Remoteapi V4.1

Total Page:16

File Type:pdf, Size:1020Kb

Remoteapi V4.1 RemoteAPI v4.1 远程支持 & 远程控制集成 Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com Index Index 1. RmeoteAPI 是什么 9. 支持环境 2. 主要特征 10. 网络环境 3. RemoteAPI主要功能 11. 定制化 4. Integration Structure 12. License 5. Integration Application Flow 13. SDK 6. 应用领域 14. Developer Support 7. 支持程序编译 15. Reference 8. 无需第三方技术 16. Case Study Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 1 1. RmoteAPI 是什么? RemoteAPI,是指将远程控制功能进行API(Application Program Interface)化 开发,并可同其他软件进行集成的一种模块。 RemoteAPI : 版本:4.1 应用于RemoteCall v. 4.1产品的引擎 VRVD:虚拟远程视频驱动引擎 (Virtual Remote Video Drive) 应用程序需要远程控制、远程支持功能时 IT服务需要远程控制、远程支持功能时 通过Remote API模块,可以同任何软件及服务产品进行集成开发。 只通过同18种API模块的集成,就可以让您的软件变得更有竞争力! Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 2 Rapid ROI Customer Screen Satisfaction Share IT Service Support Integration Remote Remote Control Access Rapid Application Feedback Support Integration Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 3 2. 主要特征 Key Features Windows Vista, 7 (UAC) support Simple API support Virtual Remote Video Driver (Integration time – 30 minutes) (GDI, DDI support) Easy control - Optional functions Network support Multilanguage support (Private IP Relay, Proxy, FW) (English, Korean, Japanese, Chinese) Integration : Remote Support & Remote Control function Add-On Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 4 3. 主要功能 Standard Extend 基本 操作系统 MS Windows OS √ √ 环境 连接方法 呼出API 方式连接 √ √ 鼠标控制 √ √ 键盘控制 √ √ 桌面共享 √ √ 支持多显示器 √ √ DirectX or OpenGL √ √ Ctrl+Alt+Del 功能传送 √ √ 单向绘图 √ √ 双向绘图 √ √ 剪贴板 √ √ URL传送 √ √ 控制 基本功能 收藏夹(文件, URL, 控制面板) 功能 √ √ 画面截屏 √ √ 查看进程信息 √ √ 逆向传送画面 √ √ 查看资产信息 √ √ 简易FTP功能 √ √ 聊天 √ √ 真彩色控制 √ √ VRVD 3.1 √ √ GDI √ √ DDI √ √ Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 5 3. 主要功能(续) 画面录像(本地) √ √ 语音聊天 √ √ 控制 高级功能 自动控制鼠标/键盘 功能 √ √ 远程资源管理器 √ √ Blank Screen √ √ SSL通信 √ 支持安全设备(防火墙, IDS, IPS) √ 安全功能 加密(AES 256bit) √ 支持代理服务器 √ √ 控制前确认同意 √ √ 中继功能 网关连接 √ Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 6 4. Integration Structure RemoteAPI Extend License Gateway Connection Gateway Connection Internet Internet Gateway Server Firewall / Proxy Firewall / Proxy Peer to Peer Connection TCP 9500 Port Viewer Side API Client Side API RemoteAPI Standard License Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 7 5. Integration Application Flow RemoteAPI使用18种API功能进行集成。 X X Your .NET, VB6, VC++, Your .NET, VB6, VC++, Delphi, etc. GUI app Delphi, etc. GUI app X X RemoteAPI RemoteAPI Viewer Side Module Client Side Module StartViewer( ) RSDriverInstallCheck( ) SetControlType( ) SetServiceMode( ) SetUseAdminAuthorityOnVista( ) SetDocPath( ) ConnectViewer( ) TerminateViewer( ) DisconnectViewer( ) RSEngineTerminate( ) Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 8 6. 应用领域 Remote Control Application Support IT Services Support Function Add-On Integration Integration Keyboard Mouse Clip Board Process System Screen Share File Transfer Control Control Share Control Information 韩国应用实例:即时通信软件集成, ESTsoft, INCA internet等 服务器类解决方案上线时应用API用作管理用途 海外应用实例:MJS, NTT-Data, Sumitomo denko(M-Core) Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 9 7. 支持程序编译 RemoteAPI v4.1支持什么环境下的程序编译? Visual Studio C++ 6.0, 2005, 2008 Visual Basic Net, C# / VB.NET Delphi Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 10 8. 无需第三方技术 应用RemoteAPI v4.1 时需要第三方的技术吗? RemoteAPI v4.1 远程支持引擎为RSUPPORT独立研发的技术 无需另外的第三方技术。 无需另外购买程序库 ※ UI Library(BCG Library)的使用许可根据RSUPPORT发布的许可权限无需另外购买即可全部使用。 Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 11 9. 支持环境 RemoteAPI v4.1 支持的环境是什么? Operating System Support : • Windows 98 • Windows 2000 Professional, Server • Windows XP (32bit) • Windows 2003 Server (32bit) • Windows 2008 Server (32bit) • Windows Vista (32bit) • Windows 7 (32bit) Browser Support : • Internet Explorer 6.0 later Network : • TCP/IP Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 12 10. 网络环境 RemoteAPI v4.1 在网络路由器(NAT)环境中也可以应用吗? 是否支持Proxy Server? RemoteAPI Extend License Support (Gateway Server License) • 公网IP • 私设IP • NAT网络环境 • 网络路由器环境 • 支持Proxy Server - 支持各种Proxy Server - NTML Certification - Basic Certification - Digest Certification ※ 购买RemoteAPI Extend License即可通过Gateway Server构建并运营远程控制服务。 ※ Extend License 可以在任何可以连接互联网的地方提供优质的远程支持服务。 Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 13 11. 定制化 RemoteAPI v4.1 支持定制化吗? RemoteAPI Customizing License Support : • 通过事先协商确定定制化内容 • 分析需要功能 • 定制化设计 • 定制化开发 ※ 提供的定制化模块信息根据保密协议受到依法受到保护。 RSUPPORT通过积累的丰富商业经验,为贵公司进行商务需求分析、设计,提供定制化服务。 ※ 定制化许可通过单独协议进行销售。 Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 14 12. License RemoteAPI v4.1 许可是如何规定的? RemoteAPI License : • 以年为单位续签合同方式 • Yearly Subscription - 在签约购买及续签时发布1年使用许可 - 在Viewer模块运行位置发布许可文件 RemoteAPI Extend – 通过Gateway Connection连接外部环境 RemoteAPI Standard – 包括集成必需的项目 ※ RemoteAPI v4.1相关的所有资料都依照作权法受保护。 禁止无故对RSUPPORT公司提供的部分或全部资料进行复制、传播发布,严重者将会被起诉,并受到民法、刑法(包括国 际法)等的严格惩处。 但是,对于已购买产品的客户,根据许可购买条件(期限,许可数量)使用本产品并由于追加开发需要重新发布执行代码时 不受许可限制。 ※ 对于所涉及的所有相关代码不允许进行反编译(Decompiling),逆向工程(Reverse Engineering)以及分解(disassemble) 作业。 Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 15 13. SDK RemoteAPI SDK(Software Development Kits) Software Development Kits Support : • RemoteAPI v4.1 用户使用手册 Wrapper DLL • Viewer-Side API : C++ DLL(library) Module • Client-Side API : C++ DLL(library) Module • Test Program : C++ DLL(library) Module Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 16 14. Developer Support RemoteAPI Developer Support SDK Package • API 用户使用手册 • 测试程序 • 测试源代码 • API header file • Library相关的C++ .cpp 源文件 -> 提供使用library相关的Wrapper class 开发人员支持 • 测试程序(Sample, C++) • 用户使用手册 • 提供测试许可 • 咨询邮件([email protected])支持 Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 17 15. Reference RemoteAPI应用在哪里? RemoteAPI Reference : • 安博士公司 – 提供AhnLab Policy Center 3.0, RemoteAPI v3.0 , 2004年 提供AhnLab Policy Center 4.0 RemoteAPI v4.1, 2010年 • INCA Internet – 搭载于综合安全软件上(企业级综合杀毒解决方案) • EST Soft – 搭载于综合安全软件上(企业级综合杀毒解决方案) • 韩国全罗北道教育信息科学院 – 嵌入院内即时通许工具 • SK NateOn – 嵌入Messager, 个人版 Messager • 韩国农协 – 责任终端系统, P2P构架, RemoteAPI v3.1 供应 • 韩国国民银行 – Paperless BPR Pilot Project, 2008年, RemoteAPI v4.1 • 日本 M-Core – 资产管理解决方案, C/S构架, 2009年, RemoteAPI v4.1 供应 • 日本 MJS – 会计管理软件, C/S 构架, 2008年, RemoteAPI v4.1 供应 Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 18 16. Case Study Messenger (Remote Screen Share Function) Add-On Killer Function 效果 Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 19 16. Case Study Japan Financial Account Service System (Remote Support) Add-On M-Core Service Remote Access Control Technical Support IT Service Support Integration Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 20 16. Case Study Anti-Virus Management System (Remote Support) Add-On Remote Access Control Technical Support IT Service Support Integration Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 21 RSUPPORT 产品群 在线虚拟帮助台 在线销售工具 在线远程支持工具 应用程序远程支持API 个人远程计算机控制工具 即时通讯软件辅助远程控制 软硬件整体远程支持解决方案 Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 22 为全球4000余家企业的远程支持服务负责 Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 23 Korea : Japan : (138-724) 서울시 송파구 방이동 45번지 한미타워 〒100-0013 東京都千代田区霞ヶ関3-3-2 15층, 16층 新霞ヶ関ビル18階KOTRA 전 화 : +82-70-7011-3900 TEL : +81-3-3539-5761 팩 스 : +82-2-479-4429 FAX : +81-3-3539-5762 For more information about RSUPPORT, 기술문의 : [email protected] お問い合わせ : [email protected] please visit http://www.rsupport.com 구매문의 : [email protected] Sales : [email protected] 기타문의 : [email protected] Info : [email protected] USA : China : 247 West 30th Street, 4th floor, 北京市朝阳区东三环北路丙2号 New York, NY 10001 天元港中心B座1005室 Phone : +1-888-348-6330 联系电话 : +86-10-8256-1810 传真号码 : +86-10-8256-2978 Fax : +1-888-348-6340 技术咨询 : [email protected] Tech : [email protected] 销售咨询 : [email protected] Sales : [email protected] 其他咨询 : [email protected] Info : [email protected] Copyright © 2001~2011 RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com .
Recommended publications
  • Computer Virus 16 Views  0  0 RELATED TITLES Virus
    16 views 0 0 RELATED TITLES Virus Uploaded by Abu Naser Mohammad Saif Full description Save Embed Share Print Steve Jobs Cryptonomicon The Woman Who Smashed Codes: A True Computer Virus 16 views 0 0 RELATED TITLES Virus Uploaded by Abu Naser Mohammad Saif Full description Save Embed Share Print Steve Jobs Cryptonomicon The Woman Who Smashed Codes: A True Presentation Outline 1. Introduction: 2. VIRUS Definition and Naming: 3. Types of computer virus: 4. Example of Virus 5. To phases of virus 6. Symptom of computer attacked by virus 7. Special focus on: Trojan, & phishing site 8. Combating Viruses 9. Anti viruses & Firewall 16 views 0 0 RELATED TITLES Virus Uploaded by Abu Naser Mohammad Saif Full description Save Embed Share Print Steve Jobs Cryptonomicon The Woman Who Smashed Codes: A True Presentation Outline Symptom of computer attacked by virus Special focus on: Trojan, & phishing site Combating VirusesAnti viruses & Firewall 16 views 0 0 RELATED TITLES Virus Uploaded by Abu Naser Mohammad Saif Full description Save Embed Share Print Steve Jobs Cryptonomicon The Woman Who Smashed Codes: A True Presentation Outline 1. Introduction: 2. VIRUS Definition and Naming: 3. History of Computer Virus: 4. Types of computer virus: 5. Example of Virus 6. To phases of virus: 16 views 0 0 RELATED TITLES Virus Uploaded by Abu Naser Mohammad Saif Full description Save Embed Share Print Steve Jobs Cryptonomicon The Woman Who Smashed Codes: A True Introduction: Computer VIRUS Almost every uses has faced virus attack And loses some sort of computer resources Computer VIRUS is not a biological element rather computer program (s).
    [Show full text]
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • Identifying Rootkit Infections Using Data Mining
    Identifying Rootkit Infections Using Data Mining Author Wu, Xin-Wen, Lobo, Desmond, Watters, Paul Published 2010 Conference Title Proceedings of The 2010 International Conference on Information Science and Applications (ICISA) DOI https://doi.org/10.1109/ICISA.2010.5480359 Copyright Statement © 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/ republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Downloaded from http://hdl.handle.net/10072/37518 Griffith Research Online https://research-repository.griffith.edu.au Identifying Rootkit Infections Using Data Mining Desmond Lobo, Paul Watters and Xin-Wen Wu Internet Commerce Security Laboratory Graduate School of Information Technology and Mathematical Sciences University of Ballarat, Australia [email protected], {p.watters, x.wu}@ballarat.edu.au Abstract - Rootkits refer to software that is used to hide the Rootkits use various types of hooking techniques in order presence and activity of malware and permit an attacker to take to remain hidden and there are several tools available, such as control of a computer system. In our previous work, we focused McAfee’s Rootkit Detective, that can be used to detect the strictly on identifying rootkits that use inline function hooking hooks that have been created by a rootkit on a computer techniques to remain hidden. In this paper, we extend our system. Each time that such a tool is run, a log file is generated previous work by including rootkits that use other types of that contains a list of the detected hooks.
    [Show full text]
  • Remoteapi V4.1
    No. PR090211-RC5-1 RemoteAPI v4.1 Integration with Remote Control & Support Copyright © 2001~2012RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com Index Index 1. What is RmeoteAPI? 9. Support platforms 2. Key Features 10. Network Environment 3. Specification RemoteAPI 11. Customizing 4. Integration Structure 12. License 5. Integration Application Flow 13. SDK 6. Application 14. Developer Support 7. Support compiler 15. Reference 8. Third-party if necessary 16. Case Study Copyright © 2001~2012RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 1 1. RmoteAPI 란 RemoteAPI is a remote control technology in an API(Application Program Interface) format that can be integrated to softwares requiring remote control features. RemoteAPI : Version : 4.1 Remotecall V. 4.1 service product engine. VRVD : Virtual remote video driver engine. (Virtual Remote Video Drive) On-demand remote control and support for applications On-demand remote control and support for IT services. RemoteAPI can be integrated with any software and also service. With the 18 API functions, you can greatly improve the performance of your software. Copyright © 2001~2012RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 2 Rapid ROI Customer Screen Satisfaction Share IT Service Support Integration Remote Remote Control Access Rapid Application Feedback Support Integration Copyright © 2001~2012RSUPPORT Co., Ltd. ALL RIGHTS RESERVED. www.rsupport.com 3 2. Key Features Key Features Windows Vista, 7 (UAC) support Simple API support Virtual Remote Video Driver (Integration time – 30 minutes) (GDI, DDI support) Easy control - Optional functions Network support Multilanguage support (Private IP Relay, Proxy, FW) (English, Korean, Japanese, Chinese) Integration : Remote Support & Remote Control function Add-On Copyright © 2001~2012RSUPPORT Co., Ltd.
    [Show full text]
  • Genian-Nac-Admin-Guide.Pdf
    Genian NAC GENIANS, INC. Sep 08, 2021 DEPLOYMENT GUIDE 1 Deployment Overview 3 2 Phase 1 - Network Surveillance / Visibility 5 3 Phase 2 - Plan / Design 7 4 Phase 3 - Configure 9 5 Phase 4 - Test / Validate 11 6 Phase 5 - Expand Deployment 13 7 Understanding Network Access Control 15 8 Deploying Genian NAC 21 9 Installing Genian NAC 47 10 Monitoring Network Assets 71 11 Controlling Network Access 111 12 Managing On-boarding Process 175 13 Managing User Authentication 187 14 Controlling Endpoints with Agent 215 15 Detecting Anomalies 287 16 Managing Logs and Events 303 17 Managing Systems 317 18 API Guide 361 19 Log Format 363 20 Node Group Templates 365 21 Frequently Asked Questions 367 22 Troubleshooting 369 i 23 Release Notes 405 24 Security Advisories 459 25 Service Level Agreement 461 ii Genian NAC DEPLOYMENT GUIDE 1 Genian NAC 2 DEPLOYMENT GUIDE CHAPTER ONE DEPLOYMENT OVERVIEW There are 5 recommended phases for Network Access Control (NAC) deployment. • Phase 1 - Network Surveillance / Visibility • Phase 2 - Plan / Design • Phase 3 - Configure • Phase 4 - Test / Validate • Phase 5 - Expand Deployment Following the steps documented in the various phases will allow Administrators with any level of experience with NAC to successfully deploy the Genian NAC Solution. While not every specific use case or edge condition is addressed, the steps outlined in each phase cover the most common deployment scenarios and use cases for NAC. 3 Genian NAC 4 Chapter 1. Deployment Overview CHAPTER TWO PHASE 1 - NETWORK SURVEILLANCE / VISIBILITY Gaining visibility into the network will allow Administrators to understand what nodes are active on the network by various information including IP, MAC, Platform Type, Location, Ownership and Status.
    [Show full text]
  • Olitics & Monograph On
    KUASA DALAM RANTAI INDUSTRI BERBASIS INOVASI Studi Komparasi Model Pengembangan Inovasi dalam Inkubasi Bisnis Teknologi Informasi di Jakarta, Bandung, dan Yogyakarta Monograph on Politics & Government KUASA DALAM RANTAI INDUSTRI BERBASIS INOVASI Studi Komparasi Model Pengembangan Inovasi dalam Inkubasi Bisnis Teknologi Informasi di Jakarta, Bandung, dan Yogyakarta PENULIS: Suci Lestari Yuana, MIA Indri Dwi Apriliyanti, MBA Nur Azizah, M.Sc. Armando Wilson Ganda Mulia Purba Ario Bimo Utomo Melati Manjari Clara Shinta Paskasari Rinta Meilani Anisa Nur Nia Rahmah Umar Abdul Aziz MONOGRAPH on Politics and Government Vol. 11, No. 2. 2017 (1-116) MONOGRAPH on i Politics & Government KUASA DALAM RANTAI INDUSTRI BERBASIS INOVASI Studi Komparasi Model Pengembangan Inovasi dalam Inkubasi Bisnis Teknologi Informasi di Jakarta, Bandung, dan Yogyakarta Kuasa dalam Rantai Industri Berbasis Inovasi Studi Komparasi Model Pengembangan Inovasi dalam Inkubasi Bisnis Teknologi Informasi di Jakarta, Bandung, dan Yogyakarta Hak cipta © Penerbit PolGov, 2017 All rights reserved Penulis: Suci Lestari Yuana, MIA, Indri Dwi Apriliyanti, MBA, Nur Azizah, M.Sc, Armando Wilson Ganda Mulia Purba, Ario Bimo Utomo, Melati Manjari, Clara Shinta Paskasari, Rinta Meilani, Anisa Nur Nia Rahmah, dan Umar Abdul Aziz. Editor: Fitria Nurhayati Pemeriksa Aksara: Cucuk Radhosa Penata Letak: Agustinus Moruk Taek Pemeriksa Akhir: Mahesti Hasanah dan Oktiviani Primardianti Diterbitkan oleh Penerbit PolGov Penerbit PolGov khusus menerbitkan buku-buku politik dan pemerintahan, berada di bawah payung Research Centre for Politics and Government (PolGov) Departemen Politik dan Pemerintahan (DPP) FISIPOL UGM. Research Centre for Politics and Government (PolGov) adalah lembaga riset dan publikasi dari Departemen Politik dan Pemerintahan (DPP) Fisipol UGM. Saat ini PolGov berfokus ke dalam lima tema kunci sesuai dengan kurikulum DPP, yaitu: 1) Kekuasaan, Kesejahteraan dan Demokrasi; 2) Politik Desentralisasi; 3) Tata Kelola Industri Ekstraktif; 4) Tata Kelola Pemilu; dan 5) Tata Kelola Perbatasan.
    [Show full text]
  • Android Test 2019
    Independent Tests of Anti-Virus Software Android Test 2019 TEST PERIOD : JANUARY 2019 LANGUAGE : ENGLISH LAST REVISION : 12TH MARCH 2019 WWW.AV-COMPARATIVES.ORG Android Test 2019 www.av-comparatives.org Contents INTRODUCTION 3 TESTED PRODUCTS 4 TEST PROCEDURE 7 TEST CASES 8 TEST RESULTS 9 NOTES 11 CONCLUSION 18 COPYRIGHT AND DISCLAIMER 19 2 Android Test 2019 www.av-comparatives.org Introduction AV-Comparatives’ 2017 test of Android antivirus products was inspired by the discovery of an Android app called Virus Shield , which claimed to scan mobile devices for malware, but in fact did nothing of the sort. In reality, running the app simply showed a progress bar, supposed to represent scan progress, followed by an announcement at the end of the “scan” that the device was free of malicious apps. Worryingly, the app had been available on the Google Play Store, and thousands of users had paid money for it (although this was ultimately refunded to them by Google). Last year’s test showed that in addition to several apps that are equally ineffective at protecting the device against malware, there are other apps that employ dubious detection mechanisms. These detect most other installed apps as potentially harmful, excluding only those with white-listed package names. With user interfaces seemingly generated from a few templates, the main purpose of these apps seems to be generating easy revenue for their developers – rather than actually protecting their users 1. Including these dubious apps, we found the malware protection of almost 40% of the tested Android AV apps to be inappropriate.
    [Show full text]
  • TACHYON Zip User Guide
    TACHYON Zip User Guide TACHYON Zip User Guide INCA Internet Co., Ltd. TACHYON Zip User Guide Contents 1. Outline ....................................................... 4 Before Use ................................................................................................................................. 4 2. Installation ................................................. 6 System Requirements ........................................................................................................... 6 Installation ................................................................................................................................. 7 Uninstallation ......................................................................................................................... 10 Get Started .............................................................................................................................. 12 3. Main Features ......................................... 14 Main screen ............................................................................................................................ 14 New Archive ........................................................................................................................... 15 Extract ....................................................................................................................................... 17 Open Archive ........................................................................................................................
    [Show full text]
  • Press Release
    January 12, 2012 (Thursday) To be reported at or after 11:00, January 12, 2012 (Thursday). Press release Inquiry: in-Bae Hong, Internet Pilicy Division, Network Policy Bureau (☎ 750-2730) Hyeon-Seon Park, Internet Policy Division (☎ 750-2723) [email protected] According to the 2011 probe into malicious code removal programs, removal performance has improved overall but products have been increasingly issuing false alerts. - Users need to be cautious about poor vaccines and products issuing false alerts - During the second half of 2011, the Korea Communications Commission (Chairman See-Joong Choi) in conjunction with the Korea Internet Security Agency (President Simon Suh) investigated 202 malicious code removal programs made and sold in Korea, and found that the malicious code removal performance has improved compared to 2010, but products are increasingly issuing false alerts and faulty vaccines are still being made and distributed. ■ Outline of the investigation ① Period: September 1, 2011 ~ December 31, 2011 ② Targets: 202 programs from 77 companies (subscription-based or purchase-only 181, free 21) ③ Investigation items : 39 items including malicious code detection and removal performance, provisions of the user agreement, user consent to installation, updates, and real-time detection capability were investigated <See Attachment 1> As for malicious code detection and removal, the number of programs that detected and removed more than 2/3rd (2,000) of 3,000 new malicio us code samples about doubled as compared to 2010 (17.5%→ 31.2%), and the number of vaccine programs with real-time monitoring effectiven ess also increased (16%→ 26.7%). However, the number of programs wi th automatic updates decreased (64.6%→ 45%), and the number of prod ucts issuing false-alert that mistake a normal file as malicious and cause damage to users also greatly increased (27.7%→ 52%).
    [Show full text]
  • 2018-TAG-Cyber-Security-Annual-Volume-1.Pdf
    Design – TAG Cyber LLC Finance – M&T Bank Administration – navitend Research – TAG Cyber LLC Lead Author – Dr. Edward G. Amoroso Researchers – Liam Baglivo, Matt Amoroso, Miles McDonald Facilities – WeWork, NYC TAG Cyber LLC P.O. Box 260, Sparta, New Jersey 07871 Copyright © 2018 TAG Cyber LLC. All rights reserved. This publication may be freely reproduced, freely quoted, freely distributed, or freely transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system without need to request permission from the publisher, so long as the content is neither changed nor attributed to a different source. Security experts and practitioners must recognize that best practices, technologies, and information about the cyber security industry and its participants will always be changing. Such experts and practitioners must therefore rely on their experience, expertise, and knowledge with respect to interpretation and application of the opinions, information, advice, and recommendations contained and described herein. Neither the author of this document nor TAG Cyber LLC assume any liability for any injury and/or damage to persons or organizations as a matter of products liability, negligence or otherwise, or from any use or operation of any products, vendors, methods, instructions, recommendations, or ideas contained in any aspect of the 2018 TAG Cyber Security Annual volumes. The opinions, information, advice, and recommendations expressed in this publication are not representations of fact, and are subject to change without notice. TAG Cyber LLC reserves the right to change its policies or explanations of its policies at any time without notice. September 7, 2017 To the Reader: This 2018 TAG Cyber Security Annual – Volume 1: Outlook for Fifty Cyber Security Controls is a companion guide to the report of similar name issued last year.
    [Show full text]
  • Administratrea Sistemelor De Operare Windows / Linux
    MINISTARUL EDUCAȚIEI, CULTURII ȘI CERCETĂRII AL REPUBLICII MOLDOVA IP CENTRUL DE EXCELENȚĂ ÎN INFORMATICĂ ȘI TEHNOLOGII INFORMAȚIONALE CATEDRA INFORMATICĂ APLICATĂ NOTE DE CURS ADMINISTRATREA SISTEMELOR DE OPERARE WINDOWS / LINUX PROFESOR ANDRIAN DASCAL CHIȘINĂU, 2017 C U P R I N S: CAPITOLUL I – Bazele Sistemelor de Operare Lecția 1: Introducere în SO. Funcțiile unui SO. Clasificarea tipurilor de SO………………………………1 Lecția 2: Caracteristicile tehnico-economice ale sistemelor de operare. Fișa de post a administratorului de SO. Echipamentele necesare pentru instalarea unui SO…………………………………………16 Lecția 3: BIOS-ul. Noţiuni generale. Lansarea programului de configurare a BIOS-ului, modificarea şi salvarea setărilor………………………………………………..………………………………..24 Lecția 4: Partiționarea HDD/SSD/SSHD. Proceduri de instalare a SO. Instalarea propriu zisă a SO…….30 CAPITOLUL II– Configurarea Sistemelor de Operare Lecția 5: Drivere. Căutarea și instalarea acestora. Configurarea SO conform nevoilor utilizatorului. Configurarea suprafeței de lucru. Programe de monitorizare a performanțelor unui PC…….….56 Lecția 6: Instrumentele oferite de panoul de control……………………………………………………....66 Lecția 7: Optimizarea și mentenanța SO……………………………………………………………….….70 Lecția 8: Configurarea modului de acces la rețea………………………………………………………….81 Lecția 9: Instalarea și configurarea echipamentelor periferice…………………………………………….93 Lecția 10: Conectori și cabluri destinate conectării echipamentelor periferice. Proceduri de conectare a echipamentelor periferice..............................................................................................................99
    [Show full text]
  • Volume 1: TAG Cyber Security Fifty Controls – Volume 1 Introduces the Fifty Primary Control Areas Required for CISO Teams to Be More Effective
    Designer – Vision Creative Finance – M&T Bank Administration – navitend Promotion – Braithwaite Communications Research – TAG Cyber LLC Lead Author – Dr. Edward G. Amoroso TAG Cyber LLC P.O. Box 260, Sparta, New Jersey 07871 Copyright © 2017 TAG Cyber LLC. All rights reserved. This publication may be freely reproduced, freely quoted, freely distributed, or freely transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system without need to request permission from the publisher, so long as the content is neither changed nor attributed to a different source. Security experts and practitioners must recognize that best practices, technologies, and information about the cyber security industry and its participants will always be changing. Such experts and practitioners must therefore rely on their experience, expertise, and knowledge with respect to interpretation and application of the opinions, information, advice, and recommendations contained and described herein. Neither the author of this document nor TAG Cyber LLC assume any liability for any injury and/or damage to persons or organizations as a matter of products liability, negligence or otherwise, or from any use or operation of any products, vendors, methods, instructions, recommendations, or ideas contained in any aspect of the 2017 TAG Cyber Security Annual volumes. The opinions, information, advice, and recommendations expressed in this publication are not representations of fact, and are subject to change without notice. TAG Cyber LLC reserves the right to change its policies or explanations of its policies at any time without notice. Page 2 2017 TAG Cyber Security Annual September 1, 2016 To the Reader: I wrote every word of this 2017 TAG Cyber Security Annual based on my experience, opinion, and research – and I wrote it for one purpose: To serve as a useful guide for Chief Information Security Officer (CISO) teams.
    [Show full text]