFL-260E/860E/1660/2560/2560G NetDefendOS Version 2.60.02 D-Link Corporation No. 289, Sinhu 3rd Rd, Neihu District, Taipei City 114, Taiwan R.O.C. http://www.DLink.com Published 2014-06-03 Copyright © 2014 Application Control Signatures DFL-260E/860E/1660/2560/2560G NetDefendOS Version 2.60.02 Published 2014-06-03 Copyright © 2014 Copyright Notice This publication, including all photographs, illustrations and software, is protected under international copyright laws, with all rights reserved. Neither this manual, nor any of the material contained herein, may be reproduced without the written consent of D-Link. Disclaimer The information in this document is subject to change without notice. D-Link makes no representations or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for a particular purpose. D-Link reserves the right to revise this publication and to make changes from time to time in the content hereof without any obligation to notify any person or parties of such revision or changes. Limitations of Liability UNDER NO CIRCUMSTANCES SHALL D-LINK OR ITS SUPPLIERS BE LIABLE FOR DAMAGES OF ANY CHARACTER (E.G. DAMAGES FOR LOSS OF PROFIT, SOFTWARE RESTORATION, WORK STOPPAGE, LOSS OF SAVED DATA OR ANY OTHER COMMERCIAL DAMAGES OR LOSSES) RESULTING FROM THE APPLICATION OR IMPROPER USE OF THE D-LINK PRODUCT OR FAILURE OF THE PRODUCT, EVEN IF D-LINK IS INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. FURTHERMORE, D-LINK WILL NOT BE LIABLE FOR THIRD-PARTY CLAIMS AGAINST CUSTOMER FOR LOSSES OR DAMAGES. D-LINK WILL IN NO EVENT BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE AMOUNT D-LINK RECEIVED FROM THE END-USER FOR THE PRODUCT. Table of Contents 1.Antivirus .........................................................................................................39 1.1. Sophos update ...................................................................................... 39 1.2. ZoneAlarm Updates ............................................................................... 39 2. Application Service ........................................................................................... 40 2.1. Microsoft ActiveSync .............................................................................. 41 2.2. Apple Push Notification Service ................................................................ 41 2.3. Apple App Store .................................................................................... 41 2.4. Dictionary Server ................................................................................... 42 2.5. EndPoint Mapper ................................................................................... 42 2.6. Generic Attribute Registration Protocol ..................................................... 42 2.7. Google Play ........................................................................................... 42 2.8. iCloud (Apple) ....................................................................................... 43 2.9. Iminent.com .......................................................................................... 43 2.10. iOS over-the-air (OTA update) ................................................................. 43 2.11. Lighweight Directory Access Protocol ...................................................... 43 2.12. Lighweight Directory Access Protocol Secure ............................................ 44 2.13. Mandriva Update ................................................................................. 44 2.14. IBM Websphere MQ .............................................................................. 44 2.15. NetBSD Updates ................................................................................... 44 2.16. ESET NOD32 Antivirus Updates ............................................................... 45 2.17. Symantec Norton AntiVirus Updates ........................................................ 45 2.18. Name Service Provider Interface ............................................................. 45 2.19. OpenBSD Updates ................................................................................ 45 2.20. Panda Update ...................................................................................... 46 2.21. Perforce Protocol .................................................................................. 46 2.22. Port Mapper ........................................................................................ 46 2.23. Samsung Apps ..................................................................................... 46 2.24. Service Location Protocol ...................................................................... 47 2.25. Simple Service Discovery Protocol ........................................................... 47 2.26. Syslog ................................................................................................. 47 2.27. Windows Marketplace ........................................................................... 47 2.28. X Font Server ....................................................................................... 48 3.Audio/Video ....................................................................................................49 3.1.050plus ................................................................................................51 3.2. Adobe Connect ...................................................................................... 52 3.3.AirVideo ...............................................................................................52 3.4. AllMusic.com ......................................................................................... 52 3.5. Apple Airplay ......................................................................................... 53 3.6. Apple HTTP Live Streaming ...................................................................... 53 3.7. Baidu Player .......................................................................................... 53 3.8. BBC Player ............................................................................................. 53 3.9. Blip.tv TV Series ...................................................................................... 54 3.10. Blockbuster.com .................................................................................. 54 3.11. ISO Base Media File Format .................................................................... 54 3.12.VodCCTV .............................................................................................55 3.13. Cnettv.cnet.com ................................................................................... 55 3.14.COMM ................................................................................................55 3.15. Apple FaceTime ................................................................................... 56 3.16. Flash Media Playback ............................................................................ 56 3.17. Free Music Download Pro - Downloader and Player ................................... 56 3.18. Fuze meeting ....................................................................................... 56 3.19. GoToMeeting Online Meeting ................................................................ 57 3.20. Grooveshark.com ................................................................................. 57 3.21.H225 ..................................................................................................57 3.22.H245 ..................................................................................................58 3.23. h248 Protocol (Megaco) in binary mode ................................................... 58 4 Application Control Signatures 3.24. h248 Protocol (Megaco) in text mode ...................................................... 58 3.25. HBOGO.com ........................................................................................ 58 3.26. Howcast.com ....................................................................................... 59 3.27. Hulu.com ............................................................................................ 59 3.28. Inter Asterisk eXchange ......................................................................... 59 3.29.icall ....................................................................................................59 3.30. icecast ................................................................................................ 60 3.31.iTunes ................................................................................................60 3.32. Cisco MeetingPlace ............................................................................... 60 3.33. Metacafe.com ...................................................................................... 61 3.34. Media Gateway Control Protocol ............................................................. 61 3.35. Microsoft Multimedia Streaming ............................................................. 61 3.36. MP3 Rocket application ......................................................................... 61 3.37. MPEG-Transport Stream ........................................................................ 62 3.38. MSN Video .........................................................................................
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Testimony of Authors Guild President Scott Turow Before the Senate
    My name is Scott Turow. I’m the president of the Authors Guild, the largest society of published authors in the U.S., representing more than 8,500 book authors and freelance writers. Our members represent the broad sweep of American authorship, including literary and genre fiction, nonfiction, trade, academic, and children’s book authors, textbook authors, freelance journalists and poets.1 Guild members have won countless honors and all major literary awards, including the Nobel Prize for Literature.2 The Authors Guild promotes the professional interests of authors: we’re advocates for effective copyright protection, fair contracts, and free expression. It’s a pleasure and an honor to be here this morning. I’d like especially to thank this committee for recognizing the severity of the problem we all face and getting the ball rolling with COICA in the fall, which recognized this central and unavoidable truth: any serious attempt to address online piracy must address the third-party enablers of infringement. Anything that doesn’t address those enablers is, frankly, a pretend solution to a real problem. Our Copyright Policy Inadvertently Encourages Investments in Technologies and Services That Promote Trafficking in Stolen Books, Music, and Movies After 300 years as one of history's greatest public policy successes, copyright is coming undone. As we meet here this morning, our well-intended policy toward copyright online is 1 The Guild had its beginnings as the Authors League of America, which was founded in 1912 by a group of book authors (including Theodore Roosevelt, who served as the League’s founding vice president), short story writers, freelance journalists and a smattering of dramatists.
    [Show full text]
  • A Taxonomy and Business Analysis for Mobile Web Applications
    A Taxonomy and Business Analysis for Mobile Web Applications Kevin Hao Liu Working Paper CISL# 2009-01 January 2009 Composite Information Systems Laboratory (CISL) Sloan School of Management, Room E53-320 Massachusetts Institute of Technology Cambridge, MA 02142 A Taxonomy and Business Analysis for Mobile Web Applications By Kevin Hao Liu Ph.D. Computer Science Victoria University Submitted to the System Design and Management Program in Partial Fulfillment of the Requirements for the Degree of Master of Science in Management and Engineering At the Massachusetts Institute of Technology February 2009 © 2009 Kevin H Liu. All rights reserved The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part in any medium now known or hereafter created. Signature of Author Kevin H Liu System Design and Management Program February 2009 Certified by Stuart E Madnick John Norris Maguire Professor of Information Technology Sloan School of Management Professor of Engineering Systems School of Engineering Massachusetts Institute of Technology Thesis Supervisor Certified by Patrick Hale Director System Design & Management Program Massachusetts Institute of Technology A Taxonomy and Business Analysis for Mobile Web Applications By Kevin Hao Liu Submitted to the System Design and Management Program in February 2009 in Partial Fulfillment of the Requirements for the Degree of Master of Science in Management and Engineering ABSTRACT Mobile web applications refer to web applications on mobile devices, aimed at personalizing, integrating, and discovering mobile contents in user contexts. This thesis presents a comprehensive study of mobile web applications by proposing a new taxonomy for mobile web applications, and conducting a business analysis in the field of mobile web applications.
    [Show full text]
  • Effective Unified Communications As a Service (Ucaas)
    The Definitive Guide to UCaaS: Simplifying Unified Communications as a Service Table of Contents Complex and Expensive................... 3 Effective unified communications as a service Talking VoIP...................................... 4 (UCaaS) promises to deliver seamless, secure, and Communication System Patchwork.. 5 cost-effective communications—across multiple UCaaS in a Nutshell......................... 6 channels (voice, text, video, etc.), and on different Multiple Payoffs................................ 7 devices, anywhere the user needs it. The Real Risk................................... 8 Maximizing User Adoption................ 9 With UCaaS, virtually any business can realize the The Only Practical Solution: UCaaS. 10 benefits of a simpler, more cost effective way to UCaaS and Collaboration................ 11 communicate and collaborate. A trucking company Benefits of UCaaS........................... 12 saves on long distance charges and gains better Moving Forward with UCaaS........... 13 connections to customers. A global commerce company cuts costs and increases employee engagement with richer meetings leveraging VoIP and video. But how do you get there? Read on to learn about moving enterprise communications to the cloud, challenges behind unified communications, the role of the user, and the multiple pay-offs of successful UCaaS and collaboration. “With the modern, global workplace being increasingly disconnected due to differences in time and location, the need for effective unified communications and collaboration
    [Show full text]
  • Désengagement De La Communication X25 Au Profit D’Une Solution Web, Pour La Récupération Des Appels Synchrones Par Les Fournisseurs
    Désengagement de la communication X25 au profit d’une solution web, pour la récupération des appels synchrones par les fournisseurs. Migration de l’application de suivi et de pilotage des centres de production de Mulhouse, Palomar et Mangualde Julien Courtout To cite this version: Julien Courtout. Désengagement de la communication X25 au profit d’une solution web, pour la récupération des appels synchrones par les fournisseurs. Migration de l’application de suivi et de pi- lotage des centres de production de Mulhouse, Palomar et Mangualde. Réseaux et télécommunications [cs.NI]. 2010. dumas-00529975 HAL Id: dumas-00529975 https://dumas.ccsd.cnrs.fr/dumas-00529975 Submitted on 27 Oct 2010 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. CENTRE REGIONAL ASSOCIE DU NORD FRANCHE-COMTE à BELFORT _______________ M E M O I R E Présenté en vue d’obtenir Le Diplôme d’Ingénieur C.N.A.M. En Informatique Par Julien COURTOUT _______________ Désengagement de la communication X25 au profit d’une solution web, pour la récupération des appels synchrones par les fournisseurs Migration de l’application de suivi et de pilotage des centres de production de Mulhouse, Palomar et Mangualde Soutenu le _______________ J U R Y Président : Membres : Monsieur Christophe ANDRIES Monsieur Philippe RANVIER Monsieur Alain-Jérôme FOUGERES Julien COURTOUT / Mémoire d’Ingénieur C.N.A.M.
    [Show full text]
  • NOTICE by Hotfile Corp., Anton Titov Defendants' Notice of Filing The
    Disney Enterprises, Inc. et al v. Hotfile Corp. et al Doc. 391 Att. 1 EXHIBIT A Dockets.Justia.com PUBLIC VERSION UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA CASE NO.: 11-CIV-20427-WILLIAMS/TURNOFF DISNEY ENTERPRISES, INC., TWENTIETH CENTURY FOX FILM CORPORATION, UNIVERSAL CITY STUDIOS PRODUCTIONS LLLP, COLUMBIA PICTURES INDUSTRIES, INC., and WARNER BROS. ENTERTAINMENT INC., Plaintiffs, v. HOTFILE CORP., ANTON TITOV, and DOES 1-10. Defendants. / HOTFILE CORP., Counterclaimant, v. WARNER BROS. ENTERTAINMENT INC., Counter-Defendant. / [REDACTED] DECLARATION OF PROFESSOR JAMES BOYLE IN SUPPORT OF DEFENDANTS’ OPPOSITION TO PLAINTIFFS’ MOTION FOR SUMMARY JUDGMENT AND EXHIBITS THERETO FILED UNDER SEAL CASE NO.: 11-CIV-20427-WILLIAMS/TURNOFF I, JAMES BOYLE, declare as follows: 1. I am currently the William Neal Reynolds Professor of Law at Duke University, and have been retained by Farella, Braun + Martel LLP on behalf of the Defendants in this action as an expert witness. 2. I received an LL.B. (Hons) from Glasgow University (1980), and an LL.M. (1981) and S.J.D. (1986) from Harvard Law School. I have been a law professor since 1982, teaching at American University, and at the Universities of Pennsylvania, Harvard and Yale as a Visiting Professor. In 2000 I joined the law faculty at Duke. 3. My academic research is mainly in the areas of intellectual property and communication policy, with a focus on the Internet. I have written and edited numerous articles and books on these subjects. In general, my research and scholarship has focused on: i) Copyright law, particularly in the digital arena. I have published extensively on copyright in law journals, monographs, and edited collections of essays; a full list is available in the attached curriculum vitae.
    [Show full text]
  • Crowdsourcing Indie Movies
    Chicago-Kent College of Law Scholarly Commons @ IIT Chicago-Kent College of Law All Faculty Scholarship Faculty Scholarship 9-1-2012 Crowdsourcing Indie Movies Henry H. Perritt Jr. IIT Chicago-Kent College of Law, [email protected] Follow this and additional works at: https://scholarship.kentlaw.iit.edu/fac_schol Part of the Entertainment, Arts, and Sports Law Commons Recommended Citation Henry H. Perritt Jr., Crowdsourcing Indie Movies, (2012). Available at: https://scholarship.kentlaw.iit.edu/fac_schol/449 This Article is brought to you for free and open access by the Faculty Scholarship at Scholarly Commons @ IIT Chicago-Kent College of Law. It has been accepted for inclusion in All Faculty Scholarship by an authorized administrator of Scholarly Commons @ IIT Chicago-Kent College of Law. For more information, please contact [email protected], [email protected]. Crowd sourcing indie movies Henry H. Perritt, Jr. 1 Table of Contents I. Introduction ........................................................................................................................... 3 II. The project: make a feature-length movie ......................................................................... 4 A. Goals ................................................................................................................................ 6 1. Enlist productive collaborators ................................................................................... 6 2. Minimize capital requirements ..................................................................................
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Fifth Internet Edition William Shotts A LinuxCommand.org Book Copyright ©2008-2019, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042. A version of this book is also available in printed form, published by No Starch Press. Copies may be purchased wherever fine books are sold. No Starch Press also offers elec- tronic formats for popular e-readers. They can be reached at: https://www.nostarch.com. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. Release History Version Date Description 19.01A January 28, 2019 Fifth Internet Edition (Corrected TOC) 19.01 January 17, 2019 Fifth Internet Edition. 17.10 October 19, 2017 Fourth Internet Edition. 16.07 July 28, 2016 Third Internet Edition. 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. Table of Contents Introduction....................................................................................................xvi Why Use the Command Line?......................................................................................xvi
    [Show full text]
  • List of Brands
    Global Consumer 2019 List of Brands Table of Contents 1. Digital music 2 2. Video-on-Demand 4 3. Video game stores 7 4. Digital video games shops 11 5. Video game streaming services 13 6. Book stores 15 7. eBook shops 19 8. Daily newspapers 22 9. Online newspapers 26 10. Magazines & weekly newspapers 30 11. Online magazines 34 12. Smartphones 38 13. Mobile carriers 39 14. Internet providers 42 15. Cable & satellite TV provider 46 16. Refrigerators 49 17. Washing machines 51 18. TVs 53 19. Speakers 55 20. Headphones 57 21. Laptops 59 22. Tablets 61 23. Desktop PC 63 24. Smart home 65 25. Smart speaker 67 26. Wearables 68 27. Fitness and health apps 70 28. Messenger services 73 29. Social networks 75 30. eCommerce 77 31. Search Engines 81 32. Online hotels & accommodation 82 33. Online flight portals 85 34. Airlines 88 35. Online package holiday portals 91 36. Online car rental provider 94 37. Online car sharing 96 38. Online ride sharing 98 39. Grocery stores 100 40. Banks 104 41. Online payment 108 42. Mobile payment 111 43. Liability insurance 114 44. Online dating services 117 45. Online event ticket provider 119 46. Food & restaurant delivery 122 47. Grocery delivery 125 48. Car Makes 129 Statista GmbH Johannes-Brahms-Platz 1 20355 Hamburg Tel. +49 40 2848 41 0 Fax +49 40 2848 41 999 [email protected] www.statista.com Steuernummer: 48/760/00518 Amtsgericht Köln: HRB 87129 Geschäftsführung: Dr. Friedrich Schwandt, Tim Kröger Commerzbank AG IBAN: DE60 2004 0000 0631 5915 00 BIC: COBADEFFXXX Umsatzsteuer-ID: DE 258551386 1.
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • Peer-To-Peer Protocol and Application Detection Support
    Peer-to-Peer Protocol and Application Detection Support This appendix lists all the protocols and applications currently supported by Cisco ASR 5500 ADC. • Supported Protocols and Applications, page 1 Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols, and the applications using these protocols. Important Please note that various client versions are supported for the protocols. The client versions listed in the table below are the latest supported version(s). Important Please note that the release version in the Supported from Release column has changed for protocols/applications that are new since the ADC plugin release in August 2015. This will now be the ADC Plugin Build number in the x.xxx.xxx format. The previous releases were versioned as 1.1 (ADC plugin release for December 2012 ), 1.2 (ADC plugin release for April 2013), and so on for consecutive releases. New in this Release This section lists the supported P2P protocols, sub-protocols and applications introduced in the ADC Plugin release for December 1, 2017. ADC Administration Guide, StarOS Release 21.6 1 Peer-to-Peer Protocol and Application Detection Support New in this Release Protocol / Client Client Version Group Classification Supported from Application Release 6play 6play (Android) 4.4.1 Streaming Streaming-video ADC Plugin 2.19.895 Unclassified 6play (iOS) 4.4.1 6play — (Windows) BFM TV BFM TV 3.0.9 Streaming Streaming-video ADC Plugin 2.19.895 (Android) Unclassified BFM TV (iOS) 5.0.7 BFM — TV(Windows) Clash Royale
    [Show full text]
  • Overview of Internet Direct
    Color profile: Generic CMYK printer profile Composite Default screen ApDev / Building Kylix Applications / Jensen & Anderson / 2947-6 / CHAPTER 20 Overview of Internet Direct 1 P:\010Comp\ApDev\947-6\ch20.vp Tuesday, May 29, 2001 11:32:19 AM Color profile: Generic CMYK printer profile Composite Default screen ApDev / Building Kylix Applications / Jensen & Anderson / 2947-6 / Chapter 20 2 Building Kylix Applications nternet Direct consists of a set of about 70 components for Internet development in Borland’s Kylix and Delphi products. These components include client Icomponents, server components, and various supporting components for writing these clients and servers. Internet Direct differs a bit from the Kylix product itself in that all of the components included with Internet Direct are open source. You will read more about this later in this chapter. This chapter provides an overview of Internet Direct and describes its major features and characteristics. You will also find a description of all of the Internet Direct components that are included with Kylix. Next, discussions of how clients work and how servers work are included. Finally, licensing requirements for using Internet Direct components in your Kylix applications and getting technical support are discussed. NOTE If you are not familiar with Internet-related technologies and terms, you may want to read through Chapter 17 first, or refer back to Chapter 17 periodically as you read about Internet Direct. What Is Internet Direct? Internet Direct, or Indy for short, is a set of open source socket components that are included with Kylix, as well as with Delphi 6. Internet Direct consists of clients, servers, and support components.
    [Show full text]