ADMINISTRATION GUIDE Version 7.2

Total Page:16

File Type:pdf, Size:1020Kb

ADMINISTRATION GUIDE Version 7.2 GUIDE STORMSHIELD ENDPOINT SECURITY ADMINISTRATION GUIDE Version 7.2 Document last update: June 2, 2021 Reference: ses-en-administration_guide-v7.2 SES - ADMINISTRATION GUIDE - V 7.2 Table of contents Preface 9 Thanks! 9 What is the target audience? 9 Contact 9 1. Use environment 10 1.1 Recommendations on security watch 10 1.2 Recommendations on keys and certificates 10 1.3 Recommendations on algorithms 10 1.4 Recommendations on administrators 10 1.5 Recommendations on workstations 10 1.6 Recommendations on administration workstations 11 1.7 Certification and qualification environment 11 2. Stormshield Endpoint Security Overview 12 2.1 Concepts 12 2.1.1 Concept 1: Integrated security 12 2.1.2 Concept 2: Proactive protection 12 2.1.3 Concept 3: Adaptive control 13 2.1.4 Concept 4: Flexible policy control 13 2.1.5 Concept 5: Application of policies based on the organization's directory 13 2.1.6 Concept 6: Information feedback 13 2.1.7 Concept 7: Data encryption 13 2.2 Protection mechanisms 13 2.2.1 Rule-based protection 14 2.2.2 Automatic protections 14 2.3 Architecture 15 2.3.1 Concepts 15 2.3.2 Stormshield Endpoint Security components 15 2.4 Packages and licenses 18 2.4.1 Packages 18 2.4.2 Licenses 21 3. Stormshield Endpoint Security Installation and Uninstallation 24 3.1 Downloading the Stormshield Endpoint Security software 24 3.1.1 Downloading from the client area 24 3.1.2 Checking software authenticity 24 3.2 System prerequisites for Stormshield Endpoint Security under Windows 25 3.2.1 Active Directory prerequisites 25 3.2.2 Stormshield Endpoint Security server prerequisites 25 3.2.3 Stormshield Endpoint Security database prerequisites 27 3.2.4 Management console prerequisites 30 3.2.5 Stormshield Endpoint Security agent prerequisites 31 3.3 Stormshield Endpoint Security installation 33 3.3.1 Prerequisites 33 3.3.2 Procedure 34 3.3.3 About Stormshield Endpoint Security 46 3.4 Downloading certificates 46 3.4.1 Certificate validity period 46 3.4.2 Login and password for downloading certificates 46 Page 2/393 ses-en-administration_guide-v7.2 - 06/02/2021 SES - ADMINISTRATION GUIDE - V 7.2 3.4.3 Compatibility with system cloning tools 47 3.5 Post-installation tests 47 3.5.1 Component tests 47 3.6 Possible changes 48 3.6.1 Changing a Stormshield Endpoint Security server IP address 48 3.6.2 Changing the database server IP address 49 3.6.3 Changing the server TCP ports for HTTP and SSL services 49 3.7 Uninstalling components 50 3.7.1 Uninstalling the server and the console 50 3.7.2 Uninstalling the agent 50 3.7.3 Removing the databases 51 4. Migrating and Updating Stormshield Endpoint Security 53 4.1 Migrating StormShield 6.0 to version Stormshield Endpoint Security 7.2 53 4.1.1 Complete migration 53 4.1.2 Partial migration 57 4.2 Updating Stormshield Endpoint Security 7.2 64 4.2.1 Prerequisites 64 4.2.2 Complete update 66 4.2.3 Partial update 71 5. Management Console Configuration 78 5.1 Getting started with the console 78 5.1.1 Connection with an internal account 78 5.1.2 Connection with a Windows account 78 5.2 Console overview 79 5.2.1 "Environment Manager" section 79 5.2.2 "Monitoring" section 89 5.2.3 "Console Manager" section 90 5.2.4 "Devices" section 94 5.2.5 Status bar 94 6. Stormshield Endpoint Security Server Configuration 95 6.1 Stormshield Endpoint Security Server list 95 6.2 Adding an additional Stormshield Endpoint Security server 95 6.2.1 Declaring an additional server 95 6.2.2 Configuring an additional server 96 6.3 Creating a server configuration policy 97 6.4 Editing a server configuration policy 97 6.4.1 Agent connection management 98 6.4.2 Deploying policies on agents and collecting logs 99 6.4.3 Log Monitoring Configuration 100 6.4.4 Syslog Configuration 101 6.4.5 SMTP Configuration 101 6.4.6 Encryption 101 6.4.7 Software Updates Settings 102 6.4.8 Authentication Service 102 6.5 Applying a server configuration policy 103 7. Stormshield Endpoint Security Agent Configuration 104 7.1 Creating a Dynamic Agent Configuration Policy 104 7.2 Editing the Dynamic Agent Configuration Policy 104 7.2.1 Agent Configuration 104 Page 3/393 ses-en-administration_guide-v7.2 - 06/02/2021 SES - ADMINISTRATION GUIDE - V 7.2 7.2.2 Temporary web access 108 7.3 Applying a dynamic agent configuration policy to an object of the directory 111 7.4 Creating a Static Agent Configuration Policy 112 7.5 Editing a Static Agent Configuration Policy 112 7.5.1 Challenges 112 7.5.2 Manage update 118 7.6 Applying a static agent configuration policy to an object of the directory 118 7.7 Stopping the agent 118 7.7.1 If the "Stop Agent" option is set to Allowed 119 7.7.2 If the "Stop Agent" option is set to "Denied" 120 7.7.3 If the user wants to uninstall the Stormshield Endpoint Security agent 123 7.8 Information about the configuration of the agent in the registry base 124 7.8.1 Availability and location 124 7.8.2 Keys and values added to the registry base 124 8. Protection Mechanisms 126 8.1 Protection mechanisms 126 8.1.1 Automatic protections 126 8.1.2 Rule-based protection 126 8.1.3 Order used to apply protection mechanisms 126 8.2 Automatic protections 127 8.2.1 Principles 127 8.2.2 Accessing automatic protections parameters 127 8.2.3 Configuring automatic protections 127 8.3 Rule-based protection 127 8.3.1 Rule categories 128 8.3.2 Whitelists and blacklists 128 8.3.3 Combining whitelists and blacklists 128 8.3.4 Rule management 129 9. Security Policies 133 9.1 Application identifiers 133 9.1.1 Types of application identifiers 133 9.1.2 Creating application identifiers 134 9.2 Importing signature certificates 138 9.3 Creating a security policy 138 9.4 Importing security policies 139 9.4.1 Import a new policy 139 9.4.2 Importing a policy from an existing policy 139 9.5 Editing a security policy 140 9.5.1 System Behavior 140 9.5.2 Device Control 148 9.5.3 Network security control 160 9.5.4 Application control 174 9.6 Applying a security policy to an object of the directory 188 10. Scripts 190 10.1 Overview 190 10.1.1 Scripts feature 190 10.1.2 Scripts 190 10.1.3 Script Resources 191 10.2 Tests 193 10.2.1 Overview 193 Page 4/393 ses-en-administration_guide-v7.2 - 06/02/2021 SES - ADMINISTRATION GUIDE - V 7.2 10.2.2 Statements 193 10.2.3 Built-in tests 194 10.2.4 User-defined tests 201 10.2.5 Creating a test script 201 10.3 Actions 203 10.3.1 Overview 203 10.3.2 Built-in actions 204 10.3.3 User-defined actions 206 10.3.4 Creating an action 206 10.4 Scripts 208 10.4.1 Overview 208 10.4.2 True/False results 209 10.4.3 Creating and applying a script to an object of the directory 209 10.5 Transferring files towards the agents 213 10.5.1 Overview 213 10.5.2 Procedure 214 11. Removable Device Administration 216 11.1 Overview 216 11.2 Preparation of the removable device enrollment 216 11.3 Delegation of the removable device administration 218 11.3.1 Overview 218 11.3.2 Device administration permissions 218 11.3.3 Enrolled devices display 219 11.3.4 Device enrollment and revocation 220 11.3.5 Pre-enrollment of removable devices 221 12. Removable Device Encryption 223 12.1 Overview 223 12.1.1 Purpose 223 12.1.2 Characteristics 223 12.1.3 What can be encrypted 223 12.1.4 Unencrypted partitions 224 12.1.5 Encryption key 224 12.1.6 Synchronization 224 12.1.7 Symbology 224 12.2 Creating an encryption policy to be applied to a group of devices 225 12.2.1 Encryption settings 225 12.3 Connecting a removable device 226 12.3.1 Password 226 12.3.2 Synchronization 226 12.3.3 Access to the device without password 227 12.3.4 Access to encrypted data 227 12.3.5 Behavior when deactivating removable device encryption 227 12.3.6 Using encrypted devices on other computers 228 12.3.7 Removing SD cards 228 12.4 Decrypting a removable device 228 12.4.1 Administrator side 228 12.4.2 Agent side 229 12.5 Passwords 230 12.5.1 Administrator side 230 12.5.2 Agent side 233 12.6 Repairing a corrupted encryption key 236 Page 5/393 ses-en-administration_guide-v7.2 - 06/02/2021 SES - ADMINISTRATION GUIDE - V 7.2 13. Encryption 238 13.1 Data encryption overview 238 13.1.1 Purpose 238 13.1.2 Characteristics 238 13.1.3 Supported system, hardware and software 239 13.1.4 Interoperability with versions previous to the certified 7.2.06 version 240 13.2 Encryption types 240 13.2.1 File encryption 240 13.2.2 Full disk encryption 240 13.3 Creating an encryption policy 241 13.3.1 Graphical interface 241 13.3.2 Procedure 242 13.4 File encryption features 243 13.4.1 Multi-user security 243 13.4.2 Data erasure security 243 13.4.3 File encryption options 244 13.4.4 Password creation and user logon 244 13.4.5 Synchronizing 245 13.4.6 Synchronization with multiple users 246 13.5 Encryption parameters 247 13.5.1 General Settings 247 13.5.2 File Encryption Parameters 250 13.5.3 Full Disk Encryption Parameters 256 13.6 Applying an encryption policy to an object of the directory 260 13.7 Recovery 261 13.7.1 Password recovery when using file encryption 261 13.7.2 Recovering data from encrypted files (decryption) 264 13.7.3 Password recovery when using full disk encryption 266 13.7.4 Recovering an encrypted disk on removable media 269 13.8 Uninstalling Stormshield Endpoint Security agents 273 13.8.1 Decryption before uninstallation 273 13.9 Changing a user account on a machine 274 14.
Recommended publications
  • Final Version of Thesis
    JAPANESE INNOVATION STRATEGY AND THE ACQUISITION OF UK INFORMATION TECHNOLOGY FIRMS T H W Minshall Christ’s College, Cambridge A dissertation submitted to the University of Cambridge for the Degree of Doctor of Philosophy Cambridge University Engineering Department April 1997 Preface Except for commonly understood and accepted ideas, or where specific reference is made, the work reported in this dissertation is my own and includes nothing which is the outcome of work done in collaboration. No part of the dissertation has been previously submitted to any university for any degree, diploma or other qualification. T H W Minshall Cambridge April 1997 Acknowledgements I am particularly grateful to my supervisor, Elizabeth Garnsey, for her guidance and support throughout the course of this research. In addition, thanks are due to Nick Oliver and Hugh Whittaker, and all my colleagues at the Manufacturing and Management Division of the Engineering Department, and at the Judge Institute of Management Studies for their advice and constructive criticism. On the industry side, my gratitude to the companies in the UK and Japan who agreed to contribute to the contents of this dissertation. Finally, my thanks to my family, for encouraging me, and to Nicola, for all her support and for applying her new-found skills at proof-reading. This programme of research was supported by a Postgraduate Training Award (J00 429 332012) from the ESRC. Table of contents Chapter 1 Introduction ...........................................................................................................
    [Show full text]
  • Troyw Breakdown.Doc
    Thor / Odin Shader Development Thor Shader Development Captain America and Shield Shader Development Environment Light Look Development Thor and Mjolnir Hammer Shader Development Thor Skin Lighting Development Loki and Casket Shader Development and Lighting Environment Lighting and Shader Development Scene Setup and Rendering Odin and Mjolnir Hammer Shader Development Strucker and Zola Shader and Lighting Development Environment Lighting and Shader Development Scene Setup and Rendering Strucker Shader and Lighting Development Environment Lighting and Shader Development Scene Setup and Rendering Loki and Casket Shader Development and Lighting Environment Lighting and Shader Development Scene Setup and Rendering Environment Lighting and Shader Development Iceborn Lighting and Look development Loki and Casket Shader Development and Lighting Environment Lighting and Shader Development Scene Setup and Rendering Captain America and Shield Shader Development Environment Light Look Development Environment Lighting and Shading Development Ymir Lighting and Shader Development Scene Setup and Rendering Odin and Mjolnir Hammer and Shader Development Environment Lighting and Shader Development Hale Lighting and Shader Development Scene Setup and Rendering Environment Lighting and Shader Development Colonist Lighting and Shader Development Scene Setup and Rendering Environment Lighting and Shader Development Exo-Suit Lighting and Shader Development Scene Setup and Rendering Environment Lighting and Shader Development Colonist Lighting and Shader Development
    [Show full text]
  • ABSTRACT the Pdblications of the Marvel Comics Group Warrant Serious Consideration As .A Legitimate Narrative Enterprise
    DOCU§ENT RESUME ED 190 980 CS 005 088 AOTHOR Palumbo, Don'ald TITLE The use of, Comics as an Approach to Introducing the Techniques and Terms of Narrative to Novice Readers. PUB DATE Oct 79 NOTE 41p.: Paper' presented at the Annual Meeting of the Popular Culture Association in the South oth, Louisville, KY, October 18-20, 19791. EDFS PRICE MF01/PCO2 Plus Postage." DESCRIPTORS Adolescent Literature:,*Comics (Publications) : *Critical Aeading: *English Instruction: Fiction: *Literary Criticism: *Literary Devices: *Narration: Secondary, Educition: Teaching Methods ABSTRACT The pdblications of the Marvel Comics Group warrant serious consIderation as .a legitimate narrative enterprise. While it is obvious. that these comic books can be used in the classroom as a source of reading material, it is tot so obvious that these comic books, with great economy, simplicity, and narrative density, can be used to further introduce novice readers to the techniques found in narrative and to the terms employed in the study and discussion of a narrative. The output of the Marvel Conics Group in particular is literate, is both narratively and pbSlosophically sophisticated, and is ethically and morally responsible. Some of the narrative tecbntques found in the stories, such as the Spider-Man episodes, include foreshadowing, a dramatic fiction narrator, flashback, irony, symbolism, metaphor, Biblical and historical allusions, and mythological allusions.4MKM1 4 4 *********************************************************************** * Reproductions supplied by EDRS are the best that can be made * * from the original document. * *********************************************************************** ) U SOEPANTMENTO, HEALD.. TOUCATiONaWELFARE NATIONAL INSTITUTE CIF 4 EDUCATION THIS DOCUMENT was BEEN N ENO°. DOCEO EXACTLY AS .ReCeIVED FROM Donald Palumbo THE PE aSON OR ORGANIZATIONORIGuN- ATING T POINTS VIEW OR OPINIONS Department of English STATED 60 NOT NECESSARILY REPRf SENT OFFICIAL NATIONAL INSTITUTE OF O Northern Michigan University EDUCATION POSITION OR POLICY CO Marquette, MI.
    [Show full text]
  • God of Warriors and Battle. Odin Rides an 8-Legged Horse Called Sleipnir
    Odin God of warriors and battle. Odin rides an 8-legged horse called Sleipnir. In Old English, Odin is known as ‘Woden’ and Wednesday is named after him (Woden’s Day). visit twinkl.com Freya (or Freyja) Goddess of love, war and death. Freya rides in a chariot pulled by cats. Her twin brother is the god Frey. visit twinkl.com Thor God of thunder. Thor has a magical hammer called Mjolnir which he uses to summon thunderbolts. Thursday is named after Thor (Thor’s Day). visit twinkl.com Loki God of mischief. Loki likes to play tricks on the other gods and make trouble. Loki was born in Jotunheim, the land of the giants, not on Asgard. visit twinkl.com Frey (or Freyr) God of fertility. Frey is the twin brother of the goddess Freya. He brings peace and good fortune to men as well as making crops grow. visit twinkl.com Frigg Goddess of motherhood. Frigg is the wife of the god Odin. Friday is named after her (Frigg’s Day). visit twinkl.com Heimdall The guardian god. Heimdall watches over the rainbow bridge to Asgard, the Bifrost. He has strong hearing and sight and keeps watch for approaching enemies. He uses a horn to summon the other gods to fight. visit twinkl.com Baldr (or Baldur) God of light and purity. Baldr is so bright that light shines from him and he is so beautiful that flowers bow to him. visit twinkl.com Týr God of single-handed combat. Týr has one hand after the other was bitten off by the giant wolf Fenrir.
    [Show full text]
  • Marvel Pop! List Popvinyls.Com
    Marvel Pop! List PopVinyls.com Updated December 2016 01 Thor 23 IM3 Iron Man 02 Loki 24 IM3 War Machine 03 Spider-man 25 IM3 Iron Patriot 03 B&W Spider-man (Fugitive) 25 Metallic IM3 Iron Patriot (HT) 03 Metallic Spider-man (SDCC ’11) 26 IM3 Deep Space Suit 03 Red/Black Spider-man (HT) 27 Phoenix (ECCC 13) 04 Iron Man 28 Logan 04 Blue Stealth Iron Man (R.I.CC 14) 29 Unmasked Deadpool (PX) 05 Wolverine 29 Unmasked XForce Deadpool (PX) 05 B&W Wolverine (Fugitive) 30 White Phoenix (Conquest Comics) 05 Classic Brown Wolverine (Zapp) 30 GITD White Phoenix (Conquest Comics) 05 XForce Wolverine (HT) 31 Red Hulk 06 Captain America 31 Metallic Red Hulk (SDCC 13) 06 B&W Captain America (Gemini) 32 Tony Stark (SDCC 13) 06 Metallic Captain America (SDCC ’11) 33 James Rhodes (SDCC 13) 06 Unmasked Captain America (Comikaze) 34 Peter Parker (Comikaze) 06 Metallic Unmasked Capt. America (PC) 35 Dark World Thor 07 Red Skull 35 B&W Dark World Thor (Gemini) 08 The Hulk 36 Dark World Loki 09 The Thing (Blue Eyes) 36 B&W Dark World Loki (Fugitive) 09 The Thing (Black Eyes) 36 Helmeted Loki 09 B&W Thing (Gemini) 36 B&W Helmeted Loki (HT) 09 Metallic The Thing (SDCC 11) 36 Frost Giant Loki (Fugitive/SDCC 14) 10 Captain America <Avengers> 36 GITD Frost Giant Loki (FT/SDCC 14) 11 Iron Man <Avengers> 37 Dark Elf 12 Thor <Avengers> 38 Helmeted Thor (HT) 13 The Hulk <Avengers> 39 Compound Hulk (Toy Anxiety) 14 Nick Fury <Avengers> 39 Metallic Compound Hulk (Toy Anxiety) 15 Amazing Spider-man 40 Unmasked Wolverine (Toytasktik) 15 GITD Spider-man (Gemini) 40 GITD Unmasked Wolverine (Toytastik) 15 GITD Spider-man (Japan Exc) 41 CA2 Captain America 15 Metallic Spider-man (SDCC 12) 41 CA2 B&W Captain America (BN) 16 Gold Helmet Loki (SDCC 12) 41 CA2 GITD Captain America (HT) 17 Dr.
    [Show full text]
  • The Myth of Skadi and Njord Characters Skadi Njord
    THE MYTH OF SKADI AND NJORD CHARACTERS SKADI NJORD ODIN LOKI GOAT HEIMDALL NARRATOR The Aesir rejoiced in celebration and song at the return of their beloved Idunn, goddess of youth. Their festive cries echoed throughout the halls of Asgard and all the Nine Realms. The smoldering carcass of Thiazi, the giant who kidnapped fair Idunn, served as fuel for the magnificent bonfire that lit up the night sky. However, beyond the farthest reaches of the icy grey waters, past the depths of the ancient magma rivers that heat the barren peaks, Skadi waited in her lonely home of Thrymheim for her father’s return; he had gone after Idunn, his escaped captive. The sun cycled through canvases of night and day, with still no sign of Thiazi’s return. Skadi’s eyes soon turned cold, yet her irises burned with fury. SKADI: How long must I wait for an answer I already have? My father is not one to find delay from wind or snow. No, there is only one explanation for the emptiness of these halls. My father is dead, and none but the Aesir could have killed him. Copyright @ Alex Schweich 2020. This play may be performed freely but the text may not be reproduced without permission of the author, and the author must be credited. Enraged, Skadi swept through each room of her home like a hurricane, donning her family’s finest armaments. Wielding a magical sword and ancient spear and shield, Skadi stood atop the highest peak, defiantly facing the heavens. SKADI: I swear, Father, I shall not let your death go unavenged.
    [Show full text]
  • PDF Download Warriors 3 Pdf Free Download
    WARRIORS 3 PDF, EPUB, EBOOK George R R Martin,Gardner Dozois | 360 pages | 02 Aug 2011 | St Martin's Press | 9780765360281 | English | New York, United States Warriors 3 PDF Book The two player mode new to Dynasty Warriors 3 allows players to either go head-to-head in one-on-one fights or play co-operatively in any of the stages. Science Fiction. He gave high praise to how much the game was based on the original Romance of the Three Kingdoms story and even went as far as saying "All the costuming of the 3D models is ethnically authentic and beautifully lavished" whereas a number of reviews described the graphical quality as being plain and blurry Such as the said IGN review. Diana Gabaldon Goodreads Author Contributor. Archived from the original PDF on April 21, In co-operative play the characters retain their saved statistics, there are no alterations to the stage and the players gain the ability to perform a more powerful version of their Musou attack Special Attack. The Warriors Three were a team of elite Asgardian warriors, comprised of some of the best warriors of Asgard. Other books in the series. Namespaces Article Talk. Smartphone :. Something like that doesn't belong in an anthology like this one, in my opinion. IGN strongly criticized the Xbox version over the sound, both music and the voice acting. Nice diverse collection of stories! Start Your Free Trial. Zhu Rong and Nu Wa are exceptions as Zhu Rong was said to be the only female to have fought in that era and Nu Wa's character is fictional and based on ancient myth.
    [Show full text]
  • Journal of Physics Special Topics an Undergraduate Physics Journal
    Journal of Physics Special Topics An undergraduate physics journal P1 6 \Let the Old Gods flow through me one last time!" J. P. Cowen, P. Doyle, T. Hyde, T. Johnstone, and G. Sutlief Department of Physics and Astronomy, University of Leicester, Leicester, LE1 7RH December 7, 2018 Abstract This paper investigates whether the Bifrost, a magical beam of light that the Asguardians use to travel between realms, can act as a spaceship transporting the Hulk across space by looking at the time and energy required to send him back to Earth in Marvels; Infinity War. We calculated that at 0.999 c the Hulk would take 2.52 ± 0.14 million years with a kinetic energy of 1.01x1021 J and a total energy of 23.5x1021 J. Introduction ship was ambushed it was travelling through An- Marvels, Avengers: Infinity war, begins with dromeda. This is also supported by the fact Thor an Asgardian ship being ambushed by the evil ti- is later rescued by the Guardians of the Galaxy tan Thanos in his quest to retrieve all the infinity who are said to be flying around this galaxy [3]. stones. In a final attempt to warn Earth of the Using the assumption that the Bifrost is trav- dangers approaching, Heimdall uses the power of elling at speeds very close to the speed of light, the Old Gods to summon the Bifrost, a magical 0.999 c, in the reference frame of the Earth, the light bridge that is used by the Asgardians to Hulk would get to Earth in 2.52 ± 0.14 million quickly travel between the nine realms, sending years using Eq.
    [Show full text]
  • Opinion But… And… Sentence Starters
    Year 4 English Lessons 1st -5th March 2021 Monday 1st March 2021 – Live Lesson Please join your teacher for your live lesson at 9:00! Today we shall be writing a comparison of Thor and Loki . For this lesson, you will need the words and phrases that you wrote down to describe these 2 Norse Gods from last Thursday and Friday. It may also be useful to have the texts from last week about Thor and Loki. If you no longer have your paper copy of the text you can find it in the ‘Lesson Plans’ channel in your class Team. When you are writing your comparison between Thor and Loki, think about the characteristics that they share (what is similar about them). Then think about the differences between them. This piece of writing will give you the perfect opportunity to use conjunctions and fronted adverbials, as well as interesting and powerful vocabulary. Use the sentence starters and conjunctions below to help you with your writing. Sentence Starters There… Even though… Despite… Although… It is surprising that… Many would think… While… With his… Conjunctions and Other Connectives When? Why? Opinion But… And… as as a result luckily although also meanwhile because unfortunately besides and until consequently but as well when for this despite as while reason nevertheless with so on the other in therefore hand addition yet whereas 1 2 English Activity – Monday 1st March 2021 Writing a Comparison Between Thor and Loki _______________________________________________ _______________________________________________ _______________________________________________
    [Show full text]
  • THOR Written by Ashley Miller, Zack Stentz, & Don Payne
    THOR Written by Ashley Miller, Zack Stentz, & Don Payne FADE IN: On the blackness of SPACE, beautiful and mysterious, strewn with a billion stars. Atop a building, a wrought-iron sign -- a HAMMER-WIELDING BLACKSMITH -- spins listlessly in the wind as a swirling breeze kicks up. A hint of what's to come. 1 EXT. PUENTE ANTIGUO, NEW MEXICO - NIGHT 1 1 A main street extends before us in this one-horse town, set amid endless flat, arid scrubland. A large SUV slowly moves down the street and heads out of town. 2 EXT. SUV - NIGHT 2 2 The SUV sits parked in the desert. Suddenly, the roof panels of the SUV FOLD OPEN. The underside of the panels house a variety of hand-built ASTRONOMICAL DEVICES, which now point at the sky. JANE FOSTER (late 20's) pops her head through the roof. She positions a MAGNETOMETER, so its monitor calibrates with the constellations above. It appears to be cobbled together from spare parts of other devices. JANE Hurry! We hear a loud BANG followed by muffled CURSING from below. Jane offers a hand down to ERIK SELVIG (60) who emerges as well, rubbing his head. JANE (CONT'D) Oh-- watch your head. SELVIG Thanks. So what's this "anomaly"¬ù of yours supposed to look like? JANE It's a little different each time. Once it looked like, I don't know, melted stars, pooling in a corner of the sky. But last week it was a rolling rainbow ribbon-- SELVIG (GENTLY TEASING) "Racing "Àúround Orion?"¬ù I've always said you should have been a poet.
    [Show full text]
  • Reading Comprehension Based Upon Viking Gods. Have You Heard About
    English - Monday 4th May LO – Reading comprehension based upon Viking Gods. Have you heard about the character Thor? What do you know about him? Well Thor is a character (actually a Viking God) that belongs to Norse mythology’ Do you anything about Viking Gods and Norse mythology? Maybe do a little Google or book research – they were very colourful characters indeed! Today’s reading comprehension is a traditional tale based upon these Viking Gods so the language style will seem a little unusual. There are also some strange names and places mentioned, so take extra care with your reading. You’ll find the story on the next page. The answers are at the bottom. Good luck! Odin’s Reward - extract This is a story from Norse mythology about Odin, the chief of the Aesir (the gods of Asgard). One night when all was quiet in Asgard and the Aesir had gone to rest, Odin, the Allfather, sat awake on his high throne, troubled with many thoughts. At his feet crouched his two faithful wolves, and upon his shoulders perched the two ravens of thought and memory, who flew far abroad every day, through the nine worlds, as Odin’s messengers. The Allfather had need of great wisdom in ruling the worlds; after thinking a long time on the matters which needed his care, he suddenly started up, and went forth with long strides from his palace of Gladsheim into the night. He soon returned, leading his beautiful, eight- footed steed, Sleipnir, and it was plain that Odin was going on a journey.
    [Show full text]
  • Network Working Group J. Reynolds Request for Comments: 1700 J
    Network Working Group J. Reynolds Request for Comments: 1700 J. Postel STD: 2 ISI Obsoletes RFCs: 1340, 1060, 1010, 990, 960, October 1994 943, 923, 900, 870, 820, 790, 776, 770, 762, 758,755, 750, 739, 604, 503, 433, 349 Obsoletes IENs: 127, 117, 93 Category: Standards Track ASSIGNED NUMBERS Status of this Memo This memo is a status report on the parameters (i.e., numbers and keywords) used in protocols in the Internet community. Distribution of this memo is unlimited. OVERVIEW This RFC is a snapshot of the ongoing process of the assignment of protocol parameters for the Internet protocol suite. To make the current information readily available the assignments are kept up-to- date in a set of online text files. This RFC has been assembled by catinating these files together with a minimum of formatting "glue". The authors appologize for the somewhat rougher formatting and style than is typical of most RFCs. We expect that various readers will notice specific items that should be corrected. Please send any specific corrections via email to <[email protected]>. Reynolds & Postel [Page 1] RFC 1700 Assigned Numbers October 1994 INTRODUCTION The files in this directory document the currently assigned values for several series of numbers used in network protocol implementations. ftp://ftp.isi.edu/in-notes/iana/assignments The Internet Assigned Numbers Authority (IANA) is the central coordinator for the assignment of unique parameter values for Internet protocols. The IANA is chartered by the Internet Society (ISOC) and the Federal Network Council (FNC) to act as the clearinghouse to assign and coordinate the use of numerous Internet protocol parameters.
    [Show full text]