Metadefender Core V4.11.1

Total Page:16

File Type:pdf, Size:1020Kb

Metadefender Core V4.11.1 MetaDefender Core v4.11.1 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 22 1.3. Scan Files with Metadefender Core 22 2. Installing or Upgrading Metadefender Core 23 2.1. Recommended System Requirements 23 System Requirements For Server 23 Browser Requirements for the Metadefender Core Management Console 25 2.2. Installing Metadefender 26 Installation 26 Installation notes 26 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 28 2.3. Upgrading MetaDefender Core 28 Upgrading from MetaDefender Core 3.x 28 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 29 2.4.1. Activating Metadefender Licenses 29 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2. Metadefender Configuration 51 3.2.1. Startup Core Configuration 51 3.2.2. Startup Node Configuration 55 3.3. User management 58 3.3.1. Users and groups 58 3.3.2. Roles 63 3.3.3. User directories 65 3.3.4. Active Directory attributes 73 3.3.5. Change user password 76 3.4. Update settings 77 Internet 78 Folder 79 Manual 79 3.5. Clean up scan database 80 Technology Note: 80 3.6. Policies configuration 80 3.6.1. How MetaDefender Core policies work 81 3.6.2. Workflow template configuration 81 3.6.3. Security zone configuration 94 3.6.4. Workflow rule configuration 94 3.7. Logging 98 3.7.1. Configuration 99 3.7.2. Debug logging 99 3.8. Enabling HTTPS 100 Enabling HTTPS via Management Console 100 Enabling HTTPS via configuration files 102 3.9. Configuring proxy settings 104 How can I set proxy server for the product 104 3.10. External Scanners And Post Actions 104 External Scanners 105 Post Actions 108 4. Scan files with Metadefender Core 111 Scan Files via REST API 111 Scan Files via Web Interface 112 Choose what to scan and how 112 Start scanning 112 Progress of scanning 112 5. Data Sanitization 114 6. Operating Metadefender Core 115 6.1. Dashboard 115 Overview page 115 Scan history 116 Quarantine 116 Update history 116 6.2. Inventory Management 117 Certificates 117 Engines 120 Nodes 127 Whitelist (by hash) 129 6.3. Regular Maintenance 131 Checking for Upgrades 131 Checking Engines / Databases Health 131 6.4 Import/Export configuration 131 Export 132 Import 132 Note 132 7. Metadefender Core Developer Guide 133 How to Interact with Metadefender Core using REST 133 File scan process 133 7.1. MetaDefender API Code Samples 133 Activate License Online 134 Successful response 134 Error response 135 Cancel Batch 135 Cancel Scan Batch 135 Close Batch 137 Close Scan Batch 137 Download Batch Signed Result 138 Download Batch Signed Result 138 Download Sanitized Files 141 Download Sanitized Files Using Data Id 141 Error response 141 Fetching Available Scan Rules 142 Successful response 143 Error response 143 Fetching Engine/Database Versions 144 Successful response 144 Error response 145 Fetch Scan Result 146 Retrieving Scan Reports Using Data ID 146 Successful response 146 Successful response with archive detection 151 Response (not existing data_id) 153 Error response 153 Fetch Scan Result by File Hash 153 Retrieve Scan Results Using Hash 153 Request http header parameters 154 The retrieved result is always the most recent for the processed item, if rule is set then it will be the most recent - if exists - under the given rule. 154 Successful response 154 Successful response with archive detection 158 Response (not existing hash) 160 Error response 160 Get Current License Information 160 Successful response 161 Error response 161 Get Product Version 162 Successful response 162 Error response 163 Initiate Batch 163 Initiate Scan Batch 163 Login / Create a Session 164 Successful response 165 Error response 165 Logout / Destroy a Session 166 Successful response 166 Error response 166 Scan A File 167 Successful response 168 Error response 168 Scan file in batch 169 Scan file in batch 169 Status of Batch 170 Status of Scan Batch 170 Uploading License Key File 171 Successful response 172 Error response 172 Vulnerability Info In Scan Result 173 Example 173 8. Advanced Metadefender Deployment 177 8.1. Scripted license management 177 Requirements 177 Activation steps 177 Deactivation steps 178 Important notes 180 8.2. Multi-node deployment 180 Setting up several Metadefender Core nodes 180 8.3. Using external load-balancer 183 8.3.1. HTTP(S) - Layer 7 load balancing 183 8.3.2. DNS load balancing 186 9. Troubleshooting Metadefender Core 190 Installation issues 190 Issues with nodes 190 Where are the Metadefender Core logs located? 190 How can I create a support package? 190 Issues under high load 190 How to Create Support Package? 191 Creating the package on Linux 191 Creating the package on Windows 191 Content of the created package 192 How to Read the Metadefender Core Log? 192 Files 192 Format 192 Severity levels of log entries 193 Inaccessible Management Console 193 How to detect 193 Solution 193 Possible Issues on Nodes 194 Q. Node detected 3rd party product on system 194 Q. There is no scan node connected 194 Too Many Sockets or Files Open 195 How to detect 195 Solution 195 Too Many TIME_WAIT Socket 196 How to detect 196 Solution 196 Technical Insights 197 10. Release notes 198 Version v4.11.1 198 Version v4.11.0 198 Version v4.10.2 198 Version v4.10.1 199 Version v4.10.0 199 Version 4.9.1 200 Version 4.9.0 200 Version 4.8.2 201 Version 4.8.1 201 Version 4.7.2 203 Version 4.7.1 203 Version 4.6.3 204 Version 4.6.2 204 Version 4.6.1 204 Version 4.6.0 205 Version 4.5.1 206 Version 4.5.0 206 Version 4.4.1 207 Version 4.3.0 207 Version 4.2.0 208 Version 4.1.0 209 Version 4.0.1 209 Version 4.0.0 210 11. Metadefender / Client 211 About This Guide 211 Key Features of MetaDefender Client 211 Supported Operating Systems 211 1. MetaDefender Client Packages 212 MetaDefender Free Client 212 MetaDefender Premium Client 212 2. MetaDefender Premium Client 213 2.1 Install using the Install Wizard 213 2.2 Install using the Command Line 215 2.3 Using the MetaDefender Premium Client 216 2.4 Configuring through the config file 231 2.5 Configuring through Central Management 238 3. MetaDefender Free Client 243 4. Command Line Interface 243 Example: 243 Command Line Options 243 4.1 Generating and using the Administrator Password 247 5. MetaDefender Client Release Notes 249 Tips and Known Issues 249 4.1.6 Release 250 4.1.5 Release 250 4.1.4 Release 251 4.1.3 Release 251 4.1.2 Release 251 4.1.1 Release 252 4.1.0 Release 252 4.0.18 Release 253 4.0.17 Release 253 4.0.16 Release 253 4.0.15 Release 254 4.0.14 Release 254 4.0.13 Release 255 4.0.12 Release 255 4.0.11 Release 255 4.0.10 Release 256 4.0.9 Release 257 4.0.8 Release 257 4.0.7 Release 257 4.0.6 Release 257 4.0.5 Release 258 4.0.4 Release (Internal Only) 258 4.0.3 Release 258 4.0.2 Release 259 4.0.1 Release 259 4.0.0 Release 260 Changes in 3.12.5 260 12. Legal 261 Copyright 261 DISCLAIMER OF WARRANTY 261 COPYRIGHT NOTICE 261 Export Classification EAR99 261 13. Knowledge Base Articles 262 Are MetaDefender Core v4 upgrades free? 263 Are there any dependencies that need to be fulfilled for MetaDefender Core v4 engines ? 263 Does Metadefender Core v4 offer real-time antivirus protection on the system where it is installed? 264 Does MetaDefender Core v4 Detect the NotPetya Ransomware? 264 Does the fixing updates for Meltdown and Spectre vulnerabilities affect any engines in MetaDefender Core v4? 267 External scanners in MetaDefender core v4.8.0 and above 268 How can I configure the maximum queue size in MetaDefender Core v4 ? 270 How can I find a sanitized file scanned with MetaDefender Core v4? 271 How can I increase the scaling up performance? 272 How can I upgrade from Core v4.7.0/v4.7.1 to a newer Core v4.7 release 274 How can the TEMP folder be changed? 275 How do I collect verbose debug packages on MetaDefender Core v4 for Linux? 276 How do I deploy MetaDefender Core v4 to an offline Linux environment? 277 Installing MetaDefender Core 277 Activate your license 278 Installing the MetaDefender Update Downloader utility 279 Applying offline updates 281 Contacting OPSWAT Support 282 How do I deploy MetaDefender Core v4 to an offline Windows environment? 282 Installing MetaDefender Core 283 Activate your license 283 Installing the MetaDefender Update Downloader utility 284 Applying offline updates 286 Contacting OPSWAT Support 287 How do I disable real-time protection of my anti-malware software if it is not allowed by corporate policy for use with MetaDefender Core v4? 287 How do I remove an engine from my MetaDefender v4 instance? 289 How do I use MetaDefender Core v4 Workflows ? 289 Defining and administering Workflow Templates in MetaDefender Core v4 290 How long is the support life cycle for a specific version/release of MetaDefender Core v4? 291 Is action needed because Metadefender v4's AVG license is expiring on 2018-06-15? 293 What do I need to do? 293 What if I don't take action by June 15, 2018? 293 Why is the license for AVG expiring? 294 What if I need more assistance from OPSWAT on this topic? 294 Is there a virus test I could use to test MetaDefender Core v4? 294 MetaDefender Core v4 shows a large number of files that failed to scan.
Recommended publications
  • Translators' Tool
    The Translator’s Tool Box A Computer Primer for Translators by Jost Zetzsche Version 9, December 2010 Copyright © 2010 International Writers’ Group, LLC. All rights reserved. This document, or any part thereof, may not be reproduced or transmitted electronically or by any other means without the prior written permission of International Writers’ Group, LLC. ABBYY FineReader and PDF Transformer are copyrighted by ABBYY Software House. Acrobat, Acrobat Reader, Dreamweaver, FrameMaker, HomeSite, InDesign, Illustrator, PageMaker, Photoshop, and RoboHelp are registered trademarks of Adobe Systems Inc. Acrocheck is copyrighted by acrolinx GmbH. Acronis True Image is a trademark of Acronis, Inc. Across is a trademark of Nero AG. AllChars is copyrighted by Jeroen Laarhoven. ApSIC Xbench and Comparator are copyrighted by ApSIC S.L. Araxis Merge is copyrighted by Araxis Ltd. ASAP Utilities is copyrighted by eGate Internet Solutions. Authoring Memory Tool is copyrighted by Sajan. Belarc Advisor is a trademark of Belarc, Inc. Catalyst and Publisher are trademarks of Alchemy Software Development Ltd. ClipMate is a trademark of Thornsoft Development. ColourProof, ColourTagger, and QA Solution are copyrighted by Yamagata Europe. Complete Word Count is copyrighted by Shauna Kelly. CopyFlow is a trademark of North Atlantic Publishing Systems, Inc. CrossCheck is copyrighted by Global Databases, Ltd. Déjà Vu is a trademark of ATRIL Language Engineering, S.L. Docucom PDF Driver is copyrighted by Zeon Corporation. dtSearch is a trademark of dtSearch Corp. EasyCleaner is a trademark of ToniArts. ExamDiff Pro is a trademark of Prestosoft. EmEditor is copyrighted by Emura Software inc. Error Spy is copyrighted by D.O.G. GmbH. FileHippo is copyrighted by FileHippo.com.
    [Show full text]
  • Amigan Software
    tali ► an Amiga Februar y 97 Issue No 3 Gaz te rip $3 Who said that there are no Amiga dealers left? Hardware Amiga A1200 HD, Amiga A4000 Cobra 33 68030 33, Mhz Cobra 33+ with 68882, Cobra 40 68EC030 40 Mhz, Cobra40+ with 68882, Ferret SCSI card for Cobra 1202 32 bit rami- clock, 1202+ with 16 or 33 Mhz 68882, Squirrel SCSI, Surf Squirrel SCSI plus RS@232, 2 Mb PCMCIA Ram A1200/A600, Spitfire SCSI A2000/3000/4000, Rapidfire SCSI + RAM A2000, Wildfire A2000 68060+ram+SCSI F/W+network, Megachip, 2Mb chip ram A500/A2000, Securekey Security card for A2000/3000/4000, Picasso Graphics cards, SCSI and IDE Hard drives. Accessories Green Mouse -320 DPI with pad, Hypermouse I1 400 DPI with pad, Pen mouse - super small, Joysticks, from Quickshot and Rocfire, GI 105 hand- scanner with touchup 4 and OCR Jr, Colourburst colour hand scanner with ADPRO loader & OCR Jr, Master 3A 880 K External Floppy drives, Rocgen Plus genlock, Electronic Design Genlocks and TBC, Neriki Genlocks Syquest EzDrives, External SCSI Cases with A500/A600/A1200 power lead included & CD, or hard drive option, A1200 3.5 IDE Kits, Monitor adaptors, ROM Switches, Air Freight Magazines with CD. Plus Much more Available. Software Over 70 titles in stock including games, productivity, CD rom titles, and Utilities, all at competative prices. Servicing We have a fully equiped workshop, and our techs have a total of over 50 Man years of experience as technicians in the computer industry. We do repairs and upgrades including specialist work. The Complete Amiga specialist.
    [Show full text]
  • Object Oriented Programming
    No. 52 March-A pril'1990 $3.95 T H E M TEe H CAL J 0 URN A L COPIA Object Oriented Programming First it was BASIC, then it was structures, now it's objects. C++ afi<;ionados feel, of course, that objects are so powerful, so encompassing that anything could be so defined. I hope they're not placing bets, because if they are, money's no object. C++ 2.0 page 8 An objective view of the newest C++. Training A Neural Network Now that you have a neural network what do you do with it? Part two of a fascinating series. Debugging C page 21 Pointers Using MEM Keep C fro111 (C)rashing your system. An AT Keyboard Interface Use an AT keyboard with your latest project. And More ... Understanding Logic Families EPROM Programming Speeding Up Your AT Keyboard ((CHAOS MADE TO ORDER~ Explore the Magnificent and Infinite World of Fractals with FRAC LS™ AN ELECTRONIC KALEIDOSCOPE OF NATURES GEOMETRYTM With FracTools, you can modify and play with any of the included images, or easily create new ones by marking a region in an existing image or entering the coordinates directly. Filter out areas of the display, change colors in any area, and animate the fractal to create gorgeous and mesmerizing images. Special effects include Strobe, Kaleidoscope, Stained Glass, Horizontal, Vertical and Diagonal Panning, and Mouse Movies. The most spectacular application is the creation of self-running Slide Shows. Include any PCX file from any of the popular "paint" programs. FracTools also includes a Slide Show Programming Language, to bring a higher degree of control to your shows.
    [Show full text]
  • ACS – the Archival Cytometry Standard
    http://flowcyt.sf.net/acs/latest.pdf ACS – the Archival Cytometry Standard Archival Cytometry Standard ACS International Society for Advancement of Cytometry Candidate Recommendation DRAFT Document Status The Archival Cytometry Standard (ACS) has undergone several revisions since its initial development in June 2007. The current proposal is an ISAC Candidate Recommendation Draft. It is assumed, however not guaranteed, that significant features and design aspects will remain unchanged for the final version of the Recommendation. This specification has been formally tested to comply with the W3C XML schema version 1.0 specification but no position is taken with respect to whether a particular software implementing this specification performs according to medical or other valid regulations. The work may be used under the terms of the Creative Commons Attribution-ShareAlike 3.0 Unported license. You are free to share (copy, distribute and transmit), and adapt the work under the conditions specified at http://creativecommons.org/licenses/by-sa/3.0/legalcode. Disclaimer of Liability The International Society for Advancement of Cytometry (ISAC) disclaims liability for any injury, harm, or other damage of any nature whatsoever, to persons or property, whether direct, indirect, consequential or compensatory, directly or indirectly resulting from publication, use of, or reliance on this Specification, and users of this Specification, as a condition of use, forever release ISAC from such liability and waive all claims against ISAC that may in any manner arise out of such liability. ISAC further disclaims all warranties, whether express, implied or statutory, and makes no assurances as to the accuracy or completeness of any information published in the Specification.
    [Show full text]
  • Date Created Size MB . تماس بگیر ید 09353344788
    Name Software ( Search List Ctrl+F ) Date created Size MB برای سفارش هر یک از نرم افزارها با شماره 09123125449 - 09353344788 تماس بگ ریید . \1\ Simulia Abaqus 6.6.3 2013-06-10 435.07 Files: 1 Size: 456,200,192 Bytes (435.07 MB) \2\ Simulia Abaqus 6.7 EF 2013-06-10 1451.76 Files: 1 Size: 1,522,278,400 Bytes (1451.76 MB) \3\ Simulia Abaqus 6.7.1 2013-06-10 584.92 Files: 1 Size: 613,330,944 Bytes (584.92 MB) \4\ Simulia Abaqus 6.8.1 2013-06-10 3732.38 Files: 1 Size: 3,913,689,088 Bytes (3732.38 MB) \5\ Simulia Abaqus 6.9 EF1 2017-09-28 3411.59 Files: 1 Size: 3,577,307,136 Bytes (3411.59 MB) \6\ Simulia Abaqus 6.9 2013-06-10 2462.25 Simulia Abaqus Doc 6.9 2013-06-10 1853.34 Files: 2 Size: 4,525,230,080 Bytes (4315.60 MB) \7\ Simulia Abaqus 6.9.3 DVD 1 2013-06-11 2463.45 Simulia Abaqus 6.9.3 DVD 2 2013-06-11 1852.51 Files: 2 Size: 4,525,611,008 Bytes (4315.96 MB) \8\ Simulia Abaqus 6.10.1 With Documation 2017-09-28 3310.64 Files: 1 Size: 3,471,454,208 Bytes (3310.64 MB) \9\ Simulia Abaqus 6.10.1.5 2013-06-13 2197.95 Files: 1 Size: 2,304,712,704 Bytes (2197.95 MB) \10\ Simulia Abaqus 6.11 32BIT 2013-06-18 1162.57 Files: 1 Size: 1,219,045,376 Bytes (1162.57 MB) \11\ Simulia Abaqus 6.11 For CATIA V5-6R2012 2013-06-09 759.02 Files: 1 Size: 795,893,760 Bytes (759.02 MB) \12\ Simulia Abaqus 6.11.1 PR3 32-64BIT 2013-06-10 3514.38 Files: 1 Size: 3,685,099,520 Bytes (3514.38 MB) \13\ Simulia Abaqus 6.11.3 2013-06-09 3529.41 Files: 1 Size: 3,700,856,832 Bytes (3529.41 MB) \14\ Simulia Abaqus 6.12.1 2013-06-10 3166.30 Files: 1 Size: 3,320,102,912 Bytes
    [Show full text]
  • Downloading Private Apps on Google Play Answers to Common Questions About Play App Signing
    downloading private apps on google play Answers to common questions about Play App Signing. Android apps are cryptographically signed by the developer. This allows the package manager on the user’s device to verify that every app update comes from the same source and that it hasn’t been tampered with. Google Play also enforces this signature check when you upload your APK to the Google Play Console, so that even if someone had your login credentials it would be impossible to send a malicious update without also having access to your private key. Historically, developers were responsible for generating their own private keys and keeping them safe throughout the application’s lifetime. While this offered a lot of flexibility, it was also prone to mistakes: generating weak keys, accidentally checking in your private key to a public repository or even losing it altogether are just a few common ones that happen routinely even to seasoned developers. Nowadays developers have a compelling alternative to managing keys themselves: Play App Signing , in which the upload key (the one you use to upload your artifacts to Google Play) and the app signing key (the one used to sign APKs distributed to devices) can be separate, and the app signing key is stored securely on Google’s infrastructure. Even though many other popular platforms treat distribution keys this way, for many developers it’s a departure from the previous Android signing model, and some developers may feel like they’re giving up too much control over their apps. That’s why, I want to dispel some common misconceptions about Play App Signing, as well as give guidance on specific scenarios that you might encounter.
    [Show full text]
  • Amigaos 3.2 FAQ 47.1 (09.04.2021) English
    $VER: AmigaOS 3.2 FAQ 47.1 (09.04.2021) English Please note: This file contains a list of frequently asked questions along with answers, sorted by topics. Before trying to contact support, please read through this FAQ to determine whether or not it answers your question(s). Whilst this FAQ is focused on AmigaOS 3.2, it contains information regarding previous AmigaOS versions. Index of topics covered in this FAQ: 1. Installation 1.1 * What are the minimum hardware requirements for AmigaOS 3.2? 1.2 * Why won't AmigaOS 3.2 boot with 512 KB of RAM? 1.3 * Ok, I get it; 512 KB is not enough anymore, but can I get my way with less than 2 MB of RAM? 1.4 * How can I verify whether I correctly installed AmigaOS 3.2? 1.5 * Do you have any tips that can help me with 3.2 using my current hardware and software combination? 1.6 * The Help subsystem fails, it seems it is not available anymore. What happened? 1.7 * What are GlowIcons? Should I choose to install them? 1.8 * How can I verify the integrity of my AmigaOS 3.2 CD-ROM? 1.9 * My Greek/Russian/Polish/Turkish fonts are not being properly displayed. How can I fix this? 1.10 * When I boot from my AmigaOS 3.2 CD-ROM, I am being welcomed to the "AmigaOS Preinstallation Environment". What does this mean? 1.11 * What is the optimal ADF images/floppy disk ordering for a full AmigaOS 3.2 installation? 1.12 * LoadModule fails for some unknown reason when trying to update my ROM modules.
    [Show full text]
  • Development of a Miniaturized Passive Air Sampler to Characterize the Exposure of Emerging Contaminants in Birds
    UNIVERSITÉ DU QUÉBEC À MONTRÉAL DEVELOPMENT OF A MINIATURIZED PASSIVE AIR SAMPLER TO CHARACTERIZE THE EXPOSURE OF EMERGING CONTAMINANTS IN BIRDS MASTER THESIS PRESENTED AS A PARTIAL REQUIREMENT OF THE MASTER' S DEGREE IN ELECTRICAL ENGINEERING BY ALI REZAEI NOVEMBER 2016 UNIVERSITÉ DU QUÉBEC À MONTRÉAL Service des bibliothèques Avertissement La diffusion de ce mémoire se fait dans le respect des droits de son auteur, qui a signé le formulaire Autorisation de reproduire et de diffuser un travail de recherche de cycles supérieurs (SDU -522 - Rév.0?-2011 ). Cette autorisation stipule que «conformément à l'article 11 du Règlement no 8 des études de cycles supérieurs, [l 'auteur] concède à l'Université du Québec à Montréal une licence non exclusive d'utilisation et de publication de la totalité ou d'une partie importante de [son] travail de recherche pour des fins pédagogiques et non commerciales. Plus précisément, [l 'auteur] autorise l'Université du Québec à Montréal à reproduire, diffuser, prêter, distribuer ou vendre des copies de [son] travail de recherche à des fins non commerciales sur quelque support que ce soit, y compris l'Internet. Cette licence et cette autorisation n'entraînent pas une renonciation de [la] part [de l'auteur] à [ses] droits moraux ni à [ses] droits de propriété intellectuelle. Sauf entente contraire, [l 'auteur] conserve la liberté de diffuser et de commercialiser ou non ce travail dont [il] possède un exemplaire. » UNIVERSITÉ DU QUÉBEC À MONTRÉAL DÉVELOPPEMENT D'ÉCHANTILLONEURS D'AIR MINIATURISÉS ET EMBARQUÉS SUR DES OISEAUX POUR LA CARACTÉRISATION DE LEUR EXPOSITON À DES NOUVEAUX CONT AMINANTS MÉMOIRE PRÉSENTÉ COMME EXIGENCE PARTIELLE DE LA MAÎTRISE EN GÉNIE ÉLECTRIQUE PAR ALIREZAEI NOVEMBRE 2016 REI'vŒRCIEI'vŒNTS Je ti ens à remercier mon directeur de recherche, Pr Ricard o Izquierd o, ainsi que mon codirecteur, Pr Jonathan Verreault pour leurs conseil s et leurs suggesti ons qui m 'ont été utiles durant tout mon mémoire.
    [Show full text]
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Metadefender Core V4.13.1
    MetaDefender Core v4.13.1 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Capitol Murder
    CAPITOL MURDER A THESIS SUBMITTED TO THE GRADUATE DIVISION OF THE UNIVERSITY OF HAWAI‘I AT MĀNOA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS IN ENGLISH DECEMBER 2012 By Sara M. K. Young Thesis Committee: Rodney Morales, Chairperson Cynthia Franklin Gary Pak ACKNOWLEDGMENTS I would like to thank the following people for their assistance with my thesis: Kai Lau, for providing his knowledge of information technology systems; Gary Pak and Cynthia Franklin, for their instruction and participation; Instructor Shawna Yang Ryan and my ENG 613C Fiction Workshop classmates for Spring and Fall 2012, for their commentary and feedback on my workshop drafts; Rodney Morales, for his literary guidance, mentorship, and overall advice; and Marcus Hayden, for his continuous encouragement and support. i TABLE OF CONTENTS ACKNOWLEDGMENTS ................................................................................................... i PROLOGUE ....................................................................................................................... 1 CHAPTER 1 ....................................................................................................................... 6 CHAPTER 2 ..................................................................................................................... 27 CHAPTER 3 ..................................................................................................................... 52 CHAPTER 4 ....................................................................................................................
    [Show full text]
  • On Computational Intelligence Tools for Vision Based Navigation of Mobile Robots
    On Computational Intelligence Tools for Vision Based Navigation of Mobile Robots By Ivan Villaverde de la Nava http://www.ehu.es/ccwintco Dissertation presented to the Department of Computer Science and Artificial Intelligence in partial fulfillment of the requirements for the degree of Doctor of Philosophy PhD Advisor: Prof. Manuel Graña Romay At University of the Basque Country Donostia - San Sebastian 2009 AUTORIZACION DEL/LA DIRECTOR/A DE TESIS PARA SU PRESENTACION Dr/a. _________________________________________con N.I.F.________________________ como Director/a de la Tesis Doctoral: realizada en el Departamento por el Doctorando Don/ña. , autorizo la presentación de la citada Tesis Doctoral, dado que reúne las condiciones necesarias para su defensa. En a de de EL/LA DIRECTOR/A DE LA TESIS Fdo.: CONFORMIDAD DEL DEPARTAMENTO El Consejo del Departamento de en reunión celebrada el día ____ de de ha acordado dar la conformidad a la admisión a trámite de presentación de la Tesis Doctoral titulada: dirigida por el/la Dr/a. y presentada por Don/ña. ante este Departamento. En a de de Vº Bº DIRECTOR/A DEL DEPARTAMENTO SECRETARIO/A DEL DEPARTAMENTO Fdo.: ________________________________ Fdo.: ________________________ ACTA DE GRADO DE DOCTOR ACTA DE DEFENSA DE TESIS DOCTORAL DOCTORANDO DON/ÑA. TITULO DE LA TESIS: El Tribunal designado por la Subcomisión de Doctorado de la UPV/EHU para calificar la Tesis Doctoral arriba indicada y reunido en el día de la Fecha, una vez eFectuada la defensa por el doctorando y contestadas las objeciones y/o sugerencias que se le han formulado, ha otorgado por___________________la calificación de: unanimidad ó mayoría En a de de EL/LA PRESIDENTE/A, EL/LA SECRETARIO/A, Fdo.: Fdo.: Dr/a: ____________________ Dr/a: ______________________ VOCAL 1º, VOCAL 2º, VOCAL 3º, Fdo.: Fdo.: Fdo.: Dr/a: Dr/a: Dr/a: EL/LA DOCTORANDO/A, Fdo.: Agradecimientos Hay una multitud de gente sin la que llegar hasta este punto me hu- biese sido imposible y sin cuya ayuda esta tesis no hubiese llegado a tér- mino.
    [Show full text]