Team-Fly® Wireless Security Essentials Defending Mobile Systems from Data Piracy

Total Page:16

File Type:pdf, Size:1020Kb

Team-Fly® Wireless Security Essentials Defending Mobile Systems from Data Piracy Y L F M A E T Team-Fly® Wireless Security Essentials Defending Mobile Systems from Data Piracy Russell Dean Vines Wiley Publishing, Inc. Publisher: Robert Ipsen Editor: Margaret Eldridge Assistant Editor: Adaobi Obi Managing Editor: Micheline Frederick New Media Editor: Brian Snapp Text Design & Composition: Wiley Composition Services Designations used by companies to distinguish their products are often claimed as trade- marks. In all instances where Wiley Publishing, Inc., is aware of a claim, the product names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should contact the appro- priate companies for more complete information regarding trademarks and registration. This book is printed on acid-free paper. ∞ Copyright © 2002 by Russell Dean Vines. All rights reserved. Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copy- right Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspointe Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, E-mail: [email protected]. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. For general information on our other products and services please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Library of Congress Cataloging-in-Publication Data: ISBN: 0-471-20936-8 Printed in the United States of America. 10 9 8 7 6 5 4 3 2 1 This book is dedicated to the heroes of 9/11/01, common people who performed uncommon deeds when the time required it. And especially to my friend Lingard Knutson, who helped lead her Port Authority co-workers down 62 flights of stairs from Tower 1 to safety. We should all have such angels. Contents Preface xiii Introduction xvii Origin and Rationale xviii Organization xix What’s on the website xxi Part I Technology Essentials 1 Chapter 1 Computing Technology 3 Computer Basics 4 CPU 4 Bus 4 Memory 5 Operating Systems and Software 7 Software 7 Network Technologies 8 Analog versus Digital 8 Local Area Networking 9 LAN Topology 10 LAN Cabling 13 LAN Network Devices 14 Wide Area Networking 19 Circuit-Switched versus Packet-Switched Networks 19 Packet-Switched Technologies 21 Private Circuit Technologies 22 Virtual Private Networking (VPNs) 22 VPN Communications Standards 23 v vi Contents Firewalls 23 Packet-Filtering Firewall 24 Application-Level Firewalls 24 Stateful Inspection Firewall 24 Protocols 25 Open Systems Interconnect (OSI) Model 25 Transmission Control Protocol/ Internet Protocol (TCP/IP) Model 27 TCP/IP Protocols 28 The Wireless Application Protocol 29 Chapter 2 Wireless Theory 33 A Painless History of Wireless Technology 33 The Cellular Phone Network 34 Worldwide Cellular via LEO Satellites 35 Cellular Network Elements 35 The Call Process 36 Wireless Cellular Technologies 36 Wireless Transmission Systems 37 Advanced Mobile Phone System 37 Time Division Multiple Access 38 Code Division Multiple Access 38 Global System for Mobile Communications 39 Cellular Digital Packet Data 39 Nordic Mobile Telephone 39 Total Access Communication System 39 Personal Digital Cellular 40 Short Message Service 40 The Generation Gap 40 2.5G Technologies 41 3G Technologies 42 Wireless Data Networking Technologies 44 Spread Spectrum Technology 44 Direct Sequence Spread Spectrum (DSSS) 44 Frequency-Hopping Spread Spectrum (FHSS) 45 Orthogonal Frequency Division Multiplexing 46 IEEE 802.11 Specifications for Wireless LANS 47 Original IEEE 802.11 LAN Standard 48 IEEE 802.11b 48 IEEE 802.11a 49 IEEE 802.11g 50 IEEE 802.11e 51 802.11 Wireless Network Operational Modes 51 Ad Hoc Mode 51 Infrastructure Mode 52 Bluetooth 54 Bluetooth Advantages and Disadvantages 55 Contents vii HomeRF 55 HomeRF Technology Overview 56 HomeRF and Shared Wireless Application Protocol 58 High-Performance Radio LANs 59 HiperLAN/1 59 HiperLAN/2 59 Wireless Application Protocol 61 WAP Layers 62 Application Layer 63 Session Layer 63 Transaction Layer 64 Security Layer 64 Transport Layer 64 Chapter 3 Wireless Reality 65 Wireless Standards and Technologies 65 802.11 66 Benefits of WLAN 66 802.11b Encryption 66 Other Notable IEEE 802 Wireless Standards and Drafts 67 802.1x Port-Based Network Access Control 67 802.15 Wireless Personal Area Networks 68 802.16 Broadband Wireless Access 69 802.11g 69 Nonwireless IEEE Standards 69 802.1v VLAN Classification by Protocol and Port 69 802.17 Resilient Packet Ring Access Protocol 70 Other Standards Working Groups 70 HomeRF 71 Comparing 802.11b to HomeRF 73 HomeRF Security 73 Bluetooth 73 System Architecture Features 74 The Piconet 75 Bluetooth Hardware Elements 76 Battery Conservation 78 Bluetooth Versions 79 Common Bluetooth Applications 80 Bluetooth Security 81 Wireless Personal Area Network 82 Infrared Data Association (IrDA) 82 Comparing Bluetooth to IrDA 84 Directionality 84 Other Comparisons 84 Wireless Hardware and Devices 85 Personal Electronic Devices 85 viii Contents PDAs 85 The Palm OS 86 Windows Handhelds 87 Other PDA Devices 88 Internet-Enabled Cell Phones 88 WAP-Enabled Phones 89 Symbian OS 89 Nokia 90 Ericsson R380e 92 Motorola i90c iDEN 93 BlackBerry 96 BlackBerry Internet Edition 96 BlackBerry Enterprise Edition 96 BlackBerry ISPs 97 Wireless Applications 98 Wireless Technologies in the Home 98 Wireless Technologies in the Office 99 Wireless Technologies in Public Spaces 99 Part II Security Essentials 101 Chapter 4 Security Concepts and Methodologies 103 The Concepts of C.I.A. 105 Confidentiality 105 Integrity 106 Availability 107 Threats, Vulnerabilities, and Risk 107 Certification and Accreditation 107 Policies and Procedures 108 Business Continuity and Disaster Recovery 109 Alternative Processing Sites 110 Wireless Disaster Recovery 111 Information Classification Concepts 111 The Ten Domains of the International Information Systems Security Certification Consortium 112 TCSEC and the Common Criteria 113 The Orange Book 113 The Red Book 114 The Common Criteria 114 DITSCAP and NIACAP 115 DITSCAP 116 NIACAP 116 INFOSEC Assessment Methodology (IAM) 117 The IAM Process 118 BS7799 119 Contents ix A Short History of Cryptography 120 The Early Days of Secret Writing 120 Early Disk Use 121 The 1920s 122 Rotor Systems 122 Identification and Authorization 123 Identification and Authentication 123 Passwords 124 Access Control Models 125 Mandatory Access Control 125 Discretionary Access Control 125 Nondiscretionary Access Control 126 Controls 126 Accountability 127 Chapter 5 Security Technologies 129 Cryptographic Technologies and Public Key Infrastructure 129 Secret Key Cryptography (Symmetric Key) 130 Data Encryption Standard 130 Advanced Encryption Standard 131 Public (Asymmetric) Key Cryptosystems 131 One-Way Function 132 Public Key Algorithms 132 Public Key Infrastructure 133 Department of Defense Wireless PKI Initiative 134 Wired Equivalent Privacy 135 WEP Encryption 136 WEP Decryption 137 WEP RC4 137 WEP Authentication Methods 138 Open System Authentication 138 Shared Key Authentication 138 WEP Key Management 140 Wireless Application Protocol Security 141 Wireless Transport Layer Security 142 End-to-End Security via the WAP Gateway 144 Bluetooth Security Architecture 146 The Security Manager 146 Link-Level Security Features 147 Mode 2: Service-Level Security 147 Mode 3: Link-Level Security 148 Other Bluetooth Security Architecture Features 149 Wireless Tools 150 Wireless VPNs 150 movianVPN 151 x Contents Wireless Packet Sniffers 152 AiroPeek 152 Cisco Systems’ Wireless Products 154 Aironet 350 Features 154 Aironet 350 Management Options 155 Security Monitoring and Testing 156 Intrusion Detection Systems 157 Network-Based IDS 158 Host-Based IDS 158 IDS Detection Methods 159 Signature-Based ID 159 Statistical Anomaly-Based ID 160 Penetration Testing 160 Chapter 6 Threats and Solutions 163 Security Threats to Personal Electronic Devices 163 Vulnerability of PDA Operating Systems 164 PDA Vulnerability Caused by Physical Loss 165 Identification and Authentication 166 Catching PDA Viruses 166 Phage.963 167 Vapor.741 167 LibertyCrack 167 Tapping Infrared Vulnerabilities
Recommended publications
  • INSECURE-Mag-9.Pdf
    Another year is almost over and a plethora of information security problems are behind us. To let 2006 go out in style, we bring you a feature packed issue of (IN)SECURE. As the feature interview for this issue we had the pleasure of talking with Kurt Sauer, the CSO at Skype, one of the most well-known companies in the digital world. We’ll be back next year with many new ideas in the pipeline. Stay tuned for coverage from a few conferences including the RSA Conference in San Francisco and the Black Hat Briefings &Training in Amsterdam. If you’re attending, be sure to drop me an e-mail and we’ll grab a drink. We wish you a safe 2007! Mirko Zorz Chief Editor Visit the magazine website at www.insecuremag.com (IN)SECURE Magazine contacts Feedback and contributions: Mirko Zorz, Chief Editor - [email protected] Marketing: Berislav Kucan, Director of Marketing - [email protected] Distribution (IN)SECURE Magazine can be freely distributed in the form of the original, non modified PDF document. Distribution of modified versions of (IN)SECURE Magazine content is prohibited without the explicit permission from the editor. For reprinting information please send an email to [email protected] or send a fax to 1-866-420-2598. Copyright HNS Consulting Ltd. 2006. www.insecuremag.com New enterprise single sign-on authentication software DigitalPersona announced the latest version of its award-winning enterprise product, DigitalPersona Pro 4.0. The new and improved software delivers a complete, accurate and trusted fingerprint Enterprise Single Sign-On (ESSO) solution with more secure authentication, improved manageability and the broadest support available for the world’s leading biometrically-enabled notebooks including models from Lenovo, HP, Dell, and Toshiba.
    [Show full text]
  • Tech Paper Symbian Technical Paper
    Tech Paper Symbian Technical Paper Copyright © 2000 Symbian Ltd. All rights reserved. Reproduction of this paper, in any form, in whole or in part, without written permission of Symbian Ltd, is prohibited. Designing for Quartz Martin Tasker, Head of Technical Communications, Symbian Ltd Summary Symbian’s Quartz design, for a tablet communicator, presents many new opportunities for application development. Successful applications must be designed both for the device, and for its end-users. This paper covers the design decisions underlying the new Quartz GUI, and shows how the standard guidelines are implemented by the built- in application suite. Finally the author considers how to migrate two of his own applications, the Solo Ships and Battleships examples from Professional Symbian Programming. This paper is based on material prepared for the Wrox Professional Wireless Developers Conference, Amsterdam, July 2000. Contents ●Introduction ❍Basic parameters ❍Symbian, manufacturers and developers ❍End-user ●Elements of the GUI ❍Screen areas ❍Applications and views ❍Real applications: personal information management ❍Standard guidelines ❍Real applications: finishing the tour ❍Dialogs ❍Text input and handwriting recognition ❍System support ●Designing for Quartz ❍Make the tough decisions ❍More on Java ❍Some simple examples ❍Battleships ●Summary Introduction Contents ●Basic parameters ●Symbian, manufacturers and developers ●End-user Symbian’s previous product was EPOC Release 5. This is the operating system behind the Psion Series 5mx, Psion Series 7, Psion netBook, http://www.symbiandevnet.com/techlib/techcomms/techpapers/papers/v6/quartz/ui/appdesign/ (1 sur 31) [24/10/2001 11:13:48] Tech Paper Ericsson MC218, and Psion Revo. These devices all sport a touch screen of similar size, and a compact but full alphanumeric keyboard.
    [Show full text]
  • Handheld Technology Review, Technical Report 2001-008-C-06
    QUT Digital Repository: http://eprints.qut.edu.au/26874 Kajewski, Stephen L. and Tilley, Paul A. and Crawford, John and Remmers, Todd R. and Chen, Swee-Eng and Lenard, Dennis and Brewer, Graham and Gameson, Rod and Martins, Rui and Sher, Willy and Kolomy, Richard and Weippert, Achim and Caldwell, Geoff and Haug, Mark (2001) Handheld technology review. The Participants of the CRC for Construction Innovation have delegated authority to the CEO of the CRC to give Participants permission to publish material created by the CRC for Construction Innovation. This delegation is contained in Clause 30 of the Agreement for the Establishment and Operation of the Cooperative Research Centre for Construction Innovation. The CEO of the CRC for Construction Innovation gives permission to the Queensland University of Technology to publish the papers/publications provided in the collection in QUT ePrints provided that the publications are published in full. Icon.Net Pty Ltd retains copyright to the publications. Any other usage is prohibited without the express permission of the CEO of the CRC. The CRC warrants that Icon.Net Pty Ltd holds copyright to all papers/reports/publications produced by the CRC for Construction Innovation. Handheld Technology Review Rep ort 2 0 0 1 -0 0 8 -C-0 6 The research described in this report was carried out by: P roject L eader D r S tephen K ajewsk i (QU T) Team Mem bers P aul Tilley, Mr J ohn C rawford (C S IR O ), Todd R em m ers (C S IR O ) P rofessor S wee-E ng C hen, P rofessor D ennis L enard, G raham B rewer, R
    [Show full text]
  • HNS - Dnschanger Redirects Users to Fake Bank Websites
    HNS - DNSChanger redirects users to fake bank websites Welcome to a new version of Help Net Security. Much has improved and more is on the way. Subscribe to our RSS feeds and stay updated! Off The Wire Latest Articles Windows Linux Security Reviews Vendor Advisories Webcasts Subscribe Current Mac OS X World Interviews Vulnerability Database Conferences Issue Archive Pocket PC Virus Book Chapters Center Federated identity: scenarios, architecture, and implementation Consultant breached FBI's computers Researcher vows to publish a browser bug a day for July McAfee sees 400,000 virus definitions by 2008 The hidden dangers of instant messaging Skype steps up security spin A day in the life of a security professional Double Password security manager announced ICICI Bank phishing scam targets customers in india Survey reveals end point security loophole 49% fail to lock down devices DNSChanger redirects users to fake bank websites The largest network security event in Asia Limiting Vulnerability Exposure Through Effective Patch Management Securing Wireless, Remote and Mobile Computing - Quick Fixes The Ten Most Critical Wireless and Mobile Security Vulnerabilities Striking the Balance Between Storage Security and Availability Security for Websites - Breaking Sessions to Hack Into a Machine Chronicle of malware detected in the first half of 2006 Sophos: because of malware home users should switch to Macs New worm holds no genuine http://www.net-security.org/secworld.php?id=4049 (1 of 3) [7/6/2006 4:18:20 PM] HNS - DNSChanger redirects users to
    [Show full text]
  • Symbian OS from Wikipedia, the Free Encyclopedia
    Try Beta Log in / create account article discussion edit this page history Symbian OS From Wikipedia, the free encyclopedia This article is about the historical Symbian OS. For the current, open source Symbian platform descended from Symbian OS and S60, see Symbian platform. navigation Main page This article has multiple issues. Please help improve the article or discuss these issues on the Contents talk page. Featured content It may be too technical for a general audience. Please help make it more accessible. Tagged since Current events December 2009. Random article It may require general cleanup to meet Wikipedia's quality standards. Tagged since December 2009. search Symbian OS is an operating system (OS) designed for mobile devices and smartphones, with Symbian OS associated libraries, user interface, frameworks and reference implementations of common tools, Go Search originally developed by Symbian Ltd. It was a descendant of Psion's EPOC and runs exclusively on interaction ARM processors, although an unreleased x86 port existed. About Wikipedia In 2008, the former Symbian Software Limited was acquired by Nokia and a new independent non- Community portal profit organisation called the Symbian Foundation was established. Symbian OS and its associated Recent changes user interfaces S60, UIQ and MOAP(S) were contributed by their owners to the foundation with the Company / Nokia/(Symbian Ltd.) Contact Wikipedia objective of creating the Symbian platform as a royalty-free, open source software. The platform has developer Donate to Wikipedia been designated as the successor to Symbian OS, following the official launch of the Symbian [1] Help Programmed C++ Foundation in April 2009.
    [Show full text]
  • SYMBIAN OS Embedded Operating System
    Adamson University 900 San Marcelino st., Ermita, Manila 1000 SYMBIAN OS Embedded Operating System Operating Systems Prof. Antonette Daligdig Atienza, Lemuel Jay Bacarra, Dan Paolo Dulatre, Michael Angelo Jimenez, John Edward Llorca, Bryalle November 2009 Table of Contents I Introduction II Origin/History III Characteristics III.a. Processing III.b. Memory Management III.c. I/O : Input/Output IV Features V Strengths VI Weakness VII Example of Applications where the OS is being used VIII Screenshots I Introduction More than 90% of the CPUs in the world are not in desktops and notebooks. They are in embedded systems like cell phones, PDAs, digital cameras, camcorders, game machines, iPods, MP3 players, CD players, DVD recorders, wireless routers, TV sets, GPS receivers, laser printers, cars, and many more consumer products. Most of these use modern 32-bit and 64-bit chips, and nearly all of them run a full-blown operating system. Taking a close look at one operating system popular in the embedded systems world: Symbian OS, Symbian OS is an operating system that runs on mobile ‘‘smartphone’’ platforms from several different manufacturers. Smartphones are so named because they run fully-featured operating systems and utilize the features of desktop computers. Symbian OS is designed so that it can be the basis of a wide variety of smartphones from several different manufacturers. It was carefully designed specifically to run on smartphone platforms: general-purpose computers with limited CPU, memory and storage capacity, focused on communication. Our discussion of Symbian OS will start with its history. We will then provide an overview of the system to give an idea of how it is designed and what uses the designers intended for it.
    [Show full text]
  • Linux on the Psion Netbook HOWTO Last Modified 9 July 2006
    Linux on the Psion netBook HOWTO Last modified 9 July 2006. Changes. Copyright © 2003-2005 www.openpsion.org (http://www.openpsion.org) - The OpenPsion Project. All rights reserved. This document contains information on how to get a Psion netBook to boot up the Linux operating system, how to subsequently configure the system, and how to obtain, install and use applications suitable for the netBook’s limited resources. This document also contains notes on the remaining problems at the moment, and instructions on such things as compiling a custom kernel and assembling a custom OS.IMG file. Framebuffer support is implemented, and X windows is supported. Compactflash, PCMCIA, and touch screen are rudimentarily supported. Many wireless PCMCIA cards will work fine; indeed, in general most PCMCIA devices (16-bit PC Card only!) will work fine. The touchscreen patch is relatively new. The only hold up to a fully functional, operational linbook seems to be that no power management is available (you can’t turn the linBook off!). There is no support for sound yet. Other useful hints may be found on the Linux on Psion 5MX HOWTO (http://linux-7110.sourceforge.net/howtos/series5mx_new/index.htm). The netBook and 5MX systems have considerable similarity. Offer (May 2006): An infrared modem is offered for free (shipped anywhere in the world) to anyone who posts a patch for the netbook kernel that enables infrared. However, a patch for proper PCMCIA support is considered more critical and will take precedence if posted prior to, or within a few days of, the infrared patch. Please send inquiries or patches to the OpenPsion mail list.
    [Show full text]
  • Mobile Device Survery
    Mobile Device Surveyrvey DRAFT NIST Interagency Report June 2002 Tom Karygiannis Wayne Jansen Vlad Korolev Serban Gavrila 1 Table of Contents 1. Introduction ........................................................................................................... 1 2. PDA Platform Families ......................................................................................... 1 2.1 Palm PDA........................................................................................................ 2 2.2 Pocket PC........................................................................................................ 3 2.3 Linux PDA ...................................................................................................... 4 3. Development Tools ................................................................................................ 8 3.1 Palm OS Development Tools........................................................................... 8 3.2 Pocket PC Development Tools......................................................................... 8 3.3 Linux PDA Development Tools....................................................................... 9 4. Commercial Security Solutions........................................................................... 11 4.1 Palm OS Security Mechanisms ...................................................................... 11 4.2 Pocket PC Security Mechanisms.................................................................... 15 4.3 Linux PDA Security Mechanisms .................................................................
    [Show full text]
  • Handheld Technology Review
    Handheld Technology Review Rep ort 2 0 0 1 -0 0 8 -C-0 6 The research described in this report was carried out by: P roject L eader D r S tephen K ajewsk i (QU T) Team Mem bers P aul Tilley, Mr J ohn C rawford (C S IR O ), Todd R em m ers (C S IR O ) P rofessor S wee-E ng C hen, P rofessor D ennis L enard, G raham B rewer, R od G am eson, R ichard K olom y, R ui Martins, W illy S her (U N ) R esearcher Mr A chim W eippert (QU T) P roject A ffiliates Mr G eoff C aldwell (QD MR ) and Mr Mark H aug (QD P W ) Res earch P rogram C: D elivery and M anagem ent of B u ilt A s s ets P roject 2 0 0 1 -0 0 8 -C: P roject Team Integration: Com m u nication, Coordination and D ecis ion S u p p ort CONTENTS CONTENTS _______________________________________________________________ 1 LIST OF TABLES__________________________________________________________ 3 LIST OF FIGURES ________________________________________________________ 3 PREFACE ________________________________________________________________ 5 EXECUTIVE SUMMARY ___________________________________________________ 6 1 INTRODUCTION ______________________________________________________ 9 2 CURRENT STATE OF HANDHELD TECHNOLOGY _______________________ 10 2.1 Hardware Overview: What’s Available in General ____________________________ 10 2.2 Add-ons and Expansions __________________________________________________ 15 2.3 Integrated Phone & PDA: The Current trend ________________________________ 16 2.4 Software: What’s Available in General ______________________________________ 19 2.4.1 Palm OS_______________________________________________________________________
    [Show full text]
  • Amiga OS Apple II Beos Common Desktop Environment GEOS
    Home > Screenshots GUIs Components Amiga OS Desktop Workbench 1.0 » Workbench 1.0 First run · Empty desktop · Desktop with applications Workbench 2.0 » Workbench 2.04 Apple II Applications MouseDesk/DeskTop » DeskTop 1.1 Office » Notepad · Text editor · Calculator · Calendar · Clock · GS/OS » GS/OS 5.0.4 · GS/OS 6.0.1 Address book Multimedia » Media player · CD player · Volume level · Sound Networking » Terminal · Phone dialer BeOS Internet » Browser · Mail Accessibility » Keyboard map BeOS R5 » BeOS R5.0.1 PE Settings Common Desktop Environment Settings menu · General · Appearance · Desktop themes · Display · Screensaver · CDE 1.0 » CDE 1.5 in Solaris 9 Keyboard · Mouse · Time and date · International · Accessibility · Power management GEOS/GeoWorks GEOS for Commodore » GEOS 2 for C64 GEOS for Apple II » GEOS 2.1 for Apple II System GeoWorks » GeoWorks Ensemble 2.0 Managers » Application manager · File manager · Running applications New Deal Office » NewDeal Office 3 Eval. · Task manager BreadBox Ensemble » BreadBox Ensemble Lite Features » Help · Search · Trash can · Run Utilities » Command prompt GNOME GNOME 2.0 » GNOME 2.2.0 in RedHat 9 Startup and shutdown Welcome splash · Login screen · Logout screen · Shutdown window · Shutting down · Shutdown complete IRIX IRIX 5.0 » IRIX 5.3 Installation Lisa Office System Welcome screen · Licence · File copying · Installation complete Lisa Office System 1 » Lisa OS 1.0 Lisa Office System 7/7 3 » Lisa OS 3.1 Interface Mac OS Dialogs » About GUI · About application · Font selection · Open file
    [Show full text]
  • Microworld Releases Mailscan 5.0
    MicroWorld releases MailScan 5.0 Take a second and subscribe to our RSS feeds and get up-to-date security news as they develop! Off The Wire Latest Articles Windows Linux Security Reviews Vendor Advisories Webcasts Subscribe Current Mac OS X World Interviews Vulnerability Database Conferences Issue Archive Pocket PC Virus Book Chapters Center Malware more compatible with Vista than anti-malware products Hackers to target mobile banking, study says Vista Service Pack 1 is coming Widgets: the next big security threat? Vista copy protection is defended The Cross-Site Request Forgery (CSRF/XSRF) FAQ Researcher says PatchGuard changes helped Microsoft VoIP security trends and predictions for 2007 Advanced email security for IBM Lotus Notes Bitdefender unveils powerful security protection for Microsoft Windows Vista Check Point VPN-1 POWER VSX NGX reduces costs by virtualizing network security Yoggie Security Systems receives an investment by Silicom Ventures RFID in the Supply Chain – A New Demand for Availability Crawling Ajax-driven Web 2.0 Applications Interview with Balazs Fejes, CTO of EPAM Systems Creating A Culture Of Security – The Real Challenge Automated Scanning vs. The OWASP Top Ten This Trojan talks about missiles, comes like a storm Info on SCVMan.B and Killav.FG trojans, Radoppan virus family 20% of trojans in 2006 were designed to steal bank details "Storm Worm" on the tail of European Storm Panda joss-stick virus is no pandemic http://www.net-security.org/secworld.php?id=4642 (1 of 3) [23/01/2007 10:51:48 AM] MicroWorld releases
    [Show full text]
  • Internet Technology and Web Programming
    INTERNET TECHNOLOGY AND WEB PROGRAMMING 1 F.C Ledesma Avenue, San Carlos City, Negros Occidental Tel. #: (034) 312-6189/(034) 729-4327 CONTENTS LESSON I: Introduction to Networking · Networking concepts and Technology (LANs and WANs) . · Serial Networking (SLIP, PPP) . · Internet Protocol (IP) and Domain Name System (DNS) . · What is the Internet . LESSON II: Internet Access Hardware and Media · HARDWARE: Modems, Terminal Adapters, Routers . · MEDIA: PTSN, ISDN, Kilostream . LESSON III: Internet Services · Electronic Mail; Newsgroups . · File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP) . · Internet databases: WAIS, Archie, gopher, WWW search databases . LESSON IV: Using E-Mail and other Clients · Electronics Mail . · Other Internet Clients . · FTP . · Newsgroups . · Telnet . LESSON V: Media & Active Content · Object & Active Content . · Types of Browser Plug-ins . 2 F.C Ledesma Avenue, San Carlos City, Negros Occidental Tel. #: (034) 312-6189/(034) 729-4327 · Additional Media File Formats . · Images File Formats . LESSON VI: Internetworking Servers · Server Implementation . · Content Servers . · Performance Servers . · Database Servers . · Mirrored Servers . · Popular Server Products . LESSON VII: Web Servers and Databases · Databases . · Introduction to Database Gateways for Web Servers . · Common Gateway Interface (CGI) . · Server Application Programming Interfaces (SAPIs) . · JavaScript . · ASP . · PHP . · HTML . · Java & Java Service . · JSP . · ColdFusion . · Database Connectivity 3 F.C Ledesma Avenue, San Carlos City, Negros Occidental Tel. #: (034) 312-6189/(034) 729-4327 · ODBC . · JDBC . LESSON VIII: Internet Security · What is Security? . · The cracker Process . · Types of Attacks . · Defending Your Networks . · Firewalls . · Defending Your Computer . · Defending Your Transmitted Data . Lesson I: (Introduction to Networking) 1. Network concepts and Technology (LANs and WANs) 4 F.C Ledesma Avenue, San Carlos City, Negros Occidental Tel.
    [Show full text]