Wibukey Developer Guide

Total Page:16

File Type:pdf, Size:1020Kb

Wibukey Developer Guide WibuKey Developer Guide for Windows, Mac OS, Linux/UNIX on IBM compatible PCs and Macintosh Version 6.11, Edition February 2013 WibuKey Developer Guide © Copyright 2003-2013 by WIBU-SYSTEMS AG, Rueppurrer Strasse 52-54, 76137 Karlsruhe, Germany Printed in Germany All rights reserved. No part of this documentation, the accompanying software, or other components of the described product may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose other than the personal use of the purchaser without the express written permission of Wibu-Systems. While the data contained in this document has been written with all due care, Wibu-Systems does not warrant or assume responsibility that the data is free from errors or omissions. Wibu-Systems expressly reserves the right to change programs or this documentation without prior notice. Trademarks WIBU®, CodeMeter®, SmartShelter® are registered trademarks of Wibu- Systems. All other brand names and product names used in this documentation are trade names, service marks, trademarks, or registered trademarks of their respective owners. Wibu-Systems is member of: PCMCIA since 1993 USB Implementers Forum since 1997 SD Card Association since 2007 SIIA Software & Information Industry Association since 1998 Bitkom, Bundesverband Informationswirtschaft, Telekommunikation und Neue Medien (German Association of Information Technology, Telecommunications, and New Media) since 2003 VDMA, Verband Deutscher Maschinen- und Anlagenbau e.V. (German Engineering Federation) since 2008 and also member of the Developers programs of Autodesk, Apple, HP, IBM, Intel and Microsoft. Microsoft Gold Certified Partner Microsoft Embedded Partner 2 Contents Table of Contents Table of Contents 3 Part I Preface 11 1 About this Guide 11 2 Other Help Documents 12 3 Typographic Convention 12 4 Contacting Support 13 5 About Wibu-Systems 14 Part II Introduction 16 1 The WibuKey concept 16 1.1 What is WibuKey? 16 1.2 What is a WibuBox? 16 1.3 What are the FIRM CODE and the USER CODE? 18 1.4 WibuKey protection by encryption 20 1.5 Summary 23 1.6 Operating systems for WibuKey 24 2 WibuKey features 26 2.1 Storing data in the WibuBox 28 2.2 Storing sensitive data 29 2.3 Using the additional memory 31 2.4 Software metering 32 2.5 EXPIRATION DATE 34 2.6 Protecting modular software 37 3 Network support – WibuKey Server 38 3.1 The WibuKey network concept 39 3.2 Network license management 39 3.2.1 Licensing a single application 40 3.2.2 Licensing modular software 41 3.2.3 Huge license management 44 3.3 Advantages of WibuKey network license management 46 4 WibuKey hardware in the field 47 4.1 Delivering customer-specific updates 47 4.2 WibuBox remote programming 48 5 Checklist for copy protection 52 5.1 Degree of protection 52 5.2 Automatic or individual protection 52 5.3 Product or customer-specific protection 52 5.4 Protection with a local WibuBox and/or across the network 53 5.5 Protection of modular software with a single WibuBox 54 5.6 Simulation of multiple USER CODES with MASTER ENTRIES 55 6 WibuBox reprogramming 57 3 WibuKey Developer Guide 7 Additional WibuKey features 58 7.1 Pay-per-use, software leasing, software metering 58 7.2 EXPIRATION DATE 59 7.3 Saving data in the WibuBox 59 7.4 Data protection 60 7.5 Use of the EXTENDED MEMORY 60 7.6 Web authentication 61 8 Protection checklist 61 Part III Installing WibuKey Software 62 1 WibuKey CD-ROM 62 2 Installation process 62 3 Installation on Macintosh 63 4 Installation on Linux 64 Part IV Protecting software and digital content 65 1 AxProtector: Automatic software protection 65 1.1 Structure and Navigation 67 1.1.1 Menu Bar 68 1.1.2 Navigation Window 69 1.1.3 Input Window 69 1.1.4 Error and Warning Window 69 1.2 Project Dialog 70 1.3 Project Types 70 2 Windows Applications (32-bit/64-bit) 71 2.1 File to Protect 71 2.2 Licensing systems 72 2.3 License Handling 73 2.4 Runtime Settings 75 2.5 Advanced Runtime Settings 77 2.6 Security Options 78 2.7 Advanced Security Options 81 2.8 Error Messages 82 2.9 Advanced Options 83 2.9.1 License Lists 84 2.9.2 Add License Lists 85 2.9.3 IxProtector 88 2.9.4 Add Function Lists 88 2.9.5 File Encryption 90 2.10 Summary 94 2.11 Protection Result 95 3 .NET Applications 97 3.1 File to protect 98 3.2 Licensing Systems 99 3.3 License Handling 100 3.4 Runtime Settings 101 4 Contents 3.5 Advanced Runtime Settings 103 3.6 Security Options 104 3.7 Error Messages 105 3.8 .NET Options 107 3.9 Advanced Options 108 3.9.1 License Lists 109 3.9.2 Add License Lists 110 3.9.3 IxProtector 112 3.10 Summary 115 3.11 Protection Result 116 4 Mac OS X Applications 117 4.1 File to protect 117 4.2 Licensing Systems 118 4.3 License Handling 120 4.4 Runtime Settings 122 4.5 Advanced Runtime Settings 123 4.6 Error Messages 124 4.7 Advanced Options 125 4.8 Summary 126 4.9 Protection Result 127 5 Linux Applications 128 6 Java Applications 129 6.1 File to Protect 131 6.2 Licensing Systems 132 6.3 License Handling 133 6.4 Runtime Settings 135 6.5 Advanced Runtime Settings 137 6.6 Security Options 138 6.7 Advanced Security Options 139 6.8 Error Messages 140 6.9 Java Options 140 6.10 Advanced Options 142 6.11 Summary 143 6.12 Protection Result 144 7 File Encryption 146 7.1 File to Protect 146 7.2 Licensing Systems 147 7.3 License Handling 148 7.4 Advanced Options 150 7.4.1 License Lists 151 7.4.2 Add License Lists 152 7.4.3 File Encryption 154 7.5 Summary 158 7.6 Protection Result 159 8 IxProtector only 160 8.1 File to Protect 160 8.2 Error Messages 161 8.3 Advanced Options 162 8.3.1 License Lists 163 5 WibuKey Developer Guide 8.3.2 Add License Lists 164 8.3.3 IxProtector 166 8.3.4 Add Function Lists 167 8.4 Summary 169 8.5 Protection Result 170 9 Commandline options for AxProtector 172 9.1 Basic Options 172 9.2 Options for the Copy Protection System 173 9.3 Options for Encryption and Decryption 175 9.4 Runtime Options 184 9.5 Java-specific Options 187 9.6 Operational Options 189 10 IxProtector and the Software Protection API – WUPI 191 11 WUPI Functions 192 12 Individual Software Protection using WUPI: an Example 196 12.1 Definition of Modules 197 12.2 Placeholders in IxProtector License and Function Lists 198 12.3 Programming of the WibuBox 204 12.4 Integration into the Source Code 205 12.5 Encryption using AxProtector 207 Part V Programming WibuBox Hardware 208 1 WkList - Interactive programming 209 1.1 Storing and modifying BASE ENTRIES 211 1.2 Storing and modifying Added Entries 213 1.3 Storing and modifying User Data and Protected Data 213 1.4 Modifying WibuBox configuration attributes 215 2 WKCRYPT - Commandline programming 216 2.1 Programming WibuBoxes 216 2.2 Modifying WibuBox contents 221 2.3 Listing WibuBox contents 223 2.4 Modifying WibuBox configuration attributes 223 2.5 Initializing WibuBox hardware 224 2.6 Output of programming sequences 224 3 Remote programming 226 3.1 Remote programming at the custome 227 3.2 Remote programming using the WibuKey symbol 227 3.2.1 Context file generation 227 3.2.2 Updating WibuBox contents 228 3.3 Commandline actions at the customer 229 3.4 Actions at the developer's side 230 3.4.1 Remote programming with WkList 230 3.4.2 Commandline syntax remote programming (WKCRYPT) 232 3.4.3 Activating remote programming 232 3.4.4 Creating an update file 232 3.4.5 Creating a modified context file 233 3.4.6 File format of remote programming files 233 3.4.7 Additional options and tips 233 6 Contents Part VI Implementing network protection 235 1 WibuKey network technology 235 1.1 Features of WkLAN 236 2 WkLAN – protocol-based protection 236 2.1 WkLAN configuration 237 2.1.1 WkLAN server configuration 237 2.1.2 Adapting WkLAN to custom TCP/IP ports 240 2.1.3 Binding to specific IP addresses 240 2.1.4 Access permissions for the clients 240 2.1.5 WKLAN client configuration 241 2.1.6 Protecting software for WkLAN 242 2.2 First evaluation test 243 3 How does the WibuKey Server work? 245 3.1 Starting the WibuKey Server on Windows 245 3.2 Starting the WibuKey Server on Linux 246 3.3 Starting WibuKey Server on Mac OS X 247 3.4 WibuBox network entries 249 4 WibuBox network cluster 252 4.1 The basics 252 4.2 Network clusters 254 4.3 Cluster management 256 5 Handling of network users 257 5.1 Sharing local and network access 257 5.2 WibuKey Server without user limitation 257 5.2.1 Unlimited access 258 5.2.2 User limitation 258 5.3 Setting of a fixed slot by a client 259 6 Huge license management 260 6.1 Creating a HLM control file 261 6.2 Setting a server-sided HLM control file 263 6.3 Mixing of HLM and WibuBox network clusters 264 6.4 HLM in the extended memory 265 6.5 The WibuBox entries 265 7 WibuKey network tools 268 7.1 Control Panel Applet 268 7.2 WibuKey Network Server Monitor 269 7.3 Server process HTTP interface 270 Part VII Controlling and configuring WibuKey 272 1 WibuKey Control Panel Applet 272 1.1 Contents page 273 1.2 Test page 275 1.3 Server page 276 1.3.1 Cluster Name 276 1.3.2 HLM Files 276 1.3.3 WkLAN Configuration 277 7 WibuKey Developer Guide 1.4 Server access page 278 1.5 Server WkNet page 278 1.5.1 WkNet configuration 279 1.6 Network page 281 1.6.1 WkNet settings 281 1.6.2 WkLAN settings 282 1.6.3 Subsystem settings 283 1.7 WibuBox context page 283 1.8 WibuBox update page 284 1.9 Setup page 285 1.9.1 General settings 286 1.9.2 Special settings for WibuBox/P and WibuBox/RP 286 1.9.3 Special settings for WibuBox/SP and WibuBox/ST 287 1.9.4 Special settings for WibuBox/U and WibuBox/RU 289 1.9.5 Special settings for WibuBox/M 289 1.9.6 Special settings
Recommended publications
  • Server Operating System
    Server Operating System ® White Paper Guide to Microsoft® Windows NT® 4.0 Profiles and Policies © 1997 Microsoft Corporation. All rights reserved. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Microsoft, the BackOffice logo, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Other product or company names mentioned herein may be the trademarks of their respective owners. Microsoft Corporation • One Microsoft Way • Redmond, WA 98052-6399 • USA 0997 Abstract This guide provides information and procedures for implementing Microsoft® Windows NT® 4.0 Profiles and Policies on client workstations and servers. A Microsoft Windows NT 4.0 User Profile describes the Windows NT configuration for a specific user, including the user’s environment and preference settings. A System Policy is a set of registry settings that together define the computer resources available to a group of users or an individual. With the addition of System Policies and the new User Profile structure to Windows NT 4.0, network administrators have a greater ability to control the user environment than they have ever had before. This document provides the details that administrators need to know to implement a rollout of User Profiles and System Policies under Windows NT 4.0.
    [Show full text]
  • Command Line Interface User's Guide
    Dell™ OpenManage™ Server Administrator Version 5.2 Command Line Interface User's Guide www.dell.com | support.dell.com Notes and Notices NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. ____________________ Information in this document is subject to change without notice. © 2006 Dell Inc. All rights reserved. Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell, the DELL logo, PowerEdge, and OpenManage are trademarks of Dell Inc.; Microsoft, Windows, Windows Server, MS-DOS, and Windows NT are registered trademarks of Microsoft Corporation; SUSE is a registered trademark of Novell, Inc. in the United States and other countries; Red Hat and Red Hat Enterprise Linux are registered trademarks of Red Hat, Inc.; Intel, Pentium, and Itanium are registered trademarks and Intel386 is a trademark of Intel Corporation; AMD, AMD Opteron, AMD-V, and AMD PowerNow! are trademarks of Advanced Micro Devices, Inc.; VESA is a registered trademark of Video Electronic Standards Association; UNIX is a registered trademark of The Open Group in the United States and other countries; OS/2 is a registered trademark of International Business Machines Corporation. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. December 2006 Contents 1 Introduction .
    [Show full text]
  • The Last Great Commodore 64 Commercial Software Sale
    theMONITOR CommodoreUsersGroupofSaskatchewan 361729thAvenue Regina,SK S4S2P8 Tel:(306)584-1736 BBS:(306)586-6608 President eachother.Membershipdues($15)arepro-rated, TristanMiller 584-1736 basedonaJanuarytoDecemberyear.Anaddi- VicePresident tional$5willbechargedformemberswishing ByronPurse 586-1601 theirnewsletterstobemailedtothem. Secretary/Treasurer KenDanylzczuk 545-0644 Anyone interested in computing is welcome to Editor attendanymeeting.Membersareencouragedto TristanMiller 584-1736 submitpublicdomainandsharewaresoftware AssistantEditors forinclusionintheCUGSDiskLibrary.These ByronPurse 586-1601 programsaremadeavailabletomembersat$3.00 R LyndonSoerensen 565-2167 each(discountedpriceswhenbuyingbulk).Since KeithKasha 522-5317 someprogramsonthedisksarefrommagazines, 64Librarian individualmembersareresponsiblefordeleting StanMustatia 789-8167 anyprogramthattheyarenotentitledtobylaw 128Librarian (youmustbetheownerofthemagazineinwhich O KeithKasha 522-5317 theoriginalprogramwasprinted).Tothebestof MemberatLarge ourknowledge,allsuchprogramsareidentifiedin HerbThompson 543-3460 theirlistings. T TheMonitorispublishedmonthlybytheCom- Otherbenefitsofclubmembershipincludeaccess modore User's Group of Saskatchewan toourdiskcopyingservice,tomakebackupsof I (CUGS).MeetingsareheldonthefirstWednes- copy-protectedsoftware,anymemberswhoowna dayofeverymonthinMillerHighSchool'scafete- modemandwishtocallourbulletinboardwill ria annex, unless otherwise noted. The next receiveincreasedaccesstothemessageandfile meetingwillbeheldonDecember1,1993from areas.Theboardoperatesat300to2400baud,24
    [Show full text]
  • Hack Attacks Revealed
    Hack Attacks Revealed A Complete Reference with Custom Security Hacking Toolkit John Chirillo This netLibrary eBook does not include the ancillary media that was packaged with the original printed version of the book. Publisher: Robert Ipsen Editor: Carol A. Long Assistant Editor: Adaobi Obi Managing Editor: Micheline Frederick New Media Editor: Brian Snapp Text Design & Composition: Thomark Design Designations used by companies to distinguish their products are often claimed as trademarks. In all instances where John Wiley & Sons, Inc., is aware of a claim, the product names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should contact the appropriate companies for more complete information regarding trademarks and registration. Copyright © 2001 by John Chirillo. All rights reserved. Published by John Wiley & Sons, Inc. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per- copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750- 8400, fax (978) 750-4744. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850-6008, E-Mail: PERMREQ @ WILEY.COM. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in professional services.
    [Show full text]
  • Dell Server Administrator Version 7.4.1 Release Notes
    Server Administrator 7.4.1 Release Notes Release Type and Definition Server Administrator This document contains updated information for the "Server Administrator User's Guide" and any other technical documentation included with Server Administrator. NOTE: System Management software, including the Server Administrator (Server Administrator), is available only on the "Systems Management Tools and Documentation" DVD. The Server Administrator (Server Administrator) documentation includes the "User's Guide", "Messages Reference Guide", "CIM Reference Guide", "Command Line Interface (CLI) Guide", "SNMP Reference Guide", and "Compatibility Guide". You can access the documentation from the Systems Management Tools and Documentation DVD or from "dell.com/support/manuals". Version 7.4.1 Release Date December 2014 Previous Version 7.4.0 Importance RECOMMENDED: It is recommended to apply this update during your next scheduled update cycle. The update contains feature enhancements or changes that will help keep your system software current and compatible with other system modules (firmware, BIOS, drivers and software). Platform(s) Affected For a complete list of supported Dell PowerEdge systems and supported Operating systems, see the Dell Systems Software Support Matrix available in the required version of OpenManage Software at dell.com/openmanagemanuals. What is Supported Hardware Requirements • Minimum of 2 GB RAM • Minimum of 512 MB free hard drive space • Administrator rights • Monitor with a minimum screen resolution of 800 x 600. The recommended screen resolution is at least 1024 x 768 Software Requirements • Supported operating system and web browser. • TCP/IP connection on the managed system and the remote system to facilitate remote system management. • Supported systems management protocol standard.
    [Show full text]
  • Mystery Behind Windows Registry
    Mystery Behind Windows Registry Index of Windows Registry Guide 1. What is Registry - an introduction 2. The Structure of Registry · HKEY_LOCAL_MACHINE (all of the settings for the system) · HKEY_CURRENT_CONFIG (a subset of HKEY_LM that details the current configuration) · HKEY_USERS (settings for the users of the machine) · HKEY_CURRENT_USER (subset of HKEY_USERS that details out the profile of the current user) · HKEY_CLASSES_ROOT (a subset of HKEY_LM & all of the software "classes" and extensions) · HKEY_DYNAMIC_DATA (dynamic information about PC that is built at startup) 3. Registry Corruption - Problem & Solutions · Registry Problems - Corruption of Registry · Protecting the Registry - Backup Solutions · Recovering from Registry Failure 4. Registry Tips and Secrets (Only in html version at http://srana.virtualave.net/winreg.htm ) 5. Some essential software for rescue 6. Inf files 7. Remote Registry Editing What is Registry and It's Role What is the Registry? The Registry has been made out to be a phenomenal mystery probably due to the CLSID keys alone and as such has inspired a number of books, faqs websites etc. It is very unfortunate that Microsoft has chosen to deal with the Registry and Registry editing as a "black art," leaving many people in the dark as to the real uses of all the settings in the systems. Microsoft's refusal to adequately, and publicly, supply information about the correct settings is extremely frustrating and added further mystery to registry. Certainly, more damage has and will be done because of lack of knowledge than because of too much information. The Windows Registry is a set of data files used to help Windows control hardware, software, the user's environment, and the "look and feel" of the Windows interface.
    [Show full text]
  • Verde Staff User's Guide
    Staff User’s Guide Version 2.0 (SFX 4.x) CONFIDENTIAL INFORMATION The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic loss. DO NOT COPY UNLESS YOU HAVE BEEN GIVEN SPECIFIC WRITTEN AUTHORIZATION FROM EX LIBRIS LTD. This document is provided for limited and restricted purposes in accordance with a binding contract with Ex Libris Ltd. or an affiliate. The information herein includes trade secrets and is confidential. DISCLAIMER The information in this document will be subject to periodic change and updating. Please confirm that you have the most current documentation. There are no warranties of any kind, express or implied, provided in this documentation, other than those expressly agreed upon in the applicable Ex Libris contract. This information is provided AS IS. Unless otherwise agreed, Ex Libris shall not be liable for any damages for use of this document, including, without limitation, consequential, punitive, indirect or direct damages. Any references in this document to third‐party material (including third‐party Web sites) are provided for convenience only and do not in any manner serve as an endorsement of that third‐ party material or those Web sites. The third‐party materials are not part of the materials for this Ex Libris product and Ex Libris has no liability for such materials. TRADEMARKS ʺEx Libris,ʺ the Ex Libris bridge , Primo, Aleph, Alephino, Voyager, SFX, MetaLib, Verde, DigiTool, Preservation, URM, Voyager, ENCompass, Endeavor eZConnect, WebVoyage, Citation Server, LinkFinder and LinkFinder Plus, and other marks are trademarks or registered trademarks of Ex Libris Ltd.
    [Show full text]
  • QWK Mail Reader
    BBS Archives - Off-Line Mail Readers http://archives.thebbs.org/ra110c.htm Off-Line Mail Readers 1ST-200.ZIP 1620K 07-20-1995 1stReader 2.00 QWK offline mail reader from Sparkware. This archive contains the rest of the basic 2.00 release. It includes manuals, address book, RIP and database support. 1ST-200C.ZIP 485K 07-20-1995 1stReader 2.00 QWK offline mail reader from Sparkware. This archive contains the spelling checker, 1STEDIT text editor and FLI support modules. (File 3 of 6 in 2.00 release) 1ST-200D.ZIP 934K 07-20-1995 1stReader 2.00 QWK offline mail reader from Sparkware. This archive contains the multimedia sound files used by the full 1stReader 2.00 release. You do not need them if you do not have a sound card. (File 4 of 6 in 2.00 release) 1ST-200E.ZIP 238K 07-20-1995 1stReader 2.00 QWK offline mail reader from Sparkware. This archive contains support for third party programmers who are interested in writing utilities for the 2.00 release. Includes full documentation on the 1stReader API interface. (File 5 of 6 in 2.00 release) 1ST-200F.ZIP 368K 07-20-1995 1stReader 2.00 QWK offline mail reader from Sparkware. This archive contains the 80386 (and higher) compiled version of the 1ST.EXE program. Do NOT use if you own a 80286 or 8088 system. (File 6 of 6 in 2.00 release) 1ST-BBS.ZIP 108K 07-20-1995 1stReader 2.00 sysop's kit. This archive tells you, the sysop, how to setup your own {QWKID}.BBS file so 1stReader can be "preconfigured" and ready to work seamlessly with your bulletin board system.
    [Show full text]
  • Alt.Am Yellow Netpages™ USENET Newsgroups
    Yellow NetPages™ USENET Newsgroups a.bsu – alt.am 81 a.bsu.programming ak.admin alt.1d alt.activism.children Alaskan network news administration. One-dimensional imaging, & the think- Open discussion of political issues a.bsu.religion ing behind it. about children. ak.bushnet.thing a.bsu.talk Alaskan Public Access Networking. alt.2600 alt.activism.d aaa.inu-chan The magazine or the game system. A place to discuss issues in ak.config Inu-chan by Kenso KATO (Moderated) You decide. alt.activism. Alaskan regional heirarchy configura- ab.arnet tion. alt.2600.codez alt.activism.death-penalty No description. For people opposed to capital punish- ab.general ak.test ment. Items of general interest in Alberta, Messages with the beta-nature. alt.2600.crackz Canada. Broken software protection. alt.adjective.noun.verb.verb.verb akr.freenet The penultimate alt group. ab.jobs Discussion about the Akron Regional alt.2600.hackerz Jobs in Alberta, Canada. Free-Net. Just what is so cool about not be able alt.adoption to spell? For those involved with or contemplat- ab.politics akr.internet ing adoption. Discussion of politics in Alberta, Internet access in the Akron, Ohio, alt.2600.hope.announce Canada. area. Hackers on Planet Earth announce- alt.adoption.agency ments. Licensed non-profit adoption agency abg.acf-jugend alabama.announce information. abg.acf-termine Announcements of interest to everyone alt.2600.hope.d in Alabama. (Moderated) Hackers on Planet Earth discussion. alt.aeffle.und.pferdle abg.acf-vor German TV cartoon characters das alabama.config alt.2600.hope.tech Aeffle und das Pferdle.
    [Show full text]
  • CIS Microsoft Windows 10 Enterprise (Release 1607) Benchmark
    CIS Microsoft Windows 10 Enterprise (Release 1607) Benchmark v1.2.0 - 06-28-2017 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International Public License. The link to the license terms can be found at https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode To further clarify the Creative Commons license related to CIS Benchmark content, you are authorized to copy and redistribute the content for use by you, within your organization and outside your organization for non-commercial purposes only, provided that (i) appropriate credit is given to CIS, (ii) a link to the license is provided. Additionally, if you remix, transform or build upon the CIS Benchmark(s), you may only distribute the modified materials if they are subject to the same license terms as the original Benchmark license and your derivative will no longer be a CIS Benchmark. Commercial use of CIS Benchmarks is subject to the prior approval of the Center for Internet Security. 1 | P a g e Table of Contents Overview ............................................................................................................................................................... 32 Intended Audience ........................................................................................................................................ 32 Consensus Guidance ..................................................................................................................................... 32 Typographical Conventions .....................................................................................................................
    [Show full text]
  • Administrator Guide
    FRONTDOOR Administrator Guide FRONTDOOR Administrator Guide Copyright © 1998, 1999, 2001 Definite Solutions HB; All rights reserved. All Definite Solutions products and trademarks are trademarks or registered trademarks of Definite Solutions HB; with the exception of FrontDoor which is a registered trademark of Joaquim Homrighausen. Other brands and product names are trademarks or registered trademarks of their respective holders. This publication is protected by international copyright laws and treaty provisions. It may only be distributed and used in accordance with those laws and treaty provisions. DEF-E-FDADMIN-Z-1/2001-EP Produced in Sweden. To the memory of Catharina Frödin and Alva Gårdlund. And to Alexander, Janet, Christian, Katja, and Igor. Party on Fred, we miss you. Special thanks to Bruce Bodger for his help with the production of the entire FrontDoor package. Special thanks to Colin Turner for his help with the production of this document. Special thanks to Jim Louvau for his help with the initial development of the communications module for the OS/2 version of FrontDoor. FrontDoor Administrator Guide TABLE OF CONTENTS TABLE OF CONTENTS ............................................................................................................................................................ 4 1. INTRODUCTION ................................................................................................................................................................... 8 ABOUT THIS DOCUMENT ............................................................................................................................................................
    [Show full text]
  • CIS Microsoft Windows 10 Enterprise (Release 1703) Benchmark V1.3.0 - 10-30-2017
    CIS Microsoft Windows 10 Enterprise (Release 1703) Benchmark v1.3.0 - 10-30-2017 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International Public License. The link to the license terms can be found at https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode To further clarify the Creative Commons license related to CIS Benchmark content, you are authorized to copy and redistribute the content for use by you, within your organization and outside your organization for non-commercial purposes only, provided that (i) appropriate credit is given to CIS, (ii) a link to the license is provided. Additionally, if you remix, transform or build upon the CIS Benchmark(s), you may only distribute the modified materials if they are subject to the same license terms as the original Benchmark license and your derivative will no longer be a CIS Benchmark. Commercial use of CIS Benchmarks is subject to the prior approval of the Center for Internet Security. 1 | P a g e Table of Contents Overview ............................................................................................................................................................... 32 Intended Audience ........................................................................................................................................ 32 Consensus Guidance ..................................................................................................................................... 32 Typographical Conventions .....................................................................................................................
    [Show full text]