Mac OS X Forensics Joaquin Moreno Garijo

Total Page:16

File Type:pdf, Size:1020Kb

Mac OS X Forensics Joaquin Moreno Garijo Mac OS X Forensics Joaquin Moreno Garijo Technical Report RHUL–MA–2015–8 4 March 2015 Information Security Group Royal Holloway University of London Egham, Surrey, TW20 0EX United Kingdom www.ma.rhul.ac.uk/tech Student Number: 100780122 Name: Joaquin, Moreno Garijo Mac OS X Forensics Supervisor: Dr. Lorenzo Cavallaro Submitted as part of the requirements for the award of the MSc in Information Security at Royal Holloway, University of London I declare that this assignment is all my own work and that I have acknowledged all quotations from the published or unpublished works of other people. I declare that I have also read the statements on plagiarism in Section 1 of the Regulations Governing Examination and Assessment Offences and in accordance with it I submit this project report as my own work. Signature: Date: Academic Year 2013/2014 Copyright c 2013/2014 by Joaquin Moreno Garijo Abstract Mac OS X Forensics by Joaquin Moreno Garijo Master of Science in Information Security Royal Holloway, University of London 2013/2014 During the past few years, the number of incidents related with Mac OS X environ- ment have increased, especially those related to malware. Due to this new tendency, incident response teams and computer forensics investigators require new tools, proce- dures and documentation to understand how to properly handle the incidents over this platform. However, the research undertaken till now is not enough to deal with these new threats. For this reason, the research community has started to work on volatile evi- dences, live system evidences and malware reversing approaches. However, the research done over persistent evidences has almost been non-existent, in particular the evidences created by Mac OS X itself. Hence, this dissertation focuses on Mac OS X persistent evidences, identifying the evidences, how these evidences are stored and how this information can be obtained. Furthermore, the project provides an implementation that extracts the information stored by Mac OS X using a well-known forensics framework called Plaso extending the tool and allowing for the work done in the dissertation to be used by the computer forensics community at large. iii iv Acknowledgement This thesis would have not been possible without Kristinn Gudjonsson. Thank you. I want to thank Lorenzo Cavallaro to gave me freedom during the project to take decision related with the implementation and the goals of the project. Lastly, I would like to thank to Plaso team that provided this incredible framework where on top of it, I developed the Mac OS X plugins extending the tool functionalities. v vi Contents 1 Introduction1 1.1 Aims and Objectives............................1 1.2 Implementation and Availability......................2 1.3 Structure of Report............................3 2 Digital Forensics Background5 2.1 Forensics Methodology...........................5 2.2 Volatile Evidences.............................8 2.3 Malware..................................9 2.4 Persistent Evidences............................ 11 3 Plaso 13 3.1 Introduction to Plaso........................... 13 3.2 Working with Plaso............................ 14 3.2.1 Evidence acquisition........................ 14 3.2.2 Executing Plaso.......................... 15 3.3 Implementation process.......................... 18 4 Mac OS X 23 4.1 Mac OS X Design............................. 23 4.2 Timestamp................................. 24 4.3 Hierarchical File System Plus (HFS+)................... 27 vii 4.4 Bundle Layout............................... 28 4.5 File Vault.................................. 28 4.6 Evidence Types............................... 29 5 Mac OS X No Time Valuable 33 5.1 System basic configuration......................... 33 5.2 User accounts............................... 35 5.3 Autologin.................................. 36 5.4 Recent Files................................ 37 5.5 Kernel, Extensions, Swap and Hibernation File.............. 40 5.6 Booting and persistence.......................... 41 6 Mac OS X Timestamp Evidences 45 6.1 Apple System Log (ASL)......................... 45 6.1.1 Apple System Log Binary File................... 46 6.1.2 Apple System Log plaintext format................ 51 6.2 Basic Security Module (BSM)....................... 54 6.3 UTMPX File................................ 59 6.4 Configuration Files: Property List..................... 61 6.4.1 Time Machine........................... 61 6.4.2 Bluetooth............................. 62 6.4.3 Mac OS X Updates........................ 62 6.4.4 Airport Stored Wifi........................ 63 6.4.5 Spotlight Searched Terms and Volume.............. 63 6.4.6 Apple User Account........................ 64 6.4.7 System User Account....................... 64 6.4.8 Installation History......................... 65 6.4.9 Finder Sidebar........................... 65 6.5 Newsyslog plaintext logs.......................... 66 6.6 CUPS IPP control files........................... 68 6.7 Document Versions............................ 71 6.8 Keychains................................. 72 7 Case of study 77 viii 8 Conclusion 83 A Independent Parsers 87 B Plaso implementation 89 C Basic Security Module Tokens 93 Bibliography 105 ix x List of Figures 2.1 FSEventer screenshot from the Dockster.A [71].............. 10 3.1 Pinfo over Mac OS X image with Careto malware executed........ 16 3.2 Example of 4n6Time tool obtained form Dav Nads blog.......... 17 3.3 Kibana interface from Mac OS X image.................. 18 3.4 Plaso 1.1 released on 6th of June...................... 21 4.1 Mac OS X structure............................ 24 4.2 Mac OS X Timestamp........................... 26 4.3 Decrypting a partition using Libfvde library................ 29 4.4 Mac OS X Evidences............................ 31 5.1 User information extracted from mac password.py............. 36 5.2 Dave tool recovering a Mac OS X 10.9 password.............. 36 5.3 Bookmark Plist attribute.......................... 38 5.4 Bookmark hexadecimal Plist attribute................... 39 6.1 Generic ASL File structure......................... 47 6.2 ASL Entry structure in deep........................ 48 6.3 ASL Hexadecimal file example....................... 49 6.4 BSM Entry structure............................ 55 6.5 BSM hexadecimal raw entry......................... 56 6.6 Real UTMPX Mac OS X structure.................... 60 xi 6.7 Hexadecimal explanation of alias attribute................. 66 6.8 Extracting mounted devices extracted using alias.py script......... 67 6.9 Diagram CUPS IPP control file....................... 69 6.10 Hexadecimal CUPS IPP control file..................... 70 6.11 Keychain database structure........................ 74 6.12 Keychain header and schema hexadecimal structure............ 74 6.13 Keychain table header hexadecimal structure................ 75 6.14 Keychain record structure.......................... 75 6.15 Keychain application record hexadecimal structure............. 76 7.1 Virtual machine running Mac OS X 10.9.................. 78 xii List of Tables 3.1 Plaso review process............................. 20 3.2 Property List Plaso implementation..................... 20 6.1 ASL priority levels.............................. 45 6.2 BSM implemented token structures..................... 58 6.3 UTMPX structure.............................. 59 6.4 Most valuable CUPS attributes....................... 70 7.1 Mac OS X Malware used.......................... 78 A.1 Independent parsers............................. 87 B.1 Plaso ASL implementation......................... 89 B.2 Plaso CUPS IPP implementation...................... 89 B.3 Plaso BSM implementation......................... 90 B.4 Plaso Appfirewall.log implementation.................... 90 B.5 Plaso document versions implementation.................. 90 B.6 Plaso Keychain implementation....................... 90 B.7 Plaso securityd.log implementation..................... 90 B.8 Plaso wifi.log implementation........................ 91 B.9 Plaso BSD single line implementation................... 91 B.10 Plaso Mac OS X UTMPX implementation................. 91 B.11 Plaso Property list Mac OS X implementation............... 92 xiii C.1 BSM Token Header 32........................... 93 C.2 BSM Token Header 64........................... 93 C.3 BSM Token Header 32 Extended...................... 94 C.4 BSM Token Text.............................. 94 C.5 BSM Token Path.............................. 94 C.6 BSM Token Return 32........................... 94 C.7 BSM Token Return 64........................... 94 C.8 BSM Token Trailer............................. 95 C.9 BSM Token Argument 32.......................... 95 C.10 BSM Token Argument 64.......................... 95 C.11 BSM Token Subject 32........................... 95 C.12 BSM Token Subject 32 extended...................... 96 C.13 BSM Token Subject 64........................... 96 C.14 BSM Token Subject 64 extended...................... 97 C.15 BSM Token opaque (au to opaque).................... 97 C.16 BSM Token Sequence (au to seq)..................... 97 C.17 BSM Token Address (au to in addr).................... 97 C.18 BSM Token Address Extended (au to in addr ext)............. 98 C.19 BSM Token IP (au to ip).......................... 98 C.20 BSM Token IPC (au to ipc)........................ 98 C.21 BSM Token Port (au to iport)....................... 99 C.22 BSM Token File (au to file)......................... 99 C.23 BSM Token Process 32 (au to process32)................. 99 C.24 BSM Token Process
Recommended publications
  • Autocad Command Aliases
    AutoCAD and Its Applications Advanced Appendix D AutoCAD Command Aliases Command Alias 3DALIGN 3AL 3DFACE 3F 3DMOVE 3M 3DORBIT 3DO, ORBIT, 3DVIEW, ISOMETRICVIEW 3DPOLY 3P 3DPRINT 3DP, 3DPLOT, RAPIDPROTOTYPE 3DROTATE 3R 3DSCALE 3S 3DWALK 3DNAVIGATE, 3DW ACTRECORD ARR ACTSTOP ARS -ACTSTOP -ARS ACTUSERINPUT ARU ACTUSERMESSAGE ARM -ACTUSERMESSAGE -ARM ADCENTER ADC, DC, DCENTER ALIGN AL ALLPLAY APLAY ANALYSISCURVATURE CURVATUREANALYSIS ANALYSISZEBRA ZEBRA APPLOAD AP ARC A AREA AA ARRAY AR -ARRAY -AR ATTDEF ATT -ATTDEF -ATT Copyright Goodheart-Willcox Co., Inc. Appendix D — AutoCAD Command Aliases 1 May not be reproduced or posted to a publicly accessible website. Command Alias ATTEDIT ATE -ATTEDIT -ATE, ATTE ATTIPEDIT ATI BACTION AC BCLOSE BC BCPARAMETER CPARAM BEDIT BE BLOCK B -BLOCK -B BOUNDARY BO -BOUNDARY -BO BPARAMETER PARAM BREAK BR BSAVE BS BVSTATE BVS CAMERA CAM CHAMFER CHA CHANGE -CH CHECKSTANDARDS CHK CIRCLE C COLOR COL, COLOUR COMMANDLINE CLI CONSTRAINTBAR CBAR CONSTRAINTSETTINGS CSETTINGS COPY CO, CP CTABLESTYLE CT CVADD INSERTCONTROLPOINT CVHIDE POINTOFF CVREBUILD REBUILD CVREMOVE REMOVECONTROLPOINT CVSHOW POINTON Copyright Goodheart-Willcox Co., Inc. Appendix D — AutoCAD Command Aliases 2 May not be reproduced or posted to a publicly accessible website. Command Alias CYLINDER CYL DATAEXTRACTION DX DATALINK DL DATALINKUPDATE DLU DBCONNECT DBC, DATABASE, DATASOURCE DDGRIPS GR DELCONSTRAINT DELCON DIMALIGNED DAL, DIMALI DIMANGULAR DAN, DIMANG DIMARC DAR DIMBASELINE DBA, DIMBASE DIMCENTER DCE DIMCONSTRAINT DCON DIMCONTINUE DCO, DIMCONT DIMDIAMETER DDI, DIMDIA DIMDISASSOCIATE DDA DIMEDIT DED, DIMED DIMJOGGED DJO, JOG DIMJOGLINE DJL DIMLINEAR DIMLIN, DLI DIMORDINATE DOR, DIMORD DIMOVERRIDE DOV, DIMOVER DIMRADIUS DIMRAD, DRA DIMREASSOCIATE DRE DIMSTYLE D, DIMSTY, DST DIMTEDIT DIMTED DIST DI, LENGTH DIVIDE DIV DONUT DO DRAWINGRECOVERY DRM DRAWORDER DR Copyright Goodheart-Willcox Co., Inc.
    [Show full text]
  • Membrane: Operating System Support for Restartable File Systems Swaminathan Sundararaman, Sriram Subramanian, Abhishek Rajimwale, Andrea C
    Membrane: Operating System Support for Restartable File Systems Swaminathan Sundararaman, Sriram Subramanian, Abhishek Rajimwale, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift Computer Sciences Department, University of Wisconsin, Madison Abstract and most complex code bases in the kernel. Further, We introduce Membrane, a set of changes to the oper- file systems are still under active development, and new ating system to support restartable file systems. Mem- ones are introduced quite frequently. For example, Linux brane allows an operating system to tolerate a broad has many established file systems, including ext2 [34], class of file system failures and does so while remain- ext3 [35], reiserfs [27], and still there is great interest in ing transparent to running applications; upon failure, the next-generation file systems such as Linux ext4 and btrfs. file system restarts, its state is restored, and pending ap- Thus, file systems are large, complex, and under develop- plication requests are serviced as if no failure had oc- ment, the perfect storm for numerous bugs to arise. curred. Membrane provides transparent recovery through Because of the likely presence of flaws in their imple- a lightweight logging and checkpoint infrastructure, and mentation, it is critical to consider how to recover from includes novel techniques to improve performance and file system crashes as well. Unfortunately, we cannot di- correctness of its fault-anticipation and recovery machin- rectly apply previous work from the device-driver litera- ery. We tested Membrane with ext2, ext3, and VFAT. ture to improving file-system fault recovery. File systems, Through experimentation, we show that Membrane in- unlike device drivers, are extremely stateful, as they man- duces little performance overhead and can tolerate a wide age vast amounts of both in-memory and persistent data; range of file system crashes.
    [Show full text]
  • Mac Keyboard Shortcuts Cut, Copy, Paste, and Other Common Shortcuts
    Mac keyboard shortcuts By pressing a combination of keys, you can do things that normally need a mouse, trackpad, or other input device. To use a keyboard shortcut, hold down one or more modifier keys while pressing the last key of the shortcut. For example, to use the shortcut Command-C (copy), hold down Command, press C, then release both keys. Mac menus and keyboards often use symbols for certain keys, including the modifier keys: Command ⌘ Option ⌥ Caps Lock ⇪ Shift ⇧ Control ⌃ Fn If you're using a keyboard made for Windows PCs, use the Alt key instead of Option, and the Windows logo key instead of Command. Some Mac keyboards and shortcuts use special keys in the top row, which include icons for volume, display brightness, and other functions. Press the icon key to perform that function, or combine it with the Fn key to use it as an F1, F2, F3, or other standard function key. To learn more shortcuts, check the menus of the app you're using. Every app can have its own shortcuts, and shortcuts that work in one app may not work in another. Cut, copy, paste, and other common shortcuts Shortcut Description Command-X Cut: Remove the selected item and copy it to the Clipboard. Command-C Copy the selected item to the Clipboard. This also works for files in the Finder. Command-V Paste the contents of the Clipboard into the current document or app. This also works for files in the Finder. Command-Z Undo the previous command. You can then press Command-Shift-Z to Redo, reversing the undo command.
    [Show full text]
  • Alias Manager 4
    CHAPTER 4 Alias Manager 4 This chapter describes how your application can use the Alias Manager to establish and resolve alias records, which are data structures that describe file system objects (that is, files, directories, and volumes). You create an alias record to take a “fingerprint” of a file system object, usually a file, that you might need to locate again later. You can store the alias record, instead of a file system specification, and then let the Alias Manager find the file again when it’s needed. The Alias Manager contains algorithms for locating files that have been moved, renamed, copied, or restored from backup. Note The Alias Manager lets you manage alias records. It does not directly manipulate Finder aliases, which the user creates and manages through the Finder. The chapter “Finder Interface” in Inside Macintosh: Macintosh Toolbox Essentials describes Finder aliases and ways to accommodate them in your application. ◆ The Alias Manager is available only in system software version 7.0 or later. Use the Gestalt function, described in the chapter “Gestalt Manager” of Inside Macintosh: Operating System Utilities, to determine whether the Alias Manager is present. Read this chapter if you want your application to create and resolve alias records. You might store an alias record, for example, to identify a customized dictionary from within a word-processing document. When the user runs a spelling checker on the document, your application can ask the Alias Manager to resolve the record to find the correct dictionary. 4 To use this chapter, you should be familiar with the File Manager’s conventions for Alias Manager identifying files, directories, and volumes, as described in the chapter “Introduction to File Management” in this book.
    [Show full text]
  • Onetouch 4 Lite USB Mac User Guide
    Contents Getting Started . .1 Using the Formatting Tool . .1 Preparing the Software Manually . .4 Installing the Software . .9 Managing Your Drives . .15 Customizing the OneTouch Button . .15 Running Diagnostics . .18 Updating Your Software . .19 Backing Up & Restoring Folders . .22 Creating Backup Plans . .22 Using Simple Backup . .22 Creating a Custom Backup Plan . .26 Managing Backup Plans . .33 Editing Backup Settings . .33 Deleting Backup Plans . .36 Backing Up Manually . .37 Restoring Files . .39 OneTouch II and III Users . .42 Managing Security . .42 Using DrivePass . .42 Enabling DrivePass . 42 Unlocking Your OneTouch Drive . 45 Removing DrivePass . 50 Changing Your DrivePass Password . 52 If You Forget Your Password... .55 Synchronizing Folders . .60 Using Pre-configured Sync . .61 Using Custom Sync . .61 Completing the Sync . .64 Maxtor OneTouch IV i Removing Folders from Sync . .65 Checking Sync Status . .65 Synchronizing Manually . .66 Using the Maxtor Synchronization Window . .66 Using Automatic Overwrite . 68 Using RAID . .68 Frequently Asked Questions . .76 Index . i 072407 Maxtor OneTouch IV ii Getting Started The Maxtor OneTouch 4 drive offers these features: • Backup & Restore to protect your data • A customized OneTouch button to quickly open a frequently-used program If you are a OneTouch II or III user, you also have access to features available on that drive: • Sync to synchronize one or more folders between two or more computers • Security settings to password-protect your drive The Maxtor OneTouch software is loaded on your OneTouch drive. Because the software is configured for a Windows operating system, the software must be prepared for installation on your Macintosh. Using the Formatting Tool The Mac OneTouch 4 Formatting tool automatically prepares the Maxtor Manager software for installation on your Macintosh, To use the Mac OneTouch 4 Formatting Tool, Step 1: Connect your OneTouch 4 drive to your computer.
    [Show full text]
  • Partitioner Och Filsystem 2
    Partitioner och filsystem 2 File systems FAT Unix-like NTFS Vad är ett filsystem? • Datorer behöver en metod för att lagra och hämta data… • Referensmodell för filsystem (Carrier) – Filsystem kategori • Layout och storleksinformation – Innehålls kategori • Kluster och block – data enheter – Metadata kategori • Tidsinformation, storlek, access kontroll • Adresser till allokerade data enheter – Filnamn kategori • Oftast ihop-kopplad med metadata – Applikations kategori • Quota • Journaler • De modernaste påminner mycket om relations databaser Windows • NTFS (New Technology File System) – 6 versioner finns, de nyaste är v3.0 (Windows 2000) och v3.1 (XP, 2003, Vista, 2008, 7), kallas även 5.0, 5.1, 5.2, 6.0 och 6.1 (efter OS version) – Stöd för unicode, säkerhet, mm. - är mycket mer komplext än FAT! – http://en.wikipedia.org/wiki/Ntfs • FAT 12/16/32, VFAT (långa filnamn i Win95) – Används fortfarande men är inte effektivt för större lagringskapaciteter (klusterstorleken) – Långsammare access än NTFS • Windows Future Storage (WinFS) inställt projekt, enligt rykten var det en SQL-databas som ligger ovanpå ett NTFS filsystem – Läs mer på: http://www.ntfs.com/ – Och: http://en.wikipedia.org/wiki/WinFS FAT12, 16 och 32 • FAT12, finns på floppy diskar – Begränsad lagringskapacitet – Designat för MS-DOS 1.0 • FAT16, var designat för större diskar – Äldre OS använde detta • MS-DOS 3.0, Win95 OSR1, NT 3.5 och NT 4.0 – Max diskstorlek 2 GB • FAT32 kom när diskar större än 2GB kom – Vissa äldre och alla nya OS kan använda FAT32 • Windows 98/Me/2000/XP/2003/Vista/7 och 2008 • Begränsningar med FAT32 – Största formaterabara volymen är 32GB (större volymer kan dock användas, < 16 TiB) – Begränsade features vad gäller komprimering, kryptering, säkerhet och hastighet jämfört mot NTFS • http://en.wikipedia.org/wiki/FAT_file_system exFAT • exFAT (Extended File Allocation Table, a.k.a.
    [Show full text]
  • ® Apple® A/UXTM Release Notes Version 1.0 Ii APPLE COMPUTER, INC
    .® Apple® A/UXTM Release Notes Version 1.0 Ii APPLE COMPUTER, INC. UNIBUS, VAX, VMS, and VT100 are trademarks of Digital © Apple Computer, Inc., 1986 Equipment Corporation. 20525 Mariani Ave. Cupertino, California 95014 Simultaneously published in the (408) 996-1010 United States and Canada. Apple, the Apple logo, APPLE'S SYSTEM V AppleTalk, ImageWriter, IMPLEMENTATION A/UX LaserWriter, Macintosh, RELEASE 1.0 RUNNING ON A MacTerminal, and ProDOS are MACINTOSH II COMPUTER registered trademarks of Apple HAS BEEN TESTED BY THE Computer, Inc. AT&T-IS' SYSTEM V VERIFICATION SUITE AND Apple Desktop Bus, A!UX, CONFORMS TO ISSUE 2 OF EtherTalk, and Finder are AT&T-IS' SYSTEM V trademarks of Apple Computer, INTERFACE DEFINITION Inc. BASE PLUS KERNEL Ethernet is a registered EXTENSIONS. trademark of Xerox Corporation. IBM is a registered trademark, and PC-DOS is a trademark, of International Business Machines, Inc. - ITC Avant Garde Gothic, ITC Garamond, and ITC Zapf Dingbats are registered trademarks of International Typeface Corporation. Microsoft and MS-DOS are registered trademarks of Microsoft Corporation. NFS is a registered trademark, and Sun Microsystems is a trademark, of Sun Microsystems, Inc. NuBus is a trademark of Texas Instruments. POSTSCRIPT is a registered trademark, and TRANSCRIPT is a trademark, of Adobe Systems Incorporated. UNIX is a registered trademark of AT&T Information Systems. Introduction to A/UX Release Notes, Version 1.0 These release notes contain late-breaking information about release 1.0 of the A!UXI'M software for the Apple® Macintosh® II computer. This package contains two kinds of materials: o Specific information that was not available in time to be incorporated into the printed manuals.
    [Show full text]
  • Chapter 1. Origins of Mac OS X
    1 Chapter 1. Origins of Mac OS X "Most ideas come from previous ideas." Alan Curtis Kay The Mac OS X operating system represents a rather successful coming together of paradigms, ideologies, and technologies that have often resisted each other in the past. A good example is the cordial relationship that exists between the command-line and graphical interfaces in Mac OS X. The system is a result of the trials and tribulations of Apple and NeXT, as well as their user and developer communities. Mac OS X exemplifies how a capable system can result from the direct or indirect efforts of corporations, academic and research communities, the Open Source and Free Software movements, and, of course, individuals. Apple has been around since 1976, and many accounts of its history have been told. If the story of Apple as a company is fascinating, so is the technical history of Apple's operating systems. In this chapter,[1] we will trace the history of Mac OS X, discussing several technologies whose confluence eventually led to the modern-day Apple operating system. [1] This book's accompanying web site (www.osxbook.com) provides a more detailed technical history of all of Apple's operating systems. 1 2 2 1 1.1. Apple's Quest for the[2] Operating System [2] Whereas the word "the" is used here to designate prominence and desirability, it is an interesting coincidence that "THE" was the name of a multiprogramming system described by Edsger W. Dijkstra in a 1968 paper. It was March 1988. The Macintosh had been around for four years.
    [Show full text]
  • Gutenprint 5.0 User's Manual and Release Notes
    Gutenprint 5.0 User's Manual Robert Krawitz March 4, 2007 Gutenprint 5.0 User's Manual Copyright © 2000-2007 Robert Krawitz Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation with no invariant sections, no Front-Cover texts, and no Back-Cover texts. Gutenprint 5.0 is licensed in its entirety under the terms of the GNU General Public License. The CUPS code (in src/cups) is licensed under the terms of the GNU General Public License version 2; the balance of the code is licensed under the terms of the GNU General Public License version 2 or any later version published by the Free Software Foundation. EPSON, ESC/P, and Stylus are registered trademarks of Seiko Epson Corp. ESC/P2 is a trademark of Seiko Epson Corp. All other product names are trademarks and/or registered trademarks of their vendors. 2 Gutenprint 5.0 User's Manual 03/04/2007 Table of Contents 1) Introduction............................................................................................................................................5 1.1) What is Gutenprint?.......................................................................................................................5 1.2) History of Gutenprint.....................................................................................................................5 1.2.1) The early years: Gimp-Print 3.x and 4.0................................................................................5
    [Show full text]
  • Reference Modification Error in Cobol
    Reference Modification Error In Cobol Bartholomeus freeze-dries her Burnley when, she objurgates it atilt. Luke still brutalize prehistorically while rosaceous Dannie aphorizing that luncheonettes. When Vernor splashes his exobiologists bronzing not histrionically enough, is Efram attrite? The content following a Kubernetes template file. Work during data items. Those advice are consolidated, transformed and made sure for the mining and online processing. For post, if internal programs A and B are agile in a containing program and A calls B and B cancels A, this message will be issued. Charles Phillips to demonstrate his displeasure. The starting position itself must man a positive integer less than one equal possess the saw of characters in the reference modified function result. Always some need me give when in quotes. Cobol reference an error will open a cobol reference modification error in. The MOVE command transfers data beyond one specimen of storage to another. Various numeric intrinsic functions are also mentioned. Is there capital available version of the rpg programming language available secure the PC? Qualification, reference modification, and subscripting or indexing allow blood and unambiguous references to that resource. Writer was slated to be shown at the bass strings should be. Handle this may be sorted and a precision floating point in sequential data transfer be from attacks in virtually present before performing a reference modification starting position were a statement? What strength the difference between index and subscript? The sum nor the leftmost character position and does length must not made the total length form the character item. Shown at or of cobol specification was slated to newspaper to get rid once the way.
    [Show full text]
  • Cups-Filters-Ippusbxd-2018.Pdf
    cups-filters The non-Apple part of CUPS, maintained by OpenPrinting ippusbxd Standards-conforming support for IPP-over-USB printers Till Kamppeter, OpenPrinting Introduction • cups-filters takes up everything from CUPS which Mac OS X does not need (CUPS 1.6.x) Started end of 2011 by OpenPrinting, overtaking most of CUPS’ filters Switched filters over from PostScript-centric to PDF-centric workflow cups-browsed introduced end of 2012, to introduce browsing of DNS- SD-advertised remote CUPS queues, as CUPS dropped its own broadcasting/browsing • In 7 years of development cups-filters improved a lot Auto-create print queues for IPP network and IPP-over-USB printers, especially driverless printing, not competing with CUPS’ own temporary queues. Mobile printing support: No printer setup tool needed, auto-setup of printers, driverless, cups-browsed auto-shutdown Load-balanced printer clusters, with client-side or server-side queueing of jobs Do legacy CUPS broadcasting/browsing to work with old CUPS on remote machines Filters support Ghostscript, Poppler, and MuPDF as PDF interpreter Filters support all PDLs for driverless printing: PDF, Apple Raster, PWG Raster, and PCLm 2 Role of cups-browsed • CUPS auto-generates its own temporary queues to point to remote IPP/CUPS printers, why continue cups-browsed? Printer clustering (like the former Implicit Classes) . Configurable: Automatic (by equal remote queue names) and manual (by cups-browsed.conf) . Load balancing of clustered queues . Auto-selection of destination printer by job and job settings (planned) Fine-grained filtering of which remote printers are available . Not only servers/IP addresses, but also service names.
    [Show full text]
  • Assistance with Self-Administered Medications 2 Contact Hours
    Chapter 8: Assistance With Self-Administered Medications 2 Contact Hours Learning objectives Identify and interpret the components of a prescription label. Describe conditions that require additional clarification for “as List and explain the procedures for assistance with oral and topical needed” prescription orders. forms of medications (including ophthalmic, otic and nasal forms), Identify medication orders that require judgment, and may prevent including the “five rights” of medical administration. the CNA from assisting residents with medication. Identify and define the side effects for medication classes and Explain and list types of information and details that must be discuss procedures to follow if residents experience side effects or reported on the medication observation record. adverse reactions. List the requirements and procedures for medication storage and disposal. Introduction The Florida statutes (revised in 2016) are the laws that govern of the 2016 Florida Statutes. This means that some material assistance with self-medication. According to the state[1]: in the 2016 edition may not take effect until January 1, 2017. Legislative changes to the Florida Statutes, effective up to and Amendments effective on January 2, 2017, or later, will appear as including January 1, 2017, are treated as current for publication footnotes. Title XXX: Chapter 429: Social welfare assisted care communities 429.256 Assistance with self-administration of medication. c. Placing an oral dosage in the resident’s hand or placing the 1. For the purposes of this section, the term: dosage in another container and helping the resident by lifting a. “Informed consent” means advising the resident, or the the container to his or her mouth.
    [Show full text]