Securetower. Client Guide

Total Page:16

File Type:pdf, Size:1020Kb

Securetower. Client Guide SecureTower. Client Guide Table of Contents 1 Program............................................................................................................................5 overview 2 Getting............................................................................................................................6 started. Connecting to the server 3 Quick tips............................................................................................................................9 for results viewing 4 Search............................................................................................................................13 4.1 Advanced.........................................................................................................................13 search 4.1.1 Full-text search........................................................................................................ conditions 14 4.1.2 Search by data........................................................................................................ type 15 4.1.3 The number........................................................................................................ of shown results 16 4.1.4 General search........................................................................................................ restriction parameters 17 4.1.5 Search parameters........................................................................................................ for different data types 18 ..................................................................................................................................... 4.1.5.1 Mail search parameters 18 ..................................................................................................................................... 4.1.5.2 Messengers search parameters 19 ..................................................................................................................................... 4.1.5.3 Web search parameters 20 ..................................................................................................................................... 4.1.5.4 File search parameters 21 4.2 Quick .........................................................................................................................22serch 4.3 Simple.........................................................................................................................23 search 4.4 Complex.........................................................................................................................24 search 4.4.1 Creating a search........................................................................................................ request 24 4.4.2 Operating with........................................................................................................ search request 37 4.4.3 Favorites ........................................................................................................ 38 5 Viewing............................................................................................................................39 search results 5.1 Search.........................................................................................................................41 results list 5.1.1 Sorting a search........................................................................................................ results list 45 5.2 Viewing.........................................................................................................................46 various data type 5.2.1 Web-traffic ........................................................................................................data (HTTP) viewing 47 5.2.2 Viewing e-mails........................................................................................................ (POP3, IMAP, SMTP, MAPI) 50 5.2.3 Viewing complex........................................................................................................ data formats (attachments, archives, files) 53 5.2.4 Viewing printed........................................................................................................ files 55 2 [email protected] 5.2.5 Viewing conversations........................................................................................................ in IMs (OSCAR, Viber, Jabber, Skype, SIP, Lync) 57 5.2.6 Viewing files........................................................................................................ transferred in IMs (OSCAR, Jabber, Skype, SIP, Viber) 60 5.2.7 Viewing files........................................................................................................ transferred over FTP protocol 60 5.2.8 Viewing files........................................................................................................ copied to a storage device 61 5.2.9 Viewing user........................................................................................................ screenshots 61 5.2.10 Viewing endpoint........................................................................................................ activity statistics 66 5.2.11 Viewing clipboard........................................................................................................ content 71 5.2.12 Viewing files........................................................................................................ transferred to network shares 71 5.2.13 Viewing cloud........................................................................................................ storages files 71 5.2.14 Keylogger viewing........................................................................................................ 71 5.2.15 Viewing device........................................................................................................ audit data 73 5.2.16 Viewing recognized........................................................................................................ text 74 5.2.17 Viewing browser........................................................................................................ activity 76 5.2.18 Viewing results........................................................................................................ of workstation indexing 77 5.3 Identifying.........................................................................................................................77 senders and recipients in search results 6 Monitoring............................................................................................................................79 user network activity 6.1 User list.........................................................................................................................80 6.2 User cards.........................................................................................................................82 6.3 Viewing.........................................................................................................................84 user network activity report 6.3.1 Viewing daily........................................................................................................ network activity of a certain user 84 6.3.2 Viewing different........................................................................................................ types of intercepted data 86 6.3.3 Viewing user’s........................................................................................................ activity statistics 87 6.3.4 Viewing user........................................................................................................ relations with Graph-analyzer 89 7 Security............................................................................................................................96 Center Management 7.1 Configuring.........................................................................................................................97 security notifications delivery 7.2 Assigning.........................................................................................................................99 a security policy 7.2.1 Creating a group........................................................................................................ of security rules 99 7.2.2 Modifying a........................................................................................................ group of security rules 101 7.2.3 Deleting a ........................................................................................................group of security rules 101 7.2.4 Assigning a........................................................................................................ security rule 102 ..................................................................................................................................... 7.2.4.1 General security rule 103 ..................................................................................................................................... 7.2.4.2 Control by thesaurus 105 ..................................................................................................................................... 7.2.4.3 Statistical security rule 107 ..................................................................................................................................... 7.2.4.4 Search rule by digital fingerprints 109 7.2.5 Modifying a.......................................................................................................
Recommended publications
  • Image File Formats, Digital Archival and TI/A
    Image File Formats, Digital Archival and TI/A Peter Fornaro & Lukas Rosenthaler A Short Introduction into Image File Formats 1 1 Introduction In general, long-term archival of digital data is a difficult task. On one hand the media, where the digital data is recorded on may be instable and decay with time. On the other hand, the rapid evolution cycle of digital technologies which is measured in years or even months leads to the obsolescence of recording technologies at a fast pace. Old1 data carriers may not be read anymore because the necessary machinery (tape reader, disk interface etc.) is no longer commercially available. Also, the the information about the file formats – that is the information about the meaning of the bits – may be lost because new formats have become standard. Thus, digital archiving is basically the task of guaranteeing the meaningful reading and decoding of bits in the far future. This task can be divided into parts: Bitstream preservation It has to be guaranteed that the bits which are basically analogue symbols on a analogue medium2 can be correctly detected. Since most often the permanence of the bits is higher than the lifetime of a given recording technology, bitstream preservation is basically limited by the obsolescence of a given recording technologies. Thus, copying the bits onto a new data carrier using the latest technology just before a recording technology becomes obsolete will preserve the bitstream. This task called bitstream migration has to be repeated every 3 - 5 years. Since a bitstream can be copied without information loss and the copies will be identical to the “original”, this process can be repeated an indefinite number of times (contrary to analogue copies where each generation is affected by more degradation until all information is lost).
    [Show full text]
  • Preferred Formats National Archives of the Netherlands in View of Sustainable Accessibility
    Preferred formats National Archives of the Netherlands In view of sustainable accessibility Version 1.0, November 2016 Contents Contents—2 1 Introduction—3 2 Why preferred formats?—6 Archival regulation: ‘open unless...’—6 Management and availability: easier with minimal diversity—6 Open standards and interoperability: as few obstacles as possible—7 3 Preferred formats and acceptable formats—8 Summary of referred formats and acceptable formats—8 Overview preferred formats including substantiation—8 Overview of acceptable formats including substantiation—10 Appendix 1: Archival regulation—12 Appendix 2: Dutch Standardisation Forum and open standards—14 What are open standards?—14 Why open standards?—14 Interoperability and supplier independence—14 Publishing details—15 Page 2 van 15 1 Introduction The National Archives’ e-Depot can receive, sustainably store and make available digital information in a variety of forms and formats. But in light of digital sustainability, the National Archives has a number of preferred formats for the information supplied by the legal caretakers. This document describes those preferred formats and provides a substantiation for their use. This allows custodians to take sustainable accessibility into account from the inception of their information. Context and cause The document Preferred formats of the National Archives is an elaboration of its Preservation Policy. The Preservation Policy describes the overall policy for preservation, i.e. the way in which the National Archives keeps the digital information it manages authentic and useable. In addition to Preferred formats, the Preservation Policy is elaborated upon in other documents.1 Figure 1 depicts the components of the National Archives’ preservation policy. Preservation policy Policy (what) Strategy and Strategies and standards standards (why which choices) Information types Preferred formats Technical Registry Preservation Watch Essential characteristics (Monitor Designated Community & Technology), incl.
    [Show full text]
  • Secure Group Communication Responsible Beneficiary: UMU Contributing Beneficiaries: Estimated Indicative Person
    Ref. Ares(2016)35755 - 05/01/2016 Specific Targeted Research Projects (STReP) SOCIOTAL Creating a socially aware citizen-centric Internet of Things FP7 Contract Number: 609112 WP3 Privacy-aware communication Deliverable report Contractual date of delivery: 31/05/15 Actual submission date: Deliverable ID: D3.3 Deliverable Title: Secure Group Communication Responsible beneficiary: UMU Contributing beneficiaries: Estimated Indicative Person Months: Start Date of the Project: 1 September 2013 Duration: 36 Months Revision: Dissemination Level: Public PROPRIETARY RIGHTS STATEMENT This document contains information, which is proprietary to the SOCIOTAL Consortium. Neither this document nor the information contained herein shall be used, duplicated or communicated by any means to any third party, in whole or in parts, except with prior written consent of the SOCIOTAL consortium. FP7 Contract Number: 609112 Deliverable report – WP3 / D3.3 Document ID: D3.3 Document Information Document ID: D3.3 Version: 0.6 Version Date: 05/06/2015 Authors: José Luis Hernández Ramos, Jorge Bernal Bernabé, Antonio Skarmeta Gómez (UMU), Ignacio Elicegui Maestro (UC), Carmen López (UC), Michele Nati (UNIS), Christine Hennebert, Benoît Denis, Iulia Tunaru (CEA) Security: Confidential Approvals Name Organization Date Visa Project Management Klaus Moessner UNIS Team Document history Revision Date Modification Authors 0.1 03/03/2015 First ToC UMU 0.2 13/03/2015 Updated ToC, first responsibilities assignments UMU, UC, UNIS, CEA Contributions and improvements added to different 0.3 08/05/2015 UMU, UC, UNIS, CEA sections Contributions and improvements added to different 0.4 14/05/2015 UMU, UC, UNIS, CEA sections Contributions and improvements added to different 0.5 25/05/2015 UMU, UC, UNIS, CEA sections.
    [Show full text]
  • File Formats Slides
    Workshop Background Purpose • To provide you with resources and tools to help you know how to handle file format decisions as a researcher. Context • Workshop Series: Preservation and Curation of ETD Research Data and Complex Digital Objects • Other topics: Copyright, Data Organization, Metadata, Storage, Version Control • https://educopia.org/research/etdplus Photo by Dmitri Popov on Unsplash Learning Objectives • Understand you have a range of file format options and that each choice has implications for future use and access. • Gain exposure to tools for archiving particularly challenging file types (e.g., web pages). • Understand how to reduce your risk via using export and “save as” functions. Photo by Christian Fregnan on Unsplash Examples of file formats • Images: jpg, gif, tiff, png, ai, svg, ... • Video: mpeg, m2tvs, flv, dv, ... • GIS: kml, dxf, shp, tiff, ... • CAD: dxf, dwg, pdf, … • Data: csv, mdf, fp, spv, xls, tsv, ... Key concept The file formats you choose will determine how easy (or difficult!) your research outputs are to access and build upon in the future. How to choose • Use software that imports and exports data in common formats to which you know you’ll have long-term access. • Ask advisors and colleagues what formats they use and why. • Choose a format with functions that support your research needs (e.g., collaboration). • Save your content in multiple formats to spread your risk across software platforms (e.g., docx, pdf, & txt; or mp4, avi, & mpg). Photo by Bryan Minear on Unsplash Informing your decision • Sustainability of Digital Formats https://www.loc.gov/preservation/digital/ formats/intro/intro.shtml • Recommended Formats Statement https://www.loc.gov/preservation/resources/rf s/ Photo by Lou Levit on Unsplash Archiving Web-based Resources • Wayback Machine (Internet Archive) https://archive.org/web/ • Robust Links http://robustlinks.mementoweb.org/ • Screen shots Photo by Logan Popoff on Unsplash File Format Conversions • Options include proprietary, freeware, and open source solutions.
    [Show full text]
  • List of File Formats
    Nicole Martin November 4, 2007 Digital Preservation - MIAP List of File Formats File Name: Advanced Audio Coding File Extension: .aac Creator: Collaboration between corporations approved by MPEG Creation Date: 1997 Media Type: Sound Format: Lossy Compression Notes: Developed to work as a part of MPEG-4, the AAC file format employs a very efficient form of compression meant to improve on the standard MP3. File Name: Advanced Authoring Format File Extension: .aaf Creator: Advanced Media Workflow Association Creation Date: 2000 Media Type: Moving Image Format: Uncompressed Notes: Created specifically for use in the post-production/editing environment to address interoperability issues. The AAF file format acts as a wrapper, is capable of storing metadata, and was designed to be versatile enough to withstand the myriad changes inherent in a production setting. File Name: Audio Interchange File Format File Extension: .aiff Creator: Electronic Arts Interchange and Apple Computer, Inc. Creation Date: 1988 Media Type: Sound Format: Uncompressed Notes: Standard Macintosh file format that is compatible with Windows (.aif) and often used by digital audio devices. Regular AIFF files are uncompressed, but compressed versions of the format (AIFF-C or AIFC) were developed to function with various codecs. File Name: Audio Video Interleave File Extension: .avi Creator: Microsoft Creation Date: 1992 Media Type: Moving Image Format: Container Notes: File most often created when DV files are imported from a camcorder to computer. File Name: Bitmap File Extension: .bmp Creator: IBM and Microsoft Creation Date: 1988 Media Type: Still Image Format: Compressed or Uncompressed Notes: Originally created for release with the Windows OS/2 operating system, BMPs are raster image files that are able to range from large, high quality files to small files of lesser quality.
    [Show full text]
  • ABBYY® Finereader 14
    ABBYY® FineReader 14 User’s Guide © 2017 ABBYY Production LLC. All rights reserved. ABBYY® FineReader 14 User’s Guide Information in this document is subject to change w ithout notice and does not bear any commitment on the part of ABBYY. The softw are described in this document is supplied under a license agreement. The softw are may only be used or copied in strict accordance w ith the terms of the agreement. It is a breach of the "On legal protection of softw are and databases" law of the Russian Federation and of international law to copy the softw are onto any medium unless specifically allow ed in the license agreement or nondisclosure agreements. No part of this document may be reproduced or transmitted in any from or by any means, electronic or other, for any purpose, w ithout the express w ritten permission of ABBYY. Copyrights 262 2 ABBYY® FineReader 14 User’s Guide Contents Introducing ABBYY FineReader ..................................................................................... 8 About ABBYY FineReader ........................................................................................... 9 What's New in ABBYY FineReader .............................................................................. 11 The New Task window ................................................................................................ 13 Viewing and editing PDFs ........................................................................................... 15 Quick conversion ....................................................................................................
    [Show full text]
  • List of File Formats Supported in Avizo
    List of file formats supported in Avizo Avizo Standard Edition Name Description Import Export 3D scene/geometry formats DXF Drawing Interchange Format for AutoCAD 3D models Yes Yes HxSurface Avizo's native format for triangular surfaces Yes Yes Open Inventor Open Inventor file format for 3D models Yes Yes Ply Format Stanford triangle format for points and surfaces Yes Yes STL Simple format for triangular surfaces Yes Yes VRML Virtual reality markup language for 3D models Yes Yes Wavefront OBJ Wavefront OBJ generic 3D file format No Yes 2D/3D image formats ACR-NEMA Predecessor of the DICOM format for medical images Yes No AmiraMesh Format Avizo's native general purpose format Yes Yes AmiraMesh as LargeDiskData Access image data blockwise Yes No Analyze 7.5 3D image data with separate header file Yes Yes AnalyzeAVW 2D and 3D medical image data Yes Yes BMP Image Format Uncompressed Windows bitmap format Yes Yes DICOM Standard file format for medical images Yes Yes Encapsulated PostScript For 2D raster images only No Yes Interfile Interfile file reader Yes No JPEG Image Format 2D image format with lossy compression Yes Yes LDA VolumeViz native file format Yes No LargeDiskData Access image data blockwise Yes Yes PNG Image Format Portable network graphics format for 2D images Yes Yes PNM Image Format Simple uncompressed 2D image format Yes Yes Raw Data Binary data as a 3D uniform field Yes Yes Raw Data as LargeDiskData Access image data blockwise Yes No SGI-RGB Image Format 2D image format with run-length encoding Yes Yes Stacked-Slices Info
    [Show full text]
  • Alone Together: a Socio-Technical Theory of Motivation, Coordination and Collaboration Technologies in Organizing for Free and Open Source Software Development
    Alone Together: A socio-technical theory of motivation, coordination and collaboration technologies in organizing for free and open source software development James Howison Abstract This dissertation presents evidence that the production of Free and Open Source Software (FLOSS) is far more alone than together; it is far more often individual work done \in company" than it is teamwork. When tasks appear too large for an individual they are more likely to be deferred until they are easier rather than be undertaken through teamwork. This way of organizing is successful because it fits with the motivations of the participants, the na- ture of software development as a task, and the key technologies of FLOSS collaboration. The empirical findings are important because they ground and motivate a theory that enables a systematic approach to understanding the implications of FLOSS development as a model for adaptation and the future of work. The dissertation presents a process of discovery (participant observa- tion), replication (a systematic study of project archives), and generalization to theory (a model of the rational choices of developers and an analysis of the flexibility of software as a task). The dissertation concludes by enumerating the conditions under which this theory of organizing is likely to be successful, such as non-revokable and rewindable work with incremental incentives. These are used as a framework to analyze efforts to adapt the FLOSS model of or- ganizing for self-organizing, virtual teams in other domains of work. Future developments of this dissertation, errata and discussion will be available at http://james.howison.name/pubs/dissertation.html.
    [Show full text]
  • 2005 3D Viewers Roundup Product Reference Guide
    2005 3D Viewers Roundup Product Reference Guide June 2005 As product development becomes increasingly more globalized, more and more players— both inside and outside of design engineering departments—are involved in the product development process. For organizations both large and small, 3D viewing technology is taking on more importance as it enables collaboration within and without the company by letting users view, markup, and print 3D CAD files without the originating CAD software. But how do you know which 3D viewing solution is best for your organization? With the goal of helping our community members address this question, we bring you the 3D Viewers Roundup. The 2005 3D Viewers Roundup consists of feature articles contributed by industry experts and this Product Reference Guide, which lists specifications for products that provide a range of viewing, markup, and collaboration capabilities in CAD neutral and cross-CAD file formats. See the associated articles under Community Features, “A Higher Level View of Enterprise Data Assets” and “Product Visualization across the Extended Enterprise.” These articles provide differing perspectives on selecting and implementing 3D Viewer technologies for collaboration on product development throughout the organization and beyond. The data herein was compiled using submissions from the listed companies. Note that it is not an exhaustive list of companies, nor does it include all the products of each company. However, we have attempted to include all the major software solutions. ConnectPress Ltd. cannot guarantee the accuracy of this data; we suggest you contact specific companies for further information, particularly to confirm technical details regarding their products. Space does not permit us to list all file formats supported, nor all versions of 3D CAD supported.
    [Show full text]
  • Falcongaze Securetower User Guide
    Falcongaze SecureTower. User Guide Table of Contents 1 What's............................................................................................................................7 New 2 Program............................................................................................................................8 overview 3 Tips for............................................................................................................................9 Guide 4 Getting............................................................................................................................10 started. Connecting to the server 5 Console............................................................................................................................13 options 5.1 Tips &.........................................................................................................................20 Tricks in the console 6 Information............................................................................................................................24 search 6.1 Full-text.........................................................................................................................26 search 6.2 Search.........................................................................................................................29 by data type 6.3 General.........................................................................................................................30 search parameters 6.4 Additional.........................................................................................................................31
    [Show full text]
  • On OSCAR File Transfers
    On Sending Files via OSCAR Google Summer of Code 2005 Gaim Project By Jonathan Clark On Sending Files via OSCAR Table of Contents Introduction................................................................................................................................................3 Contact Information.............................................................................................................................. 3 Acknowledgments.................................................................................................................................3 Who Should Read This..........................................................................................................................3 Background........................................................................................................................................... 3 Overview............................................................................................................................................... 4 Recommended Tools.............................................................................................................................4 Example Implementations.....................................................................................................................4 Conventions...........................................................................................................................................4 Data Structures...........................................................................................................................................5
    [Show full text]
  • Teacher Manual
    Language Learning with Certified Live Online Language Teachers Swertz, Christian; Motteram, Gary; Philp, Heike; Sanhil Gonöl, Serpil (Hrsg.) Teacher Manual This project has been funded with support from the European Commission. This publication reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein. Content Page 2 1 Content 1 Content 2 2 LANCELOT General Introduction 5 2.1 General Introduction ........................................................................................................................................................ 5 2.2 Development Portfolio .................................................................................................................................................... 6 3 Learning Block 1 8 3.1 Introduction to Learning Block 1 .................................................................................................................................... 8 3.2 Lesson Observation 1 ...................................................................................................................................................... 9 3.3 Becoming a Live Online Language Teacher ................................................................................................................. 10 3.4 Icebreakers in Language Learning ................................................................................................................................ 11 3.5 Intercultural Communicative Competence
    [Show full text]