Metadefender Core V4.15.2

Total Page:16

File Type:pdf, Size:1020Kb

Metadefender Core V4.15.2 MetaDefender Core v4.15.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 11 Key Features of MetaDefender Core 12 1. Quick Start with MetaDefender Core 13 1.1. Installation 13 Operating system invariant initial steps 13 Basic setup 14 1.1.1. Configuration wizard 14 1.2. License Activation 19 1.3. Process Files with MetaDefender Core 19 2. Installing or Upgrading MetaDefender Core 20 2.1. Recommended System Requirements 20 System Requirements For Server 20 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing MetaDefender 24 Installation 24 Installation notes 24 2.2.1. Installing Metadefender Core using command line 25 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 27 2.4. MetaDefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 34 2.5. Performance and Load Estimation 35 What to know before reading the results: Some factors that affect performance 35 How test results are calculated 36 Test Reports 36 Performance Report - Multi-Scanning On Linux 36 Performance Report - Multi-Scanning On Windows 40 2.6. Special installation options 43 Use RAMDISK for the tempdirectory 43 3. Configuring MetaDefender Core 47 3.1. Management Console 47 3.1.1. Password Recovery 48 3.2. MetaDefender Configuration 55 3.2.1. Startup Core Configuration 56 3.2.2. Startup Node Configuration 60 3.2.3 Nginx related configuration (for API Rate Limiting) 63 3.3. User management 65 3.3.1. Users and groups 65 3.3.2. Roles 70 3.3.3. User directories 72 3.3.4. Active Directory attributes 80 3.3.5. Change user password 83 3.4. Update settings 84 Internet 85 Folder 86 Manual 86 3.5. Clean up scan database 87 Technology Note: 87 3.6. Policy configuration 87 3.6.1. How MetaDefender Core policies work 88 3.6.2. Workflow template configuration 88 3.6.3. Security zone configuration 103 3.6.4. Workflow rule configuration 103 3.6.5. Quarantine 108 3.7. Logging 116 3.7.1. Configuration 116 3.7.2. Debug logging 117 3.8 Security settings on web console 117 3.8.1 Enabling HTTPS 118 3.8.2 Session timeout 121 3.9. Configuring proxy settings 122 How can I set proxy server for the product 122 3.10. External Scanners And Post Actions 123 External Scanners 123 Post Actions 126 3.11. Yara rule sources 128 3.12. Configuring mail settings 129 Server configuration 130 User authentication 131 4. Process files with MetaDefender Core 132 Process Files via REST API 132 Process Files via Web Interface 133 Choose what to process and how 133 Start processing 134 Progress of scanning 134 5. Data Sanitization 135 6. Operating MetaDefender Core 137 6.1. Dashboard 137 Overview page 137 Scan history 138 Quarantine 138 Update history 138 6.2. Inventory Management 139 Certificates 139 Nodes 142 Skip by hash 144 Technologies 146 6.3. Regular Maintenance 154 Checking for Upgrades 154 Checking Engines / Databases Health 154 6.4 Import/Export configuration 154 Export 155 Import 155 Note 155 7. MetaDefender Core Developer Guide 156 How to Interact with MetaDefender Core using REST 156 File scan process 156 7.1. MetaDefender API 156 7.1.1. Sessions 157 7.1.2. Licensing 160 7.1.3. Processing files 164 7.1.4. Processing files in batch 186 7.1.5. Download Sanitized Files 194 7.1.6. Vulnerability Info In Processing Result 196 7.1.7. Skip by hash 199 7.1.8. Get version of components 205 7.1.9. Configuration related APIs 208 7.1.10. Yara 330 7.2. MetaDefender API Code Samples 337 7.3. Deployment automation support 338 Installation 339 Initialization 340 Configuration 344 8. Advanced MetaDefender Deployment 345 8.1. Scripted license management 345 Requirements 345 Activation steps 345 Deactivation steps 347 Important notes 348 8.2. Multi-node deployment 348 Setting up several Metadefender Core nodes 348 8.3. Using external load-balancer 351 8.3.1. HTTP(S) - Layer 7 load balancing 352 8.3.2. DNS load balancing 354 8.4. Cloud Deployment 357 8.4.1. AWS Deployment 357 9. Troubleshooting MetaDefender Core 378 Installation issues 378 Issues with nodes 378 Where are the Metadefender Core logs located? 378 How can I create a support package? 378 Issues under high load 378 How to Create Support Package? 379 Creating the package on Linux 379 Creating the package on Windows 379 Content of the created package 380 How to Read the Metadefender Core Log? 380 Files 380 Format 380 Severity levels of log entries 381 Inaccessible Management Console 381 How to detect 381 Solution 381 Possible Issues on Nodes 382 Q. Node detected 3rd party product on system 382 Q. There is no scan node connected 382 Too Many Sockets or Files Open 383 How to detect 383 Solution 383 Too Many TIME_WAIT Socket 384 How to detect 384 Solution 384 Technical Insights 385 10. Release notes 386 10.1. Archived release notes 386 Version v4.15.1 386 Version v4.15.0 387 Version v4.14.3 388 Version v4.14.2 389 Version v4.14.1 389 Version v4.14.0 389 Version v4.13.2 390 Version v4.13.1 390 Version v4.13.0 390 Version v4.12.2 391 Version v4.12.1 391 Version v4.12.0 391 Version v4.11.3 392 Version v4.11.2 392 Version v4.11.1 392 Version v4.11.0 393 Version v4.10.2 393 Version v4.10.1 393 Version v4.10.0 394 Version 4.9.1 395 Version 4.9.0 395 Version 4.8.2 396 Version 4.8.1 396 Version 4.7.2 397 Version 4.7.1 397 Version 4.6.3 398 Version 4.6.2 398 Version 4.6.1 399 Version 4.6.0 399 Version 4.5.1 400 Version 4.5.0 400 Version 4.4.1 401 Version 4.3.0 402 Version 4.2.0 402 Version 4.1.0 403 Version 4.0.1 404 Version 4.0.0 404 11. Legal 405 Copyright 405 DISCLAIMER OF WARRANTY 405 COPYRIGHT NOTICE 405 Export Classification EAR99 405 12. Knowledge Base Articles 406 Are MetaDefender Core v4 upgrades free? 407 Are there any dependencies that need to be fulfilled for MetaDefender Core v4 engines ? 408 Does Metadefender Core v4 offer real-time antivirus protection on the system where it is installed? 408 Does MetaDefender Core v4 Detect the NotPetya Ransomware? 409 Does the fixing updates for Meltdown and Spectre vulnerabilities affect any engines in MetaDefender Core v4? 411 External scanners in MetaDefender core v4.8.0 and above 412 How can I configure the maximum queue size in Metadefender Core v4 ? 414 How can I find a sanitized file scanned with MetaDefender Core v4? 415 How can I increase the scaling up performance? 416 How can I upgrade from Core v4.7.0/v4.7.1 to a newer Core v4.7 release 418 How can the TEMP folder be changed? 419 How do I collect verbose debug packages on MetaDefender Core v4 for Linux? 420 How do I deploy MetaDefender Core v4 to an offline Linux environment? 421 Installing MetaDefender Core 422 Activate your license 422 Installing the MetaDefender Update Downloader utility 423 Applying offline updates 425 Contacting OPSWAT Support 426 How do I deploy MetaDefender Core v4 to an offline Windows environment? 426 Installing MetaDefender Core 427 Activate your license 427 Installing the MetaDefender Update Downloader utility 428 Applying offline updates 430 Contacting OPSWAT Support 431 How do I remove an engine from my MetaDefender v4 instance? 431 How do I use MetaDefender Core v4 Workflows ? 432 Defining and administering Workflow Templates in MetaDefender Core v4 432 How long is the support life cycle for a specific version/release of MetaDefender Core v4? 433 How to install MSE on Windows Server 2012 R2 and Windows Server 2016 436 MSE on Windows Server 2012 R2 436 MSE on Windows Server 2016 440 How to transfer your Metadefender Core v4 scan history database 447 Is action needed because Metadefender v4's AVG license is expiring on 2018-06-15? 447 What do I need to do? 448 What if I don't take action by June 15, 2018? 448 Why is the license for AVG expiring? 448 What if I need more assistance from OPSWAT on this topic? 448 Is Metadefender Core compromised while scanning files? 449 Is there a virus test I could use to test MetaDefender Core v4? 449 MetaDefender Core v4 shows a large number of files that failed to scan. What can I do? 449 Post actions in MetaDefender core V4.8.0 and above 451 Queue mechanism on Metadefender Core v4 453 Queue mechanism in general 453 Queue size for requests 453 Limit of concurrent connections 453 Max file size allowed 454 Using MetaDefender core V4 BLACKLIST/WHITELIST feature 454 Using filetype groups VS. MIME-types VS file extensions 454 Using Regular Expressions 454 Advanced usage 455 What are Security Policies and how do I use them? 455 Understanding Security Policies 455 What features of MetaDefender Core version 3 are available in version 4 ? 457 What file types are supported by DLP engine? 460 What is Data Loss Prevention (DLP)? 460 Meta Data Check (Only): 461 File Conversion and Parse: 461 What file types can be verified by MetaDefender v4? 462 What links, target-services or target host-IP's need to be allowed for MetaDefender Core v4? 710 What operating system patches should be applied to the system hosting MetaDefender Core? 711 What should I do if an engine is in "failed" or "permanently_failed" status? 711 What temporary folder do Custom Engines use ? 712 Where can I submit false positives detected by MetaDefender Core v4? 712 Which are the supported archive formats for MetaDefender Core v4? 715 Why don't I see the Data Sanitization engine in MetaDefender Core v4? 716 Why should I upgrade my MetaDefender Core v4? 716 About This Guide Welcome to the Metadefender v4 guide.
Recommended publications
  • Translators' Tool
    The Translator’s Tool Box A Computer Primer for Translators by Jost Zetzsche Version 9, December 2010 Copyright © 2010 International Writers’ Group, LLC. All rights reserved. This document, or any part thereof, may not be reproduced or transmitted electronically or by any other means without the prior written permission of International Writers’ Group, LLC. ABBYY FineReader and PDF Transformer are copyrighted by ABBYY Software House. Acrobat, Acrobat Reader, Dreamweaver, FrameMaker, HomeSite, InDesign, Illustrator, PageMaker, Photoshop, and RoboHelp are registered trademarks of Adobe Systems Inc. Acrocheck is copyrighted by acrolinx GmbH. Acronis True Image is a trademark of Acronis, Inc. Across is a trademark of Nero AG. AllChars is copyrighted by Jeroen Laarhoven. ApSIC Xbench and Comparator are copyrighted by ApSIC S.L. Araxis Merge is copyrighted by Araxis Ltd. ASAP Utilities is copyrighted by eGate Internet Solutions. Authoring Memory Tool is copyrighted by Sajan. Belarc Advisor is a trademark of Belarc, Inc. Catalyst and Publisher are trademarks of Alchemy Software Development Ltd. ClipMate is a trademark of Thornsoft Development. ColourProof, ColourTagger, and QA Solution are copyrighted by Yamagata Europe. Complete Word Count is copyrighted by Shauna Kelly. CopyFlow is a trademark of North Atlantic Publishing Systems, Inc. CrossCheck is copyrighted by Global Databases, Ltd. Déjà Vu is a trademark of ATRIL Language Engineering, S.L. Docucom PDF Driver is copyrighted by Zeon Corporation. dtSearch is a trademark of dtSearch Corp. EasyCleaner is a trademark of ToniArts. ExamDiff Pro is a trademark of Prestosoft. EmEditor is copyrighted by Emura Software inc. Error Spy is copyrighted by D.O.G. GmbH. FileHippo is copyrighted by FileHippo.com.
    [Show full text]
  • Liste Von Programmiersprachen
    www.sf-ag.com Liste von Programmiersprachen A (1) A (21) AMOS BASIC (2) A# (22) AMPL (3) A+ (23) Angel Script (4) ABAP (24) ANSYS Parametric Design Language (5) Action (25) APL (6) Action Script (26) App Inventor (7) Action Oberon (27) Applied Type System (8) ACUCOBOL (28) Apple Script (9) Ada (29) Arden-Syntax (10) ADbasic (30) ARLA (11) Adenine (31) ASIC (12) Agilent VEE (32) Atlas Transformatikon Language (13) AIMMS (33) Autocoder (14) Aldor (34) Auto Hotkey (15) Alef (35) Autolt (16) Aleph (36) AutoLISP (17) ALGOL (ALGOL 60, ALGOL W, ALGOL 68) (37) Automatically Programmed Tools (APT) (18) Alice (38) Avenue (19) AML (39) awk (awk, gawk, mawk, nawk) (20) Amiga BASIC B (1) B (9) Bean Shell (2) B-0 (10) Befunge (3) BANCStar (11) Beta (Programmiersprache) (4) BASIC, siehe auch Liste der BASIC-Dialekte (12) BLISS (Programmiersprache) (5) Basic Calculator (13) Blitz Basic (6) Batch (14) Boo (7) Bash (15) Brainfuck, Branfuck2D (8) Basic Combined Programming Language (BCPL) Stichworte: Hochsprachenliste Letzte Änderung: 27.07.2016 / TS C:\Users\Goose\Downloads\Softwareentwicklung\Hochsprachenliste.doc Seite 1 von 7 www.sf-ag.com C (1) C (20) Cluster (2) C++ (21) Co-array Fortran (3) C-- (22) COBOL (4) C# (23) Cobra (5) C/AL (24) Coffee Script (6) Caml, siehe Objective CAML (25) COMAL (7) Ceylon (26) Cω (8) C for graphics (27) COMIT (9) Chef (28) Common Lisp (10) CHILL (29) Component Pascal (11) Chuck (Programmiersprache) (30) Comskee (12) CL (31) CONZEPT 16 (13) Clarion (32) CPL (14) Clean (33) CURL (15) Clipper (34) Curry (16) CLIPS (35)
    [Show full text]
  • Advanced OCR with Omnipage and Finereader
    AAddvvHighaa Technn Centerccee Trainingdd UnitOO CCRR 21050 McClellan Rd. Cupertino, CA 95014 www.htctu.net Foothill – De Anza Community College District California Community Colleges Advanced OCR with OmniPage and FineReader 10:00 A.M. Introductions and Expectations FineReader in Kurzweil Basic differences: cost Abbyy $300, OmniPage Pro $150/Pro Office $600; automating; crashing; graphic vs. text 10:30 A.M. OCR program: Abbyy FineReader www.abbyy.com Looking at options Working with TIFF files Opening the file Zoom window Running OCR layout preview modifying spell check looks for barcodes Blocks Block types Adding to blocks Subtracting from blocks Reordering blocks Customize toolbars Adding reordering shortcut to the tool bar Save and load blocks Eraser Saving Types of documents Save to file Formats settings Optional hyphen in Word remove optional hyphen (Tools > Format Settings) Tables manipulating Languages Training 11:45 A.M. Lunch 1:00 P.M. OCR program: ScanSoft OmniPage www.scansoft.com Looking at options Languages Working with TIFF files SET Tools (see handout) www.htctu.net rev. 9/27/2011 Opening the file View toolbar with shortcut keys (View > Toolbar) Running OCR On-the-fly zoning modifying spell check Zone type Resizing zones Reordering zones Enlargement tool Ungroup Templates Saving Save individual pages Save all files in one document One image, one document Training Format types Use true page for PDF, not Word Use flowing page or retain fronts and paragraphs for Word Optional hyphen in Word Tables manipulating Scheduler/Batch manager: Workflow Speech Saving speech files (WAV) Creating a Workflow 2:30 P.M. Break 2:45 P.M.
    [Show full text]
  • Devices with USB-C Interface Android Phones Tablets Laptops
    LUCI immers Compatibility List Devices with USB-C Interface The interface of devices supports DP video output. For example: Huawei P30, Mate 20, Samsung S9, S10 Android Phones The following compatibility list of mobile phones is based on the ability of lighting up displays of LUCI immers. Please contact customer support for more details. Huawei P20 P20 Pro P30 P30 Pro P40 P40 Pro Honor V20 Mate 10 Mate 10 Pro Mate 20 Mate 20 Pro Mate 30 4G Mate 30 5G Mate 20 5G X Mate Pro 30 5G Samsung S8 S8+ S9 S9+ S10 Note 8 Note 9 Note 10 Galaxy Fold LG V30 V40 Nokia 8 Sirocco OPPO R17 Pro Find X2 Reno 10x Zoom Others Black Shark 2 Sony Xperia 1 OnePlus 7T OnePlus 7 HTC U11 OnePlus 7 Pro OnePlus 8 OnePlus 8 Pro AUSU ROG AUSU ROG 3 ASUS FA706 ASUS FA506 Alienware 17R5 Razer Phone 2.0 ZTE Axon 10 Pro 5G ASUS FA506 ASUS FA706 Tablets Apple 12.9-inch iPad Pro 2018 11-inch iPad Pro Samsung Galaxy Tab S5e Huawei MatePad Pro MediaPad M6 10.8'' Laptops Apple 12-inch MacBook 2017 MacBook Pro 13-Inch 2017 MacBook Pro 2020 Intel NUC 7 NUC 8 Hades Canyon Dell XPs 13 7590 Latitude 3490 XPS15 9550 Inspiron 7590 Others Mi Pro GPD WIN 2 GPD Pocket 2 OneMix 3 Lenovo Y9000X HUAWEI MateBook 14 HP Elitebook 755 G5 Huawei Matebook Pro HP Envy13 2018 ASUS Zenbook Pro Duo KINGBOOK U65E ThinkPad X390 Razer Blade 15 Devices with HDMI Interface LUCI Video Converter is required Desktop (Windows System) CPU ≥Intel Core i5-6260U@1.
    [Show full text]
  • Full Document
    R&D Centre for Mobile Applications (RDC) FEE, Dept of Telecommunications Engineering Czech Technical University in Prague RDC Technical Report TR-13-4 Internship report Evaluation of Compressibility of the Output of the Information-Concealing Algorithm Julien Mamelli, [email protected] 2nd year student at the Ecole´ des Mines d'Al`es (N^ımes,France) Internship supervisor: Luk´aˇsKencl, [email protected] August 2013 Abstract Compression is a key element to exchange files over the Internet. By generating re- dundancies, the concealing algorithm proposed by Kencl and Loebl [?], appears at first glance to be particularly designed to be combined with a compression scheme [?]. Is the output of the concealing algorithm actually compressible? We have tried 16 compression techniques on 1 120 files, and the result is that we have not found a solution which could advantageously use repetitions of the concealing method. Acknowledgments I would like to express my gratitude to my supervisor, Dr Luk´aˇsKencl, for his guidance and expertise throughout the course of this work. I would like to thank Prof. Robert Beˇst´akand Mr Pierre Runtz, for giving me the opportunity to carry out my internship at the Czech Technical University in Prague. I would also like to thank all the members of the Research and Development Center for Mobile Applications as well as my colleagues for the assistance they have given me during this period. 1 Contents 1 Introduction 3 2 Related Work 4 2.1 Information concealing method . 4 2.2 Archive formats . 5 2.3 Compression algorithms . 5 2.3.1 Lempel-Ziv algorithm .
    [Show full text]
  • Lindoo2019 Miami Xojo Presentation
    Back to the Basics, in an Two Effort to Improve Student distinct retention in Intro to schools Programming Classes CS Dr. Ed Lindoo Associate Professor Computer Information Systems (CC&IS) 3 year average CS and CIS Drop/Fail rate • 3 year average • 50+ percent drop/fail rate in intro to programming class Two CIS classes taught by CS • Specifically CC&IS students were failing at a 62% rate! • Big problem! • If they fail this course, they don’t continue in the program • Represents a huge loss of revenue to the school • Intro to programming class taught by CS department • I was asked by our Dean to “Fix it” • Computer Science students and Information Systems students • Performed extensive research on why students fail. (business students) took the class together. • After sifting through all the research, I decided to go back to • Business students don’t have the strong technical skills to the basics, BASIC programing that is. jump into a Java or C++ course • I started thinking back to my days of BASIC and QBASIC • Certainly not as an intro class • Remember BASIC? • But that’s what was happening • Well that wasn’t going to cut it! • Further research found a common theme • Visual Programming Environments • Easier to understand languages. DON’T START WITH C++ • I thought long and hard about it • Re-wrote the entire course, Intro to Programming based on Xojo • Even though I had done a lot of work in VB.net, I felt like that was too heavy for this course • Ahh, but there’s a catch…………………isn’t there always? • Then I remembered back to my days of using Real Basic, so I • Must pass a Java course once they pass this class.
    [Show full text]
  • OCR Pwds and Assistive Qatari Using OCR Issue No
    Arabic Optical State of the Smart Character Art in Arabic Apps for Recognition OCR PWDs and Assistive Qatari using OCR Issue no. 15 Technology Research Nafath Efforts Page 04 Page 07 Page 27 Machine Learning, Deep Learning and OCR Revitalizing Technology Arabic Optical Character Recognition (OCR) Technology at Qatar National Library Overview of Arabic OCR and Related Applications www.mada.org.qa Nafath About AboutIssue 15 Content Mada Nafath3 Page Nafath aims to be a key information 04 Arabic Optical Character resource for disseminating the facts about Recognition and Assistive Mada Center is a private institution for public benefit, which latest trends and innovation in the field of Technology was founded in 2010 as an initiative that aims at promoting ICT Accessibility. It is published in English digital inclusion and building a technology-based community and Arabic languages on a quarterly basis 07 State of the Art in Arabic OCR that meets the needs of persons with functional limitations and intends to be a window of information Qatari Research Efforts (PFLs) – persons with disabilities (PWDs) and the elderly in to the world, highlighting the pioneering Qatar. Mada today is the world’s Center of Excellence in digital work done in our field to meet the growing access in Arabic. Overview of Arabic demands of ICT Accessibility and Assistive 11 OCR and Related Through strategic partnerships, the center works to Technology products and services in Qatar Applications enable the education, culture and community sectors and the Arab region. through ICT to achieve an inclusive community and educational system. The Center achieves its goals 14 Examples of Optical by building partners’ capabilities and supporting the Character Recognition Tools development and accreditation of digital platforms in accordance with international standards of digital access.
    [Show full text]
  • Dingoo A320 Manual Pdf
    Dingoo A320 Manual Pdf GP2x Screenshots · GP2X User Guide Xpdf - PDF Reader · Xynth · Xreader Dingoo A320 Native and Gamepark GP32 - vAtari v2.0. September 23rd Download MAME4ALL v1.3 for Dingoo A320 Native Source Code · Discuss this. Papercraft - Airbus A320 () PDF от RG Superdetki. May 2015. 5.38 MB 10 Files, 1 / 0. Germanwings 4U9525 Airbus A320 Operating Manual Cockpit Door Dingoo A320 Essential Pack v1 46 dec 2009 - GBA, SNES, NeoGeo, CPS1, CPS2. A320 pdf. Professional A320 Type Rating in STO, LGW, BRU or MADGet the best quality training for lowest price! More in this category: A319-A320-A321 Flight Crew Training Manual Vol1 Dingoo A320 full manual - English language. Broadband cable (RJ11 to RJ11), Ethernet cable (RJ45 to RJ45) (Cat5e), Power adapter, 2 ADSL microfilters, Phone to RJ11 converter, User guide and CD. WORD/EXCEL/PDF/TXT/CHM/HTML Follow the 11 page dingoonity thread here: boards.dingoonity.org/gpd-devices/gpd-xd-new-5-inch- Dingoo A320 OpenDingux port by Sergei Kolesnikov (Exl) OTG cable, USB wall charger, EURO connector for charger, User guide, User reference, Warranty, JXD Sticker. Latest version download whatsappHuman resources policy manual sampleClie desktop download Essay on health and fitness pdf Dingoo a320 downloads Dingoo A320 Manual Pdf Read/Download We get an instructional manual, a micro USB to full USB cable, a stylus (this is NOT a Given modern needs, such as web browsing and PDF reading, I think. Document Processing support TXT,LRC,PDF,Html etc. 1* manual dingoo A330 portable game player / video game console dingoo a320 upgrade version. PDF - MetaGames-EU Test émulateurs DIngoo A320 follow the guidelines listed in the Medicare Program Integrity Manual, Chapter 3 to discern the identity.
    [Show full text]
  • ABBYY Finereader Engine OCR
    ABBYY FineReader Engine Performance Guide Integrating optical character recognition (OCR) technology will effectively extend the functionality of your application. Excellent performance of the OCR component is one of the key factors for high customer satisfaction. This document provides information on general OCR performance factors and the possibilities to optimize them in the Software Development Kit ABBYY FineReader Engine. By utilizing its advanced capabilities and options, the high OCR performance can be improved even further for optimal customer experience. When measuring OCR performance, there are two major parameters to consider: RECOGNITION ACCURACY PROCESSING SPEED Which Factors Influence the OCR Accuracy and Processing Speed? Image type and Image image source quality OCR accuracy and Processing System settings processing resources speed Document Application languages architecture Recognition speed and recognition accuracy can be significantly improved by using the right parameters in ABBYY FineReader Engine. Image Type and Image Quality Images can come from different sources. Digitally created PDFs, screenshots of computer and tablet devices, image Key factor files created by scanners, fax servers, digital cameras Image for OCR or smartphones – various image sources will lead to quality = different image types with different level of image quality. performance For example, using the wrong scanner settings can cause “noise” on the image, like random black dots or speckles, blurred and uneven letters, or skewed lines and shifted On the other hand, processing ‘high-quality images’ with- table borders. In terms of OCR, this is a ‘low-quality out distortions reduces the processing time. Additionally, image’. reading high-quality images leads to higher accuracy results. Processing low-quality images requires high computing power, increases the overall processing time and deterio- Therefore, it is recommended to use high-quality images rates the recognition results.
    [Show full text]
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Metadefender Core V4.13.1
    MetaDefender Core v4.13.1 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Game Development for Computer Science Education
    Game Development for Computer Science Education Chris Johnson Monica McGill Durell Bouchard University of Wisconsin, Eau Bradley University Roanoke College Claire [email protected] [email protected] [email protected] Michael K. Bradshaw Víctor A. Bucheli Laurence D. Merkle Centre College Universidad del Valle Air Force Institute of michael.bradshaw@ victor.bucheli@ Technology centre.edu correounivalle.edu.co laurence.merkle@afit.edu Michael James Scott Z Sweedyk J. Ángel Falmouth University Harvey Mudd College Velázquez-Iturbide [email protected] [email protected] Universidad Rey Juan Carlos [email protected] Zhiping Xiao Ming Zhang University of California at Peking University Berkeley [email protected] [email protected] ABSTRACT cation, including where and how they fit into CS education. Games can be a valuable tool for enriching computer science To guide our discussions and analysis, we began with the education, since they can facilitate a number of conditions following question: in what ways can games be a valuable that promote learning: student motivation, active learning, tool for enriching computer science education? adaptivity, collaboration, and simulation. Additionally, they In our work performed prior to our first face-to-face meet- provide the instructor the ability to collect learning metrics ing, we reviewed over 120 games designed to teach comput- with relative ease. As part of 21st Annual Conference on ing concepts (which is available for separate download [5]) Innovation and Technology in Computer Science Education and reviewed several dozen papers related to game-based (ITiCSE 2016), the Game Development for Computer Sci- learning (GBL) for computing. Hainey [57] found that there ence Education working group convened to examine the cur- is \a dearth of empirical evidence in the fields of computer rent role games play in computer science (CS) education, in- science, software engineering and information systems to cluding where and how they fit into CS education.
    [Show full text]