Migration Guide

Total Page:16

File Type:pdf, Size:1020Kb

Migration Guide Migration Guide A guide to migrating the basic software components on server and workstation computers Version 1.0 – July 2003 KBSt Publication Service ISSN 0179-7263 Volume 57 July 2003 KBSt Publication Series Volume 57 ISSN 0179 - 7263 Reprint, even in part, subject to approval This volume was prepared by the KBSt unit at the Federal Ministry of the Interior in co-operation with the German Federal Office for Information Security, the Bundesverwaltungsamt (BVA) and C_sar Consulting, solutions and results AG. Editor: C_sar AG, Berlin If you are interested in publications by KBSt currently available or further information concerning the documents, please contact Bundesministerium des Innern Referat IT 2 (KBSt) 11014 Berlin, Germany Tel.: +49 (0) 1888 681 - 2312 Fax.: +49 (0) 1888 681 - 523121 KBSt homepage: http://www.kbst.bund.de 1Frau Monika Pfeiffer (mailto: [email protected]) Migration Guide A guide to migrating the basic software components on server and workstation computers Version 1.0 July 2003 Published by the Federal Ministry of the Interior CONTENTS 1 Introduction .................................................................... 8 1.1 About the project 8 1.2 About this guide 9 1.3 How to use this guide 10 1.4 Information for decision-makers 12 1.4.1 General recommendations 12 1.4.2 Continuing and replacing migration 12 1.4.3 Migration paths 13 1.4.4 Comparability of alternatives 14 1.4.5 Future key issues 14 1.4.6 Economic efficiency 15 2 Key issues of the migration guide.............................. 17 2.1 Important definitions 17 2.1.1 Open source, free software 17 2.1.2 Proprietary software 17 2.1.3 Commercial Linux software 17 2.1.4 Replacing migration 18 2.1.5 Continuing migration 18 2.2 Migration paths 18 2.2.1 Microsoft Windows as the starting situation 19 2.2.2 System landscape with replacing migration 21 2.2.3 System landscape with continuing migration 22 2.2.4 Internal dependencies within the Microsoft system landscape 23 2.3 Linux distributions 25 2.3.1 Introduction 25 2.3.2 Debian GNU Linux 27 2.3.3 SuSE Linux distribution 28 2.3.4 Red Hat distribution 29 2.3.5 Certifications 29 2.3.6 Conclusions 31 Version: 04.09.2003 16:12 Page 1 CONTENTS 2.4 License models 31 2.4.1 GPL 31 2.4.2 Lesser GPL 32 2.4.3 BSD license 33 2.5 Data sources 33 2.5.1 Experience with migration projects 34 2.5.2 Integration of experts 36 3 Technical description of the migration paths ............ 38 3.1 Introduction 38 3.2 File system 39 3.2.1 Overview 39 3.2.2 Windows NT 4 40 3.2.3 Replacing migration 49 3.2.4 Continuing migration 59 3.3 Print service 63 3.3.1 Overview 63 3.3.2 Introduction 64 3.3.3 The starting situation – printing under Windows NT 4 65 3.3.4 Replacing migration 72 3.3.5 Continuing migration 81 3.4 Authentication services 82 3.4.1 Overview 82 3.4.2 The starting situation – Windows NT 4 83 3.4.3 Replacing migration – Linux, Samba and OpenLDAP 91 3.4.4 Continuing migration 94 3.5 Network services 94 3.5.1 Overview 94 3.5.2 The starting situation – network services under Windows NT 95 3.5.3 Replacing migration – network services under Linux 100 3.5.4 Continuing migration – network services under Windows 2000 102 3.6 System audit and management services 103 Page 2 Version: 04.09.2003 16:12 CONTENTS 3.6.1 Overview 103 3.6.2 The starting situation – Systems Management Server under Windows NT 4 104 3.6.3 Replacing migration – Linux 106 3.6.4 Continuing migration – Windows 2000 109 3.7 Directory service 110 3.7.1 Overview 110 3.7.2 Fundamentals 111 3.7.3 Active directory service (ADS) 114 3.7.4 Replacing migration – Samba and OpenLDAP 130 3.7.5 Continuing migration – introduction of ADS 134 3.8 Middleware – COM,.NET, J2EE 141 3.8.1 Component Object Model (COM) 142 3.8.2 ".NET" 143 3.8.3 Java 2 Enterprise Edition (J2EE) 145 3.9 Web services 146 3.9.1 Overview 146 3.9.2 Fundamentals 147 3.9.3 .Net web services 148 3.9.4 J2EE 149 3.10 XML (Extensible Markup Language) 150 3.11 Web servers 151 3.11.1 Overview 151 3.11.2 Introduction 152 3.11.3 Internet Information Server 4.0 152 3.11.4 Replacing migration 155 3.11.5 Continuing migration 161 3.12 SharePoint Portal Server 164 3.12.1 Overview 164 3.12.2 Introduction 164 3.12.3 Dashboard site 164 3.12.4 Document management system (DMS) 166 3.12.5 Search functions 166 3.12.6 Conclusions 166 Stand: 04.09.2003 16:12 Seite 3 CONTENTS 3.13 Databases 167 3.13.1 Overview 167 3.13.2 Introduction 167 3.13.3 MS SQL Server 7.0 168 3.13.4 Replacing migration 173 3.13.5 Continuing migration 179 3.14 Groupware 180 3.14.1 Overview 180 3.14.2 Introduction 181 3.14.3 The starting situation – Microsoft Exchange 5.5 182 3.14.4 Replacing migration 186 3.14.5 Continuing migration 205 3.15 Office / desktop 210 3.15.1 Overview 210 3.15.2 Introduction 210 3.15.3 MS Office: the starting situation 211 3.15.4 Replacing migration 215 3.15.5 Continuing migration 233 3.15.6 Further desktop applications 236 3.15.7 Integration of Windows applications in conjunction with Linux clients 244 3.15.8 Evaluation 256 3.16 Terminal servers and thin clients 257 3.16.1 Overview 257 3.16.2 Introduction 257 3.16.3 Linux Terminal Server Project 261 3.16.4 NX terminal services 263 3.16.5 Windows Terminal Services and Citrix 264 3.17 High availability 267 3.17.1 Aims 267 3.17.2 The "five new" and reality 267 3.17.3 The approach 268 3.17.4 Categories of HA systems 26268 3.17.5 Proprietary HA software 270 Page 4 Version: 04.09.2003 16:12 CONTENTS 3.17.6 Open Source HA software 271 4 Evaluation of economic efficiency ........................... 275 4.1 Introduction 275 4.2 Methodological principles 276 4.2.1 Monetary analysis 277 4.2.2 Benefit analysis 277 4.2.3 IT-WiBe 21 (recommendations on economic efficiency assessments for IT systems) 277 4.2.4 Migration cost matrix 278 4.2.5 TCO 279 4.2.6 Comparability 279 4.2.7 New introduction vs. migration of systems 280 4.2.8 Full cost approach 281 4.3 The monetary (operative) dimension 282 4.3.1 Applications 282 4.3.2 Cost categories 282 4.3.3 Features of applied categories of public agencies 283 4.4 Strategic dimension 285 4.4.1 Macroeconomic discussion 285 4.4.2 Microeconomic discussion 285 4.5 Overall results of the evaluation of economic efficiency 286 4.6 Migration recommendations based on the evaluation of economic efficiency 287 4.6.1 Complete migration 289 4.6.2 Continuing migration 290 4.6.3 Partial migration 290 4.7 Conclusions 293 4.8 Expenditures with different migration scenarios 2292 4.8.1 General assumptions concerning migration expenditures 2292 4.8.2 Costs of migration from Windows NT to Windows 2000 2294 4.8.3 Expenditure on migration from Windows NT to Linux 2297 Stand: 04.09.2003 16:12 Seite 5 CONTENTS 4.8.4 Expenditure on migration from Exchange 5.5 to Exchange 2000 301 4.8.5 Expenditure on migration from Exchange 5.5 to Samsung Contact 302 4.8.6 Recommended assessments concerning products / product groups 303 4.9 Example of evaluation of urgency and quality / strategy 333 4.9.1 Urgency criteria 334 4.9.2 Quality/strategy criteria 334 4.9.3 Benefit analysis 334 5 Migration recommendations...................................... 341 5.1 General statements 341 5.1.1 The decision-making path 341 5.1.2 General recommendations 342 5.2 Completely "replacing migration" 344 5.2.1 Architecture model 345 5.2.2 Medium and large public agencies 348 5.2.3 Specialized public agencies with an IT service function 351 5.2.4 Small public agencies 353 5.3 Completely "continuing migration" 355 5.3.1 Minimizing the degree of integration, protecting degrees of freedom 357 5.3.2 Further migration paths 359 5.4 Partial migration 359 5.4.1 Selective migration 359 5.4.2 Partial migration at the server end 362 5.5 Migration paths 363 5.5.1 One-step migration 363 5.5.2 Gentle migration 365 5.5.3 Critical success factors 367 6 Authors........................................................................ 380 Page 6 Version: 04.09.2003 16:12 CONTENTS 7 Abbreviations ............................................................. 381 8 Glossary...................................................................... 390 9 Tables........................................................................ 3394 10 Illustrations ................................................................. 400 11 Appendix ..................................................................... 404 11.1 Appendix: WiBe (recommendations on economic efficiency assessments for IT systems) 404 11.1.1 Overview of recommended catalogs of criteria 404 11.1.2 General catalog of criteria, IT-WiBe21, for migration scenarios 404 11.1.3 Special catalog of criteria, IT-WiBe21, for migration objects 408 11.1.4 Explanation of additional criteria 412 Stand: 04.09.2003 16:12 Seite 7 Introduction 1 Introduction "A product replaces another one if it offers customers an incentive for a change which outweighs the change costs or which overcomes the resistance to change. A replacement product offers an incentive for change if, compared to its price, it offers customers a higher value than the product that was previously used." M.E.
Recommended publications
  • Email Issues
    EMAIL ISSUES - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - TABLE OF CONTENTS NEW POLICY WITH RESPECT TO EMAIL ADDRESSES A NECESSARY EMAIL SETTING WHY OUR EMAILS POSSIBLY ARRIVED LATE OR NOT AT ALL STOP USING YAHOO, NETZERO, AND JUNO EMAIL PROVIDERS - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - NEW POLICY WITH RESPECT TO EMAIL ADDRESSES: There are two important issues here. FIRST, members must not supply CFIC with their company email addresses. That is, companies that they work for. (If you own the company, that's different.) All email on a company's server can be read by any supervisor. All it takes is one pro vaccine activist to get hold of our mobilization alerts to throw a monkey wrench in all of our efforts. Thus, do not supply me with a company email address. We can help you get an alternative to that if necesary. SECONDLY, CFIC needs members' email addresses to supply important information to mobilize parents to do things that advances our goal to enact our legislative reforms of the exemptions from vaccination. That has always been CFIC's sole agenda. CFIC has been able to keep the membership fee to zero because we don't communicate via snail mail. But people change their addresses frequently and forget to update CFIC. When this happens over the years, that member is essentually blind and deaf to us, and is no longer of any value to the coalition---your fellow parents. Therefore, it warrants me to require that members supply CFIC with their most permanent email account. That means the email address of the company in which you are paying a monthly fee for internet access, be it broadband or dialup service.
    [Show full text]
  • SMTP (Simple Mail Transfer Protocol)
    P1: JsY JWBS001A-60.tex WL041/Bidgoli WL041-Bidgoli.cls May 12, 2005 3:27 Char Count= 0 SMTP (Simple Mail Transfer Protocol) Vladimir V. Riabov, Rivier College Introduction 1 SMTP Security Issues 12 SMTP Fundamentals 1 SMTP Vulnerabilities 12 SMTP Model and Protocol 2 SMTP Server Buffer Overflow Vulnerability 15 User Agent 4 Mail Relaying SMTP Vulnerability 15 Sending e-Mail 4 Mail Relaying SMTP Vulnerability in Microsoft Mail Header Format 4 Windows 2000 15 Receiving e-Mail 4 Encapsulated SMTP Address Vulnerability 15 The SMTP Destination Address 4 Malformed Request Denial of Service 16 Delayed Delivery 4 Extended Verb Request Handling Flaw 16 Aliases 5 Reverse DNS Response Buffer Overflow 16 Mail Transfer Agent 5 Firewall SMTP Filtering Vulnerability 16 SMTP Mail Transaction Flow 5 Spoofing 16 SMTP Commands 6 Bounce Attack 16 Mail Service Types 6 Restricting Access to an Outgoing Mail SMTP Service Extensions 8 Server 17 SMTP Responses 8 Mail Encryption 17 SMTP Server 8 Bastille Hardening System 17 On-Demand Mail Relay 8 POP and IMAP Vulnerabilities 17 Multipurpose Internet Mail Extensions Standards, Organizations, and (MIME) 8 Associations 18 MIME-Version 10 Internet Assigned Numbers Authority 18 Content-Type 10 Internet Engineering Task Force Working Content-Transfer-Encoding 10 Groups 18 Content-Id 11 Internet Mail Consortium 18 Content-Description 11 Mitre Corporation 18 Security Scheme for MIME 11 Conclusion 18 Mail Transmission Types 11 Glossary 18 Mail Access Modes 11 Cross References 19 Mail Access Protocols 11 References 19 POP3 11 Further Reading 22 IMAP4 12 INTRODUCTION and IMAP4), SMTP software, vulnerability and security issues, standards, associations, and organizations.
    [Show full text]
  • Understanding Post Office Protocol (POP3)
    Understanding Post Office Protocol (POP3) Author: Conrad Chung, 2BrightSparks Introduction Most Internet users with email accounts would have used some form of “client” software (Outlook, Thunderbird etc.) to access and manage their email at one point or another. To retrieve emails, these email clients may require the configuration of Post Office Protocol (or POP3) before messages can be downloaded from the server. This article will help readers understand what POP3 is and how it works. What is Post Office Protocol? The Post Office Protocol (POP3) is an Internet standard protocol used by local email software clients to retrieve emails from a remote mail server over a TCP/IP connection. Since the first version was created in 1984, the Post Office Protocol (currently at Version 3) has since became one of the most popular protocols and is used by virtually every email client to date. Its popularity lies in the protocol’s simplicity to configure, operate and maintain. Email servers hosted by Internet service providers also use POP3 to receive and hold emails intended for their subscribers. Periodically, these subscribers will use email client software to check their mailbox on the remote server and download any emails addressed to them. Once the email client has downloaded the emails, they are usually deleted from the server, although some email clients allow users to specify that mails be copied or saved on the server for a period of time. Email clients generally use the well-known TCP port 110 to connect to a POP3 server. If encrypted communication is supported on the POP3 server, users can optionally choose to connect either by using the STLS command after the protocol initiation stage or by using POP3S, which can use the Transport Layer Security (TLS) or Secure Sockets Layer (SSL) on TCP port 995 to connect to the server.
    [Show full text]
  • What Is the Difference Between Email Protocols
    What Is The Difference Between Email Protocols Interactions between email servers and users are governed by email protocols. The most common incoming email protocols are POP, and IMAP. Most email applications/programs support one or more of these. This article is to help users understand and choose which protocol should be selected for each user’s situation. Outgoing Incoming POP (Post Office Protocol): IMAP (Internet Message Access Protocol): SSL (Secure Socket Layer): Differences Between POP and IMAP Backups / Email Loss Outgoing SMTP (Simple Mail Transfer Protocol) is the protocol used in sending (outgoing) emails. SMTP is the protocol always used for sending (outgoing) emails. Incoming POP (Post Office Protocol) and IMAP (Internet Message Access Protocol) are two different protocols that do the same thing differently. They are both used in receiving emails from a mail server and can both are available for standard and secure (?) connections. POP (Post Office Protocol): POP is an email accessing protocol used to download emails from a mail server. Applications like Outlook and Outlook Express using POP will download all emails from the server to the user’s computer, and then delete them on the server. Generally POP server uses port 110 to listen to the POP requests or securely using SSL (Secure Socket Layer) (?) POP uses port number 995. The POP protocol assumes that there is only one client/computer that will be connecting to the mailbox. Even though there is an option in most mail applications to leave the copies of the emails in the server, it is not generally used due to various reasons.
    [Show full text]
  • Ii Jacobs Rp316
    !II JACOBS RP316 RACIBORZ FLOOD RESERVOIR Public Disclosure Authorized Resettlement Action Plan Public Disclosure Authorized DRAFT Public Disclosure Authorized Public Disclosure Authorized March 2005 JACOBS Document control sheet Form IP180/B Client: PCU Project: Odra Flood Mitigation Job No: J24201A Title: Draft Resettlement Action Plan Prepared by Reviewed by Approved by ORIGINAL0 NAME NAME NAME P Devitt L J S Attewill see list of authors H Fiedler-Krukowicz J Loch | DATfE SIGNATURE SIGNATURE SIGNATURE REVISION NAME NAME NAME DATE SIGNATURE SIGNATURE SIGNATURE REVISION NAME NAME NAME DATE SIGNATURE SIGNATURE SIGNATURE REVISION NAME NAME NAME DATE SIGNATURE SIGNATURE SIGNATURE This report, and infonnabon or advice which it contains, is provided by JacobsGIBB Ltd solely for internal use and reliance by its Cient in performance of JacobsGIBB Ltd's duties and liabilities under its contract with the Client Any advice, opinions, or recomrnendatons within this report should be read and retied upon only in the context of the report as a whole. The advice and opinions in this report are based upon the information nmadeavailable to JacobsGIBB Ltd at the date of this report and on current UK standards, codes, technology and constnuction practices as at the date of this report. Folloving final delvery of this report to the Client, JacobsGIBB Ltd will have no further obligations or duty to advise She Client on any mafters, including developrrient affecting the information or advice provided in ths report This report has been prepared by JacobsGIBB Ltd in their professional capaaty as Consuhing Engineers The contents of the report do not, in any way, purport to include any mranner of legal advice or opinion This report is prepared in accordance wrth the terms and conditions of JacobsGIBB Ltd's contract with the Client.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Migrationsleitfaden
    Migrationsleitfaden Leitfaden für die Migration der Basissoftwarekomponenten auf Server- und Arbeitsplatz-Systemen Version 1.0 – Juli 2003 Schriftenreihe der KBSt ISSN 0179-7263 Band 57 Juli 2003 Schriftenreihe der KBSt Band 57 ISSN 0179 - 7263 Nachdruck, auch auszugsweise, ist genehmigungspflichtig Dieser Band wurde erstellt von der KBSt im Bundesministeri- um des Innern in Zusammenarbeit mit dem Bundesamt für Sicherheit in der Informationstechnik (BSI), dem Bundesver- waltungsamt (BVA) und der C_sar Consulting, solutions and results AG Redaktion: C_sar AG, Berlin Interessenten erhalten die derzeit lieferbaren Veröffentlichungen der KBSt und weiterführende Informationen zu den Dokumenten bei Bundesministerium des Innern Referat IT 2 (KBSt) 11014 Berlin Tel.: +49 (0) 1888 681 - 2312 Fax.: +49 (0) 1888 681 - 523121 Homepage der KBSt: http://www.kbst.bund.de 1Frau Monika Pfeiffer (mailto: [email protected]) Migrationsleitfaden Leitfaden für die Migration der Basissoftwarekomponenten auf Server- und Arbeitsplatz-Systemen Version 1.0 Juli 2003 Herausgegeben vom Bundesministerium des Innern INHALTSVERZEICHNIS 1 Einleitung ........................................................................ 8 1.1 Über das Vorhaben 8 1.2 Über diesen Leitfaden 9 1.3 Hinweise zur Benutzung des Leitfadens 10 1.4 Hinweise an die Entscheider 12 1.4.1 Grundsätzliche Empfehlungen 12 1.4.2 Fortführende und ablösende Migration 13 1.4.3 Migrationswege 14 1.4.4 Vergleichbarkeit von Alternativen 14 1.4.5 Künftige Schwerpunte 15 1.4.6 Wirtschaftlichkeit 16
    [Show full text]
  • Toward an Automated Vulnerability Comparison of Open Source IMAP Servers Chaos Golubitsky – Carnegie Mellon University
    Toward an Automated Vulnerability Comparison of Open Source IMAP Servers Chaos Golubitsky – Carnegie Mellon University ABSTRACT The attack surface concept provides a means of discussing the susceptibility of software to as-yet-unknown attacks. A system’s attack surface encompasses the methods the system makes available to an attacker, and the system resources which can be used to further an attack. A measurement of the size of the attack surface could be used to compare the security of multiple systems which perform the same function. The Internet Message Access Protocol (IMAP) has been in existence for over a decade. Relative to HTTP or SMTP, IMAP is a niche protocol, but IMAP servers are widely deployed nonetheless. There are three popular open source UNIX IMAP servers – UW-IMAP, Cyrus, and Courier-IMAP – and there has not been a formal security comparison between them. In this paper, I use attack surfaces to compare the relative security risks posed by these three products. I undertake this evaluation in service of two complementary goals: to provide an honest examination of the security postures and risks of the three servers, and to advance the study of attack surfaces by performing an automated attack surface measurement using a methodology based on counting entry and exit points in the code. Introduction Contributions and Roadmap System administrators frequently confront the The paper makes two major contributions. First, problem of selecting a software package to perform a I undertake an in-depth discussion of the relative secu- desired function. Many considerations affect this deci- rity postures of the three major open source IMAP sion, including functionality, ease of installation, soft- servers in use today.
    [Show full text]
  • Downloadable Email Program for My Pc 32 Best Free Email Clients
    downloadable email program for my pc 32 Best Free Email Clients. Here are 32 best free email client software . These let you manage and access all of your email accounts in one single place easily. All these email client software are completely free and can be downloaded to Windows PC. These free software offer various features, like: can be used with IMAP, SMTP, POP3 and Gmail, keeps your emails safe and secure, lets you open various emails simultaneously, provide protection from spam, lets you view your emails offline, manage and access all of your email accounts in one single place, supports PH, LDAP, IMAP4, POP3 and SMPT mail protocols etc. So, go through this list of free email client software and see which ones you like the most. Thunderbird. Thunderbird is a free and handy email client software for your computer. It can be used with IMAP, SMTP, POP3 and Gmail. It will also work with email accounts provided by MS Exchange Server. The user interface of Thunderbird is tabbed. It lets you open various emails simultaneously. Thunderbird keeps your emails safe and secure. It also has special filters for filtering the mail. Windows Live Mail. Windows Live Mail is a free email client for your computer. It works with various email accounts. It lets you access Yahoo, Gmail, Hotmail and emails from different servers which supports POP3 and SMTP. Its security features are excellent it will also provide protection from spam. You can also view your emails offline in this freeware. Zimbra Desktop. Zimbra Desktop is a free email client.
    [Show full text]
  • Validated Products List, 1993 No. 2
    mmmmm NJST PUBLICATIONS NISTIR 5167 (Supersedes NISTIR 5103) Validated Products List 1993 No. 2 Programming Languages Database Language SQL Graphics GOSIP POSIX Judy B. Kailey Computer Security Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 April 1993 (Supersedes January 1993 issue) —QC 100 NIST . U56 #5167 1993 NISTIR 5167 (Supersedes NISTIR 5103) Validated Products List 1993 No. 2 Programming Languages Database Language SQL Graphics GOSIP POSIX Judy B. Kailey Computer Security Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 April 1993 (Supersedes January 1993 issue) U.S. DEPARTMENT OF COMMERCE Ronald H. Brown, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Raymond Kammer, Acting Director FOREWORD The Validated Products List is a collection of registers describing implementations of Federal Information Processing Standards (FIPS) that have been validated for conformance to FTPS. The Validated Products List also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The Validated Products List is updated quarterly. iii iv TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 Purpose 1 1.2 Document Organization 2 1.2.1 Programming Languages 2 1.2.2 Database
    [Show full text]
  • [MS-STANOPOP3]: Outlook Post Office Protocol Version 3 (POP3) Standards Compliance
    [MS-STANOPOP3]: Outlook Post Office Protocol Version 3 (POP3) Standards Compliance Intellectual Property Rights Notice for Open Specifications Documentation . Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages, standards as well as overviews of the interaction among each of these technologies. Copyrights. This documentation is covered by Microsoft copyrights. Regardless of any other terms that are contained in the terms of use for the Microsoft website that hosts this documentation, you may make copies of it in order to develop implementations of the technologies described in the Open Specifications and may distribute portions of it in your implementations using these technologies or your documentation as necessary to properly document the implementation. You may also distribute in your implementation, with or without modification, any schema, IDL’s, or code samples that are included in the documentation. This permission also applies to any documents that are referenced in the Open Specifications. No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. Patents. Microsoft has patents that may cover your implementations of the technologies described in the Open Specifications. Neither this notice nor Microsoft's delivery of the documentation grants any licenses under those or any other Microsoft patents. However, a given Open Specification may be covered by Microsoft's Open Specification Promise (available here: http://www.microsoft.com/interop/osp) or the Community Promise (available here: http://www.microsoft.com/interop/cp/default.mspx). If you would prefer a written license, or if the technologies described in the Open Specifications are not covered by the Open Specifications Promise or Community Promise, as applicable, patent licenses are available by contacting [email protected].
    [Show full text]
  • Programming Languages, Database Language SQL, Graphics, GOSIP
    b fl ^ b 2 5 I AH1Q3 NISTIR 4951 (Supersedes NISTIR 4871) VALIDATED PRODUCTS LIST 1992 No. 4 PROGRAMMING LANGUAGES DATABASE LANGUAGE SQL GRAPHICS Judy B. Kailey GOSIP Editor POSIX COMPUTER SECURITY U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 100 . U56 4951 1992 NIST (Supersedes NISTIR 4871) VALIDATED PRODUCTS LIST 1992 No. 4 PROGRAMMING LANGUAGES DATABASE LANGUAGE SQL GRAPHICS Judy B. Kailey GOSIP Editor POSIX COMPUTER SECURITY U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 October 1992 (Supersedes July 1992 issue) U.S. DEPARTMENT OF COMMERCE Barbara Hackman Franklin, Secretary TECHNOLOGY ADMINISTRATION Robert M. White, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director - ;,’; '^'i -; _ ^ '’>.£. ; '':k ' ' • ; <tr-f'' "i>: •v'k' I m''M - i*i^ a,)»# ' :,• 4 ie®®;'’’,' ;SJ' v: . I 'i^’i i 'OS -.! FOREWORD The Validated Products List is a collection of registers describing implementations of Federal Information Processing Standards (FTPS) that have been validated for conformance to FTPS. The Validated Products List also contains information about the organizations, test methods and procedures that support the validation programs for the FTPS identified in this document. The Validated Products List is updated quarterly. iii ' ;r,<R^v a;-' i-'r^ . /' ^'^uffoo'*^ ''vCJIt<*bjteV sdT : Jr /' i^iL'.JO 'j,-/5l ':. ;urj ->i: • ' *?> ^r:nT^^'Ad JlSid Uawfoof^ fa«Di)itbiI»V ,, ‘ isbt^u ri il .r^^iytsrH n 'V TABLE OF CONTENTS 1.
    [Show full text]