Administrator's Guide

Total Page:16

File Type:pdf, Size:1020Kb

Administrator's Guide Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release notes, and/or the latest version of the applicable documentation, which are available from the Trend Micro website at: http://docs.trendmicro.com/en-us/enterprise/scanmail-for-microsoft- exchange.aspx Trend Micro, the Trend Micro t-ball logo, Apex Central, eManager, and ScanMail are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright © 2020. Trend Micro Incorporated. All rights reserved. Document Part No.: SMEM149028/200709 Release Date: November 2020 Protected by U.S. Patent No.: 5,951,698 This documentation introduces the main features of the product and/or provides installation instructions for a production environment. Read through the documentation before installing or using the product. Detailed information about how to use specific features within the product may be available at the Trend Micro Online Help Center and/or the Trend Micro Knowledge Base. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at [email protected]. Evaluate this documentation on the following site: https://www.trendmicro.com/download/documentation/rating.asp Privacy and Personal Data Collection Disclosure Certain features available in Trend Micro products collect and send feedback regarding product usage and detection information to Trend Micro. Some of this data is considered personal in certain jurisdictions and under certain regulations. If you do not want Trend Micro to collect personal data, you must ensure that you disable the related features. The following link outlines the types of data that ScanMail for Microsoft Exchange collects and provides detailed instructions on how to disable the specific features that feedback the information. https://success.trendmicro.com/data-collection-disclosure Data collected by Trend Micro is subject to the conditions stated in the Trend Micro Privacy Notice: https://www.trendmicro.com/privacy Table of Contents Preface Preface ................................................................................ ix ScanMail Documentation ....................................................... x Audience .............................................................................. x Document Conventions ........................................................ xi Part I: Introducing ScanMail and Getting Started Chapter 1: Introducing Trend Micro ScanMail for Microsoft Exchange System Requirements ......................................................... 1-2 What’s New ........................................................................ 1-6 Features and Benefits .......................................................... 1-8 Version Comparison .......................................................... 1-16 How ScanMail Protects the Microsoft Exchange Environment ......................................................................................... 1-18 About Uncleanable Files .................................................... 1-22 ScanMail Technology ........................................................ 1-23 Chapter 2: Getting Started with ScanMail Getting Started ................................................................... 2-2 Understanding the Product Console ..................................... 2-2 ScanMail Registration ....................................................... 2-10 ScanMail Activation .......................................................... 2-12 About ScanMail Updates .................................................... 2-18 Office 365 Protection with Trend Micro Cloud App Security . 2-23 i ScanMail™ for Microsoft™ Exchange 14.0 Patch 4 Administrator’s Guide Chapter 3: Establishing and Maintaining Security for Your Exchange Servers Establishing a Security Baseline .......................................... 3-2 Maintaining Security .......................................................... 3-3 Managing Outbreak Situations ............................................. 3-4 Chapter 4: Managing ScanMail Understanding Real-time Monitor ....................................... 4-2 Understanding the Server Management Console ................... 4-4 Starting and Stopping the Services ..................................... 4-10 Understanding ScanMail Icons .......................................... 4-10 Part II: Configuring Scans and Scan Filters Chapter 5: Understanding Smart Protection About Trend Micro Smart Protection ................................... 5-2 Configuring Local Sources .................................................. 5-7 Scan Service Settings .......................................................... 5-9 Chapter 6: Configuring Scans About Scans ....................................................................... 6-2 Compressed File Handling .................................................. 6-6 About ScanMail Actions ...................................................... 6-9 Notifications ..................................................................... 6-22 Chapter 7: Configuring Security Risk Scans About Security Risk Scans ................................................... 7-2 ScanMail Scan Hierarchy .................................................... 7-3 ii Table of Contents Security Risk Scan Actions .................................................. 7-6 Enabling Real-time Security Risk Scan ................................. 7-7 Configuring Security Risk Scan Targets ................................ 7-7 Configuring Security Risk Scan Actions .............................. 7-10 Configuring Security Risk Scan Notifications ...................... 7-14 Chapter 8: Configuring Attachment Blocking About Attachment Blocking ................................................. 8-2 Enabling Real-time Attachment Blocking ............................. 8-3 About the Attachment Blocking Global Policy ....................... 8-4 Adding an Exception to the Attachment Blocking Global Policy .......................................................................................... 8-7 Editing an Attachment Blocking Exception ........................... 8-9 Adding a Customized Policy ............................................... 8-11 Editing a Customized Policy ............................................... 8-13 Chapter 9: Configuring Content Filtering About Content Filtering ...................................................... 9-2 Enabling Real-time Content Filtering ................................... 9-3 Global Settings ................................................................... 9-4 Configuring Content Filtering Policies ................................. 9-4 Configuring a Content Filtering Exception .......................... 9-13 Editing a Content Filtering Policy ....................................... 9-14 Chapter 10: Configuring Data Loss Prevention About Data Loss Prevention (DLP) ...................................... 10-2 Data Identifier Types ......................................................... 10-3 About Data Loss Prevention Templates ............................. 10-16 iii ScanMail™ for Microsoft™ Exchange 14.0 Patch 4 Administrator’s Guide About Data Loss Prevention Policies ................................. 10-21 Chapter 11: Configuring Spam Prevention About Spam Prevention ..................................................... 11-2 About Email Reputation .................................................... 11-3 About Content Scanning .................................................... 11-7 Chapter 12: Configuring Advanced Spam Prevention About Advanced Spam Prevention ...................................... 12-2 Configuring Advanced Spam Prevention Settings ................ 12-3 Configuring Writing Style Training Settings ........................ 12-7 Configuring Writing Style Verification Settings ................... 12-9 Chapter 13: Configuring Web Reputation About Web Reputation Services ......................................... 13-2 Configuring the Web Reputation Scan Service ..................... 13-3 Enabling Web Reputation .................................................. 13-4 Configuring Web Reputation Targets .................................. 13-4 Configuring Web Reputation Actions .................................. 13-5 Configuring Web Reputation Notifications .......................... 13-7 Chapter 14: Configuring URL Time-of-Click Protection About URL Time-of-Click Protection .................................. 14-2 Enabling URL Time-of-Click Protection .............................. 14-2 Configuring URL Time-of-Click Protection ......................... 14-2 Chapter 15: Configuring Search & Destroy About Search & Destroy ..................................................... 15-2 Configuring Search & Destroy Access Accounts ................... 15-3 iv Table of Contents Activating Search & Destroy ............................................... 15-4 About Mailbox Searches .................................................... 15-6 Configuring a Mailbox Search .......................................... 15-13 Configuring Search & Destroy Settings .............................. 15-20 Viewing Search & Destroy Event Logs ............................... 15-21 Troubleshooting Search & Destroy ...................................
Recommended publications
  • ACS – the Archival Cytometry Standard
    http://flowcyt.sf.net/acs/latest.pdf ACS – the Archival Cytometry Standard Archival Cytometry Standard ACS International Society for Advancement of Cytometry Candidate Recommendation DRAFT Document Status The Archival Cytometry Standard (ACS) has undergone several revisions since its initial development in June 2007. The current proposal is an ISAC Candidate Recommendation Draft. It is assumed, however not guaranteed, that significant features and design aspects will remain unchanged for the final version of the Recommendation. This specification has been formally tested to comply with the W3C XML schema version 1.0 specification but no position is taken with respect to whether a particular software implementing this specification performs according to medical or other valid regulations. The work may be used under the terms of the Creative Commons Attribution-ShareAlike 3.0 Unported license. You are free to share (copy, distribute and transmit), and adapt the work under the conditions specified at http://creativecommons.org/licenses/by-sa/3.0/legalcode. Disclaimer of Liability The International Society for Advancement of Cytometry (ISAC) disclaims liability for any injury, harm, or other damage of any nature whatsoever, to persons or property, whether direct, indirect, consequential or compensatory, directly or indirectly resulting from publication, use of, or reliance on this Specification, and users of this Specification, as a condition of use, forever release ISAC from such liability and waive all claims against ISAC that may in any manner arise out of such liability. ISAC further disclaims all warranties, whether express, implied or statutory, and makes no assurances as to the accuracy or completeness of any information published in the Specification.
    [Show full text]
  • CONTENTS in THIS ISSUE Fighting Malware and Spam
    MARCH 2008 Fighting malware and spam CONTENTS IN THIS ISSUE 2 COMMENT EVASIVE ACTION Home (page) renovations Pandex has attracted very little attention from the media and generated little 3 NEWS discussion between malware Botherders herded researchers and among the 29A folds general populace. Chandra Prakash and Adam Thomas provide an overview of the Pandex operation and take an in-depth look at VIRUS PREVALENCE TABLE 3 the underlying code that has allowed this malware to evade detection for so long. 4 MALWARE ANALYSIS page 4 Pandex: the botnet that could PACKING A PUNCH In the fi nal part of the series on exepacker 9 FEATURE blacklisting, Robert Neumann takes a look at how all the processing and analysis techniques are put Exepacker blacklisting part 3 into practice in a real-life situation. page 9 15 CONFERENCE REPORT AVG TURNS 8 Black Hat DC and CCC 24C3 John Hawes gets his hands on a preview version of the latest offering from AVG. 18 PRODUCT REVIEW page 18 AVG Internet Security 8 22 END NOTES & NEWS This month: anti-spam news and events, and Ken Simpson considers the implications of rising spam volume despite increasing accuracy of content fi lters. ISSN 1749-7027 COMMENT ‘It is hoped that within all sizes of business. It is hoped that the comment facility will promote discussion among visitors and that the comment facility in some cases the more knowledgeable of VB’s readers will promote will be able to guide and assist those less well versed in discussion among the complexities of anti-malware technologies.
    [Show full text]
  • Windows X32 Cross Compile Guide
    Guide for cross compiling Trezarcoin for windows. By Iwens Fortis Tested on Ubuntu 16.04.2 LTS. • Start on ubuntu your terminal (search for terminal with ubuntu dash top icon left, or press windows key to open dash). • First we need to install the dependencies, for this execute the following cmd’s stated below in the terminal window. The commands to execute are in the grey textboxes. The commands will ask for a password which and u have to confirm some commands with y from yes. Tip transfer the pdf to ubuntu for easy copy and paste. • First update the apt library. sudo apt-get update • Install needed dependencies to install mxe to cross compile Trezarcoin. sudo apt-get install p7zip-full autoconf automake autopoint bash bison bzip2 cmake flex gettext git g++ gperf intltool \ libffi-dev libtool libltdl-dev libssl-dev libxml-parser-perl make openssl patch perl pkg-config python ruby scons sed unzip \ wget xz-utils libtool-bin libgdk-pixbuf2.0-dev g++-multilib libc6-dev-i386 upx -y • We need to get latest mxe from github and compile libraries needed. git clone https://github.com/mxe/mxe.git cd mxe make MXE_TARGETS="i686-w64-mingw32.static" boost make MXE_TARGETS="i686-w64-mingw32.static" qttools make MXE_TARGETS="i686-w64-mingw32.static" miniupnpc • Next we need to compile the recommended Berkeley DB our self cd ~ wget 'http://download.oracle.com/berkeley-db/db-4.8.30.NC.tar.gz' tar zxvf db-4.8.30.NC.tar.gz cd db-4.8.30.NC • Now we will create a bash script for this execute the following commands to create the bash script.
    [Show full text]
  • Guida-Comprimere-I-Documenti.Pdf
    Guida Comprimere i documenti alvare spazio e gestire me- Questione di spazio Guida glio i file. In sintesi, è questo Per capire bene il funzionamento ai programmi Sil principale vantaggio che di questi programmi e quale sia deriva dall’utilizzo dei program- ancora oggi la loro utilità, bisogna che permettono mi per creare archivi compressi, tenere conto di come si è evolu- ovvero quei software che ci con- ta nel tempo la gestione dei file: di creare archivi sentono di “impacchettare” i file vent’anni fa la memoria di massa compressi che abbiamo sui nostri computer e più economica e diffusa era il flop- ridurre così lo spazio occupato sui py disk (il cosiddetto “dischetto”) salvando spazio dispositivi di archiviazione (cioè, da 1.4 megabyte. Attualmente, la le cosiddette memorie di massa e dimensione dei dischi ottici, del- sul pc. simili). le chiavette usb e degli hard disk N° 39 SETTEMBRE 2013 13 Guida QUATTRO SOFTWARE A CONFRONTO WinAce v2.69 PUNTI FORTI Versione standard 29$ (circa 22 €) Indispensabile per aprire i file in formato Valido Navigando online non è raro imbattersi .ace. in archivi compressi distribuiti in formato anche PUNTI DEBOLI se meno .ace. WinAce non si discosta molto, come funzionalità, dagli altri programmi: legge e L’Interfaccia utente è un po’ più ostica ri- conosciuto crea anche file .zip e legge (ma non crea) spetto agli altri programmi. file in formato .rar. Winrar v4.20 PUNTI FORTI Singola licenza 36 € Interfaccia semplice e immediata; sup- Winrar è la versione per Windows del pro- porta un buon numero formati in lettura È un altro gramma, ma esistono anche versioni per e scrittura.
    [Show full text]
  • Interface IDE No MSX1 O Melhor Dos Msxdev's Symbos
    N Ú M E R O 9 N O V E M B R O 2 0 0 6 R $ 4 , 0 0 IInntteerrffaaccee IIDDEE nnoo MMSSXX11 OO mmeellhhoorr ddooss MMSSXXDDeevv''ss SSyymmbbOOSS NOVO MSX PARTE V½ | MSX RIO 2006 | SVI-738 XPRESS | AMSTRAD CPC | SEXO! M S X F o r c e 9 fudebatorial: ““LLoouuccuurraa”” éé aa úúnniiccaa ppaallaavvrraa ppoossssíívveell ppaarraa eexxpplliiccaarr!! Em 2005, um solitário programador alemão foi convencido a portar o seu trabalho, feito inicialmente para o seu micro favorito (um Amstrad CPC), para outra plataforma baseada em Z80. E qual foi a escolhida? Sim, o MSX2. E assim foi feito. Qual era o trabalho dele? O SymbOS. Em maio de 2006, saiu o primeiro beta e... O resto vocês lêem na matéria que temos sobre esse fantástico e revolucionário ambiente operacional para MSX. E, em breve, deveremos ter surpresas quanto ao SymbOS, aqui no nosso zine. Curioso? Pois saiba que o nosso articulista, “especializado” no MSX-em-um- chip, resolveu escrever um artigo derradeiro, sobre as últimas novidades realmente interessantes que ele ficou sabendo. Será que compensa comprar um? E como não basta ler o MSX.org, mas também comentar, saiba a opinião dele a respeito. Usar IDE num MSX1? Você é doido? Sim, se você se guiar pelo nosso tutorial, você irá conseguir usar uma IDE num MSX1. E você será rotulado como doido. Fudeba (claro!) e doido. Mas todos nós somos doidos... Doidos pelo MSX! Citamos o concurso MSXDev no fudebatorial passado (número 8). E resolvemos então: Por que não falarmos sobre o MSXDev? Então, mandamos o Dr.
    [Show full text]
  • Les Extensions Des Fichiers
    OUVRIR TOUS TYPES DE DOCUMENTS Quels logiciels pour quels fichiers? Fichiers_Audio Fichiers_Images Fichiers_Compressés Fichiers_De_Données Fichiers_Exécutables Fichiers_Encodés Fichiers_Exécutables Fichiers_Paramètres Fichiers_Polices Fichiers_Systèmes Fichiers_Texte Fichiers_Web Fichiers_Vidéos Famille de fichiers Fichiers_Audio Extension Programmes associés .aac iTunes/VLC Media Player .acm Ouvert directement par Windows .aif Windows media player/Quick Time/iTunes .asf Windows media player/VLC Media Player .au Windows media player/Quick Time/Real Player .cdr Windows media player/iTune .iff Quick Time .m3u iTunes/VLC Media Player/Real Player/WinAmp .mid ou .midi Quick Time .mp3 iTunes/VLC Media Player/Real Player/WinAmp Windows media player .mpa iTunes/Windows media player/Quick Time .ra Real Player .ram Real Player .Wav iTunes/Windows media player/VLC Media Player .wma Windows media player/navigateur internet/WinAmp Famille de fichiers Fichiers_Images Extension Programmes associés .3dmf Qick Time .ai Adobe Illustrator .bmp Ouverture par Windows .drw Paint shop pro/Picture it .eps GIMP/Irfanview .gif Paint/Irfanview/la plus part des logiciels multimédia .jpg/jpeg La plus part des logiciels multimédia .pdf Acrobat Reader .png Paint/Vista/Acdsee... .psd Adobe Photoshop/ logiciels de traitement image .psp Paint shop pro/divers traitement image .tiff Paint/Irfanview/divers traitement image .svg Flash player/navigateur internet Famille de fichiers Fichiers_Compressés Extension Programmes associés .ace Izarc/Winace/Winrar .arc Izarc/Winace/Winzip
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 7,921.461 B1 Golchikov Et Al
    USOO7921461B1 (12) United States Patent (10) Patent No.: US 7,921.461 B1 Golchikov et al. (45) Date of Patent: Apr. 5, 2011 (54) SYSTEMAND METHOD FOR ROOTKIT S.8. 53 A. : SS Eyrdseter . et. al.. ............... 7 1. DETECTION AND CURE 2004/O181561 A1 9, 2004 Knox et al. 2005, 0021994 A1 1/2005 Barton et al. (75) Inventors: Andrey V. Golchikov, Moscow (RU); 2005/0278788 A1 12/2005. Jindal et al. Andrey V. Sobko, Moscow (RU) 2006/0031673 A1 2/2006 Becket al. .................... T13, 164 2006.0053270 A1* 3, 2006 Dunn et al. 712/13 (73) Assignee: Kaspersky Lab, ZAO, Moscow (RU) 2.99. A. : 29: RSU ca.tal. ... 2. (*) Notice: Subject to any disclaimer, the term of this 2008.0034429 A1 ck 2/2008 Schneider ....................... T26/23 patent is extended or adjusted under 35 OTHER PUBLICATIONS U.S.C. 154(b) by 1115 days. Simon Baker et al. "Checking Microsoft Windows(R) Systems for (21) Appl. No.: 11/623,364 Signs of Compromise', Oct. 28, 2005, version 1.3.4, pp. 1-18.* y x- - - 9 * cited by examiner (22) Filed: Jan. 16, 2007 Primary Examiner — Farid Homayoumehr (51) Int. Cl. Assistant Examiner — Michael Guirguis ge. 5.b4. 3:08: (74) Attorney, Agent, or Firm — Bardmesser Law Group GSB 23/00 (2006.01) (57) ABSTRACT (52) U.S. Cl. ................... 726/23: 726/24; 726/25; 713/2 ASVstem. method and computer program product for SVStem (58) Field of Classification Search .................... 726/26, ystem, computer program pr ySt. 726/23 25: 713/2 for detecting a rootkit on a computer having an operating S lication file f let h his s system, including a native application in ring 0 which, when ee appl1cauon Ille Ior complete searcn n1Story.
    [Show full text]
  • Command-Line Guide for Linux, Mac & Windows
    Command-line Guide for Linux, Mac & Windows info.nrao.edu /computing/guide/file-access-and-archiving/7zip/7z-7za-command-line-guide See also: File Archiving and Compression, Accessing and Sharing Files, Network Access, Windows Terminal Servers 7-Zip Versions 7-Zip is an Archive and File Management utility available in command-line versions for Linux/Mac, "P7Zip" (7z.exe), as well as for Windows, "7za" (7za.exe). Although its interface is deceptively simple, the command-line versions of 7ZIP are highly customizable archiving programs when used with the command parameters and switchesdescribed below. Windows users who want to use the command-line version should generate a Help Desk ticket to install the standalone 7za.exe version. To begin a session, open a terminal window. Invoke the version of 7Zip you are using by entering " 7z" for P7Zip (7z.exe), or "7za" for 7Zip for Windows (7za.exe) to start either the P7-Zip or 7za application prior to entering commands. Other than this program invocation command, all commands, parameters and switches are identical for all command-line versions. NOTE TO WINDOWS USERS: the following syntax examples begin by invoking the Linux command-line version, "7z". Please change the invocation to "7za" when applying these examples for use in 7-Zip for Windows. Command Line Syntax The general command line syntax begins by invoking the version of 7Zip you are using: "7z" for P7Zip (7z.exe) users or "7za" for 7Zip for Windows (7za.exe) users followed by the command and parameters: "command" "switches" "full_path_archive_name" "full_path_file_name" Eg; 7z a -p 7Zip_Archive Test_file.txt creates a 7z formatted archive named 7Zip_Archive that is protected with a password , then adds a file named test_file.txt to the archive.
    [Show full text]
  • 3. PE Portable Executable: a Look
    1. Introduction Anti-virus software has in true sense evolved a lot in these years. Time has gone where there were anti-virus software which used to detect the malwares or viruses based on scanning the executable hex`s dump and finding an appropriate string (also called as String based detection). Nowadays, more and more advanced technologies are been incorporated in detecting malwares for example, advanced heuristics, signature and its variants based, sandboxing, behavioral based approach etc. Now many AV not only offers deep scan option which scans almost all files stored in secondary memory but also scans offsets in the memory (also called as opcodes). But, if we look at the real-time statistics by Bit Defender AV[1] , we can come to know that each hour there are new malwares and viruses reported. This is shown in the figure below. Figure [1] Real-time virus reporting (Dated: 29/09/13) From the stats above one may have a question rising in their mind that nowadays the AVs scans each and every files even that present in the opcodes of the memory then why there is drastic spread of malwares as compared to last decade? The answer to these is that very smart people whom we call Crackers/Hackers have found the way to bypass these AVs. Page 1 They know the very detail about how the AV works and which AV have which type of detection capabilities for example if it scans based on string detection or if it scans based on sandboxing approach. We sometimes fail to remember that they (Crackers and Hackers) too have AV scanners from which they may scan their newly developed malware and viruses and can easily spread via plethora of medium, mostly the Internet.
    [Show full text]
  • Installation and Configuration
    6 Jun 2007 Drupal Handbook Table of Contents Installation and configuration . 1 System requirements . 2 Client System Requirements . 3 Javascript . 3 CSS . 4 RSS . 4 Browser Specifics . 4 Browser Popularity . 4 Known Problems . 4 Validation . 4 Caveats . 4 HOWTO: Server requirement recommendations for your consulting clients .. 5 Message to the Client . 5 Benchmark . 6 What Drupal.org runs on . 6 Requirements - older versions . 6 Installing Drupal, modules and themes . 8 Installing Drupal . 8 Formatted Drupal 5.x Installation instructions for better readability .. 13 Installation . 13 Changes . 14 Requirements . 14 Optional Requirements . 14 Installation . 14 Drupal Administration . 16 Customizing your theme(s) . 16 Multi-site configuration . 16 More Information . 17 Formatted Drupal 4.7.x Installation instructions for better readability .. 17 Installation . 17 REQUIREMENTS . 18 SERVER CONFIGURATION . 18 OPTIONAL COMPONENTS . 18 INSTALLATION . 19 1. DOWNLOAD DRUPAL . 19 2. CREATE THE DRUPAL DATABASE . 19 3. LOAD THE DRUPAL DATABASE SCHEME . 20 4. CONNECTING DRUPAL . 20 5. CONFIGURE DRUPAL . 21 6. CRON TASKS . 22 DRUPAL ADMINISTRATION . 22 CUSTOMIZING YOUR THEME(S) . 22 UPGRADING . 23 MORE INFORMATION . 23 i Drupal Handbook 6 Jun 2007 10 minute install using PuTTY SSH/Telnet client .. 23. How I installed Drupal: The Eightfold Way . 24. Installing virtual hosts for Drupal sites and subsites .. 25. Mac OS X-specific guidelines . 26. Important notes for MySQL install: . 27. HOWTO: Create a local server environment for drupal using MAMP .. 28. HOWTO: Installing PostgreSQL and MySQL on the same Mac OS X machine .. 29. Installing Drupal on Mac OS X 10.4 Tiger . 30. Installing and Configuring MySQL . 30. Sending mail . 32.
    [Show full text]
  • Groove Gfs Browser Helper Grooveshellextensions.Dll
    Groove gfs browser helper grooveshellextensions.dll Continue Equipment Info maakt gebruik van biscuits Equipment Information onderdeel van DPG Media. Onze sites en applications gebruiken cookies, JavaScript en vergelijkbare technologie onder andere om je een optimale gebruikerservaring te bieden. Ook kunnen we hierdoor het gedrag van bezoekers vastleggen en analyseren, en deze informatie toevoegen aan bezoekersprofielen. Biscuits kunnen worden gebruikt om Op Equipment Advertising information those Tonen en artikelen aan te bevelen die aansluiten op je interesses. Ook derden kunnen je internetgedrag volgen, zoals bijvoorbeeld het geval - is a bij built-in video van YouTube. Biscuits kunnen gebruikt worden om op sites van derden relevantenties te tonen. Dankzij cookies van derde partijen kun je daarnaast informatie delen via social media, zoals Twitter en Facebook. Meer informatie hierover vind je op hardware.info/extra/cookies. Om pagina's op Hardware Info te kunnen bekijken, moet je de cookies accepteren door op 'Ja, ik accepteer cookies' te klikken. The original GrooveShellExtensions.dll file is a software component of Microsoft Office 2007 at Microsoft. GrooveShellExtensions.dll is an addition to Microsoft Browser Helper Object (BHO) for Microsoft Internet Explorer. Known as Groove Folder Sync, this allowed Office 2007 users to access Groove files in the IE web browser window and helped synchronize updated files. It included a contextual menu. His location was C: Files of the Microsoft Office-Office12-GrooveShellExtensions.dll. No reference to Office14 or above can be found, indicating that it has not been installed since Office 2010 or later. The Groove in Office 2007 product allows users to collaborate by sharing workspaces synchronized through relay servers with any other user they're invited to join the workspace.
    [Show full text]
  • Qualitative and Quantitative Evaluation of Software Packers
    Qualitative and Quantitative Evaluation of Software Packers Mar´ıa Bazus,´ Ricardo J. Rodr´ıguez, Jose´ Merseguer « All wrongs reversed [email protected] ¸ @RicardoJRdez ¸ www.ricardojrodriguez.es Department of Computer Science and Systems Engineering University of Zaragoza, Spain December 12, 2015 NoConName 2015 Barcelona (Spain) $whoami Ph.D. on Comp. Sci. (Univ. of Zaragoza, Spain) (2013) Assistant Professor at University of Zaragoza Performance analysis on critical, complex systems Secure Software Engineering Advance malware analysis RFID/NFC Security Not prosecuted ^¨ Speaker at NcN, HackLU, RootedCON, STIC CCN-CERT, HIP, MalCON, HITB. M. Bazus,´ R.J. Rodr´ıguez, J. Merseguer Qualitative and Quantitative Evaluation of Software Packers NcN 2015 2 / 39 Agenda 1 Introduction 2 Contributions and Related Work 3 Previous Concepts 4 Software Protection Taxonomy 5 Software Packers Under Study 6 Qualitative and Quantitative Evaluation Qualitative Evaluation Quantitative Evaluation 7 Conclusions and Future Work M. Bazus,´ R.J. Rodr´ıguez, J. Merseguer Qualitative and Quantitative Evaluation of Software Packers NcN 2015 3 / 39 Agenda 1 Introduction 2 Contributions and Related Work 3 Previous Concepts 4 Software Protection Taxonomy 5 Software Packers Under Study 6 Qualitative and Quantitative Evaluation Qualitative Evaluation Quantitative Evaluation 7 Conclusions and Future Work M. Bazus,´ R.J. Rodr´ıguez, J. Merseguer Qualitative and Quantitative Evaluation of Software Packers NcN 2015 4 / 39 RE uses: legitimate and illegitimate X Find software bugs X Get interoperability with legacy systems X Detect malicious software X Detect vulnerabilities to create/spread malware X Obtain (or avoid) software license duplication Introduction (I): Reverse Engineering WTF? To analyse a binary program with machine-code vision Types of analysis: Static analysis( + not executed, * all paths explored) Dynamic analysis( * truly executed, + but just one path explored!) M.
    [Show full text]