The Response by the Security Community to Are All Retained

Total Page:16

File Type:pdf, Size:1020Kb

The Response by the Security Community to Are All Retained The magazine you!re reading was put together during an extremely busy few months that saw us pile up frequent flier miles on the way to several conferences. You can read about some of them in the pages that follow, specifically RSA Conference 2009, Infosecurity Europe 2009 and Black Hat Europe 2009. This issue brings forward many hot topics from respected security professionals located all over the world. There!s an in-depth review of IronKey, and to round it all up, there are three interviews that you!ll surely find stimulating. This edition of (IN)SECURE should keep you busy during the summer, but keep in mind that we!re coming back in September! Articles are already piling in so get in touch if you have something to share. Mirko Zorz Editor in Chief Visit the magazine website at www.insecuremag.com (IN)SECURE Magazine contacts Feedback and contributions: Mirko Zorz, Editor in Chief - [email protected] Marketing: Berislav Kucan, Director of Marketing - [email protected] Distribution (IN)SECURE Magazine can be freely distributed in the form of the original, non modified PDF document. Distribution of modified versions of (IN)SECURE Magazine content is prohibited without the explicit permission from the editor. Copyright HNS Consulting Ltd. 2009. www.insecuremag.com Qualys adds Web application scanning to QualysGuard Qualys added QualysGuard Web Application Scanning (WAS) 1.0 to the QualysGuard Security and Compliance Software-as-a- Service (SaaS) Suite, the company!s flagship solution for IT secu- rity risk and compliance management. Delivered through a SaaS model, QualysGuard WAS delivers automated crawling and test- ing for custom Web applications to identify most common vulner- abilities such as those in the OWASP Top 10 and WASC Threat Classification, including SQL injection and cross-site scripting. QualysGuard WAS scales to scan any number of Web applica- tions, internal or external in production or development environments. (www.qualys.com) Integrated protection for smartphones: Kaspersky Mobile Security 8.0 The new version of Kaspersky Mobile Security provides protection against the wide range of threats facing smartphone users. For instance, SMS Find can locate the exact whereabouts of a lost smartphone. After sending an SMS with a password to the lost device, the user receives a link to Google Maps containing its exact coordinates. The Anti-theft module of Kaspersky Mobile Security 8.0 makes it possible for the owner of a lost or stolen smartphone to remotely block access to or completely wipe the memory of the device by simply sending a codeword via SMS to his/her number. (www.kaspersky.com) www.insecuremag.com "" 5 SSH solution for real-time inspection and audit of encrypted traffic SSH Communications Security announced SSH Tectia Guardian, a new technology solution that enables real-time session and file transfer monitor- ing with IDS or DLP integration capabilities, as well as replay of sessions for post-session auditing of encrypted traffic. This unique security solution enables both real-time inspection, and full re- play of SSH, SFTP, Telnet, and RDP traffic and sessions to meet compliance, governance, audit- ing, and forensics requirements in enterprises and government entities. (www.ssh.com) Acunetix Web Vulnerability Scanner 6.5 now available Acunetix announced new "file upload forms vulner- ability checks" in version 6.5 of the Acunetix Web Vulnerability Scanner (WVS). Other key features in the new versions are the new Login Sequence Re- corder, Session Auto Recognition functionality and improved cookie and session handling. With the new Login Sequence Recorder and Session Auto Recognition module, WVS can automatically login to a wider range of authentication forms using dif- ferent authentication mechanisms, while with the improved cookie and session handling. WVS is now able to scan a broader range of dynamic web applications effectively. (www.acunetix.com) Wi-Fi kit for disaster response and temporary events Xirrus announced a portable, pre-packaged kit designed for the rapid and simple de- ployment of Wi-Fi networks in temporary applications. Unlike other Wi-Fi networking solutions which require many different components, the Xirrus Wi-Fi Array integrates everything needed to deploy a large coverage, high density Wi-Fi network supporting up to hundreds of clients into a single device. This makes the Wi-Fi Array the ideal fit for portable applications such as disaster re- sponse command posts; high-density events such as conferences and expositions; and short-term events such as festivals, markets, and fairs. (www.xirrus.com) PGP launches Endpoint Application Control PGP has announced PGP Endpoint Application Control, a product that blocks malicious and unauthorized software, including applications, scripts and macros, from executing on a user!s system by automatically enforcing policies using whitelisting technology that explicitly allows only trusted and authorized software applications. By leveraging PGP Endpoint Application Control as another layer of data defense, customers can ensure business continuity with always-on protection and not have to worry about malicious software entering their networks. (www.pgp.com) www.insecuremag.com "" 6 Web penetration testing live CD The Samurai Web Testing Framework is a live Linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on test- ing and attacking websites. The developers included the tools they use in their own security practice. (sourceforge.net/projects/samurai) RIM launches BlackBerry Enterprise Server 5.0 RIM launched BlackBerry Enterprise Server 5.0 which supports advanced IT ad- ministration features and smartphone controls that help improve the productivity of mobile workers and meet the demands of large-scale, mission critical enterprise deployments. It enables a secure, centrally managed link between BlackBerry smartphones and enterprise systems, applications, corporate phone environments and wireless networks. (www.blackberry.com) New StoneGate FW-1030 appliance with firewall capabilities Stonesoft introduced the StoneGate FW-1030 appliance with firewall capabilities. It provides data security for small enterprises and remote offices combined with StoneGate's built-in high availability features that guarantee always-on connectivity. With perimeter protection and internal network segmenting ca- pabilities, the FW-1030 prevents computer worms from spreading and contaminating an organi- zation's internal network. It provides built-in solid-state disk technologies that emphasize reliability and durability while using 50% less power compared to similar appliances. (www.stonesoft.com) New release of RSA Data Loss Prevention Suite RSA announced enhancements to the RSA Data Loss Prevention Suite, its suite of data security products that are engineered to discover, moni- tor and protect sensitive data from loss, leakage or misuse whether in a datacenter, on the network, or out at the endpoints. The allows organiza- tions to secure sensitive content in a way that saves time and stream- lines processes for data security personnel. Sensitive data at rest can now be moved or quarantined automatically and users can apply self- remediation for emails quarantined due to violations. (www.rsa.com) New services to secure Web applications from TippingPoint TippingPoint announced its Web Application Digital Vaccine (Web App DV) services, a two-part approach to address the security threat posed by Web applications. This set of services enables users to maximize their security investments, while reducing the risk of attacks through custom-built Web ap- plications. (www.tippingpoint.com) www.insecuremag.com "" 7 Malware researchers are very careful with the samples they analyze. They know several types of malicious files can execute their payload even without being opened. Up until now, the consensus was that malicious PDF docu- ments were harmless as long as you didn't open them with a vulnerable ver- sion of a PDF reader, usually Adobe Reader. My research shows that this is no longer the case. Under the right circumstances, a malicious PDF document can trigger a vulnerability in Adobe Reader without getting opened. The JBIG2 vulnerability vulnerabilities. Malware authors started ex- ploiting this JBIG2Decode vulnerability before In March, Adobe released a new version of Adobe was able to release a fix. They man- Adobe Reader to fix several bugs. One of the aged to create PDF documents that cause the fixes is for the notorious JBIG2 vulnerability. buggy JBIG2 decompression code to malfunc- tion in such a way that shellcode is executed, The PDF format supports several image com- which ultimately downloads a Trojan. pression algorithms; you're probably familiar with JPEG. JBIG2 is another compression al- I will use the following malformed JBIG2 data gorithm. Adobe's implementation of the JBIG2 to trigger an error in the vulnerable JBIG2 de- decompression algorithms contained bugs compression algorithm in Adobe Reader. that could lead to arbitrary code execution: i.e, www.insecuremag.com 8 Some user interaction required When you install Adobe Reader, a Column Handler Shell Extension is installed. A column How is it possible to exploit this vulnerability in handler is a special program (a COM object) a PDF document without having the user that will provide Windows Explorer with addi- opening this document? The answer lies in tional data to display (in extra columns) for the Windows Explorer Shell Extensions. file types the column handler supports. The PDF column handler adds a few extra col- Have you noticed that when you install a pro- umns, like the Title. When a PDF document is gram like WinZip, an entry is added to the listed in a Windows Explorer window, the PDF right-click menu to help you compress and ex- column handler shell extension will be called tract files? This is done with a special program by Windows Explorer when it needs the addi- (a shell extension) installed by the WinZip tional column info. The PDF column handler setup program.
Recommended publications
  • Turning on Bitlocker Drive Encryption on Windows Computers Before You
    Turning on BitLocker drive encryption on Windows computers Before you start a couple of VERY important notes... a) Make sure you have backups before you start just in case anything goes wrong (as it’s much harder, usually impossible, to recover data from an encrypted drive - as you would hope and expect). b) Make sure you keep a safe copy of the encryption key And please provide a copy for the IT Office to store for use in the event of a problem or, if you choose to let Microsoft keep it, make sure you know your login details for Microsoft. If you forget the passwords and can not recover a copy of your key you will loose all your files (which is another reason to keep backups). If you reset BitLocker and a new encryption key is set - please remember to provide a copy to the IT Office Windows 7, 8 and 10 have BitLocker Built in, this can be used to encrypt the hard drive. It just needs to be activated following the steps shown below. 1) Enable BitLocker for a Drive The easiest way to enable BitLocker for a drive is to right-click the drive in a File Explorer window, and then choose the “Turn on BitLocker” command. If you don’t see this option on your context menu. Then click on the windows icon and where it says “Type here to search” type in “encryption” and click on “Manage BitLocker” from the list of options that appears. It’s just that simple. The wizard that pops up walks you through selecting several options, which we’ve broken down into the sections that follow.
    [Show full text]
  • Microsoft Windows FIPS 140 Validation Security Policy Document
    Secure Kernel Code Integrity Security Policy Document Microsoft Windows FIPS 140 Validation Microsoft Windows 10 (Creators Update, Fall Creators Update, April 2018 Update) Microsoft Windows Server (versions 1703, 1709, and 1803) Non-Proprietary Security Policy Document Version Number 1.4 Updated On April 4, 2019 © 2018 Microsoft. All Rights Reserved Page 1 of 24 This Security Policy is non-proprietary and may be reproduced only in its original entirety (without revision). Secure Kernel Code Integrity Security Policy Document The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs- NonCommercial License (which allows redistribution of the work). To view a copy of this license, visit http://creativecommons.org/licenses/by-nd-nc/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
    [Show full text]
  • Invalid Class String Error
    Tib4231 July, 2001 TECHNICAL INFORMATION BULLETIN Invalid Class String Error KODAK DC215, KODAK DC240, KODAK DC280, DC3400, and DC5000 Zoom Digital Cameras An Invalid Class String error may occur when you try to launch the camera software for the first time, or the Mounter or Camera Properties software may not operate properly.This error is caused when the program RegSvr32.exe is not located in the C:\Windows\System folder, preventing the DLL files from being registered. Use this document to help you properly locate the RegSvr32.exe program in your system, and if necessary, manually register the DLL files. The instructions in this document assume that you are familiar with copying and moving files in your computer, and installing software. Relocating RegSvr32.exe 1. Go to Start > Find > Files and Folders and search for regsvr32*.* Note the location of the program. 2. In WINDOWS Explorer or My Computer, copy RegSvr32.exe to the C:\Windows\System folder if it is not already there. When the file is in place, go on to Step 3. 3. Uninstall the KODAK software using the KODAK Uninstall application, or go to Start > Settings > Control Panel > Add / Remove Programs. 4. Close all background programs except Explorer and Systray by pressing Ctrl Alt Del, selecting each program one at a time, and clicking End Task after each. 5. Install the KODAK camera software. 6. Start the KODAK Camera Mounter and Camera Properties software for your camera. If the Invalid Class String error appears, manually register the DLL file using the procedure that follows for your camera.
    [Show full text]
  • Technical Reference for Microsoft Sharepoint Server 2010
    Technical reference for Microsoft SharePoint Server 2010 Microsoft Corporation Published: May 2011 Author: Microsoft Office System and Servers Team ([email protected]) Abstract This book contains technical information about the Microsoft SharePoint Server 2010 provider for Windows PowerShell and other helpful reference information about general settings, security, and tools. The audiences for this book include application specialists, line-of-business application specialists, and IT administrators who work with SharePoint Server 2010. The content in this book is a copy of selected content in the SharePoint Server 2010 technical library (http://go.microsoft.com/fwlink/?LinkId=181463) as of the publication date. For the most current content, see the technical library on the Web. This document is provided “as-is”. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. © 2011 Microsoft Corporation. All rights reserved. Microsoft, Access, Active Directory, Backstage, Excel, Groove, Hotmail, InfoPath, Internet Explorer, Outlook, PerformancePoint, PowerPoint, SharePoint, Silverlight, Windows, Windows Live, Windows Mobile, Windows PowerShell, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.
    [Show full text]
  • Copyrighted Material
    Index Numerics Address Resolution Protocol (ARP), 1052–1053 admin password, SOHO network, 16-bit Windows applications, 771–776, 985, 1011–1012 900, 902 Administrative Tools window, 1081–1083, 32-bit (x86) architecture, 124, 562, 769 1175–1176 64-bit (x64) architecture, 124, 562, 770–771 administrative tools, Windows, 610 administrator account, 1169–1170 A Administrators group, 1171 ADSL (Asynchronous Digital Subscriber Absolute Software LoJack feature, 206 Line), 1120 AC (alternating current), 40 Advanced Attributes window, NTFS AC adapters, 311–312, 461, 468–469 partitions, 692 Accelerated Graphics Port (AGP), 58 Advanced Computing Environment (ACE) accelerated video cards (graphics initiative, 724 accelerator cards), 388 Advanced Confi guration and Power access points, wireless, 996, 1121 Interface (ACPI) standard, 465 access time, hard drive, 226 Advanced Graphics Port (AGP) card, access tokens, 1146–1147 391–392 Account Operators group, 1172 Advanced Graphics Port (AGP) port, 105 ACE (Advanced Computing Environment) Advanced Host Controller Interface (AHCI), initiative, 724 212–213 ACPI (Advanced Confi guration and Power Advanced Micro Devices (AMD), 141–144 Interface) standard, 465 Advanced Packaging Tool (APT), 572 Action Center, 1191–1192 Advanced Power Management (APM) Active Directory Database, 1145–1146, 1183 standard, 465 active heat sink, 150 Advanced Programmable Interrupt active matrix display, LCD (thin-fi lm Controller (APIC), 374 transistor (TFT) display), 470 Advanced RISC Computing Specifi cation active partition, 267,
    [Show full text]
  • Diskgenius User Guide (PDF)
    www.diskgenius.com DiskGenius® User Guide The information in this document is subject to change without notice. This document is not warranted to be error free. Copyright © 2010-2021 Eassos Ltd. All Rights Reserved 1 / 236 www.diskgenius.com CONTENTS Introduction ................................................................................................................................. 6 Partition Management ............................................................................................................. 6 Create New Partition ........................................................................................................ 6 Active Partition (Mark Partition as Active) .............................................................. 10 Delete Partition ................................................................................................................ 12 Format Partition ............................................................................................................... 14 Hide Partition .................................................................................................................... 15 Modify Partition Parameters ........................................................................................ 17 Resize Partition ................................................................................................................. 20 Split Partition ..................................................................................................................... 23 Extend
    [Show full text]
  • Bitleaker: 0 1 1 1 1 1 0 0 0 0 0 0 1 1 1 1 1 1 0 1 0 1 0 0 1 Subverting Bitlocker with One Vulnerability1 1 1
    1 1 0 1 0 1 1 0 BitLeaker: 0 1 1 1 1 1 0 0 0 0 0 0 1 1 1 1 1 1 0 1 0 1 0 0 1 Subverting BitLocker with One Vulnerability1 1 1 Seunghun Han, Jun-Hyeok Park (hanseunghun || parkparkqw)@nsr.re.kr Wook Shin, Junghwan Kang, Byungjoon Kim (wshin || ultract || bjkim)@nsr.re.kr Who Are We? - Senior security researcher at the Affiliated Institute of ETRI - Review board member of Black Hat Asia and KimchiCon - Speaker at USENIX Security, Black Hat Asia, HITBSecConf, BlueHat Shanghai, KimchiCon, BeVX, TyphoonCon and BECS - Author of “64-bit multi-core OS principles and structure, Vol.1&2” - a.k.a kkamagui, @kkamagui1 - Senior security researcher at the Affiliated Institute of ETRI - Speaker at Black Hat Asia 2018 ~ 2019 - Embedded system engineer - Interested in firmware security and IoT security - a.k.a davepark, @davepark312 Previous Works Goal of This Presentation - We present an attack vector, S3 Sleep, to subvert the Trusted Platform Modules (TPMs) - S3 sleeping state cuts off the power of CPU and peripheral devices - We found CVE-2018-6622, and it affects a discrete TPM (dTPM) and a firmware TPM (fTPM) - We introduce a new tool, BitLeaker - BitLeaker extracts the Volume Master Key (VMK) of BitLocker from TPMs - BitLeaker can mount a BitLocker-locked partition with the VMK DISCLAIMER - We do not explain BitLocker’s encryption algorithm - We focus on the protection mechanism for the VMK - Especially, the mechanism only with a TPM! - It is a default option of BitLocker - We do not consider combinations of a TPM and other options (PIN or USB startup
    [Show full text]
  • USB External Device Encryption Instructions Acceptable Use: HSC Security Practices Regarding the Encryption of External USB Devices
    USB External Device Encryption Instructions Acceptable Use: HSC Security Practices regarding the encryption of external USB devices • The Encrypted USB Storage Device may only be used for temporary storage and/or data transport of duplicate data. • A complex password must be used upon encryption, loss of the password will render the data on the USB unrecoverable. Further recovery safeguards are NOT APPLICABLE. Some things to note before getting started: • It is recommended that the USB device (Flash Drive/External HDD) be formatted to “NTFS” before saving data to the device and/or encrypting the device. Make sure that you have saved desired data from the USB Device before formatting the drive! There is no mechanism to restore the data from the USB Storage Device once it has been formatted. • The following steps must be performed on a Windows 10 [Ver. 1511] device or above that is connected to the Health domain for BitLocker encryption to work in our environment. Format the Device • Connect the USB device to the computer and locate the device in the File Explorer. • Right-click the external USB device, select “Format…”, and select the following options: o File system: NTFS o Volume label: *Something easily identifiable* o Format options: [Select] “Quick Format” Activate BitLocker • Locate the device in the File Explorer • Right-click the external USB device, select “Turn on BitLocker”, and select the following options: o Use a password to unlock the drive (This should be automatically selected if you are connected to the Health domain) o Enter a unique PIN, ensure that your new PIN meets the following requirements: .
    [Show full text]
  • INFORMATION TECHNOLOGY CONCEPTS-OPEN - REGIONAL 2019 Page 1 of 8
    INFORMATION TECHNOLOGY CONCEPTS-OPEN - REGIONAL 2019 Page 1 of 8 INFORMATION TECHNOLOGY CONCEPTS (391) —OPEN EVENT— REGIONAL – 2019 DO NOT WRITE ON TEST BOOKLET TOTAL POINTS _________ (100 points) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must hand in this test booklet and all printouts. Failure to do so will result in disqualification. 2. No equipment, supplies, or materials other than those specified for this event are allowed in the testing area. No previous BPA tests and/or sample tests or facsimile (handwritten, photocopied, or keyed) are allowed in the testing area. 3. Electronic devices will be monitored according to ACT standards. No more than sixty (60) minutes testing time Property of Business Professionals of America. May be reproduced only for use in the Business Professionals of America Workplace Skills Assessment Program competition. INFORMATION TECHNOLOGY CONCEPTS-OPEN - REGIONAL 2019 Page 2 of 8 MULTIPLE CHOICE Identify the choice that best completes the statement or answers the question. Mark A if the statement is true. Mark B if the statement is false. 1. Which of the following appears on the right side of any Windows 8 screen when you move your pointer to a right corner? A. Live tile B. Memory Manager C. Charms bar D. System tray 2. Which element of the Windows 7 GUI gives windows a glassy appearance, but also consumes more hardware resources? A. Control panel B. Aero user interface C. Charms interface D. Logic interface 3. The top of a top-down hierarchical structure of subdirectories is called which of the following? A.
    [Show full text]
  • Bitlocker Management
    BitLocker Management Vista Full Volume Encryption Feature Overview BitLocker - Full Volume Encryption Vista Enterprise and Ultimate AD management & Key backup options Save recovery password to USB, Printer, or File Share TPM 1.2 – Enables Drive Tampering Protection WMI Interface Vista Tool compatibility MS Boot Loader, System Restore, Disk Management BitLocker Tools Manage-bde.wsf - RTM Add / Remove key protectors Tools from MS Premier Support Site: BitLocker Drive Preparation BitLocker Recovery Password Viewer BitLocker Repair Tool Searches HD for unlinked FVEKs BitLocker Group Policy Computer Config\Admin Templates\Windows Components\BitLocker Drive Encryption AD Key Backup Options Backup Recovery Password to AD Backup Key Package to AD Require Backup to AD before encryption is enabled Backup Recovery Password to Share Recovery Options Require Creation of Recovery Password - Default Require Creation of Recovery Key Package - Default BitLocker Group Policy Advanced Options Allow BitLocker without TPM Startup Key or Pin with TPM Encryption Method AES 128 Diffuser – Default Prevent Memory Overwrite on Restart – Disabled TPM Platform Validation –7 Default Metrics Rom Code MBR Code – not partition table Boot Manager TPM Group Policy Computer Config\Admin Templates\System\ Trusted Platform Module Backup TPM Owner information to AD Require backup 3 settings related to TPM blocked commands BDE Security and Compatibility BitLocker Tips AD Backup only occurs when BDE is enabled Or when TPM is initialized
    [Show full text]
  • How to Evade Application Whitelisting Using REGSVR32
    EXTERNAL/INTERNAL, RED TEAM, RED TEAM TOOLS CASEY SMITH, COM+ SCRIPLETS, DLL, FOLLOW US 10 SUBTEE, WEVADE, WHITELISTING MAY 2017 How to Evade Application Whitelisting Using REGSVR32 Jo Thyer // I was recently working on a Red Team for a customer that was very much up to date with their defenses. This customer had tight egress controls, perimeter proxying, strong instrumentation, and very tight application whitelisting controls. My teammate and I knew that we would have to work very hard to get command and control outbound from this environment, and that would be after obtaining physical access (yet another signicant challenge). Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD The week before going on-site, we began to LOOKING FOR research all of the various methods for SOMETHING? potential application whitelisting bypass. We assumed the best case defensive scenario whereby the customer would have all binary execution blocked with the exception of specic applications permitted. In prior tests SUBSCRIBE TO THE with other customers and this same BHISBLOG customer, we had used “rundll32.exe” to execute DLL content. This method is really useful if you can host shellcode Don't get left in the dark! Enter within a DLL, and have a nice controlled entry point. In the Metasploit case, the your email address and every DLL entry point is named “Control_RunDLL”. While this might evade time a post goes live you'll get instant notication! We'll also whitelisting, we also knew this old trick had been played before and we likely add you to our webcast list, so could not count on it again.
    [Show full text]
  • Conversion Server User Guide
    www.AutoDWG.com Thank you for using AutoDWG Conversion Server Software AutoDWG Conversion Server With AutoDWG Conversion Server, companies can convert dwg to pdf, dwg to image automatically at high speed in a centrally-managed server. Users upload or drop dwg files into a watched folder, the drawing will be convert into pdf, dwf or image automatcially at once, Users can set up different folders in different output policy to specify output file type, and others setting. Features • Windows Service Program, no AutoCAD required in the server. • Supports dwg to pdf, dwg to jpg, dwg to bmp, dwg to gif, dwg to bmp, dwg to png conversion. • Supports AutoCAD drawing format from R2.5 to the latest version R2008. Email us [email protected] for more information and pricing. Download Free Trial Quick Start: • Install the software, register the DLL files and the acs.exe service o RUN: Regsvr32 “Full path\DWG2PDFX.dll” o RUN: Regsvr32 “Full path\DWG2imageX.dll” o RUN: Regsvr32 “Full path\mfc42.dll” o Set up the PS path, copy the whole folder of “PS” to C:\windows\system32\PS o RUN: acs.exe /service o Start the service from the [Windows control panel\Administrative tools\Services] • Launch AcsCtrl.exe to set up profiles of the watched folders and output file formats o Click menu button “File/New Profile” to create new watched folder o Right click on the existing listed input folder, click “add a profile” to create more out put file formats or copy files without convert • Click on the button “Start Server” to start the conversion service Æ Go to Trouble Shooting and learn more on the installation www.AutoDWG.com User’s manual The AutoDWG Conversion server is enterprise class software, and recommended to installed with a server, the requirements to the server listed as below: Hard ware requirements, CPU: PIII 1GHz or greater, a modern processor is recommended, since the conversion calculation will be kind of heavy loading to the CPU.
    [Show full text]