Making Sense of Email Addresses on Drives

Total Page:16

File Type:pdf, Size:1020Kb

Making Sense of Email Addresses on Drives Journal of Digital Forensics, Security and Law Volume 11 Number 2 Article 10 2016 Making Sense of Email Addresses on Drives Neil C. Rowe U.S. Naval Postgraduate School Riqui Schwamm U.S. Naval Postgraduate School Michael R. McCarrin U.S. Naval Postgraduate School Ralucca Gera U.S. Naval Postgraduate School Follow this and additional works at: https://commons.erau.edu/jdfsl Part of the Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, and the Information Security Commons Recommended Citation Rowe, Neil C.; Schwamm, Riqui; McCarrin, Michael R.; and Gera, Ralucca (2016) "Making Sense of Email Addresses on Drives," Journal of Digital Forensics, Security and Law: Vol. 11 : No. 2 , Article 10. DOI: https://doi.org/10.15394/jdfsl.2016.1385 Available at: https://commons.erau.edu/jdfsl/vol11/iss2/10 This Article is brought to you for free and open access by the Journals at Scholarly Commons. It has been accepted for inclusion in Journal of Digital Forensics, Security and Law by an authorized administrator of (c)ADFSL Scholarly Commons. For more information, please contact [email protected]. Making Sense of Email Addresses on Drives JDFSL V11N2 MAKING SENSE OF EMAIL ADDRESSES ON DRIVES Neil C. Rowe1, Riqui Schwamm1, Michael R. McCarrin1 and Ralucca Gera2 U.S. Naval Postgraduate School 1Computer Science Department 2Applied Mathematics Department Monterey, California 93943 USA 1-831-656-2462, fax 1-831-656-2814, [email protected] ABSTRACT Drives found during investigations often have useful information in the form of email addresses, which can be acquired by search in the raw drive data independent of the file system. Using these data, we can build a picture of the social networks in which a drive owner participated, even perhaps better than investigating their online profiles maintained by social-networking services, because drives contain much data that users have not approved for public display. However, many addresses found on drives are not forensically interesting, such as sales and support links. We developed a program to filter these out using a Naïve Bayes classifier and eliminated 73.3% of the addresses from a representative corpus. We show that the byte-offset proximity of the remaining addresses found on a drive, their word similarity, and their number of co-occurrences over a corpus are good measures of association of addresses, and we built graphs using this data of the interconnections both between addresses and between drives. Results provided several new insights into our test data. Keywords: digital forensics, electronic mail, email, addresses, users, filtering, networks, visualization INTRODUCTION service or page owner. A better source could be the contacts users store on their computers Finding social networks is important in and devices in the form of electronic-mail investigating organized crime and terrorism. (email) addresses, telephone numbers, street Social networks can be learned from addresses, and personal names. Some may be connections recorded by social-networking information of which users are not aware services and discussion-forum Web pages. because it was stored by software or left in However, this is public information, and is unallocated space after deletions. often of limited value in a criminal investigation in which subjects conceal key This work focuses on email-address data. information about their contacts. Such data can indicate personal connections by Furthermore, license agreements often prohibit the nearby placement of pairs of addresses on a automated analysis of such data without drive, similarity of words in address pairs permission, and much user data may not be suggesting aliases, or repeated association of accessible without the cooperation of the address pairs on a set of drives. We may thus © 2016 ADFSL Page 153 JDFSL V11N2 Making Sense of Email Addresses on Drives be able to infer networks of contacts of varying extract all email addresses, their offsets on the connection strengths from the data on one drive, and their preceding and following drive alone. We can then use several methods characters. Email addresses consist of a to build visualizations of the networks to make username of up to 64 characters, a “@”, and a them easier to understand. A key obstacle is set of domain and subdomain names delimited that many addresses on a drive are by periods. Bulk Extractor bypasses the file uninteresting because businesses and system and searches the raw drive bytes for organizations put contact addresses into their patterns appearing to be email addresses, so it Web pages and software, so we must first can find addresses in deleted files and slack exclude these. Note that seeking addresses on space. On our corpus, this resulted in drives has advantages over inspecting the 292,347,920 addresses having an average of records of a mail server because it can find 28.4 characters per address, of which there older addresses removed from a server or were 17,544,550 distinct addresses. The potential contacts never used to send mail. number of files on these drives was 61,365,153, so addresses were relatively infrequent, though LITERATURE REVIEW they were more common for mobile devices. Most work on visualizing social networks has Sample output of Bulk Extractor: focused on social-networking sites where links between people are made explicit through a 65484431478 [email protected] variety of friend and contact links (Holzer, vy.mil>\x0A> To: "'ttfaculty@cs Malin, and Sweeney, 2005; Zhou et al, 2006; 69257847997 [email protected] Polakis et al, 2010). They can also be 0\x1E\x06\x09*\x86H\x86\xF7\x0D\x01\ extracted from text by nearby mentions of x09\x01\x16\[email protected]\x00\x0 names of people (Laclavik et al, 2012), though 0\x00\x00\x00\x00\x00\x00\x00\x00\x00\ nearness may be coincidental. So far there has x00\x00\x00\x00\x00 been little attention to the mining of addresses Bulk Extractor’s email-address scanner from drives, their classification, or their seeks domain/subdomain lists containing at connection to social networks. There has been least one period and punctuating delimiters in work on the classification of email messages front and behind the address. Currently, Bulk from their message headers (Lee, Shishibori, Extractor handles common compressed formats and Ando, 2007), but headers provide but cannot recognize non-ASCII addresses. significantly richer contextual information than Recent standards for international email in the lists of email addresses found scattered over a IETF’s RFC 6530 allow the full Unicode drive. character set in both usernames and domains TEST SETUP (Klensin and Ko, 2012) so that must be considered in the future. Most of our corpus This work primarily used the Real Data predates the standard. Corpus (Garfinkel et al, 2009), a collection of currently 2401 drives from 36 countries after This work primarily used an “email excluding 961 empty or unreadable drives. stoplist” provided by the U.S. National These drives were purchased as used Institute of Standards and Technology (NIST) equipment and represent a range of business, by running Bulk Extractor on a portion of government, and home users. We ran the their software collection. Email addresses Bulk Extractor tool (Bulk Extractor, 2013) to found inside software are likely software contact information and unlikely to be Page 154 © 2016 ADFSL Making Sense of Email Addresses on Drives JDFSL V11N2 interesting, but this is not guaranteed because 102,426 personal names including both software developers may have inadvertently given names and surnames. We left personal addresses, or deliberately put obtained international coverage by them in to enable unauthorized data leakage. using a variety of resources including We supplemented this list with three other proposed baby names. Another sources: known “blackhole” addresses used for approximately 15,000 were found by forwarding spam inspecting the training set and stop list. (gist.github.adamloving/4401361, 482 items), 3,515 names of email and messaging known scam email addresses servers. Some had words like “mail” (www.sistersofspam.co.uk, 2030 items), and and “chat” in their domains, but others addresses found by us using Bulk Extractor on required Web research to determine fresh installs of standard Windows and their function. Macintosh operating systems (332 items). 2,813 “generic usernames” representing After eliminating duplicates, the stoplist had generic addresses such as business 496,301 addresses total. contacts. These we identified by We also created four important word lists manually inspecting the training set for use in interpreting the words within and stoplist. Table 1 gives examples. addresses: Table 1 Example generic usernames 809,858 words of the online dictionaries auctions backup beauty used in (Rowe, Schwamm, and callcenter conference download Garfinkel 2013). The English word list editor feedback group was 223,525 words from two dictionary homepage ideas jobsindia sources and included morphological linux marketinfo nobody variants. 587,258 additional words outlet passwords registration were from Croatian, Czech, Dutch, response save testing Finnish, French, German, Greek, tickets update yourmatches Hungarian, Italian, Norwegian, Polish, Portuguese, Romanian, Serbian, ELIMINATING Spanish, Swedish, and Turkish dictionaries and transliterated to UNINTERESTING ASCII. We did not consider languages ADDRESSES like Arabic and Chinese whose A first step is to remove addresses unlikely to transliteration to ASCII was be interesting in a forensic investigation. We problematic. We converted words to have clues in both the username and the lower case, eliminated those that were domain/subdomain names. For instance, also personal names and generic [email protected] uses two human usernames, and eliminated non-English one-letter and two-letter words since names in the username, and a domain name that includes “mail” to suggest a mail server; they caused too many false matches to these clues suggest it is an interesting address.
Recommended publications
  • 5337 Sun Microsystems Updates: 3461, 3464, 3798 A
    Network Working Group C. Newman Request for Comments: 5337 Sun Microsystems Updates: 3461, 3464, 3798 A. Melnikov, Ed. Category: Experimental Isode Ltd September 2008 Internationalized Delivery Status and Disposition Notifications Status of This Memo This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet standard of any kind. Discussion and suggestions for improvement are requested. Distribution of this memo is unlimited. Abstract Delivery status notifications (DSNs) are critical to the correct operation of an email system. However, the existing Draft Standards (RFC 3461, RFC 3462, RFC 3464) are presently limited to US-ASCII text in the machine-readable portions of the protocol. This specification adds a new address type for international email addresses so an original recipient address with non-US-ASCII characters can be correctly preserved even after downgrading. This also provides updated content return media types for delivery status notifications and message disposition notifications to support use of the new address type. This document experimentally extends RFC 3461, RFC 3464, and RFC 3798. Newman & Melnikov Experimental [Page 1] RFC 5337 Internationalized DSN and MDNs September 2008 Table of Contents 1. Introduction . 3 2. Conventions Used in This Document . 3 3. UTF-8 Address Type . 3 4. UTF-8 Delivery Status Notifications . 6 4.1. Additional Requirements on SMTP Servers . 8 5. UTF-8 Message Disposition Notifications . 9 6. IANA Considerations . 10 6.1. UTF-8 Mail Address Type Registration . 10 6.2. Update to 'smtp' Diagnostic Type Registration . 11 6.3. message/global-headers . 11 6.4. message/global-delivery-status . 12 6.5.
    [Show full text]
  • Email Address Verification
    Email Address Verification API Release 3.0.4 Email Hippo Ltd. Jul 05, 2018 Contents 1 Quick Start 3 1.1 Quick Start................................................3 2 Data Privacy 7 2.1 Data Privacy...............................................7 2.2 Compliance................................................7 2.3 Security..................................................7 2.4 Latest Uptime Statistics.........................................7 3 Live Uptime Report 9 4 Live Response Time Report 11 5 Editions 13 5.1 About Editions.............................................. 13 6 Integration Guide 15 6.1 Schema.................................................. 15 6.2 Return Protocols............................................. 15 6.3 Firewall Rules.............................................. 15 7 Features 17 7.1 Features.................................................. 17 8 Usage Report 21 8.1 Usage Report............................................... 21 9 Reliability 23 9.1 Service Reliability............................................ 23 9.2 Real Time Monitoring.......................................... 24 10 Data Dictionary 25 10.1 Data Dictionary For API V3....................................... 25 11 Client Libraries 43 11.1 Client Libraries.............................................. 43 12 Special Providers 45 i 12.1 Special Providers............................................. 45 13 Technical Specification 47 13.1 Technical Specification.......................................... 47 14 Change Log 49 14.1 Change Log..............................................
    [Show full text]
  • International Email Addresses in X.509
    International Email Addresses in X.509 Dmitry Belyavskiy Technical Centre of Internet ICANN 60 Tech Day, Abu-Dhabi October 30, 2017 EAI: history IETF EAI workgroup: • 2007-2010: experimental RFCs • 2012: final RFCs 653x: SMTP • 2013: final RFCs 685x: POP/IMAP EAI: standards Group of RFC 653x (2012): • RFC 6530: Overview and Framework for Internationalized Email • RFC 6531: SMTP Extension for Internationalized Email (SMTPUTF8) • RFC 6532: Internationalized Email Headers • RFC 6533: Internationalized Delivery Status and Disposition Notifications • RFC 6783: Mailing Lists and Non-ASCII Addresses EAI: standards Group of RFC 685x (2013): • RFC 6855: IMAP Support for UTF-8 • RFC 6856: POP3 Support for UTF-8 • RFC 6857: Post-Delivery Message Downgrading for Internationalized Email Messages • RFC 6858: Simplified POP and IMAP Downgrading for Internationalized Email EAI: adoption Servers: Postfix 3.0+, Exim 4.86+, Dovecot, Roundcube… Mail clients: Microsoft Outlook 2016 for Windows, Apple iOS Mail, The Bat!, mutt… Mail providers: Google Gmail… Russian statistics: 1,3% MX-servers, 2,6% Domain zones Source: https://statdom.ru EAI: missing standards EAI in EPP EAI in X.509 – work in progress Something else? EAI in X.509: current state IETF WG Lamps . https://tools.ietf.org/wg/lamps/draft- ietf-lamps-rfc5280-i18n-update/ Russ Housley . https://tools.ietf.org/wg/lamps/draft- ietf-lamps-eai-addresses/ Alexey Melnikov Weihaw Chuang Source: https://tools.ietf.org/wg/lamps/ Internationalization Updates to RFC 5280 Set of patches to RFC 5280 X.509/CRL Profile
    [Show full text]
  • SIM7000 Series Email Application Note
    SIM7000 Series_Email _Application Note LPWA Module SIMCom Wireless Solutions Limited Building B, SIM Technology Building, No.633, Jinzhong Road Changning District, Shanghai P.R. China Tel: 86-21-31575100 [email protected] www.simcom.com SIM7000 Series_Email_Application Note_V1.01 Document Title: SIM7000 Series_Email_Application Note Version: 1.02 Date: 2020.07.28 Status: Released GENERAL NOTES SIMCOM OFFERS THIS INFORMATION AS A SERVICE TO ITS CUSTOMERS, TO SUPPORT APPLICATION AND ENGINEERING EFFORTS THAT USE THE PRODUCTS DESIGNED BY SIMCOM. THE INFORMATION PROVIDED IS BASED UPON REQUIREMENTS SPECIFICALLY PROVIDED TO SIMCOM BY THE CUSTOMERS. SIMCOM HAS NOT UNDERTAKEN ANY INDEPENDENT SEARCH FOR ADDITIONAL RELEVANT INFORMATION, INCLUDING ANY INFORMATION THAT MAY BE IN THE CUSTOMER’S POSSESSION. FURTHERMORE, SYSTEM VALIDATION OF THIS PRODUCT DESIGNED BY SIMCOM WITHIN A LARGER ELECTRONIC SYSTEM REMAINS THE RESPONSIBILITY OF THE CUSTOMER OR THE CUSTOMER’S SYSTEM INTEGRATOR. ALL SPECIFICATIONS SUPPLIED HEREIN ARE SUBJECT TO CHANGE. COPYRIGHT THIS DOCUMENT CONTAINS PROPRIETARY TECHNICAL INFORMATION WHICH IS THE PROPERTY OF SIMCOM WIRELESS SOLUTIONS LIMITED COPYING, TO OTHERS AND USING THIS DOCUMENT, ARE FORBIDDEN WITHOUT EXPRESS AUTHORITY BY SIMCOM. OFFENDERS ARE LIABLE TO THE PAYMENT OF INDEMNIFICATIONS. ALL RIGHTS RESERVED BY SIMCOM IN THE PROPRIETARY TECHNICAL INFORMATION ,INCLUDING BUT NOT LIMITED TO REGISTRATION GRANTING OF A PATENT , A UTILITY MODEL OR DESIGN. ALL SPECIFICATION SUPPLIED HEREIN ARE SUBJECT TO CHANGE WITHOUT NOTICE AT ANY TIME. SIMCom Wireless Solutions Limited Building B, SIM Technology Building, No.633 Jinzhong Road, Changning District, Shanghai P.R. China Tel: +86 21 31575100 Email: [email protected] For more information, please visit: https://www.simcom.com/download/list-863-en.html For technical support, or to report documentation errors, please visit: https://www.simcom.com/ask/ or email to: [email protected] Copyright © 2020 SIMCom Wireless Solutions Limited All Rights Reserved.
    [Show full text]
  • World Report on Internationalised Domain Names 2014
    .eu Insights World report on Internationalised Domain Names 2014 August 2014 With the support of With the support of CENTR, LACTLD, APTLD, and AFTLD .eu Insights The EURid Insights series aims to analyse specifc aspects of the domain name environment. The reports are based on surveys, studies and research conducted by EURid in cooperation with industry experts and sector leaders. World report on Internationalised Domain Names 2014 Numbers (December 2013) 6 2% 215% Million of the world’s growth IDN domain names 270 million domain in the IDN market over names are IDNs the past 5 years 2012-2013 116% IDN.IDN 46% -8% ccTLD annual gTLD IDN ccTLD IDNs growth rate annual growth rate annual growth rate (second level) (second level) 50 26 2 ASCII TLDs IDNs IDN gTLDs offer IDNs at the sec- for 22 countries or territories (web), ond level (eg .com, .eu) (eg , ) (everyone) Languages • IDNs help to enhance multilingualism in cyberspace • The IDN market is more balanced in favour of emerging economies • IDNs are accurate predictors of the language of online content • 99%+ correlation between IDN scripts and language of website • Strong correlation between country of hosting and IDN scripts • Japanese, Chinese, Korean and German are the most popular languages for content associated with IDNs • Arabic script IDNs are associated with blogs, ecommerce and online business sites in Persian and Arabic language Universal acceptance • Universal acceptance of IDNs the key challenge to mass uptake • Google Gmail began supporting internationalised email addresses starting in July 2014. Popular open source email services are also supporting IDN emails • Standardised programming tools for mobile application developers support IDNs • Social media and search have improved support for IDNs as URLs in links • Universal acceptance is a wider issue than previously thought.
    [Show full text]
  • Introduction to Universal Acceptance (UA)
    Introduction to Universal Acceptance (UA) Universal Acceptance Steering Group (UASG) 23 September 2019 Universal Acceptance – Report UASG007 TABLE OF CONTENTS About This Document 4 Target Audience 4 Background Concepts 5 Domain Names 5 Country Code Top-level Domains (ccTLDs) 5 Generic Top-level Domains (gTLDs) 5 Domain Name Internationalization 6 The Need for Universal Acceptance (UA) 6 U-labels and A-labels 6 Email Address Internationalization (EAI) 7 Dynamic Link Generation (Linkification) 8 The Dynamic Nature of the Root Zone Registry 8 Universal Acceptance in Action 9 Five Criteria of Universal Acceptance 9 User Scenarios 11 Nonconformance to Universal Practices 12 Technical Requirements for UA Readiness 13 High-Level Requirements 13 Developer Considerations 14 Designing Software for Compatibility and Flexibility 14 Good Practices for Developing and Updating Software to Achieve UA-Readiness 14 Authoritative Sources for Domain Names: DNS Root Zone and IANA Lists 21 Email with IDNs and Why It Is Not the Same as EAI 21 Linkification and Its Challenges 22 Good Practice Recommendations 22 Unicode - Background and Code Point Attributes 23 UTF8, UTF16, and Other Encoding Methods 23 IDNA - A Brief History and Current State 24 Use Cases for Testing 24 Upgrading Software for EAI 25 Advanced Topics 25 Complex Scripts 25 Right-to-Left Languages and Unicode Conformance 25 The Bidi Algorithm 25 The Bidi Rule for Domain Names 27 Joiners 27 Homoglyphs and Similar Characters 28 Introduction to Universal Acceptance - Report UASG007 // 2 Normalization, Case Folding, and String Preparation 28 Case Folding and Mapping 30 Glossary and Other Resources 31 Glossary 31 RFCs and Key Standards 34 Key Standards 37 Online Resources 38 Introduction to Universal Acceptance - Report UASG007 // 3 About This Document The Internet’s technologies, including its naming components, continually evolve and change.
    [Show full text]
  • Universal Acceptance and Its Challenges
    Getting ready for the New Internet Name Space Universal Acceptance and its Challenges An APRALO-APAC Hub Webinar 22 March 2016 Contents Background 3 Overview 4 Introduction, Kelvin Wong 5 Don Hollander- presentation 6 POP QUIZ #1 13 Marvin Woo - presentation 14 POP QUIZ #2 21 Questions and Answers 22 Acknowledgements 24 2 Universal Acceptance Universal Acceptance Background Challenges. Domain names in a TLD must be useable in applications regardless of the written script, length or newness of the TLD. The primary Applications and Services must: drivers for Universal Acceptance stem from the following elements: • Enable use of whatever TLD Longer TLD Names: TLDs with names is delegated longer than three characters, such as .museum or .plumber. • Display domain and email names correctly Non-Latin based TLDs: TLDs with names • Work correctly for any name written in scripts other than ASCII, such as Hindi, Japanese and Greek. • Implement appropriate levels of security Rapid addition of TLDs: The New gTLD Program spurring very rapid additions of new gTLDs delegated to the root zone. International. Email: The introduction of non-ASCII names in email. While IDNs solved part of the ability to have non-ASCII names for servers, it doesn't solve the ability to have non-ASCII names for mailboxes. Quick Guide: https://www.icann.org/en/system/files/files/ua-quick-guide-02mar16-en.pdf Universal Acceptance 3 Overview Universal Acceptance is a foundational requirement for a truly multilingual Internet, one in which users around the world can navigate entirely in local languages. It is also the key to unlocking the potential of new generic top-level domains (gTLDs) to foster competition, consumer choice and innovation in the domain name industry.
    [Show full text]
  • Email Address Verification
    Email Address Verification API Release 2.0.1 Email Hippo Ltd. May 16, 2017 Contents 1 Latest Uptime Statistics 1 1.1 Live Uptime Report...........................................1 1.2 Live Response Time Report.......................................1 2 Documentation Introduction3 2.1 Quick Start................................................3 2.2 Data Dictionary.............................................4 2.3 Sandbox.................................................7 2.4 Features..................................................7 2.5 Reliability................................................9 2.6 Technical Specification.......................................... 10 2.7 FAQs................................................... 11 2.8 Glossary................................................. 14 3 Indices and tables 19 i ii CHAPTER 1 Latest Uptime Statistics Live Uptime Report Report shows functional requests. Functional requests are queries containing real email addresses for validation. Live Response Time Report Report shows response times from the functional API endpoint. 1 Email Address Verification API, Release 2.0.1 2 Chapter 1. Latest Uptime Statistics CHAPTER 2 Documentation Introduction This document will show you how to get up and running with the email verification API. You will have the basics of the API up and running in 15 minutes or less. Use: • Signup for a free account. • Verify email addresses from inside your portal. • Integrate email validation with your application using the RESTful API. Engage: • Create a support ticket •
    [Show full text]
  • Network Working Group Y. Abel, Ed. Request for Comments: 5335 TWNIC Updates: 2045, 2822 September 2008 Category: Experimental
    Network Working Group Y. Abel, Ed. Request for Comments: 5335 TWNIC Updates: 2045, 2822 September 2008 Category: Experimental Internationalized Email Headers Status of This Memo This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet standard of any kind. Discussion and suggestions for improvement are requested. Distribution of this memo is unlimited. Abstract Full internationalization of electronic mail requires not only the capabilities to transmit non-ASCII content, to encode selected information in specific header fields, and to use non-ASCII characters in envelope addresses. It also requires being able to express those addresses and the information based on them in mail header fields. This document specifies an experimental variant of Internet mail that permits the use of Unicode encoded in UTF-8, rather than ASCII, as the base form for Internet email header field. This form is permitted in transmission only if authorized by an SMTP extension, as specified in an associated specification. This specification Updates section 6.4 of RFC 2045 to conform with the requirements. Abel Experimental [Page 1] RFC 5335 I18N Email Headers September 2008 Table of Contents 1. Introduction . 3 1.1. Role of This Specification . 3 1.2. Relation to Other Standards . 3 2. Background and History . 3 3. Terminology . 4 4. Changes on Message Header Fields . 5 4.1. UTF-8 Syntax and Normalization . 5 4.2. Changes on MIME Headers . 6 4.3. Syntax Extensions to RFC 2822 . 6 4.4. Change on addr-spec Syntax . 8 4.5. Trace Field Syntax . 9 4.6. message/global .
    [Show full text]
  • Email Address Verification
    Email Address Verification API Release 3.0.12 Email Hippo Ltd. Jan 28, 2019 Contents 1 Quick start 3 1.1 Quick start................................................3 2 Compliance 7 2.1 Compliance................................................7 3 Latest uptime statistics 9 4 Live uptime report 11 5 Live response time report 13 6 Editions 15 6.1 About editions.............................................. 15 7 Integration guide 17 7.1 Schema.................................................. 17 7.2 Return protocols............................................. 17 7.3 Firewall rules............................................... 17 8 Features 19 8.1 Features.................................................. 19 9 Usage report 23 9.1 Usage report............................................... 23 10 Reliability 25 10.1 Service reliability............................................. 25 10.2 Real time monitoring........................................... 25 11 Concurrency 27 11.1 Concurrency............................................... 27 12 Data dictionary 29 12.1 Data dictionary for API v3........................................ 29 13 Client libraries 47 13.1 Client libraries.............................................. 47 i 14 Technical specification 49 14.1 Technical specification.......................................... 49 15 Change log 51 15.1 Change log................................................ 51 16 FAQs 53 16.1 Frequently asked questions........................................ 53 17 Glossary 57 17.1 Glossary................................................
    [Show full text]
  • Personal Assistant Email Agent
    A-PDF Merger DEMO : Purchase from www.A-PDF.com to remove the watermark Republic of Iraq Ministry of Higher Education and Scientific Research Al-Nahrain University College of Science Personal Assistant Email Agent A thesis Submitted to the College of Science, Al-Nahrain University in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Science By Zaid H. Alibadi (B.Sc. 2006) Supervisors Dr. Loay E. George Dr. Sawsan K. Thamer January 2011 Sufar 1423 Dedication To the two women, that they have most impact in my life, my mother and grandmother. mt|w Acknowledgment I express a special thank to Dr. Loay E. George, beside his valuable guidance and ideas to complete this work, I thank him for the interesting discussions that we had, which included various issues and topics of life. For those hours and ideas that you shared with me, I show my sincere thanks and gratitude. To Dr. Sawsan K. Thamer, for her valuable guidance and ideas to present this thesis as best as possible, have my sincere gratitude and appreciation. Grateful thank to both Dr. Haithem A. Al-Ani and Dr. Taha S. Bashaga for helping me in all the administrative matters that accompanied the years of study and research. Finally, to everyone who helped me and supported me, I say "thank you". Abstract Email is one of the most useful communication tools over the Internet; Email can be an effective knowledge management tool which conveniently enables fast and accurate communication. On the other side, the increasing volume of email threatens to cause a state of “email overload” at which the volume of messages exceeds individuals’ capacity to process them.
    [Show full text]
  • SIEBEL Email RESPONSE ADMINISTRATION GUIDE
    SIEBEL eMAIL RESPONSE ADMINISTRATION GUIDE VERSION 7.5, REV. A 12-FAUN7O MAY 2003 Siebel Systems, Inc., 2207 Bridgepointe Parkway, San Mateo, CA 94404 Copyright © 2003 Siebel Systems, Inc. All rights reserved. Printed in the United States of America No part of this publication may be stored in a retrieval system, transmitted, or reproduced in any way, including but not limited to photocopy, photographic, magnetic, or other record, without the prior agreement and written permission of Siebel Systems, Inc. Siebel, the Siebel logo, TrickleSync, TSQ, Universal Agent, and other Siebel product names referenced herein are trademarks of Siebel Systems, Inc., and may be registered in certain jurisdictions. Other product names, designations, logos, and symbols may be trademarks or registered trademarks of their respective owners. U.S. GOVERNMENT RESTRICTED RIGHTS. Programs, Ancillary Programs and Documentation, delivered subject to the Department of Defense Federal Acquisition Regulation Supplement, are “commercial computer software” as set forth in DFARS 227.7202, Commercial Computer Software and Commercial Computer Software Documentation, and as such, any use, duplication and disclosure of the Programs, Ancillary Programs and Documentation shall be subject to the restrictions contained in the applicable Siebel license agreement. All other use, duplication and disclosure of the Programs, Ancillary Programs and Documentation by the U.S. Government shall be subject to the applicable Siebel license agreement and the restrictions contained in subsection (c) of FAR 52.227-19, Commercial Computer Software - Restricted Rights (June 1987), or FAR 52.227-14, Rights in Data—General, including Alternate III (June 1987), as applicable. Contractor/licensor is Siebel Systems, Inc., 2207 Bridgepointe Parkway, San Mateo, CA 94404.
    [Show full text]