No Place Like /Home—Creating an Attack Lab

Total Page:16

File Type:pdf, Size:1020Kb

No Place Like /Home—Creating an Attack Lab 328_InfoSec_06.qxd 4/14/05 8:40 PM Page 159 Chapter 6 No Place Like /home—Creating an Attack Lab Solutions in this chapter: ■ Building an Attack Platform ■ Building a Target Lab ■ Assembling Peripherals Summary Solutions Fast Track Frequently Asked Questions 159 328_InfoSec_06.qxd 4/14/05 8:40 PM Page 160 160 Chapter 6 • No Place Like /home—Creating an Attack Lab Introduction The best way to sharpen and maintain your skills is to practice attack and defense techniques. In the movie,“The Matrix, the lead character, Neo, begins his journey as a bumbling-know nothing. In his own mind, he is hot stuff. When he steps up to the next level, Morpheus teaches him a hard lesson in the dojo (training hall).After being tossed around like a rag doll, Neo realizes his skills need focus and his mind needs to be released from the things he thought he knew about the world around him.The transition from computer geek to INFOSEC pro will undoubtedly leave you feeling a bit like Neo.As a computer hobbyist, your perspective is purposefully limited to the tech you feel like tinkering with. In the “real world” of professional INFOSEC, you must focus on the technologies that are prevalent in the industry. You have to practice your skills and techniques in an environment that mirrors what you see in that real world. Specifically, you need to build a work machine (we’ll call it an attack machine) and a working target lab that allows you to keep up with the changing face of network security. In this chapter we’ll explore the main compo- nents that make up a well-rounded, flexible attack machine. We’ll also discuss the components of a solid target lab. From software to hardware, this chapter is your guide to designing and maintaining what is arguably the most important catalyst to developing and maintaining those hard-learned skillz! Building an Attack Platform Sith and Jedi warriors carried lightsabers. Samurai warriors lived and died by their Daito and Wakizashi swords. Ninja were known to carry swords, nunchaku and shuriken as weapons.A hacker’s attack machine (powered by a keen mind) is a devastating weapon.As an INFOSEC professional, it’s important to prepare for the technology you will face, but without the proper tools installed on the proper well-thought out plat- form, you will be at a severe disadvantage professionally. In this section, we’ll discuss some the hardware and software considerations of building a well-equipped attack platform. Hardware Most INFOSEC jobs require at least some travel, whether for actual gigs or for con- ferences, training, or testing. With this in mind, a laptop is a logical choice for an attack platform.A laptop is certainly not required, but the portability of a laptop (sometimes called a notebook) is nice, even if you don’t do any traveling. Combined www.syngress.com 328_InfoSec_06.qxd 4/14/05 8:40 PM Page 161 No Place Like /home—Creating an Attack Lab • Chapter 6 161 with a wireless connection, a laptop allows you to check your email, surf the web, and keep in touch without being strapped to a desk. In addition, a laptop can easily be transported back and forth between work and home (or between the living room and the Jacuzzi), which makes synchronizing data that much simpler.The down side of a laptop is that it is portable and can easily be stolen.A stolen laptop can be dev- astating, resulting in loss of productivity and effort, or, in the most extreme case, it could allow the thief to compromise your client’s network using the data stored on the machine. Because of this downside, you should give extra consideration to an effective backup strategy (using even simple tools like rsync or tar), and utilize indus- trial-grade encryption on any laptop machine.Another downside of a portable system is that it’s much easier to suffer data loss or hardware failure due to the rela- tive frailty of most laptops.A drop from just about any height could cause hard disk problems that could result in loss or corruption of data. When considering a laptop, it’s worth looking for auto-parking hard drives that will secure the drive heads in the event of a drop.This feature alone could save your hide when your laptop goes bouncing down your driveway. Sell Your Skillz… Encrypt it! There are many good encryption products on the market. Look for a multi-use product like PGP Personal Desktop (www.pgp.com, available for Windows and Mac) that is capable of one-shot encryption of files and e- mail, but also allows virtual partition encryption, transparent encryption of files that are used on a regular basis, like customer vulnerability reports. SafeHouse (www.pcdynamics.com/SafeHouse/) is another good hard drive encryption program for Windows, but lacks the industry-stan- dard e-mail protection offered by the PGP product line. Windows 2000/ XP Pro, Linux, and Mac OS X users are afforded basic protection in the operating system software through the EFS filesystem, losetup command and disk image encryption features, respectively. www.syngress.com 328_InfoSec_06.qxd 4/14/05 8:40 PM Page 162 162 Chapter 6 • No Place Like /home—Creating an Attack Lab Which Notebook Vendor? There are so many PC laptop vendors these days that it’s nearly impossible to keep up with them all. However, most laptops are similar and share various components produced from the same manufacturer. When considering a laptop purchase, it’s easy to get lured by “sex appeal”. Lean, mean, powerful machines are all the rage these days, but if you’re considering a single laptop purchase, and you’re on a budget, sexy isn’t always better. Consider the Sony VAIO PCG-TR3A notebook, shown in Figure 6.1.This machine is lightweight, with built-in wireless, digital camera, CD- RW/DVD drive and a 40GB hard drive.Although this machine is very capable, it costs nearly 4 times the price of the similarly equipped (and less sexy) Dell Inspiron 1000, Dell’s entry-level notebook machine. Beware the sex factor, however, even if you’re independently wealthy. In most cases, highly customized machines like the Sony VAIO are harder to customize with niceties like external wireless antennas or non-OEM operating systems like Linux. In addition, sexy machines can become tar- gets, even to non-technical thieves. What’s most important for work is flexibility. Figure 6.1 The Sexy Sony VAIO PCG-TR3A Photo Courtesy of Sony VAIO What about a Mac? This is a loaded question with no correct answer.The Mac vs PC war is a bloody one with zealots on both sides of the argument.Apple makes gorgeous hardware; there’s no doubt about that. In fact, even the “Anti-Mac” camp generally agrees that Apple makes amazing hardware. Consider the 12-inch Mac Powerbook G4, shown in Figure 6.2. www.syngress.com 328_InfoSec_06.qxd 4/14/05 8:40 PM Page 163 No Place Like /home—Creating an Attack Lab • Chapter 6 163 Figure 6.2 The equally-sexy Mac Powerbook G4 12-inch Photo Courtesy of Sony VAIO Nicely equipped, the PowerBook is more than able to handle the stresses of life as an attack machine, but not without a price. Priced firmly in the mid to high range, these machines range in performance, from the svelte 12-inch to the 17-inch model, which is a desktop replacement system.The Apple operating system, OS X, is based loosely on FreeBSD, with a smooth-as-butter Aqua user interface. Unix users will delight in the ability to control the machine from a familiar command-line shell like tcsh or bash. Macs, however, are not PC compatible, and they are best suited for run- ning Mac (or in some cases Linux) software.This is not a showstopper when consid- ering the PowerBook as an attack machine, and thanks to programs like Virtual PC (www.microsoft.com/windows/virtualpc), the Mac is capable of running Windows or Linux operating systems as a virtual session, enabling their respective software libraries. If you aren’t familiar with Windows and/or Linux, you may consider an attack platform based on those OSs, since you’re more likely to run into them in the field. Many renowned INFOSEC pros and hackers have migrated to a Mac as an attack platform, but if you’re just getting started, there’s no sense overwhelming your- self with too much new technology. Once you get the hang of things, however, a Mac is an excellent choice. Software: Running Multiple Operating Systems War is also apparent in the battle of the operating systems. If you want to start a flame war in just about any forum, try jumping on and shouting “Windoze sucks!” or www.syngress.com 328_InfoSec_06.qxd 4/14/05 8:40 PM Page 164 164 Chapter 6 • No Place Like /home—Creating an Attack Lab “Linucks is for losers!”The choice of operating system for your attack machine is important, as certain attacks against certain targets are just plain easier from certain environments. For example, it’s quite easy for an advanced attacker to bounce around a bunch of Windows shares from a Linux machine, but navigating a web of Windows domain trusts tends to be much simpler from a Windows-based attack platform. Fortunately, you don’t have to choose between operating systems.These days, it’s simple to run multiple operating systems on the same system.
Recommended publications
  • QEMU Version 2.10.2 User Documentation I
    QEMU version 2.10.2 User Documentation i Table of Contents 1 Introduction ::::::::::::::::::::::::::::::::::::: 1 1.1 Features :::::::::::::::::::::::::::::::::::::::::::::::::::::::: 1 2 QEMU PC System emulator ::::::::::::::::::: 2 2.1 Introduction :::::::::::::::::::::::::::::::::::::::::::::::::::: 2 2.2 Quick Start::::::::::::::::::::::::::::::::::::::::::::::::::::: 2 2.3 Invocation :::::::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.3.1 Standard options :::::::::::::::::::::::::::::::::::::::::: 3 2.3.2 Block device options ::::::::::::::::::::::::::::::::::::::: 9 2.3.3 USB options:::::::::::::::::::::::::::::::::::::::::::::: 19 2.3.4 Display options ::::::::::::::::::::::::::::::::::::::::::: 19 2.3.5 i386 target only::::::::::::::::::::::::::::::::::::::::::: 26 2.3.6 Network options :::::::::::::::::::::::::::::::::::::::::: 27 2.3.7 Character device options:::::::::::::::::::::::::::::::::: 35 2.3.8 Device URL Syntax::::::::::::::::::::::::::::::::::::::: 39 2.3.9 Bluetooth(R) options ::::::::::::::::::::::::::::::::::::: 42 2.3.10 TPM device options ::::::::::::::::::::::::::::::::::::: 42 2.3.11 Linux/Multiboot boot specific ::::::::::::::::::::::::::: 43 2.3.12 Debug/Expert options ::::::::::::::::::::::::::::::::::: 44 2.3.13 Generic object creation :::::::::::::::::::::::::::::::::: 52 2.4 Keys in the graphical frontends :::::::::::::::::::::::::::::::: 58 2.5 Keys in the character backend multiplexer ::::::::::::::::::::: 58 2.6 QEMU Monitor ::::::::::::::::::::::::::::::::::::::::::::::: 59 2.6.1 Commands :::::::::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • Validated Products List, 1995 No. 3: Programming Languages, Database
    NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 QC 100 NIST .056 NO. 5693 1995 NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 (Supersedes April 1995 issue) U.S. DEPARTMENT OF COMMERCE Ronald H. Brown, Secretary TECHNOLOGY ADMINISTRATION Mary L. Good, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arati Prabhakar, Director FOREWORD The Validated Products List (VPL) identifies information technology products that have been tested for conformance to Federal Information Processing Standards (FIPS) in accordance with Computer Systems Laboratory (CSL) conformance testing procedures, and have a current validation certificate or registered test report. The VPL also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The VPL includes computer language processors for programming languages COBOL, Fortran, Ada, Pascal, C, M[UMPS], and database language SQL; computer graphic implementations for GKS, COM, PHIGS, and Raster Graphics; operating system implementations for POSIX; Open Systems Interconnection implementations; and computer security implementations for DES, MAC and Key Management.
    [Show full text]
  • Tom Kearney Object Name: Sun Sparcstation IPX Vintage: C.1991 Synopsis: Sun Sparcstation IPX
    AccessionIndex: TCD-SCSS-T.20121208.075 Accession Date: 8-Dec-2012 Accession By: Tom Kearney Object name: Sun Sparcstation IPX Vintage: c.1991 Synopsis: Sun Sparcstation IPX. S/N: 600-2791-04 213M1236. Description: The Sun Sparcstation IPX is a workstation introduced by Sun Microsystems in 1991. It was designed to be an entry-level networked workstation. It is based on the SUN4C architecture, enclosed in a lunchbox chassis. It uses a Fujitsu MB86903 or Weitek W8701 40 MHz processor. Weitek provided 80MHz after-market "SPARC POWERuP!" (2000A-080 GCD) processors which worked well in an IPX but required a ROM update to v2.9. It has four 72-pin SIMM slots for memory expansion. The memory uses parity Fast Page Memory (FPM) SIMM's with speeds of 50-80ns. Slots can be filled individually giving a maximum of 64MB memory. Paired memory modules decrease access times via "bank interleaving" resulting in faster memory and overall system performance. Additional 32 and 64MB SBUS "Above Board" RAM expanders will fit and work in the IPX using the 8-pin J101 header which contains additional power and clock signals next to the DMA/Cache controller. The Sparcstation IPX also includes an on-board AMD Lance Ethernet chipset providing 10BaseT networking as standard and 10Base2 and 10Base5 via an AUI transceiver. The OpenBoot ROM is able to boot from network, using RARP and TFTP. Like all other SPARCstation systems, it holds system information such as MAC address and serial number in NVRAM. If the battery on this chip dies, then the system will not be able to boot.
    [Show full text]
  • Oracle Solaris Administration Basic Administration
    Oracle® Solaris Administration: Basic Administration Part No: E29492–03 June 2013 Copyright © 1998, 2013, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS. Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including anyoperating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications.
    [Show full text]
  • Sun Ultratm 5 Workstation Just the Facts
    Sun UltraTM 5 Workstation Just the Facts Copyrights 1999 Sun Microsystems, Inc. All Rights Reserved. Sun, Sun Microsystems, the Sun logo, Ultra, PGX, PGX24, Solaris, Sun Enterprise, SunClient, UltraComputing, Catalyst, SunPCi, OpenWindows, PGX32, VIS, Java, JDK, XGL, XIL, Java 3D, SunVTS, ShowMe, ShowMe TV, SunForum, Java WorkShop, Java Studio, AnswerBook, AnswerBook2, Sun Enterprise SyMON, Solstice, Solstice AutoClient, ShowMe How, SunCD, SunCD 2Plus, Sun StorEdge, SunButtons, SunDials, SunMicrophone, SunFDDI, SunLink, SunHSI, SunATM, SLC, ELC, IPC, IPX, SunSpectrum, JavaStation, SunSpectrum Platinum, SunSpectrum Gold, SunSpectrum Silver, SunSpectrum Bronze, SunVIP, SunSolve, and SunSolve EarlyNotifier are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the United States and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the United States and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. UNIX is a registered trademark in the United States and other countries, exclusively licensed through X/Open Company, Ltd. OpenGL is a registered trademark of Silicon Graphics, Inc. Display PostScript and PostScript are trademarks of Adobe Systems, Incorporated, which may be registered in certain jurisdictions. Netscape is a trademark of Netscape Communications Corporation. DLT is claimed as a trademark of Quantum Corporation in the United States and other countries. Just the Facts May 1999 Positioning The Sun UltraTM 5 Workstation Figure 1. The Ultra 5 workstation The Sun UltraTM 5 workstation is an entry-level workstation based upon the 333- and 360-MHz UltraSPARCTM-IIi processors. The Ultra 5 is Sun’s lowest-priced workstation, designed to meet the needs of price-sensitive and volume-purchase customers in the personal workstation market without sacrificing performance.
    [Show full text]
  • SPARC/CPU-5V Technical Reference Manual
    SPARC/CPU-5V Technical Reference Manual P/N 203651 Edition 5.0 February 1998 FORCE COMPUTERS Inc./GmbH All Rights Reserved This document shall not be duplicated, nor its contents used for any purpose, unless express permission has been granted. Copyright by FORCE COMPUTERS CPU-5V Technical Reference Manual Table of Contents SECTION 1 INTRODUCTION ....................................................................................1 1. Getting Started ..................................................................................................................................... 1 1.1. The SPARC CPU-5V Technical Reference Manual Set.................................................................. 1 1.2. Summary of the SPARC CPU-5V ................................................................................................... 2 1.3. Specifications ................................................................................................................................... 4 1.3.1. Ordering Information........................................................................................................... 6 1.4. History of the Manual ...................................................................................................................... 9 SECTION 2 INSTALLATION ....................................................................................11 2. Introduction........................................................................................................................................ 11 2.1. Caution
    [Show full text]
  • VNMR and Solaris Software Installation
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
    [Show full text]
  • System Administration
    System Administration Varian NMR Spectrometer Systems With VNMR 6.1C Software Pub. No. 01-999166-00, Rev. C0503 System Administration Varian NMR Spectrometer Systems With VNMR 6.1C Software Pub. No. 01-999166-00, Rev. C0503 Revision history: A0800 – Initial release for VNMR 6.1C A1001 – Corrected errors on pg 120, general edit B0202 – Updated AutoTest B0602 – Added additional Autotest sections including VNMRJ update B1002 – Updated Solaris patch information and revised section 21.7, Autotest C0503 – Add additional Autotest sections including cryogenic probes Applicability: Varian NMR spectrometer systems with Sun workstations running Solaris 2.x and VNMR 6.1C software By Rolf Kyburz ([email protected]) Varian International AG, Zug, Switzerland, and Gerald Simon ([email protected]) Varian GmbH, Darmstadt, Germany Additional contributions by Frits Vosman, Dan Iverson, Evan Williams, George Gray, Steve Cheatham Technical writer: Mike Miller Technical editor: Dan Steele Copyright 2001, 2002, 2003 by Varian, Inc., NMR Systems 3120 Hansen Way, Palo Alto, California 94304 1-800-356-4437 http://www.varianinc.com All rights reserved. Printed in the United States. The information in this document has been carefully checked and is believed to be entirely reliable. However, no responsibility is assumed for inaccuracies. Statements in this document are not intended to create any warranty, expressed or implied. Specifications and performance characteristics of the software described in this manual may be changed at any time without notice. Varian reserves the right to make changes in any products herein to improve reliability, function, or design. Varian does not assume any liability arising out of the application or use of any product or circuit described herein; neither does it convey any license under its patent rights nor the rights of others.
    [Show full text]
  • Tms320c3x Workstation Emulator Installation Guide
    TMS320C3x Workstation Emulator Installation Guide 1994 Microprocessor Development Systems Printed in U.S.A., December 1994 2617676-9741 revision A TMS320C3x Workstation Emulator Installation Guide SPRU130 December 1994 Printed on Recycled Paper IMPORTANT NOTICE Texas Instruments (TI) reserves the right to make changes to its products or to discontinue any semiconductor product or service without notice, and advises its customers to obtain the latest version of relevant information to verify, before placing orders, that the information being relied on is current. TI warrants performance of its semiconductor products and related software to the specifications applicable at the time of sale in accordance with TI’s standard warranty. Testing and other quality control techniques are utilized to the extent TI deems necessary to support this warranty. Specific testing of all parameters of each device is not necessarily performed, except those mandated by government requirements. Certain applications using semiconductor products may involve potential risks of death, personal injury, or severe property or environmental damage (“Critical Applications”). TI SEMICONDUCTOR PRODUCTS ARE NOT DESIGNED, INTENDED, AUTHORIZED, OR WARRANTED TO BE SUITABLE FOR USE IN LIFE-SUPPORT APPLICATIONS, DEVICES OR SYSTEMS OR OTHER CRITICAL APPLICATIONS. Inclusion of TI products in such applications is understood to be fully at the risk of the customer. Use of TI products in such applications requires the written approval of an appropriate TI officer. Questions concerning potential risk applications should be directed to TI through a local SC sales offices. In order to minimize risks associated with the customer’s applications, adequate design and operating safeguards should be provided by the customer to minimize inherent or procedural hazards.
    [Show full text]
  • Sun Ultratm 2 Workstation Just the Facts
    Sun UltraTM 2 Workstation Just the Facts Copyrights 1999 Sun Microsystems, Inc. All Rights Reserved. Sun, Sun Microsystems, the Sun Logo, Ultra, SunFastEthernet, Sun Enterprise, TurboGX, TurboGXplus, Solaris, VIS, SunATM, SunCD, XIL, XGL, Java, Java 3D, JDK, S24, OpenWindows, Sun StorEdge, SunISDN, SunSwift, SunTRI/S, SunHSI/S, SunFastEthernet, SunFDDI, SunPC, NFS, SunVideo, SunButtons SunDials, UltraServer, IPX, IPC, SLC, ELC, Sun-3, Sun386i, SunSpectrum, SunSpectrum Platinum, SunSpectrum Gold, SunSpectrum Silver, SunSpectrum Bronze, SunVIP, SunSolve, and SunSolve EarlyNotifier are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the United States and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the United States and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. OpenGL is a registered trademark of Silicon Graphics, Inc. UNIX is a registered trademark in the United States and other countries, exclusively licensed through X/Open Company, Ltd. Display PostScript and PostScript are trademarks of Adobe Systems, Incorporated. DLT is claimed as a trademark of Quantum Corporation in the United States and other countries. Just the Facts May 1999 Sun Ultra 2 Workstation Figure 1. The Sun UltraTM 2 workstation Sun Ultra 2 Workstation Scalable Computing Power for the Desktop Sun UltraTM 2 workstations are designed for the technical users who require high performance and multiprocessing (MP) capability. The Sun UltraTM 2 desktop series combines the power of multiprocessing with high-bandwidth networking, high-performance graphics, and exceptional application performance in a compact desktop package. Users of MP-ready and multithreaded applications will benefit greatly from the performance of the Sun Ultra 2 dual-processor capability.
    [Show full text]
  • Connecting the Storage System to the Solaris Host
    Configuration Guide for Solaris™ Host Attachment Hitachi Virtual Storage Platform Hitachi Universal Storage Platform V/VM FASTFIND LINKS Document Organization Product Version Getting Help Contents MK-96RD632-05 Copyright © 2010 Hitachi, Ltd., all rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. (hereinafter referred to as “Hitachi”) and Hitachi Data Systems Corporation (hereinafter referred to as “Hitachi Data Systems”). Hitachi Data Systems reserves the right to make changes to this document at any time without notice and assumes no responsibility for its use. This document contains the most current information available at the time of publication. When new and/or revised information becomes available, this entire document will be updated and distributed to all registered users. All of the features described in this document may not be currently available. Refer to the most recent product announcement or contact your local Hitachi Data Systems sales office for information about feature and product availability. Notice: Hitachi Data Systems products and services can be ordered only under the terms and conditions of the applicable Hitachi Data Systems agreement(s). The use of Hitachi Data Systems products is governed by the terms of your agreement(s) with Hitachi Data Systems. Hitachi is a registered trademark of Hitachi, Ltd. in the United States and other countries. Hitachi Data Systems is a registered trademark and service mark of Hitachi, Ltd.
    [Show full text]
  • Solaris Powerpc Edition: Installing Solaris Software—May 1996 What Is a Profile
    SolarisPowerPC Edition: Installing Solaris Software 2550 Garcia Avenue Mountain View, CA 94043 U.S.A. A Sun Microsystems, Inc. Business Copyright 1996 Sun Microsystems, Inc., 2550 Garcia Avenue, Mountain View, California 94043-1100 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Portions of this product may be derived from the UNIX® system, licensed from Novell, Inc., and from the Berkeley 4.3 BSD system, licensed from the University of California. UNIX is a registered trademark in the United States and other countries and is exclusively licensed by X/Open Company Ltd. Third-party software, including font technology in this product, is protected by copyright and licensed from Sun’s suppliers. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. Sun, Sun Microsystems, the Sun logo, Solaris, Solstice, SunOS, OpenWindows, ONC, NFS, DeskSet are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the United States and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc.
    [Show full text]