Wireless Cellular Technologies

Total Page:16

File Type:pdf, Size:1020Kb

Wireless Cellular Technologies Y L F M A E T Team-Fly® Wireless Security Essentials Defending Mobile Systems from Data Piracy Russell Dean Vines Wiley Publishing, Inc. Publisher: Robert Ipsen Editor: Margaret Eldridge Assistant Editor: Adaobi Obi Managing Editor: Micheline Frederick New Media Editor: Brian Snapp Text Design & Composition: Wiley Composition Services Designations used by companies to distinguish their products are often claimed as trade- marks. In all instances where Wiley Publishing, Inc., is aware of a claim, the product names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should contact the appro- priate companies for more complete information regarding trademarks and registration. This book is printed on acid-free paper. ∞ Copyright © 2002 by Russell Dean Vines. All rights reserved. Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copy- right Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspointe Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, E-mail: [email protected]. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. For general information on our other products and services please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Library of Congress Cataloging-in-Publication Data: ISBN: 0-471-20936-8 Printed in the United States of America. 10 9 8 7 6 5 4 3 2 1 This book is dedicated to the heroes of 9/11/01, common people who performed uncommon deeds when the time required it. And especially to my friend Lingard Knutson, who helped lead her Port Authority co-workers down 62 flights of stairs from Tower 1 to safety. We should all have such angels. Contents Preface xiii Introduction xvii Origin and Rationale xviii Organization xix What’s on the website xxi Part I Technology Essentials 1 Chapter 1 Computing Technology 3 Computer Basics 4 CPU 4 Bus 4 Memory 5 Operating Systems and Software 7 Software 7 Network Technologies 8 Analog versus Digital 8 Local Area Networking 9 LAN Topology 10 LAN Cabling 13 LAN Network Devices 14 Wide Area Networking 19 Circuit-Switched versus Packet-Switched Networks 19 Packet-Switched Technologies 21 Private Circuit Technologies 22 Virtual Private Networking (VPNs) 22 VPN Communications Standards 23 v vi Contents Firewalls 23 Packet-Filtering Firewall 24 Application-Level Firewalls 24 Stateful Inspection Firewall 24 Protocols 25 Open Systems Interconnect (OSI) Model 25 Transmission Control Protocol/ Internet Protocol (TCP/IP) Model 27 TCP/IP Protocols 28 The Wireless Application Protocol 29 Chapter 2 Wireless Theory 33 A Painless History of Wireless Technology 33 The Cellular Phone Network 34 Worldwide Cellular via LEO Satellites 35 Cellular Network Elements 35 The Call Process 36 Wireless Cellular Technologies 36 Wireless Transmission Systems 37 Advanced Mobile Phone System 37 Time Division Multiple Access 38 Code Division Multiple Access 38 Global System for Mobile Communications 39 Cellular Digital Packet Data 39 Nordic Mobile Telephone 39 Total Access Communication System 39 Personal Digital Cellular 40 Short Message Service 40 The Generation Gap 40 2.5G Technologies 41 3G Technologies 42 Wireless Data Networking Technologies 44 Spread Spectrum Technology 44 Direct Sequence Spread Spectrum (DSSS) 44 Frequency-Hopping Spread Spectrum (FHSS) 45 Orthogonal Frequency Division Multiplexing 46 IEEE 802.11 Specifications for Wireless LANS 47 Original IEEE 802.11 LAN Standard 48 IEEE 802.11b 48 IEEE 802.11a 49 IEEE 802.11g 50 IEEE 802.11e 51 802.11 Wireless Network Operational Modes 51 Ad Hoc Mode 51 Infrastructure Mode 52 Bluetooth 54 Bluetooth Advantages and Disadvantages 55 Contents vii HomeRF 55 HomeRF Technology Overview 56 HomeRF and Shared Wireless Application Protocol 58 High-Performance Radio LANs 59 HiperLAN/1 59 HiperLAN/2 59 Wireless Application Protocol 61 WAP Layers 62 Application Layer 63 Session Layer 63 Transaction Layer 64 Security Layer 64 Transport Layer 64 Chapter 3 Wireless Reality 65 Wireless Standards and Technologies 65 802.11 66 Benefits of WLAN 66 802.11b Encryption 66 Other Notable IEEE 802 Wireless Standards and Drafts 67 802.1x Port-Based Network Access Control 67 802.15 Wireless Personal Area Networks 68 802.16 Broadband Wireless Access 69 802.11g 69 Nonwireless IEEE Standards 69 802.1v VLAN Classification by Protocol and Port 69 802.17 Resilient Packet Ring Access Protocol 70 Other Standards Working Groups 70 HomeRF 71 Comparing 802.11b to HomeRF 73 HomeRF Security 73 Bluetooth 73 System Architecture Features 74 The Piconet 75 Bluetooth Hardware Elements 76 Battery Conservation 78 Bluetooth Versions 79 Common Bluetooth Applications 80 Bluetooth Security 81 Wireless Personal Area Network 82 Infrared Data Association (IrDA) 82 Comparing Bluetooth to IrDA 84 Directionality 84 Other Comparisons 84 Wireless Hardware and Devices 85 Personal Electronic Devices 85 viii Contents PDAs 85 The Palm OS 86 Windows Handhelds 87 Other PDA Devices 88 Internet-Enabled Cell Phones 88 WAP-Enabled Phones 89 Symbian OS 89 Nokia 90 Ericsson R380e 92 Motorola i90c iDEN 93 BlackBerry 96 BlackBerry Internet Edition 96 BlackBerry Enterprise Edition 96 BlackBerry ISPs 97 Wireless Applications 98 Wireless Technologies in the Home 98 Wireless Technologies in the Office 99 Wireless Technologies in Public Spaces 99 Part II Security Essentials 101 Chapter 4 Security Concepts and Methodologies 103 The Concepts of C.I.A. 105 Confidentiality 105 Integrity 106 Availability 107 Threats, Vulnerabilities, and Risk 107 Certification and Accreditation 107 Policies and Procedures 108 Business Continuity and Disaster Recovery 109 Alternative Processing Sites 110 Wireless Disaster Recovery 111 Information Classification Concepts 111 The Ten Domains of the International Information Systems Security Certification Consortium 112 TCSEC and the Common Criteria 113 The Orange Book 113 The Red Book 114 The Common Criteria 114 DITSCAP and NIACAP 115 DITSCAP 116 NIACAP 116 INFOSEC Assessment Methodology (IAM) 117 The IAM Process 118 BS7799 119 Contents ix A Short History of Cryptography 120 The Early Days of Secret Writing 120 Early Disk Use 121 The 1920s 122 Rotor Systems 122 Identification and Authorization 123 Identification and Authentication 123 Passwords 124 Access Control Models 125 Mandatory Access Control 125 Discretionary Access Control 125 Nondiscretionary Access Control 126 Controls 126 Accountability 127 Chapter 5 Security Technologies 129 Cryptographic Technologies and Public Key Infrastructure 129 Secret Key Cryptography (Symmetric Key) 130 Data Encryption Standard 130 Advanced Encryption Standard 131 Public (Asymmetric) Key Cryptosystems 131 One-Way Function 132 Public Key Algorithms 132 Public Key Infrastructure 133 Department of Defense Wireless PKI Initiative 134 Wired Equivalent Privacy 135 WEP Encryption 136 WEP Decryption 137 WEP RC4 137 WEP Authentication Methods 138 Open System Authentication 138 Shared Key Authentication 138 WEP Key Management 140 Wireless Application Protocol Security 141 Wireless Transport Layer Security 142 End-to-End Security via the WAP Gateway 144 Bluetooth Security Architecture 146 The Security Manager 146 Link-Level Security Features 147 Mode 2: Service-Level Security 147 Mode 3: Link-Level Security 148 Other Bluetooth Security Architecture Features 149 Wireless Tools 150 Wireless VPNs 150 movianVPN 151 x Contents Wireless Packet Sniffers 152 AiroPeek 152 Cisco Systems’ Wireless Products 154 Aironet 350 Features 154 Aironet 350 Management Options 155 Security Monitoring and Testing 156 Intrusion Detection Systems 157 Network-Based IDS 158 Host-Based IDS 158 IDS Detection Methods 159 Signature-Based ID 159 Statistical Anomaly-Based ID 160 Penetration Testing 160 Chapter 6 Threats and Solutions 163 Security Threats to Personal Electronic Devices 163 Vulnerability of PDA Operating Systems 164 PDA Vulnerability Caused by Physical Loss 165 Identification and Authentication 166 Catching PDA Viruses 166 Phage.963 Y 167 Vapor.741 167 LibertyCrack L 167 Tapping Infrared Vulnerabilities
Recommended publications
  • Tech Paper Symbian Technical Paper
    Tech Paper Symbian Technical Paper Copyright © 2000 Symbian Ltd. All rights reserved. Reproduction of this paper, in any form, in whole or in part, without written permission of Symbian Ltd, is prohibited. Designing for Quartz Martin Tasker, Head of Technical Communications, Symbian Ltd Summary Symbian’s Quartz design, for a tablet communicator, presents many new opportunities for application development. Successful applications must be designed both for the device, and for its end-users. This paper covers the design decisions underlying the new Quartz GUI, and shows how the standard guidelines are implemented by the built- in application suite. Finally the author considers how to migrate two of his own applications, the Solo Ships and Battleships examples from Professional Symbian Programming. This paper is based on material prepared for the Wrox Professional Wireless Developers Conference, Amsterdam, July 2000. Contents ●Introduction ❍Basic parameters ❍Symbian, manufacturers and developers ❍End-user ●Elements of the GUI ❍Screen areas ❍Applications and views ❍Real applications: personal information management ❍Standard guidelines ❍Real applications: finishing the tour ❍Dialogs ❍Text input and handwriting recognition ❍System support ●Designing for Quartz ❍Make the tough decisions ❍More on Java ❍Some simple examples ❍Battleships ●Summary Introduction Contents ●Basic parameters ●Symbian, manufacturers and developers ●End-user Symbian’s previous product was EPOC Release 5. This is the operating system behind the Psion Series 5mx, Psion Series 7, Psion netBook, http://www.symbiandevnet.com/techlib/techcomms/techpapers/papers/v6/quartz/ui/appdesign/ (1 sur 31) [24/10/2001 11:13:48] Tech Paper Ericsson MC218, and Psion Revo. These devices all sport a touch screen of similar size, and a compact but full alphanumeric keyboard.
    [Show full text]
  • Handheld Technology Review, Technical Report 2001-008-C-06
    QUT Digital Repository: http://eprints.qut.edu.au/26874 Kajewski, Stephen L. and Tilley, Paul A. and Crawford, John and Remmers, Todd R. and Chen, Swee-Eng and Lenard, Dennis and Brewer, Graham and Gameson, Rod and Martins, Rui and Sher, Willy and Kolomy, Richard and Weippert, Achim and Caldwell, Geoff and Haug, Mark (2001) Handheld technology review. The Participants of the CRC for Construction Innovation have delegated authority to the CEO of the CRC to give Participants permission to publish material created by the CRC for Construction Innovation. This delegation is contained in Clause 30 of the Agreement for the Establishment and Operation of the Cooperative Research Centre for Construction Innovation. The CEO of the CRC for Construction Innovation gives permission to the Queensland University of Technology to publish the papers/publications provided in the collection in QUT ePrints provided that the publications are published in full. Icon.Net Pty Ltd retains copyright to the publications. Any other usage is prohibited without the express permission of the CEO of the CRC. The CRC warrants that Icon.Net Pty Ltd holds copyright to all papers/reports/publications produced by the CRC for Construction Innovation. Handheld Technology Review Rep ort 2 0 0 1 -0 0 8 -C-0 6 The research described in this report was carried out by: P roject L eader D r S tephen K ajewsk i (QU T) Team Mem bers P aul Tilley, Mr J ohn C rawford (C S IR O ), Todd R em m ers (C S IR O ) P rofessor S wee-E ng C hen, P rofessor D ennis L enard, G raham B rewer, R
    [Show full text]
  • Symbian OS from Wikipedia, the Free Encyclopedia
    Try Beta Log in / create account article discussion edit this page history Symbian OS From Wikipedia, the free encyclopedia This article is about the historical Symbian OS. For the current, open source Symbian platform descended from Symbian OS and S60, see Symbian platform. navigation Main page This article has multiple issues. Please help improve the article or discuss these issues on the Contents talk page. Featured content It may be too technical for a general audience. Please help make it more accessible. Tagged since Current events December 2009. Random article It may require general cleanup to meet Wikipedia's quality standards. Tagged since December 2009. search Symbian OS is an operating system (OS) designed for mobile devices and smartphones, with Symbian OS associated libraries, user interface, frameworks and reference implementations of common tools, Go Search originally developed by Symbian Ltd. It was a descendant of Psion's EPOC and runs exclusively on interaction ARM processors, although an unreleased x86 port existed. About Wikipedia In 2008, the former Symbian Software Limited was acquired by Nokia and a new independent non- Community portal profit organisation called the Symbian Foundation was established. Symbian OS and its associated Recent changes user interfaces S60, UIQ and MOAP(S) were contributed by their owners to the foundation with the Company / Nokia/(Symbian Ltd.) Contact Wikipedia objective of creating the Symbian platform as a royalty-free, open source software. The platform has developer Donate to Wikipedia been designated as the successor to Symbian OS, following the official launch of the Symbian [1] Help Programmed C++ Foundation in April 2009.
    [Show full text]
  • SYMBIAN OS Embedded Operating System
    Adamson University 900 San Marcelino st., Ermita, Manila 1000 SYMBIAN OS Embedded Operating System Operating Systems Prof. Antonette Daligdig Atienza, Lemuel Jay Bacarra, Dan Paolo Dulatre, Michael Angelo Jimenez, John Edward Llorca, Bryalle November 2009 Table of Contents I Introduction II Origin/History III Characteristics III.a. Processing III.b. Memory Management III.c. I/O : Input/Output IV Features V Strengths VI Weakness VII Example of Applications where the OS is being used VIII Screenshots I Introduction More than 90% of the CPUs in the world are not in desktops and notebooks. They are in embedded systems like cell phones, PDAs, digital cameras, camcorders, game machines, iPods, MP3 players, CD players, DVD recorders, wireless routers, TV sets, GPS receivers, laser printers, cars, and many more consumer products. Most of these use modern 32-bit and 64-bit chips, and nearly all of them run a full-blown operating system. Taking a close look at one operating system popular in the embedded systems world: Symbian OS, Symbian OS is an operating system that runs on mobile ‘‘smartphone’’ platforms from several different manufacturers. Smartphones are so named because they run fully-featured operating systems and utilize the features of desktop computers. Symbian OS is designed so that it can be the basis of a wide variety of smartphones from several different manufacturers. It was carefully designed specifically to run on smartphone platforms: general-purpose computers with limited CPU, memory and storage capacity, focused on communication. Our discussion of Symbian OS will start with its history. We will then provide an overview of the system to give an idea of how it is designed and what uses the designers intended for it.
    [Show full text]
  • Linux on the Psion Netbook HOWTO Last Modified 9 July 2006
    Linux on the Psion netBook HOWTO Last modified 9 July 2006. Changes. Copyright © 2003-2005 www.openpsion.org (http://www.openpsion.org) - The OpenPsion Project. All rights reserved. This document contains information on how to get a Psion netBook to boot up the Linux operating system, how to subsequently configure the system, and how to obtain, install and use applications suitable for the netBook’s limited resources. This document also contains notes on the remaining problems at the moment, and instructions on such things as compiling a custom kernel and assembling a custom OS.IMG file. Framebuffer support is implemented, and X windows is supported. Compactflash, PCMCIA, and touch screen are rudimentarily supported. Many wireless PCMCIA cards will work fine; indeed, in general most PCMCIA devices (16-bit PC Card only!) will work fine. The touchscreen patch is relatively new. The only hold up to a fully functional, operational linbook seems to be that no power management is available (you can’t turn the linBook off!). There is no support for sound yet. Other useful hints may be found on the Linux on Psion 5MX HOWTO (http://linux-7110.sourceforge.net/howtos/series5mx_new/index.htm). The netBook and 5MX systems have considerable similarity. Offer (May 2006): An infrared modem is offered for free (shipped anywhere in the world) to anyone who posts a patch for the netbook kernel that enables infrared. However, a patch for proper PCMCIA support is considered more critical and will take precedence if posted prior to, or within a few days of, the infrared patch. Please send inquiries or patches to the OpenPsion mail list.
    [Show full text]
  • Handheld Technology Review
    Handheld Technology Review Rep ort 2 0 0 1 -0 0 8 -C-0 6 The research described in this report was carried out by: P roject L eader D r S tephen K ajewsk i (QU T) Team Mem bers P aul Tilley, Mr J ohn C rawford (C S IR O ), Todd R em m ers (C S IR O ) P rofessor S wee-E ng C hen, P rofessor D ennis L enard, G raham B rewer, R od G am eson, R ichard K olom y, R ui Martins, W illy S her (U N ) R esearcher Mr A chim W eippert (QU T) P roject A ffiliates Mr G eoff C aldwell (QD MR ) and Mr Mark H aug (QD P W ) Res earch P rogram C: D elivery and M anagem ent of B u ilt A s s ets P roject 2 0 0 1 -0 0 8 -C: P roject Team Integration: Com m u nication, Coordination and D ecis ion S u p p ort CONTENTS CONTENTS _______________________________________________________________ 1 LIST OF TABLES__________________________________________________________ 3 LIST OF FIGURES ________________________________________________________ 3 PREFACE ________________________________________________________________ 5 EXECUTIVE SUMMARY ___________________________________________________ 6 1 INTRODUCTION ______________________________________________________ 9 2 CURRENT STATE OF HANDHELD TECHNOLOGY _______________________ 10 2.1 Hardware Overview: What’s Available in General ____________________________ 10 2.2 Add-ons and Expansions __________________________________________________ 15 2.3 Integrated Phone & PDA: The Current trend ________________________________ 16 2.4 Software: What’s Available in General ______________________________________ 19 2.4.1 Palm OS_______________________________________________________________________
    [Show full text]
  • Amiga OS Apple II Beos Common Desktop Environment GEOS
    Home > Screenshots GUIs Components Amiga OS Desktop Workbench 1.0 » Workbench 1.0 First run · Empty desktop · Desktop with applications Workbench 2.0 » Workbench 2.04 Apple II Applications MouseDesk/DeskTop » DeskTop 1.1 Office » Notepad · Text editor · Calculator · Calendar · Clock · GS/OS » GS/OS 5.0.4 · GS/OS 6.0.1 Address book Multimedia » Media player · CD player · Volume level · Sound Networking » Terminal · Phone dialer BeOS Internet » Browser · Mail Accessibility » Keyboard map BeOS R5 » BeOS R5.0.1 PE Settings Common Desktop Environment Settings menu · General · Appearance · Desktop themes · Display · Screensaver · CDE 1.0 » CDE 1.5 in Solaris 9 Keyboard · Mouse · Time and date · International · Accessibility · Power management GEOS/GeoWorks GEOS for Commodore » GEOS 2 for C64 GEOS for Apple II » GEOS 2.1 for Apple II System GeoWorks » GeoWorks Ensemble 2.0 Managers » Application manager · File manager · Running applications New Deal Office » NewDeal Office 3 Eval. · Task manager BreadBox Ensemble » BreadBox Ensemble Lite Features » Help · Search · Trash can · Run Utilities » Command prompt GNOME GNOME 2.0 » GNOME 2.2.0 in RedHat 9 Startup and shutdown Welcome splash · Login screen · Logout screen · Shutdown window · Shutting down · Shutdown complete IRIX IRIX 5.0 » IRIX 5.3 Installation Lisa Office System Welcome screen · Licence · File copying · Installation complete Lisa Office System 1 » Lisa OS 1.0 Lisa Office System 7/7 3 » Lisa OS 3.1 Interface Mac OS Dialogs » About GUI · About application · Font selection · Open file
    [Show full text]
  • Team-Fly® Wireless Security Essentials Defending Mobile Systems from Data Piracy
    Y L F M A E T Team-Fly® Wireless Security Essentials Defending Mobile Systems from Data Piracy Russell Dean Vines Wiley Publishing, Inc. Publisher: Robert Ipsen Editor: Margaret Eldridge Assistant Editor: Adaobi Obi Managing Editor: Micheline Frederick New Media Editor: Brian Snapp Text Design & Composition: Wiley Composition Services Designations used by companies to distinguish their products are often claimed as trade- marks. In all instances where Wiley Publishing, Inc., is aware of a claim, the product names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should contact the appro- priate companies for more complete information regarding trademarks and registration. This book is printed on acid-free paper. ∞ Copyright © 2002 by Russell Dean Vines. All rights reserved. Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copy- right Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspointe Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, E-mail: [email protected]. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose.
    [Show full text]
  • Mcafee Virusscan
    GETTING STARTED McAfee VirusScan VERSION 6.0 COPYRIGHT © 2001 Networks Associates Technology, Inc and its Affiliated Companies. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Network Associates, Inc. TRADEMARK ATTRIBUTIONS Active Security, Activehelp, Activeshield, Antivirus Anyware And Design, Bomb Shelter, Building A World Of Trust, Certified Network Expert, Clean-up, Cleanup Wizard, Cloaking, Cnx, Cnx Certification Certified Network Expert And Design, Cybercop, Cybermedia, Cybermedia Uninstaller, Data Security Letter And Design, Design (Logo), Design (Rabbit With Hat), Design (Stylized N), Disk Minder, Distributed Sniffer System, Distributed Sniffer System (In Katakana), Dr Solomon's, Dr Solomon's Label, Enterprise Securecast, Ez Setup, First Aid, Forcefield, Gauntlet, Gmt, Groupshield, Guard Dog, Helpdesk, Homeguard, Hunter, I C Expert, Isdn Tel/scope, Lan Administrature Architecture And Design, Langura, Languru (In Katakana), Lanwords, Leading Help Desk Technology, Lm1, M And Design, Magic Solutions, Magic University, Magicspy, Magictree, Magicword, Mc Afee Associates, Mcafee, Mcafee (In Katakana), Mcafee And Design, Netstalker, Mcafee Associates, Moneymagic, More Power To You, Multimedia Cloaking, Mycio.com, Mycio.com Design (Cio Design), Mycio.com Your Chief Internet Officer & Design, Nai And Design, Net Tools, Net Tools (And In Katakana), Netcrypto, Netoctopus,
    [Show full text]
  • Quickstart Guide COPYRIGHT Copyright (C) 1999-2000 Networks Associates Technology, Inc
    VirusScan Wireless Version 1.0 QuickStart Guide COPYRIGHT Copyright (c) 1999-2000 Networks Associates Technology, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Networks Associates Technology, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS * ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX, * ActiveHelp, Bomb Shelter, Building a World of Trust, CipherLink, Clean-Up, Cloaking, CNX, Compass 7, CyberCop, CyberMedia, Data Security Letter, Discover, Distributed Sniffer System, Dr Solomon's, Enterprise Secure Cast, First Aid, ForceField, Gauntlet, GMT, GroupShield, HelpDesk, Hunter, ISDN Tel/Scope, LM 1, LANGuru, LeadingHelp Desk Technology, Magic Solutions, MagicSpy, MagicTree, Magic University, MagicWin, MagicWord, McAfee, McAfee Associates, MoneyMagic, More Power To You, Multimedia Cloaking, NetCrypto, NetOctopus, NetRoom, NetScan, Net Shield, NetShield, NetStalker, Net Tools, Network Associates, Network General, Network Uptime!, NetXRay, Nuts & Bolts, PC Medic, PCNotary, PGP, PGP (Pretty Good Privacy), PocketScope, Pop-Up, PowerTelnet, Pretty Good Privacy, PrimeSupport, RecoverKey, RecoverKey-International, ReportMagic, RingFence, Router PM, Safe & Sound, SalesMagic, SecureCast, Service Level Manager, ServiceMagic, Site Meter, Sniffer, SniffMaster, SniffNet, Stalker, Statistical Information Retrieval (SIR), SupportMagic, Switch PM, TeleSniffer, TIS, TMach, TMeg, Total Network Security, Total Network Visibility, Total Service Desk, Total Virus Defense, T-POD, Trusted Mach,Trusted Mail, Uninstaller, Virex, Virex-PC, Virus Forum, ViruScan, VirusScan, VShield, WebScan, WebShield, WebSniffer, WebStalker, WebWall, and ZAC 2000 are registered trademarks of Network Associates and/or its affiliates in the US and/or other countries.
    [Show full text]
  • Scanned by Camscanner Scanned by Camscanner
    Scanned by CamScanner Scanned by CamScanner Ans 1 a). Message passing provides a mechanism to allow processes to communicate and to synchronize their actions without sharing the same address space and is particularly useful in a distributed environment, where the communicating processes may reside on different computers connected by a network. For example, a chat program used on the World Wide Web could be designed so that chat participants communicate with one another by exchanging messages. A message-passing facility provides at least two operations: send (message) and receive (message). Messages sent by a process can be of either fixed or variable size. If only fixed-sized messages can be sent, the system-level implementation is straightforward. This restriction, however, makes the task of programming more difficult. Conversely, variable-sized messages require a more complex system-level implementation, but the programming task becomes simpler. This is a common kind of tradeoff seen throughout operating system design. If processes P and Q want to communicate, they must send messages to and receive messages from each other; a communication link must exist between them. This link can be implemented in a variety of ways. Here are several methods for logically implementing a link and the send()/receive () operations: • Direct or indirect communication • Synchronous or asynchronous communication • Automatic or explicit buffering We look at issues related to each of these features next. 1 Naming Processes that want to communicate must have a way to refer to each other. They can use either direct or indirect communication. Under direct communication, each process that wants to communicate must explicitly name the recipient or sender of the communication.
    [Show full text]
  • Windows Mobile
    Науково практична конференція Foss Lviv 2013 «Мобільні операційні системи. Розвиток впз на мобільних пристроях» Курдаєв Олег Сергійович. [email protected] Викладач іт Чоповський С.С. [email protected] Державний навчальний заклад «Львівський професійний ліцей залізничного транспорту» www.lzl.ucoz.ua Мобільні операційні системи На сьогоднішній день ринок мобільних пристроїв розвивається досить швидко.На сьогодні мобільний телефон це не просто пристрій з якого можна подзвонити один одному.Сучасні телефони містять інтерфейс bluetooth,більшість має фото- і відеокамеру. Більш розвинутим сегментом мобільних пристроїів є смартфон. На сьогодні чітко розділити межу між простими телефонами і смартфонами можна за такими ознаками як : -Наявність операційної системи; -Для запезпечення роботи цієї ос смартфон повинен містити досить потужний процессор(якого буде достатньо для роботи на даному пристрої з даною ос), а також відповідну кількість інших ресурсів(оперативної памяті і т. д.). Сьогодні мені б хотілось розповісти про мобільні ос,а саме про найпоширеніші з них. Android Android - портативна операційна система для комунікаторів, планшетних комп'ютерів, електронних книжок, цифрових програвачів, наручних годинників, нетбуків і смартбуків, заснована на ядрі Linux. Історія цієї ос розпочинається в 2007 році,коли компанія Google 5 листопада 2007 офіційно оголосила про створення Open Handset Alliance (OHA) і анонсувала відкриту мобільну платформу Android. Перша версія вийшла 23 вересня 2008 року,Android 1.0. Остання версія даної ос (Android 4.2.2)
    [Show full text]