2020 Kansas Permit Program Review Final Report

Total Page:16

File Type:pdf, Size:1020Kb

2020 Kansas Permit Program Review Final Report Program Review of KDHE’s Air Permitting Programs Conducted: August 2020 U.S. EPA, Region 7 Air Permitting and Standards Branch Air and Radiation Division Kansas Bureau of Air Program Review Report Contents Contents A. INTRODUCTION .................................................................................................................. 1 B. SUMMARY of FINDINGS and CONCLUSIONS ................................................................ 2 C. CATEGORIZED COMMENTS ............................................................................................. 3 1. General ................................................................................................................................. 3 a. Staffing ......................................................................................................................... 3 b. Other General Observations ......................................................................................... 4 2. Construction Permitting ....................................................................................................... 5 a. Assuring Healthy Air Quality ...................................................................................... 5 b. Other Construction Permitting Observations ............................................................... 6 3. NSPS / NESHAP ................................................................................................................. 6 4. Operating Permits ................................................................................................................ 7 a. Title V Fees .................................................................................................................. 7 b. Other Title V Observations........................................................................................... 9 ATTACHMENT A: List of Files Reviewed ................................................................................ 11 ATTACHMENT B: Completed NSR Questionnaire .................................................................. 15 ATTACHMENT C: Completed Title V Questionnaire ............................................................. 181 ATTACHMENT D: Fee Attachment.......................................................................................... 224 ATTACHMENT E: Entrance Meeting Attendees ..................................................................... 227 ATTACHMENT F: Exit Meeting Attendees ............................................................................. 228 ATTACHMENT G: KDHE’s Response Letter Regarding the Draft Report ............................ 229 KS/KDHE AIR BUREAU AIR PERMITTING PROGRAMS PROGRAM REVIEW REPORT A. INTRODUCTION The comprehensive review of Kanas Department of Health and Environment’s (KDHE’s) air permitting programs was part of the Environmental Protection Agency (EPA) Region 7’s efforts to fulfill the EPA’s oversight responsibility to ensure adequate implementation of the Clean Air Act. The overall scope of this review included assessment of the state agency’s performance regarding: 1) Prevention of Significant Deterioration (PSD)/New Source Review (NSR) construction permitting, 2) Title V operating permitting, 3) synthetic minor permitting [construction and/or operating], 4) New Source Performance Standards (NSPS) and National Emission Standards for Hazardous Air Pollutants (NESHAP) determinations, 5) the establishment of enforceable permit conditions and 6) the use of Title V operating permit fees. The review was initiated by a letter to the department dated March 4, 2020, with a request for separate lists of construction and Class II operating permits issued over the previous two years and a request that questionnaires be completed and returned to the regional office prior to the on- site review of files. We also requested that the KDHE fill out Attachment C from the March 27, 2018 guidance “Program and Fee Evaluation Strategy and Guidance for 40 CFR Part 70.” In March, both the KDHE and the EPA employees started working from home to mitigate the spread of COVID-19. The EPA and the KDHE discussed postponing the program review. The decision was made to proceed with the program review from remote work locations. Therefore, this review was accomplished using video meetings and reviewing electronic versions of files. The program review entrance meeting was held virtually on July 28, 2020. Attachment E list the attendees of the meeting. An exit meeting was held virtually on August 12, 2020. At this meeting we discussed our initial findings and discussed the next steps for the review. Attachment F list the attendees of that meeting. The following Region 7 staff participated in the review of files: Ward Burns, Bob Cheever, Keith Johnson, David Peter, Pat Scott, and Bob Webber. A total of 92 source files were reviewed regarding the above-mentioned actions (see Appendix A). The review team appreciated the assistance of the KDHE staff in providing records and financial information, and answering questions related to the program review. 1 B. SUMMARY of FINDINGS and CONCLUSIONS On balance, the department runs adequate construction and operating permit programs. In general, we found that all the projects we reviewed completed the proper level of permitting with the only major issues being 1) spending Title V fees on non-Title V activities and 2) the lack of verifying that construction projects would not interfere with the attainment or maintenance of any ambient air quality standard. The following observations are in no particular order and most are discussed in more detail later in the report. Observations The KDHE does appear to be collecting adequate funds to operate the Title V program. However, Title V funds are being used to fund other non-Title V air program activities. No air dispersion modeling or other means is used to assure that new sources or modifications will not interfere with the attainment or maintenance of any ambient air quality standard except for when PSD applies. The KDHE staff have the technical ability to follow the requirements of 40 CFR Part 51 Appendix W. The KDHE’s electronic records systems, especially the new Kansas Environmental Information Management System (KEIMS) system, seem to work well and are extremely useful with employees teleworking. EPA was given access to KEIMS to retrieve records for the file reviews. The system seems easy to use and we had no issues accessing the records stored in the system. However, we did need to take some care to avoid accidentally downloading confidential business information. We did not observe any incorrect NSPS/NESHAP applicability/non-applicability determinations. However, the files do not contain much documentation which support NSPS/NESHAP decisions. The application forms seemed well designed to collect information needed to determine NSPS/NESHAP applicability. In some cases, the description in the permit or the chronology log provided explanations for determinations. K.A.R. 28-19-204(a) requires construction permits and Class I and Class II operating permits to have the opportunity for the public to participate in the permit development or modification process prior to issuance. The regulation appears to require public notice for all these permits. However, construction and Class II permits are being issued without public notice. The KDHE is following an internal guidance on which permits should be placed on public notice. Kansas does not publish their final Class I permits online. This is not a requirement, but they are the only state in the Region that does not post their final permits. 2 Kansas has one local agency that issues permits on behalf of the state and that agency. The KDHE stated that the KDHE reviews all documents and draft permits before issuance (except for expeditated permits and approvals). The files did not contain any record of these reviews. Most permit limits appeared to be practically enforceable. However, we did note a few cases of 12-month rolling source-wide tons per year blanket emission limits. Minor construction permits and Class II operating permits did not have a statement of basis or fact sheets. In some cases, a chronology log or the permit description did a good job documenting permit decisions. Also, Title V permits renewal’s statement of basis only address renewal issues and facility changes. The KDHE has a very low Title V backlog and issued construction permit timely. No variances are issued. The KDHE uses standardized spreadsheets they created to calculate emissions from grain elevators. This eased the review of grain elevator emission calculations. The KDHE was behind on entering Best Available Control Technology (BACT) decisions into the RBLC database. They have been working to catch up on this backlog and expect to be caught up by the end of September 2020. The KDHE does a great job with early engagement with the EPA on Prevention of Significant Deterioration (PSD) permits including providing EPA with the modeling protocols and inviting the EPA to preapplication meetings. C. CATEGORIZED COMMENTS 1. General a. Staffing The KDHE air permitting program has a total of 21 staff positions with 19 of the positions currently filled. This includes a Section Chief, three Unit Supervisors, two clerical staff and 13 permit writers and database staff. The average length of NSR permitting experience is over 5 years. In 2017, the State of Kansas implemented a market adjustment on the salary of engineers for both Engineers-In-Training and Professional
Recommended publications
  • Next Generation Web Scanning Presentation
    Next generation web scanning New Zealand: A case study First presented at KIWICON III 2009 By Andrew Horton aka urbanadventurer NZ Web Recon Goal: To scan all of New Zealand's web-space to see what's there. Requirements: – Targets – Scanning – Analysis Sounds easy, right? urbanadventurer (Andrew Horton) www.morningstarsecurity.com Targets urbanadventurer (Andrew Horton) www.morningstarsecurity.com Targets What does 'NZ web-space' mean? It could mean: •Geographically within NZ regardless of the TLD •The .nz TLD hosted anywhere •All of the above For this scan it means, IPs geographically within NZ urbanadventurer (Andrew Horton) www.morningstarsecurity.com Finding Targets We need creative methods to find targets urbanadventurer (Andrew Horton) www.morningstarsecurity.com DNS Zone Transfer urbanadventurer (Andrew Horton) www.morningstarsecurity.com Find IP addresses on IRC and by resolving lots of NZ websites 58.*.*.* 60.*.*.* 65.*.*.* 91.*.*.* 110.*.*.* 111.*.*.* 113.*.*.* 114.*.*.* 115.*.*.* 116.*.*.* 117.*.*.* 118.*.*.* 119.*.*.* 120.*.*.* 121.*.*.* 122.*.*.* 123.*.*.* 124.*.*.* 125.*.*.* 130.*.*.* 131.*.*.* 132.*.*.* 138.*.*.* 139.*.*.* 143.*.*.* 144.*.*.* 146.*.*.* 150.*.*.* 153.*.*.* 156.*.*.* 161.*.*.* 162.*.*.* 163.*.*.* 165.*.*.* 166.*.*.* 167.*.*.* 192.*.*.* 198.*.*.* 202.*.*.* 203.*.*.* 210.*.*.* 218.*.*.* 219.*.*.* 222.*.*.* 729,580,500 IPs. More than we want to try. urbanadventurer (Andrew Horton) www.morningstarsecurity.com IP address blocks in the IANA IPv4 Address Space Registry Prefix Designation Date Whois Status [1] -----
    [Show full text]
  • Learning HTTP 2.Pdf
    L e a r n i n g H T T P/2 A PRACTICAL GUIDE FOR BEGINNERS Stephen Ludin & Javier Garza Learning HTTP/2 A Practical Guide for Beginners Stephen Ludin and Javier Garza Beijing Boston Farnham Sebastopol Tokyo Learning HTTP/2 by Stephen Ludin and Javier Garza Copyright © 2017 Stephen Ludin, Javier Garza. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://oreilly.com/safari). For more information, contact our corporate/insti‐ tutional sales department: 800-998-9938 or [email protected]. Acquisitions Editor: Brian Anderson Indexer: Wendy Catalano Editors: Virginia Wilson and Dawn Schanafelt Interior Designer: David Futato Production Editor: Shiny Kalapurakkel Cover Designer: Karen Montgomery Copyeditor: Kim Cofer Illustrator: Rebecca Demarest Proofreader: Sonia Saruba June 2017: First Edition Revision History for the First Edition 2017-05-14: First Release 2017-10-27: Second Release See http://oreilly.com/catalog/errata.csp?isbn=9781491962442 for release details. The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Learning HTTP/2, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc. While the publisher and the authors have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the authors disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Comparison of Web Server Software from Wikipedia, the Free Encyclopedia
    Create account Log in Article Talk Read Edit ViewM ohrisetory Search Comparison of web server software From Wikipedia, the free encyclopedia Main page This article is a comparison of web server software. Contents Featured content Contents [hide] Current events 1 Overview Random article 2 Features Donate to Wikipedia 3 Operating system support Wikimedia Shop 4 See also Interaction 5 References Help 6 External links About Wikipedia Community portal Recent changes Overview [edit] Contact page Tools Server Developed by Software license Last stable version Latest release date What links here AOLserver NaviSoft Mozilla 4.5.2 2012-09-19 Related changes Apache HTTP Server Apache Software Foundation Apache 2.4.10 2014-07-21 Upload file Special pages Apache Tomcat Apache Software Foundation Apache 7.0.53 2014-03-30 Permanent link Boa Paul Phillips GPL 0.94.13 2002-07-30 Page information Caudium The Caudium Group GPL 1.4.18 2012-02-24 Wikidata item Cite this page Cherokee HTTP Server Álvaro López Ortega GPL 1.2.103 2013-04-21 Hiawatha HTTP Server Hugo Leisink GPLv2 9.6 2014-06-01 Print/export Create a book HFS Rejetto GPL 2.2f 2009-02-17 Download as PDF IBM HTTP Server IBM Non-free proprietary 8.5.5 2013-06-14 Printable version Internet Information Services Microsoft Non-free proprietary 8.5 2013-09-09 Languages Jetty Eclipse Foundation Apache 9.1.4 2014-04-01 Čeština Jexus Bing Liu Non-free proprietary 5.5.2 2014-04-27 Galego Nederlands lighttpd Jan Kneschke (Incremental) BSD variant 1.4.35 2014-03-12 Português LiteSpeed Web Server LiteSpeed Technologies Non-free proprietary 4.2.3 2013-05-22 Русский Mongoose Cesanta Software GPLv2 / commercial 5.5 2014-10-28 中文 Edit links Monkey HTTP Server Monkey Software LGPLv2 1.5.1 2014-06-10 NaviServer Various Mozilla 1.1 4.99.6 2014-06-29 NCSA HTTPd Robert McCool Non-free proprietary 1.5.2a 1996 Nginx NGINX, Inc.
    [Show full text]
  • Delivering Web Content
    Delivering web content GET /rfc.html HTTP/1.1 Host: www.ie.org GET /rfc.html HTTP/1.1 User-agent: Mozilla/4.0 Host: www.ie.org GET /rfc.html HTTP/1.1 User-agent: Mozilla/4.0 Host: www.ie.org User-agent: Mozilla/4.0 GET /rfc.html HTTP/1.1 Host: www.ie.org GET /rfc.html HTTP/1.1 User-agent: Mozilla/4.0 Host: www.ie.org User-agent: Mozilla/4.0 CSCI 470: Web Science • Keith Vertanen • Copyright © 2011 Overview • HTTP protocol review – Request and response format – GET versus POST • Stac and dynamic content – Client-side scripIng – Server-side extensions • CGI • Server-side includes • Server-side scripng • Server modules • … 2 HTTP protocol • HyperText Transfer Protocol (HTTP) – Simple request-response protocol – Runs over TCP, port 80 – ASCII format request and response headers GET /rfc.html HTTP/1.1 Host: www.ie.org Method User-agent: Mozilla/4.0 Header lines Carriage return, line feed indicates end of request 3 TCP details MulIple Persistent Persistent connecIons and connecIon and connecIon and sequenIal requests. sequenIal requests. pipelined requests. 4 HTTP request GET /rfc.html HTTP/1.1 Host: www.ie7.org User-agent: Mozilla/4.0 POST /login.html HTTP/1.1 Host: www.store.com User-agent: Mozilla/4.0 Content-Length: 27 Content-Type: applicaon/x-www-form-urlencoded userid=joe&password=guessme 5 HTTP response • Response from server – Status line: protocol version, status code, status phrase – Response headers: extra info – Body: opIonal data HTTP/1.1 200 OK Date: Thu, 17 Nov 2011 15:54:10 GMT Server: Apache/2.2.16 (Debian) Last-Modified: Wed,
    [Show full text]
  • The Weblate Manual Versão 4.2.1 Michal Čihař
    The Weblate Manual Versão 4.2.1 Michal Čihař 21 ago., 2020 Documentação de utilizador 1 Documentação de utilizador 1 1.1 Básico do Weblate .......................................... 1 1.2 Registo e perfil de utilizador ..................................... 1 1.3 Traduzir usando o Weblate ...................................... 10 1.4 Descarregar e enviar traduções .................................... 20 1.5 Verificações e correções ....................................... 22 1.6 Searching ............................................... 38 1.7 Application developer guide ..................................... 42 1.8 Fluxos de trabalho de tradução .................................... 62 1.9 Frequently Asked Questions ..................................... 66 1.10 Formatos de ficheiros suportados ................................... 73 1.11 Integração de controlo de versões ................................... 91 1.12 Weblate’s REST API ......................................... 98 1.13 Cliente Weblate ............................................ 137 1.14 Weblate’s Python API ........................................ 141 2 Documentação de administrador 143 2.1 Configuration instructions ....................................... 143 2.2 Weblate deployments ......................................... 195 2.3 Upgrading Weblate .......................................... 196 2.4 Fazer backup e mover o Weblate ................................... 200 2.5 Autenticação ............................................. 205 2.6 Controlo de acesso .........................................
    [Show full text]
  • The Buildroot User Manual I
    The Buildroot user manual i The Buildroot user manual The Buildroot user manual ii Contents I Getting started 1 1 About Buildroot 2 2 System requirements 3 2.1 Mandatory packages.................................................3 2.2 Optional packages...................................................4 3 Getting Buildroot 5 4 Buildroot quick start 6 5 Community resources 8 II User guide 9 6 Buildroot configuration 10 6.1 Cross-compilation toolchain............................................. 10 6.1.1 Internal toolchain backend.......................................... 11 6.1.2 External toolchain backend.......................................... 11 6.1.2.1 External toolchain wrapper.................................... 12 6.2 /dev management................................................... 13 6.3 init system....................................................... 13 7 Configuration of other components 15 8 General Buildroot usage 16 8.1 make tips....................................................... 16 8.2 Understanding when a full rebuild is necessary................................... 17 8.3 Understanding how to rebuild packages....................................... 18 8.4 Offline builds..................................................... 18 8.5 Building out-of-tree.................................................. 18 The Buildroot user manual iii 8.6 Environment variables................................................ 19 8.7 Dealing efficiently with filesystem images...................................... 19 8.8 Graphing the dependencies
    [Show full text]
  • Python Guide Documentation Release 0.0.1
    Python Guide Documentation Release 0.0.1 Kenneth Reitz fev 10, 2019 Sumário 1 Começando com Python 3 1.1 Picking a Python Interpreter (3 vs 2)...................................3 1.2 Instalando Python corretamente......................................6 1.3 Instalando Pyhton 3 no Mac OS X....................................7 1.4 Installing Python 3 on Windows..................................... 10 1.5 Installing Python 3 on Linux....................................... 11 1.6 Installing Python 2 on Mac OS X.................................... 13 1.7 Installing Python 2 on Windows..................................... 15 1.8 Installing Python 2 on Linux....................................... 17 1.9 Pipenv & Virtual Environments..................................... 18 1.10 Lower level: virtualenv.......................................... 21 2 Ambientes de desenvolvimento em Python 25 2.1 Seu ambiente de desenvolvimento.................................... 26 2.2 Further Configuration of pip and Virtualenv............................... 32 3 Escrevendo Ótimos códigos em Python 35 3.1 Estruturando seu projeto......................................... 35 3.2 Estilo de código............................................. 47 3.3 Lendo Ótimos Códigos.......................................... 59 3.4 Documentação.............................................. 60 3.5 Testando seu código........................................... 64 3.6 Logging.................................................. 69 3.7 Common Gotchas...........................................
    [Show full text]
  • Migration from Windows to Linux for a Small Engineering Firm "A&G Associates"
    Rochester Institute of Technology RIT Scholar Works Theses 2004 Migration from Windows to Linux for a small engineering firm "A&G Associates" Trimbak Vohra Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Vohra, Trimbak, "Migration from Windows to Linux for a small engineering firm A&G" Associates"" (2004). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Migration from Windows to Linux for a Small Engineering Firm "A&G Associates" (H ' _T ^^L. WBBmBmBBBBmb- Windows Linux by Trimbak Vohra Thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Information Technology Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Date: December 2, 2004 12/B2/28B2 14:46 5854752181 RIT INFORMATION TECH PAGE 02 Rochester Institute of Teehnology B. Thomas Golisano College of Computing and Information Sciences Master of Science in Information Technology Thesis Approval Form Student Name: Trimbak Vohra Thesis Title: Migration from Windows to Unux for a Small Engineeriog Firm "A&G Associates" Thesis Committee Name Signature Date Luther Troell luther IrQell, Ph.D ttL ",j7/Uy Chair G. L. Barido Prof. ~~orge Barido ? - Dec:. -cl7' Committee Member Thomas Oxford Mr. Thomas OxfocQ \ 2. L~( Q~ Committee Member Thesis Reproduction Permission Form Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Master of Science in Information Technology Migration from Windows to Linux for a Small Engineering Firm "A&G Associates" I,Trimbak Vohra, hereby grant permission to the Wallace Library of the Rochester Institute of Technology to reproduce my thesis in whole or in part.
    [Show full text]
  • Testing Security for Internet of Things a Survey on Vulnerabilities in IP Cameras
    Testing Security for Internet of Things A Survey on Vulnerabilities in IP Cameras Kim Jonatan Wessel Bjørneset Master’s Thesis Autumn 2017 Testing Security for Internet of Things Kim Jonatan Wessel Bjørneset 23rd November 2017 Abstract The number of devices connected to the Internet is growing rapidly. Many of these devices are referred to as IoT-devices. These are easy to connect and access over the Internet. Many of these, though, come with security flaws and vulnerabilities which make them easy targets for attackers. This is something that has been reviewed a lot in media lately. An IP camera is a typical example of an IoT-device, and is used for various purposes, e.g., in industrial surveillance, home surveillance, baby monitors, elderly monitoring, social interaction, movement tracking, etc. This kind of device is often powerful, both in computing and bandwidth, which makes them very attractive for attackers as they can abuse them in additional attacks, such as distributed denial of service (DDoS) attacks. This thesis investigates and presents a few methods used to find and hack IoT-devices. These methods we then apply to IP cameras, where the focus is to examine the impact of these attacks on security and privacy, and to what extent the normal end user can affect (strengthen/weaken) the security. The methods used are based on previously done attacks on IP cameras together with a few other tools used in ethical hacking. The results of the research show that there are vulnerabilities in many of these devices, and that these vulnerabilities have different impacts on security.
    [Show full text]
  • A Tiny Web Server on Embedded System
    A Tiny Web Server on Embedded System Lain-Jinn Hwang∗, Tang-Hsun Tu†, Tzu-Hao Lin‡, I-Ting Kuo§, and Bing-Hong Wang¶ Department of Computer Science and Information Engineering Tamkang University, Tamshui, 251, Taipei, Taiwan ∗E-mail: [email protected] †E-mail: war3 [email protected] ‡E-mail: [email protected] §E-mail: [email protected] Abstract [3] has only 64MB RAM and 100MIPS and SiS550 [4] has 128MB RAM and 400MIPS. When we need to build a web Bhttpd (BBS httpd) is a tiny web server for embedded server on these enviroment we have to retrench the size and system, the entire size it consumed is 14KB only. Bhttpd is simplify unnecessary functionality [5]. Usually, the web HTTP/1.1 compliance, GET/POST method, keep-alive con- server built on embedded system is for personal usage. For nection and flow control support. For computer program- example, we can configure the router or switch network set- mer, Bhttpd is easily for reuse because of its structure is ting by browser because there is web server built on it, and simple. In this paper, we introduce the means of bundling we may not often change the setting. Briefly, what we need Bhttpd to make a new web page, by just adding the re- to used on embedded system is a light, small and fit web quired functions. This makes the static web page develop- server. ment on embedded system not only simple but also efficient Usually, web server mean two things, one is a computer than other web server.
    [Show full text]
  • SOPHOS IPS Signature Update Release Notes
    SOPHOS IPS Signature Update Release Notes Version : 9.16.71 Release Date : 30th January 2020 IPS Signature Update Release Information Upgrade Applicable on IPS Signature Release Version 9.16.70 CR250i, CR300i, CR500i-4P, CR500i-6P, CR500i-8P, CR500ia, CR500ia-RP, CR500ia1F, CR500ia10F, CR750ia, CR750ia1F, CR750ia10F, CR1000i-11P, CR1000i-12P, CR1000ia, CR1000ia10F, CR1500i-11P, CR1500i-12P, CR1500ia, CR1500ia10F Sophos Appliance Models CR25iNG, CR25iNG-6P, CR35iNG, CR50iNG, CR100iNG, CR200iNG/XP, CR300iNG/XP, CR500iNG- XP, CR750iNG-XP, CR2500iNG, CR25wiNG, CR25wiNG-6P, CR35wiNG, CRiV1C, CRiV2C, CRiV4C, CRiV8C, CRiV12C, XG85 to XG450, SG105 to SG650 Upgrade Information Upgrade type: Automatic Compatibility Annotations: None Introduction The Release Note document for IPS Signature Database Version 9.16.71 includes support for the new signatures. The following sections describe the release in detail. New IPS Signatures The Sophos Intrusion Prevention System shields the network from known attacks by matching the network traffic against the signatures in the IPS Signature Database. These signatures are developed to significantly increase detection performance and reduce the false alarms. Report false positives at [email protected], along with the application details. January 2020 Page 2 of 65 IPS Signature Update This IPS Release includes Six Hundred and Thirteen(613) signatures to address Five Hundred(500) vulnerabilities. New signatures are added for the following vulnerabilities: Name CVE–ID Category Severity BROWSER-CHROME Google Chrome
    [Show full text]