Relativity Processing User Guide V10.3

Total Page:16

File Type:pdf, Size:1020Kb

Relativity Processing User Guide V10.3 Processing User Guide September 23, 2021 | Version 10.3.287.3 For the most recent version of this document, visit our documentation website. Table of Contents 1 Processing 10 1.1 Application version considerations 10 1.2 Basic processing workflow 11 1.3 Logging for processing 12 2 Installing and configuring Processing 13 2.1 Upgrade considerations for Relativity Goatsbeard 13 2.2 Installation process 13 2.3 Throttle settings for distributed publish 14 2.4 License considerations 15 2.5 Importing the Processing application 16 2.6 Worker manager server 16 2.6.1 Designating a worker for processing 16 2.7 Entering the ProcessingWebAPiPath instance setting 17 2.8 Adding the worker manager server to a resource pool 19 2.9 Configuring processing agents 20 2.10 Creating a choice for the processing source location 21 2.11 Logging for processing 23 2.12 Security permissions 23 3 Processing to Data Grid 25 3.1 Enabling processing to Data Grid 25 4 Supported file types for processing 28 4.1 Supported file types 28 4.1.1 Excel file considerations 31 4.1.2 Multi-part forensic file considerations 32 4.1.3 Tracking inline/embedded images 32 4.1.4 Native text extraction and OCR 32 4.1.5 Support for password-protected RAR archives 33 4.1.6 MSG to MHT conversion considerations 34 4.1.7 Microsoft Office child extraction support 34 Processing User Guide 2 4.2 Notable unsupported file types 36 4.3 Supported container file types 39 4.3.1 Lotus Notes considerations 41 4.3.2 Multi-part container considerations 43 4.3.3 ICS/VCF file considerations 43 4.4 Container file types supported for the password bank 48 4.4.1 Non-container file types supported for Password Bank in Inventory 49 5 Password bank 50 5.1 Password bank in processing workflow 50 5.2 Password Bank in imaging workflow 52 5.3 Creating or deleting a Password Bank entry 53 5.3.1 Fields 53 5.3.2 Example password 56 5.4 Validations, errors, and exceptions 56 5.5 Viewing audits 57 6 Mapping processing fields 58 6.1 Mapping fields 58 6.1.1 Processing system field considerations 59 6.1.2 Field mapping validations 59 6.2 System-mapped processing fields 60 6.3 Optional processing fields 66 6.4 Email Store Name details 88 6.5 Virtual path details 90 6.6 Processing folder path details 91 6.7 Email folder path details 91 6.8 Source path details 91 6.9 Message ID considerations 92 6.10 Comments considerations 92 6.11 Deduped custodian and path considerations 93 6.12 Pivot-enabled fields for processing 94 7 Processing profiles 95 Processing User Guide 3 7.1 Creating or editing a processing profile 95 7.1.1 Fields 96 8 Deduplication considerations 111 8.1 Global deduplication 111 8.2 Custodial deduplication 112 8.3 No deduplication 113 8.4 Global deduplication with attachments 114 8.5 Global deduplication with document-level errors 115 8.6 Technical notes for deduplication 116 8.6.1 Calculating MD5/SHA1/SHA256 hashes 116 8.6.2 Calculating deduplication hashes for emails 117 8.6.3 Calculating the Relativity deduplication hash 118 9 Quick-create set(s) 120 9.1 Required security permissions 120 9.2 Using quick-create set(s) 122 9.2.1 Validations and errors 130 10 Processing sets 131 10.1 Processing sets default view 132 10.2 Creating a processing set 134 10.3 Processing Set Fields 134 10.4 Adding a data source 136 10.5 Data Source Fields 137 10.5.1 Order considerations 142 10.5.2 Edit considerations for data sources 143 10.5.3 Processing Data Source view 143 10.5.4 Document Errors view 145 10.5.5 Job Errors View 146 10.6 Processing Data Sources tab 147 10.7 Deleting a processing set 151 10.8 Avoiding data loss across sets 155 10.9 Copying natives during processing 155 Processing User Guide 4 11 Inventory 159 11.1 Running inventory 160 11.1.1 Inventory process 162 11.1.2 Monitoring inventory status 163 11.1.3 Canceling inventory 164 11.2 Filtering files 165 11.2.1 Applying a Date range filter 170 11.2.2 Applying a File Size filter 172 11.2.3 Applying a deNIST filter 173 11.2.4 Applying a Location filter 174 11.2.5 Applying a File Type filter 174 11.2.6 Applying a Sender Domain filter 175 11.3 Removing filters 179 11.4 Inventory progress 179 11.5 Discovering files from Inventory 181 11.6 Inventory errors 181 11.6.1 Inventory error scenarios 182 11.7 Re-inventory 182 12 Discovering files 185 12.1 Running file discovery 186 12.1.1 Discovery process 188 12.1.2 Container extraction 190 12.2 Special considerations - OCR and text extraction 190 12.3 Monitoring discovery status 191 12.4 Canceling discovery 193 12.4.1 Canceling discovery 193 13 Discovered files view 195 13.0.1 Discovered files tab 195 14 Publishing files 198 14.1 Running file publish 199 14.1.1 Publish process 203 Processing User Guide 5 14.2 Monitoring publish status 205 14.3 Canceling publishing 206 14.4 Republishing files 208 14.5 Retrying errors after publish 209 15 Processing error workflow 211 15.1 Required permissions 211 15.2 Processing errors tabs 212 15.2.1 Document Errors tab 213 15.2.2 Pivotable error fields 215 15.2.3 Document Errors layout 216 15.2.4 Job Errors tab 219 15.2.5 Job Error layout 220 15.2.6 Error categories list 223 15.3 Error message list 224 15.4 Identifying and resolving errors by category 225 15.5 Using the processing error console 227 15.6 Viewing error-related audits 233 15.7 Special considerations 234 15.7.1 Bulk import error handling 234 15.7.2 Non-existent document identifier errors 235 15.7.3 Publish Batch ID field 235 15.7.4 Linking child errors to parent documents 236 15.7.5 Agent errors 237 15.7.6 Mass ignoring errors 237 15.7.7 Mass un-ignoring errors 238 15.7.8 Mass retrying errors 239 15.7.9 Mass editing notes 240 16 Reports 242 16.1 Generating a processing report 242 16.2 Data Migration 243 16.2.1 Excluded Files 244 Processing User Guide 6 16.2.2 Summary Statistics: Data Migration 244 16.2.3 Processing Sets 244 16.3 Discovered Files by Custodian 244 16.3.1 Discovered Files by Custodian 245 16.3.2 File Types Discovered - Processable 245 16.3.3 File Types Discovered - Processable(By Custodian) 245 16.3.4 File Types Discovered - Unprocessable 245 16.3.5 File Types Discovered - Unprocessable (by Custodian) 245 16.3.6 Processing Sets 245 16.4 Discovered Files by File Type 246 16.4.1 Discovered Files by Custodian 246 16.4.2 File Types Discovered - Processable 246 16.4.3 File Types Discovered - Processable (By File Type) 246 16.4.4 File Types Discovered - Unprocessable 246 16.4.5 File Types Discovered - Unprocessable (By File Type) 246 16.4.6 Processing Sets 247 16.5 Document Exception 247 16.5.1 Document Level Errors - Discovery 247 16.5.2 Document Level Errors - Publishing 247 16.5.3 Processing Sets 247 16.6 File Size Summary 248 16.6.1 Pre-Processed File Size 248 16.6.2 Processed File Size 248 16.6.3 Published File Size 248 16.7 Inventory Details 248 16.7.1 Inventory Filter Settings 248 16.7.2 Excluded by File Type Filter | Excluded File Count 249 16.7.3 Excluded by Location Filter | Excluded File Count 249 16.7.4 Excluded by Sender Domain Filter | Excluded File Count 249 16.7.5 Processing Sets 249 16.8 Inventory Details by Custodian 249 Processing User Guide 7 16.8.1 Inventory Filter Settings 249 16.8.2 Custodian | Excluded by File Type Filter | Excluded File Count 250 16.8.3 Custodian | Excluded by File Location Filter | Excluded File Count 250 16.8.4 Custodian | Excluded by Sender Domain | Excluded File Count 250 16.8.5 Processing Sets 250 16.9 Inventory Exclusion Results 250 16.9.1 Inventory Filter Settings 250 16.9.2 File Type | Excluded File Count 250 16.9.3 Location | Excluded File Count 251 16.9.4 Sender Domain | Excluded File Count 251 16.9.5 Processing Sets 251 16.10 Inventory Exclusion Results by Custodian 251 16.10.1 Custodian | Excluded by File Type Filter | Excluded File Count 251 16.10.2 Custodian | Excluded by File Location Filter | Excluded File Count 251 16.10.3 Custodian | Excluded by Sender Domain | Excluded File Count 251 16.10.4 Processing Sets 251 16.11 Inventory Summary 252 16.11.1 Initial Inventory Results 252 16.11.2 Filtering Summary 252 16.11.3 Final Inventory Results 252 16.11.4 Processing Sets 253 16.12 Job Exception 253 16.12.1 Job Level Errors 253 16.12.2 Processing Sets 253 16.13 Text Extraction 253 16.13.1 Text Extraction by Custodian 254 16.13.2 Text Extraction by File Type 254 16.13.3 Breakdown by Error Message 254 16.13.4 Processing Sets 254 17 Processing Administration 255 17.1 Security considerations for processing administration 255 Processing User Guide 8 17.2 Monitoring active jobs 257 17.2.1 Active jobs mass operations 260 17.3 Checking worker and thread status 261 17.3.1 Worker mass operations 265 17.3.2 Timeouts for stuck workers 266 17.3.3 Auto refresh options 267 17.3.4 Thread data visibility 267 17.3.5 Errors 268 17.4 Using the Processing History tab 268 17.4.1 Auto refresh options for processing history 270 18 Managing processing jobs in the queue 272 19 Processing FAQs 275 Processing User Guide 9 1 Processing Use Relativity’s processing feature to ingest raw data directly into your workspace for eventual search, review, and production without the need for an external tool.
Recommended publications
  • Translators' Tool
    The Translator’s Tool Box A Computer Primer for Translators by Jost Zetzsche Version 9, December 2010 Copyright © 2010 International Writers’ Group, LLC. All rights reserved. This document, or any part thereof, may not be reproduced or transmitted electronically or by any other means without the prior written permission of International Writers’ Group, LLC. ABBYY FineReader and PDF Transformer are copyrighted by ABBYY Software House. Acrobat, Acrobat Reader, Dreamweaver, FrameMaker, HomeSite, InDesign, Illustrator, PageMaker, Photoshop, and RoboHelp are registered trademarks of Adobe Systems Inc. Acrocheck is copyrighted by acrolinx GmbH. Acronis True Image is a trademark of Acronis, Inc. Across is a trademark of Nero AG. AllChars is copyrighted by Jeroen Laarhoven. ApSIC Xbench and Comparator are copyrighted by ApSIC S.L. Araxis Merge is copyrighted by Araxis Ltd. ASAP Utilities is copyrighted by eGate Internet Solutions. Authoring Memory Tool is copyrighted by Sajan. Belarc Advisor is a trademark of Belarc, Inc. Catalyst and Publisher are trademarks of Alchemy Software Development Ltd. ClipMate is a trademark of Thornsoft Development. ColourProof, ColourTagger, and QA Solution are copyrighted by Yamagata Europe. Complete Word Count is copyrighted by Shauna Kelly. CopyFlow is a trademark of North Atlantic Publishing Systems, Inc. CrossCheck is copyrighted by Global Databases, Ltd. Déjà Vu is a trademark of ATRIL Language Engineering, S.L. Docucom PDF Driver is copyrighted by Zeon Corporation. dtSearch is a trademark of dtSearch Corp. EasyCleaner is a trademark of ToniArts. ExamDiff Pro is a trademark of Prestosoft. EmEditor is copyrighted by Emura Software inc. Error Spy is copyrighted by D.O.G. GmbH. FileHippo is copyrighted by FileHippo.com.
    [Show full text]
  • ACS – the Archival Cytometry Standard
    http://flowcyt.sf.net/acs/latest.pdf ACS – the Archival Cytometry Standard Archival Cytometry Standard ACS International Society for Advancement of Cytometry Candidate Recommendation DRAFT Document Status The Archival Cytometry Standard (ACS) has undergone several revisions since its initial development in June 2007. The current proposal is an ISAC Candidate Recommendation Draft. It is assumed, however not guaranteed, that significant features and design aspects will remain unchanged for the final version of the Recommendation. This specification has been formally tested to comply with the W3C XML schema version 1.0 specification but no position is taken with respect to whether a particular software implementing this specification performs according to medical or other valid regulations. The work may be used under the terms of the Creative Commons Attribution-ShareAlike 3.0 Unported license. You are free to share (copy, distribute and transmit), and adapt the work under the conditions specified at http://creativecommons.org/licenses/by-sa/3.0/legalcode. Disclaimer of Liability The International Society for Advancement of Cytometry (ISAC) disclaims liability for any injury, harm, or other damage of any nature whatsoever, to persons or property, whether direct, indirect, consequential or compensatory, directly or indirectly resulting from publication, use of, or reliance on this Specification, and users of this Specification, as a condition of use, forever release ISAC from such liability and waive all claims against ISAC that may in any manner arise out of such liability. ISAC further disclaims all warranties, whether express, implied or statutory, and makes no assurances as to the accuracy or completeness of any information published in the Specification.
    [Show full text]
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Comunicado 23 Técnico
    Comunicado 23 ISSN 1415-2118 Abril, 2007 Técnico Campinas, SP Armazenagem e transporte de arquivos extensos André Luiz dos Santos Furtado Fernando Antônio de Pádua Paim Resumo O crescimento no volume de informações transportadas por um mesmo indivíduo ou por uma equipe é uma tendência mundial e a cada dia somos confrontados com mídias de maior capacidade de armazenamento de dados. O objetivo desse comunicado é explorar algumas possibilidades destinadas a permitir a divisão e o transporte de arquivos de grande volume. Neste comunicado, tutoriais para o Winrar, 7-zip, ALZip, programas destinados a compactação de arquivos, são apresentados. É descrita a utilização do Hjsplit, software livre, que permite a divisão de arquivos. Adicionalmente, são apresentados dois sites, o rapidshare e o mediafire, destinados ao compartilhamento e à hospedagem de arquivos. 1. Introdução O crescimento no volume de informações transportadas por um mesmo indivíduo ou por uma equipe é uma tendência mundial. No início da década de 90, mesmo nos países desenvolvidos, um computador com capacidade de armazenamento de 12 GB era inovador. As fitas magnéticas foram substituídas a partir do anos 50, quando a IBM lançou o primogenitor dos atuais discos rígidos, o RAMAC Computer, com a capacidade de 5 MB, pesando aproximadamente uma tonelada (ESTADO DE SÃO PAULO, 2006; PCWORLD, 2006) (Figs. 1 e 2). Figura 1 - Transporte do disco rígido do RAMAC Computer criado pela IBM em 1956, com a capacidade de 5 MB. 2 Figura 2 - Sala de operação do RAMAC Computer. Após três décadas, os primeiros computadores pessoais possuíam discos rígidos com capacidade significativamente superior ao RAMAC, algo em torno de 10 MB, consumiam menos energia, custavam menos e, obviamente, tinham uma massa que não alcançava 100 quilogramas.
    [Show full text]
  • Electronic Data Deliverables Reference Guide EPA Region 4
    Electronic Data Deliverables Reference Guide Version 1.0 EPA Region 4 Prepared By: for Region 4 Superfund Division Environmental Protection Agency March 2010 DISCLAIMER OF ENDORSEMENT Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government, and shall not be used for advertising or product endorsement purposes. STATUS OF DOCUMENT As of March 2010, this document and all contents contained herein are considered DRAFT and are subject to revision and subsequent republication. Ecological EDD specifications do not appear in this guidance as they are currently under development, and will appear in future addenda. CONTACTS For questions and comments, contact: Your RPM or, DART Coordinator Superfund Division, 11th Floor East United States Environmental Protection Agency, Region 4 Sam Nunn Atlanta Federal Center 61 Forsyth Street, SW Atlanta, GA 30303-8960 (404) 562-8558 [email protected] Acronyms CAS RN – Chemical Abstracts Service Registry Number DART – Data Archival and ReTrieval EDD – Electronic Data Deliverable EDP – EQuIS Data Processor EPA – Environmental Protection Agency O&M – Operation and Maintenance SESD – Science and Ecosystem Support Division SRS – Substance Registry System CLP – Contract Laboratory Program PRP – Potentially Responsible Party Definitions Darter - Darter is a set of software utilities written by EPA that assist in moving data from other platforms such as FORMS, Niton, YSI and Scribe to the Region 4 EDD format. Data Provider – It is important to distinguish between “Data Provider” and “Sample Provider” with regard to EDD submittals.
    [Show full text]
  • Symantec Web Security Service Policy Guide
    Web Security Service Policy Guide Revision: NOV.07.2020 Symantec Web Security Service/Page 2 Policy Guide/Page 3 Copyrights Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. Policy Guide/Page 4 Symantec WSS Policy Guide The Symantec Web Security Service solutions provide real-time protection against web-borne threats. As a cloud-based product, the Web Security Service leverages Symantec's proven security technology, including the WebPulse™ cloud community. With extensive web application controls and detailed reporting features, IT administrators can use the Web Security Service to create and enforce granular policies that are applied to all covered users, including fixed locations and roaming users. If the WSS is the body, then the policy engine is the brain. While the WSS by default provides malware protection (blocks four categories: Phishing, Proxy Avoidance, Spyware Effects/Privacy Concerns, and Spyware/Malware Sources), the additional policy rules and options you create dictate exactly what content your employees can and cannot access—from global allows/denials to individual users at specific times from specific locations.
    [Show full text]
  • Archive and Compressed [Edit]
    Archive and compressed [edit] Main article: List of archive formats • .?Q? – files compressed by the SQ program • 7z – 7-Zip compressed file • AAC – Advanced Audio Coding • ace – ACE compressed file • ALZ – ALZip compressed file • APK – Applications installable on Android • AT3 – Sony's UMD Data compression • .bke – BackupEarth.com Data compression • ARC • ARJ – ARJ compressed file • BA – Scifer Archive (.ba), Scifer External Archive Type • big – Special file compression format used by Electronic Arts for compressing the data for many of EA's games • BIK (.bik) – Bink Video file. A video compression system developed by RAD Game Tools • BKF (.bkf) – Microsoft backup created by NTBACKUP.EXE • bzip2 – (.bz2) • bld - Skyscraper Simulator Building • c4 – JEDMICS image files, a DOD system • cab – Microsoft Cabinet • cals – JEDMICS image files, a DOD system • cpt/sea – Compact Pro (Macintosh) • DAA – Closed-format, Windows-only compressed disk image • deb – Debian Linux install package • DMG – an Apple compressed/encrypted format • DDZ – a file which can only be used by the "daydreamer engine" created by "fever-dreamer", a program similar to RAGS, it's mainly used to make somewhat short games. • DPE – Package of AVE documents made with Aquafadas digital publishing tools. • EEA – An encrypted CAB, ostensibly for protecting email attachments • .egg – Alzip Egg Edition compressed file • EGT (.egt) – EGT Universal Document also used to create compressed cabinet files replaces .ecab • ECAB (.ECAB, .ezip) – EGT Compressed Folder used in advanced systems to compress entire system folders, replaced by EGT Universal Document • ESS (.ess) – EGT SmartSense File, detects files compressed using the EGT compression system. • GHO (.gho, .ghs) – Norton Ghost • gzip (.gz) – Compressed file • IPG (.ipg) – Format in which Apple Inc.
    [Show full text]
  • Anycount 7.0 User Guide
    HelpAndManual_unregistered_evaluation_copy Advanced International Translations AnyCount 7.0 User Guide © 2008 Advanced International Translations, Revision V7R1 I AnyCount 7.0 User Guide Table of Contents Foreword 0 Part I Introduction 1 1 AnyCount 7.0 ................................................................................................................................... 1 2 Using this Guide................................................................................................................................... 1 3 Reference Material................................................................................................................................... 1 Part II Setup 3 1 System Requirements................................................................................................................................... 3 2 Installation ................................................................................................................................... 3 Part III Working with AnyCount 4 1 Overview ................................................................................................................................... 4 2 Selecting Files................................................................................................................................... to Count 4 3 Count Settings................................................................................................................................... 7 4 Count Units ..................................................................................................................................
    [Show full text]
  • Formats Et Extensions De Fichiers
    Formats et extensions de fichiers Octobre 2015 Extension Description Programme associé 3ds Fichiers Autodesk 3d Studio 4. ace Les fichiers portant l'extension .ace Décompresseurs : sont des fichiers compressés. Pour Winzip, WinRar, les décompresser, il faut utiliser un PowerArchiver, 7zip, décompresseur. Alzip aif Les fichiers portant l'extension .aif, Lecteur multimédia : .aiff, .aifc sont des clips sonores, ils VLC, Winamp, peuvent être lus grâce à un lecteur Windows Media Player multimédia. aiff Les fichiers portant l'extension .aif, Lecteur multimédia : .aiff, .aifc sont des clips sonores, ils VLC, Winamp, peuvent être lus grâce à un lecteur Windows Media Player multimédia. aifc Les fichiers portant l'extension .aif, Lecteur multimédia .aiff, .aifc sont des clips sonores, ils peuvent être lus grâce à un lecteur multimédia. ani Les fichiers portant l'extension .ani sont des curseurs animés, ils peuvent être utilisés comme pointeur de souris. arc Les fichiers portant l'extension .arc Décompresseur : sont des fichiers compressés. Pour Winzip, WinRar, les créer ou les décompresser un PowerArchiver, 7zip, décompresseur est nécessaire. Alzip arj quickzip, WinArj, 7zip Les fichiers portant l'extension .arj sont des fichiers compressés, ils nécessitent un décompresseur tel que arj.exe. La syntaxe pour décompresser un fichier de ce type en ligne de commande est: arj x nom_du_fichier_a_decompresser.arj cible -va -r L'attribut -va spécifie que les archives en plusieurs volumes seront traitées automatiquement L'attribut -r spécifie que l'arborescence sera reconstituée La syntaxe pour compresser un fichier avec ARJ est: arj a nom_de_l_archive.arj nom_du_fichier_a_compresser -va - r asp Microsoft Active Server Pages. Il Navigateur Web pour s'agit de pages web dynamiques le client, Serveur Web générées au niveau du serveur web.
    [Show full text]
  • Ten Thousand Security Pitfalls: the ZIP File Format
    Ten thousand security pitfalls: The ZIP file format. Gynvael Coldwind @ Technische Hochschule Ingolstadt, 2018 About your presenter (among other things) All opinions expressed during this presentation are mine and mine alone, and not those of my barber, my accountant or my employer. What's on the menu Also featuring: Steganograph 1. What's ZIP used for again? 2. What can be stored in a ZIP? y a. Also, file names 3. ZIP format 101 and format repair 4. Legacy ZIP encryption 5. ZIP format and multiple personalities 6. ZIP encryption and CRC32 7. Miscellaneous, i.e. all the things not mentioned so far. Or actually, hacking a "secure cloud disk" website. EDITORIAL NOTE Everything in this color is a quote from the official ZIP specification by PKWARE Inc. The specification is commonly known as APPNOTE.TXT https://pkware.cachefly.net/webdocs/casestudies/APPNOTE.TXT Cyber Secure CloudDisk Where is ZIP used? .zip files, obviously Default ZIP file icon from Microsoft Windows 10's Explorer And also... Open Packaging Conventions: .3mf, .dwfx, .cddx, .familyx, .fdix, .appv, .semblio, .vsix, .vsdx, .appx, .appxbundle, .cspkg, .xps, .nupkg, .oxps, .jtx, .slx, .smpk, .odt, .odp, .ods, ... .scdoc, (OpenDocument) and Offixe Open XML formats: .docx, .pptx, .xlsx https://en.wikipedia.org/wiki/Open_Packaging_Conventions And also... .war (Web application archive) .rar (not THAT .rar) .jar (resource adapter archive) (Java Archive) .ear (enterprise archive) .sar (service archive) .par (Plan Archive) .kar (Karaf ARchive) https://en.wikipedia.org/wiki/JAR_(file_format)
    [Show full text]
  • Unzip Rar Files Free Software
    Unzip rar files free software Packing / unpacking: 7z, XZ, BZIP2, GZIP, TAR, ZIP and WIM; Unpacking only: AR, ARJ, CAB, CHM, CPIO, We compared 7-Zip with WinRAR Archiver, Mozilla Firefox, Google Earth. 65 files 85 bytes, files And 7-Zip compresses to zip format % better than most of other zip compatible programs.​Download · ​7z Format · ​FAQ · ​Support. WinRAR, free and safe download. WinRAR latest version: The king of compressed files. WinRAR is a program that can be used to open, create and decompress. RAR files can be split into multi-volume archives when dealing with large file sets. Click 1-click Unzip and choose Unzip to PC or Cloud in the WinZip toolbar. Free RAR Extract Frog extracts RAR archive files. RAR files aren't uncommon, but some ZIP tools don't handle the format; even if they do, it's often quicker and. Unzip RAR is a free file decompressing (unzip) tool for RAR archives, it can quickly open and extract files and folders in RAR archives, simple and easy to use. Software provides preview function, it will read RAR archives and show all. free Rar files software. Open, extract 7Z ACE CAB RAR TAR ZIP archives, support + formats. Extract Rar files, free Zip Unzip software. PeaZip Portable. Free portable Zip software, extract Rar files. This is the best solution to bring a complete zip & unzip / unrar utility with you (i.e. on an USB drive), make it. To Open RAR files, you need to install WinRar which is not a free application. Files\RAR File Open Knife - Free Opener\); Use notepad to create a text file.
    [Show full text]
  • Security Space
    Security Space User Manual © Doctor Web, 2017. All rights reserved This document is the property of Doctor Web. No part of this document may be reproduced, published or transmitted in any form or by any means for any purpose other than the purchaser's personal use without proper attribution. Trademarks Dr.Web, SpIDer Mail, SpIDer Guard, CureIt!, CureNet!, AV-Desk, KATANA and the Dr.WEB logo are trademarks and registered trademarks of Doctor Web in Russia and/or other countries. Other trademarks, registered trademarks and company names used in this document are property of their respective owners. Disclaimer In no event shall Doctor Web and its resellers or distributors be liable for errors or omissions, or any loss of profit or any other damage caused or alleged to be caused directly or indirectly by this document, the use of or inability to use information contained in this document. Dr.Web Security Space Version 11.0 User Manual 9/6/2017 Doctor Web Head Office 2-12A, 3rd str. Yamskogo polya Moscow, Russia 125040 Website: http://www.drweb.com/ Phone: +7 (495) 789-45-87 Refer to the official website for regional and international office information. Doctor Web Doctor Web develops and distributes Dr.Web information security solutions which provide efficient protection from malicious software and spam. Doctor Web customers can be found among home users from all over the world and in government enterprises, small companies and nationwide corporations. Dr.Web antivirus solutions are well known since 1992 for continuing excellence in malware detection and compliance with international information security standards.
    [Show full text]