Bin/Sh # Securitybox.Sh

Total Page:16

File Type:pdf, Size:1020Kb

Bin/Sh # Securitybox.Sh #!/bin/sh # securitybox.sh - Turn a generic Ubuntu or Debian SO into a security auditing m achine with one command # Version 1.01 # ekx0day at GMAIL.COM # Yu may have r00t privileges in order to install if [ `id | cut -d= -f3 | cut -d\( -f1` = 0 ] then echo echo " Okay, you are r00t and can run this script" echo sleep 1 # dnswalk #Checks dns zone information using nameserver lookups #dnswalk is a DNS debugger. It performs zone transfers of specified #domains, and checks the database in numerous ways for internal #consistency, as well as accuracy. apt-get -y install dnswalk # dns-bruteforce # dnsenum # dnsmap # DNSPredict # Finger Google #finger-ldap #Finger for machines that authenticate against LDAP #finger-ldap displays information about system users, by calling the BSD #finger command. However, it works around a gross inefficiency of #BSD finger's full-name matching algorithm by exploiting the LDAP #Search Filter mechanism, outlined in RFC 2254. #apt-get -y install finger-ldap # Commented out because the install asked too many questions # Firewalk # Goog Mail Enum # Google-search # Googrape # Gooscan # Host #utility for querying DNS servers #'host' is a utility, similar to 'nslookup' (deprecated) or 'dig', #used to query DNS servers for domain names and zones. # #This package provides the original version of 'host', originally #in the package 'dnsutils'. BIND9 provides a similar utility, in #'bind9-host'. # apt-get -y install bind9-host apt-get -y install host #Internetwork Routing Protocol Attack Suite #Despite the "exciting" title this is merely a collection of programs #used for advanced network operations, testing, and debugging. # #CDP and the route injectors can be useful in a production network. #Several other tools are useful for security and firewall testing. #Finally some tools such as netenum are useful for general admin #scripting. # #Like all powerful tools, someone whom is terminally stupid could #cause great damage when using these tools, so be careful. # #cdp - Cisco discovery protocol packet sender #igrp - IGRP route injector #ass - Autonomous system scanner #irdp - IRDP sender #irdpresponder - IRDP responder #itrace - ICMP based traceroute #tctrace - TCP SYN based traceroute #protos - ICMP based port scanner #netmask - Asks for netmask via ICMP #file2cable - Dumps any binary file direct to ethernet #dfkaa - Troubleshoot devices formerly known as Ascend (Pipeline, etc) #netenum - Ping scanner designed for shell scripts #hsrp - HSRP failover tester #icmp_redirect - ICMP redirection system #timestamp - ICMP timestamp requester #dhcpx - DHCP server "exerciser" # #I placed this program in "non-free" because per the license: #1) A developer is required to get written permission to use code # from IRPAS in derivative works #2) Users are barred from using this software for illegal purposes apt-get -y install irpas # Pirana # QGoogle # Relay Scanner # SMTP-Vrfy # - Network Mapping # Amap 5.2 # Autoscan 0.99_R1 # cdpr #Cisco Discovery Protocol Reporter #cdpr listens on specified network interfaces for Cisco Discovery #Protocol packets. It then decodes those packets and outputs the #information, optionally sending the information to a server for #processing. apt-get -y install cdpr # Cheops NG #Network swiss army knife #Cheops-ng is a Network management tool for mapping and monitoring #your network. It has host/network discovery functionality as well as #OS detection of hosts making. Cheops-ng has the ability to probe hosts to see #what services they are running. On some services, cheops-ng is actually #able to see what program is running for a service and the version #number of that program. # #Cheops-ng is a replacement for Cheops ('ng' stands for 'Next Generation'). #Main differences with cheops are: # * Cheops is a GUI program whereas cheops-ng has a backend server # that is running all of the time. The GUI for cheops-ng just logs into # the server to use the server's functions, like OS detection and mapping. # * OS detection is done with nmap not with queso (which is out of date) # * Cheops-ng does not have monitoring capabilities yet. # * It is being maintained and supported # #Homepage: http://cheops-ng.sourceforge.net apt-get -y install cheops-ng # doscan #port scanner for discovering services on large networks #doscan is a tool to discover TCP services on your network. It is #designed for scanning a single ports on a large network. doscan #contacts many hosts in parallel, using standard TCP sockets provided #by the operating system. It is possible to send strings to remote #hosts, and collect the banners they return. # #There are better tools for scanning many ports on a small set of #hosts, for example nmap. apt-get -y install doscan # Fping #sends ICMP ECHO_REQUEST packets to network hosts #fping is a ping like program which uses the Internet Control Message Protocol #(ICMP) echo request to determine if a target host is responding. fping #differs from ping in that you can specify any number of targets on the command #line, or specify a file containing the lists of targets to ping. Instead of #sending to one target until it times out or replies, fping will send out a #ping packet and move on to the next target in a round-robin fashion. # # Homepage: http://www.fping.com/ apt-get -y install fping # Hping #Active Network Smashing Tool #hping3 is a network tool able to send custom ICMP/UDP/TCP packets and #to display target replies like ping does with ICMP replies. It handles #fragmentation and arbitrary packet body and size, and can be used to #transfer files under supported protocols. Using hping3, you can test #firewall rules, perform (spoofed) port scanning, test network #performance using different protocols, do path MTU discovery, perform #traceroute-like actions under different protocols, fingerprint remote #operating systems, audit TCP/IP stacks, etc. hping3 is scriptable #using the TCL language. #apt-get -y install hping2 apt-get -y install hping3 # IDSWakeup #tool for testing network intrusion detection systems #idswakeup is a Bourne shell script invoking hping2 (required) and iwu #(part of this package) to generate false alarms in order to check if #a network intrusion detection system works all right. # #idswakeup requires no configuration and includes many common attack #simulations. apt-get -y install idswakeup # Python-Scapy #Packet generator/sniffer and network scanner/discovery #Scapy is a powerful interactive packet manipulation tool, packet #generator, network scanner, network discovery, packet sniffer, etc. It #can for the moment replace hping, 85% of nmap, arpspoof, arp-sk, arping, #tcpdump, tethereal, p0f, .... # #In scapy you define a set of packets, then it sends them, receives #answers, matches requests with answers and returns a list of packet couples #(request, answer) and a list of unmatched packets. This has the big advantage #over tools like nmap or hping that an answer is not reduced to #(open/closed/filtered), but is the whole packet. # # Homepage: http://www.secdev.org/projects/scapy/ apt-get -y install python-scapy # IKE-Scan #discover and fingerprint IKE hosts (IPsec VPN Servers) #ike-scan discovers IKE hosts and can also fingerprint them using the #retransmission backoff pattern. # #ike-scan does two things: # #a) Discovery: Determine which hosts are running IKE. # This is done by displaying those hosts which respond to the IKE requests # sent by ike-scan. # . #b) Fingerprinting: Determine which IKE implementation the hosts are using. # This is done by recording the times of the IKE response packets from the # target hosts and comparing the observed retransmission backoff pattern # against known patterns. # . # The retransmission backoff fingerprinting concept is discussed in more # detail in the UDP backoff fingerprinting paper which should be included # in the ike-scan kit as udp-backoff-fingerprinting-paper.txt. apt-get -y install ike-scan # IKEProbe # lft #layer-four traceroute #lft sends various TCP SYN and FIN probes (differing from Van Jacobson's #UDP-based method) utilizing the IP protocol "time to live" field and #attempts to elicit an ICMP TIME_EXCEEDED response from each gateway along #the path to some host. #lft also listens for various TCP and ICMP messages along the way to assist #network managers in ascertaining per-protocol heuristic routing information #and can optionally retrieve various information about the networks it #traverses. # #Homepage: http://www.mainnerve.com/lft/index.html apt-get -y install lft # Netdiscover #active/passive address scanner using arp requests #The netdiscover tool is an active/passive address reconnaissance #program, mainly developed to gain informations about wireless #networks without dhcp servers in wardriving scenarios. It can #also be used on switched networks. Built on top of libnet and #libpcap, it can passively detect online hosts or search for #them by sending arp requests. Furthermore, it can be used to #inspect your network's arp traffic and find network addresses #using auto scan mode which will scan for common local networks. apt-get -y install netdiscover # Nmap #The Network Mapper #Nmap is a utility for network exploration or security auditing. It #supports ping scanning (determine which hosts are up), many port #scanning techniques, version detection (determine service protocols #and application versions listening behind ports), and TCP/IP #fingerprinting (remote host OS or device identification). Nmap also #offers flexible target and port specification, decoy/stealth scanning, #sunRPC scanning, and more. Most Unix and Windows platforms are #supported in both GUI and commandline modes. Several popular handheld #devices are also supported, including the Sharp Zaurus and the iPAQ. apt-get -y install nmap # NmapFE # ndiff #Compares two nmap scans #NDiff is a tool that can take the output from two nmap scans #and give you the difference between them. # #The difference can be new or removed hosts and services. apt-get -y install ndiff # NWatch #Network service detector #NWatch is a sniffer but can be conceptualized as a "passive port #scanner", in that it is only interested in IP traffic and it organizes #results as a port scanner would.
Recommended publications
  • Free Dmin Password Download Windows 10 3 Ways on How to Crack Administrator Password on Windows 10/8/7/XP
    free dmin password download windows 10 3 Ways on How to Crack Administrator Password on Windows 10/8/7/XP. Password is a very important security feature that lets you protect your important files from unauthorized users. If you have multiple accounts on your computer, then your administrator account will be the main account. To stop unauthorized users from gaining access to your important files, you would have likely set up a password to your administrator account. But what happens when you forget your administrator account password. You get a computer in which you can't go to the desktop or access your files. When you want to crack administrator password , then you will need the tricks to crack your administrator account password so that you can get access to your computer. Part 1. How to Crack Administrator Password Using CMD Part 2. Crack Administrator Password on Windows with Software Part 3. How to Crack Administrator Password Without Software. Part 1. How to Crack Administrator Password Using CMD. CMD or command prompt is an administrative tool in the Windows operating system. The command prompt is a command line tool that looks like MS-DOS and thus can be difficult to use for beginners. You can use various commands and utilities in command prompt to fix various system errors and issues. So it is no wonder that it can help crack administrator password. What you need for operating CMD is a little bit of skill and knowledge of the right commands. Command prompt not really shows you the old password, instead lets you reset the password.
    [Show full text]
  • Cyber Security Manual V1.0.Pdf
    St. Angelo‘s Professional Education Lab Manual v1.0 Contributing Authors: Rajesh Vishwakarma Vinod Singh Satish Jha Lalit Jha 1 St. Angelo‘s Professional Education Lab Manual v1.0 Table of Contents Program Overview ............................................................................................................................ 5 What is penetration testing? ........................................................................................................ 5 Objectives ..................................................................................................................................... 5 Pre-requisites ............................................................................................................................... 5 Course Contents ........................................................................................................................... 6 Module One: Art of Hacking ..................................................................................................... 6 Module Two: Scenario of Enterprise security .......................................................................... 6 Module Three: Planning and gathering Information................................................................ 6 Module Four: Social Engineering .............................................................................................. 6 Module Five: Taking on the system .......................................................................................... 7 Module Six: Attacking passwords
    [Show full text]
  • Local Password Exploitation Class
    Adrian Crenshaw http://Irongeek.com I run Irongeek.com I have an interest in InfoSec education I don’t know everything - I’m just a geek with time on my hands Regular on: http://www.isd-podcast.com/ http://Irongeek.com Pulling stored passwords from web browsers/IM clients and other apps Hash cracking of Windows passwords, as well as other systems Sniffing plain text passwords off the network How passwords on one box can be used to worm though other hosts on a network Hope it get’s you thinking. Exploits are temporary, bad design decisions are forever. http://Irongeek.com There are several reasons why an attacker may want to find local passwords: To escalate privileges on the local host (install games, sniffers, key stroke catchers and other software or just to bypass restrictions). Local passwords can be used to gain access to other systems on the network. Admins may reuse the same usernames and passwords on other network hosts (more than likely if they use hard drive imaging). Similar themes are also often used for password selection. Just for the fun of doing it. http://Irongeek.com Does not organize well, but you need to have these factoids in the back of your head for later. http://Irongeek.com Imaged Systems Uses it on other systems Repeat ad nauseum Attacker grabs local password on one box Grabs passwords from other systems, and installs keyloggers/sniffers to get network credentials for http://Irongeek.com more systems Target Audience: Workstation Installers, System Admins, Security Folk and General Gear-heads.
    [Show full text]
  • Windows Password Recovery Usb
    Windows password recovery usb Here are the 7 best free Windows password recovery and cracking tools. Just burn the program to a disc or USB drive, boot from it, and you're off. Kon-Boot ​Windows Password Recovery · ​Free Windows Password · ​Windows Vista. Lazesoft Recover My Password Home Edition is a Windows Password Recovery password recovery for Windows 8 and Windows ; Create UEFI boot USB. The article will give you some ideas to reset Windows password with USB flash drive. Select your USB password key disk drive and click "Next >" to reset the. It works offline, that is, you have to shutdown your computer and boot off a CD or USB disk to do the password reset. Will detect and offer to unlock locked or. Have you ever found yourself locked out of your own machine? You just changed your password, and sometime in the night it managed to slip out of your mind. Only with writable USB device, you could reset forgotten Windows 10//8/7/Vista/XP and Windows server password with USB password reset disk or bootable. How to Reset Password on Windows 7 with or without Reset Disk Burn a password reset disk with CD/DVD/USB flash drive on another. This best Windows password recovery tool can help you regain the password Reset passwords with a bootable CD, DVD or USB flash drive, easy and fast. In this edition of the Windows Desktop Report, Greg Shultz shows you how to create and use a Password Reset Disk in Windows 7 using a. If you've forgotten your Windows password and you don't have an to reset the password, you can do it easily with the Offline Windows Password editor.
    [Show full text]
  • Zekr: the Quran Study Tool Sabily: Linux for Muslim How to Reset
    Zekr: The Quran Study Tool Tanzil: Read Quran Translation in Various Sabily: Linux for Muslim Languages How to Reset Forgotten Ubuntu Tweak: Tweak Windows Log‐in Password Ubuntu To What You Like Canonical, Stop Making KDE Windows Administrators Look Bad? Are A Disgrace to IT ISSUE #8 Ramazan Mubarik Contents Let me start with a riddle, who are the beings that, in a sense, grant your wish instantly without asking for anything back in return? Appear when you need help, provide 04 Zekr : The Quran Study Tool free favors and magical tricks? Angels. Worldover there is significant interest in angels, pictures of angels, stories of angels, 09 Tanzil: Read Quran Translations In Various Languages and popular spirituality of angels which have put the images and imaginations of angels in our collective unconscious. In this Holy month of ramazan, we as Muslims, we 11 Sabily : Linux for Muslim have lot of room to believe in angels. Though the word angels literally means 16 messenger, today in the popular literature Ubuntu Tweak : Tweak Ubuntu To What You Like and movies angels have become more involved with tangible needs of this world. From glass slippers and ballroom dressess to 21 How to reset forgotten Windows log‐in password feeding the hungry, rickety places are preserved from disasters and even coded for you by angels. All in all angels represent help from an unknown and unseeable origin 24 Windows Administrators Are A Disgrace to IT to survive a difficult situation. Have you ever turned out into the unknown, expecting help from beyond your actual Canonical, Stop Making KDE Look Bad? means, wish‐projected? If you believe in 25 angels or if you have wish‐projected than it would not be hard to understand what Free Libre Open Source Software (FLOSS) is all about.
    [Show full text]
  • Openflow, in Proceedings of the Interna- Tional Conference on Pervasive Computing and Communication Workshops (Percom Workshops)
    Traffic Control for Multi-homed End-hosts via Software Defined Networking Anees Mohsin Hadi Al-Najjar B.Sc. (Computer Science), M.Sc. (Computer Science) A thesis submitted for the degree of Doctor of Philosophy at The University of Queensland in 2019 School of Information Technology & Electrical Engineering Abstract Software Defined Networking (SDN) is an emerging technology that allows computer networks to be more efficiently managed and controlled by providing a high level of abstraction and network programmability. Having powerful abstractions and pro- grammability via a centralised network controller provides new potential improve- ments to computer networks, such as easier network management, faster innovation and reduced cost. SDN has been successfully applied in wide area and data centre networks, and has achieved a significant improvement in network performance and efficiency. However, using SDN to control network traffic in end-host devices has not been investigated thoroughly. The research presented in this thesis aims to address this gap and inves- tigates the potential benefits of SDN for end-hosts. This thesis explores the feasibility of applying the SDN methodology to control network traffic on multi-homed end de- vices. The objective was to create a control mechanism by changing the network stack on the client in a way that is transparent to the application layer, the network infras- tructure, and other hosts on the network. In contrast to other solutions such as MPTCP, which require a protocol stack upgrade on all the participating nodes, the approach presented in this thesis allows quick and easy client-side-only deployment. This thesis presents an architecture for embedding SDN components, i.e.
    [Show full text]
  • Cracking Passwords Guide
    Cracking Passwords Version 1.1 file:///D:/password10.html Cracking Passwords Version 1.1 by: J. Dravet February 15, 2010 Abstract This document is for people who want to learn to the how and why of password cracking. There is a lot of information being presented and you should READ IT ALL BEFORE you attempted doing anything documented here. I do my best to provide step by step instructions along with the reasons for doing it this way. Other times I will point to a particular website where you find the information. In those cases someone else has done what I attempting and did a good or great job and I did not want to steal their hard work. These instructions have several excerpts from a combination of posts from pureh@te, granger53, irongeek, PrairieFire, RaginRob, stasik, and Solar Designer. I would also like to thank each of them and others for the help they have provided me on the BackTrack forum. I will cover both getting the SAM from inside windows and from the BackTrack CD, DVD, or USB flash drive. The SAM is the Security Accounts Manager database where local usernames and passwords are stored. For legal purposes I am using my own system for this article. The first step is to get a copy of pwdump. You can choose one from http://en.wikipedia.org/wiki/Pwdump . Update: I used to use pwdump7 to dump my passwords, however I have come across a new utility called fgdump from http://www.foofus.net/fizzgig/fgdump/ This new utility will dump passwords from clients and Active Directory (Windows 2000 and 2003 for sure, not sure about Windows 2008) where pwdump7 only dumps client passwords.
    [Show full text]
  • How to Reset Windows 7 Password with Ubuntu and Chntpw Utility
    HOW TO RESET WINDOWS 7 PASSWORD WITH UBUNTU AND CHNTPW UTILITY 1 / 3 HOW TO RESET WINDOWS 7 PASSWORD WITH UBUNTU AND CHNTPW UTILITY 2 / 3 In order for you to reset your Windows password, you have to make the ... chntpw is a terminal-based (not point-and-click) application, so to use it, ... it's Windows 7 or Windows XP—I forget which it is for Windows Vista). ... Please start the program with at least SAM & SYSTEM-hive filenames as arguments!. Method 2: Reset Windows 7/8/10 Login Password using iSeePasword 25 Jan 2017 ... chntpw, a neat Linux utility that you can use to reset a Windows password. reset ... Reset root password in Ubuntu, Debian, Kali, CentOS or pretty much any .... chntpw - utility to overwrite passwords of Windows systems ... a manual page. chntpw is a utility to view some information and reset user passwords in a Windows ... It might not work properly in Windows XP, Vista, Win7, Win8 and later systems.. Reset Your Windows Password Using Ubuntu Linux ... OPHCrack works best on Windows XP, Windows Vista and on Windows 7 computers. ... The chntpw command line tool is much better for resetting Windows passwords .... How to reset a Windows password with Linux ... Install the chntpw utility with the following command (you'll need a live internet connection for this): ... 7. Type 1 to clear the user password or 2 to set a new password for the Archit-PC user, then quit and save the ... This utility can also run from Ubuntu Live CD.. How To Reset Windows Login Password With Ubuntu Linux Live CD ..
    [Show full text]
  • The Stealing Windows Password
    FORENSIC INSIGHT; DIGITAL FORENSICS COMMUNITY IN KOREA The Stealing Windows Password blueangel [email protected] forensic-note.blogspot.kr Junghoon Oh Index 1. Introduction 2. Password Hash Dump in Registry 3. Password Hash Dump in NTDS.DIT 4. Password History Dump 5. LSA Secret Dump in Registry 6. Cached Domain Logon Information Dump in Registry 7. Password Hash Dump in Logon Session 8. Network service authentication credentials Dump 9. The Forensic Artifacts 10. Conclusion forensicinsight.org Page 2 Introduction forensicinsight.org Page 3 Introduction . 출처 : Dump Windows password hashes efficiently – Part 1 ~ 6 • Bernardo Damele A. G. ‘s Blog( http://bernardodamele.blogspot.kr ) forensicinsight.org Page 4 Password Hash Dump in Registry forensicinsight.org Page 5 Password Hash Dump in Registry . 레지스트리 파일 수집 • 컴퓨터 재부팅 후, USB 나 Live CD로 부팅하여 SAM 파일 수집 SAM 파일에 접근하여 Hash 값을 가져오는 도구 사용 • bkhive : dumps the syskey(bootkey) from a Windows system hive. • smdump2 : dumps Windows 2k/NT/XP/Vista password hashes. SAM 파일 수집 후, Can & Abel, creddump, mimikatz 도구를 통해 오프라인 공격 forensicinsight.org Page 6 Password Hash Dump in Registry . 레지스트리 파일 수집 • Logon Prompt 우회 후, 파일 수집 BootRoot( http://www.eeye.com/Resources/Security-Center/Research/Tools/BootRoot ) • 커스텀 부트 섹터 코드를 통해 커널이 로딩될 때 수정하여 로그인 프롬프트 우회 SysRQ2( http://www.eeye.com/Resources/Security-Center/Research/Tools/SysRQ2 ) • Bootable CD • SYSTEM 권한의 커맨드 프롬프트 제공 Kon-Boot( http://www.piotrbania.com/all/kon-boot/ ) • 상용 소프트웨어, CD나 USB에 설치함 • 부팅 중에 리눅스 or 윈도우즈 커널을 수정하여 패스워드를 입력하지 않아도(아무거나 쳐도) 관리자 권한으로 로그인할 수 있게 함 forensicinsight.org Page 7 Password Hash Dump in Registry .
    [Show full text]
  • Ipv6 for Helenos
    Charles University in Prague Faculty of Mathematics and Physics MASTER THESIS Mgr. Bc. Anton´ınSteinhauser IPv6 for HelenOS Department of Distributed and Dependable Systems Supervisor of the master thesis: Mgr. Martin Dˇeck´y Study programme: Informatics Specialization: Software Systems Prague 2013 I am much obliged to my thesis supervisor, Mgr. Martin Dˇeck´y,for his advices and hints in this research. I declare that I carried out this master thesis independently, and only with the cited sources, literature and other professional sources. I understand that my work relates to the rights and obligations under the Act No. 121/2000 Coll., the Copyright Act, as amended, in particular the fact that the Charles University in Prague has the right to conclude a license agreement on the use of this work as a school work pursuant to Section 60 paragraph 1 of the Copyright Act. In Prague date 18. 7. 2013 Anton´ınSteinhauser N´azevpr´ace:IPv6 for HelenOS Autor: Anton´ınSteinhauser Katedra: Katedra distribuovan´ych a spolehliv´ych syst´em˚u Vedouc´ıdiplomov´epr´ace: Mgr. Martin Dˇeck´y,Katedra distribuovan´ych a spolehliv´ych syst´em˚u Abstrakt: Tato pr´acerozˇsiˇrujeoperaˇcn´ısyst´emHelenOS o podporu nov´ehoIPv6 protokolu. Implementace protokolu IPv6 je na stejn´e´urovni jako dˇr´ıvˇejˇs´ıimple- mentace IPv4 protokolu. S´ıˇtov´ystack HelenOS nyn´ınab´ız´ıtˇrim´odypr´acese s´ıt´ı: uˇz´ıv´an´ıpouze IPv4 protokolu, uˇz´ıv´an´ıpouze IPv6 protokolu a du´aln´ım´od, kter´y umoˇzˇnujepouˇz´ıvat oba protokoly najednou. Pr´acepopisuje pˇredchoz´ıstav s´ıˇtov´ehostacku HelenOS, analyzuje rozd´ılymezi IPv4 protokolem a IPv6 protokolem a zd˚uvodˇnujejednotliv´astrategick´arozhod- nut´ı.
    [Show full text]
  • Shelf Manager User Guide (May 15, 2018) Page 1 / 321
    User Guide Pigeon Point Shelf Manager Release 3.7.1 May 15, 2018 nVent Schroff GmbH [email protected] www.pigeonpoint.com schroff.nVent.com This document is furnished under license and may be used or copied only in accordance with the terms of such license. The content of this manual is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by nVent. nVent assumes no responsibility or liability for any errors or inaccuracies that may appear in this book. Except as permitted by such license, no part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, manual, recording, or otherwise, without the prior written permission of nVent. The Pigeon Point Shelf Manager uses an implementation of the MD5 Message-Digest algorithm that is derived from the RSA Data Security, Inc. MD5 Message-Digest algorithm. All nVent marks and logos are owned or licensed by nVent Services GmbH or its affiliates. All other trademarks are the property of their respective owners. nVent reserves the right to change specifications without notice. Pigeon Point Shelf Manager User Guide (May 15, 2018) Page 1 / 321 Table of contents 1 About this document 9 1.1 Shelf Manager documentation 9 1.1.1 Conventions used in this document 9 1.2 Additional resources 10 2 Introduction 11 2.1 In this section 11 2.2 Intelligent Platform Management: an ATCA overview 11 2.3 Pigeon Point Board Management Reference: hardware and firmware 14 2.4
    [Show full text]
  • Linux Audio Conference 2019
    Proceedings of the Linux Audio Conference 2019 March 23rd – 26th, 2019 Center for Computer Research in Music and Acoustics (CCRMA) Stanford University, USA “In Ping(uins) e trust! Published by CCRMA, Stanford University, California, US March 2019 All copyrights remain with the authors http://lac.linuxaudio.org/2019 ISBN 978-0-359-46387-9 Credits Layout: Frank Neumann and Romain Michon Typesetting: LATEX and pdfLaTeX Logo Design: The Linuxaudio.org logo and its variations copyright Thorsten Wilms c 2006, imported into "LAC 2014" logo by Robin Gareus Thanks to: Martin Monperrus for his webpage "Creating proceedings from PDF files" ii Partners and Sponsors Linuxaudio.org iii iv Foreword Welcome everyone to LAC 2019 at CCRMA! For the second time in its seventeen year history, the Linux Audio Conference (LAC) is hosted in the United Stated of America by the Center for Computer Research in Mu- sic and Acoustics (CCRMA) at Stanford University. With its informal workshop-like at- mosphere, LAC is a blend of scientific and technical papers, tutorials, sound installations, and concerts centered on the free GNU/Linux operating system and open-source free soft- ware for audio, multimedia, and musical applications. LAC is a unique platform during which members of this community gather to exchange ideas, draft new projects, and see old friends. In these times of increasing political tensions and of rising extremism throughout the world, we believe that emphasizing and promoting the universality of this type of event is of the utmost importance. The Linux audio community exists worldwide; we believe it should remain a priority to diversify LAC’s geographical location from year to year for the benefit of those who can’t afford to travel to the other side of the world.
    [Show full text]