Thesis Final Submitted

Total Page:16

File Type:pdf, Size:1020Kb

Thesis Final Submitted TRACING FORENSIC ARTEFACTS FROM USB-BOUND COMPUTING ENVIRONMENTS ON WINDOWS HOSTS. JAN COLLIE A submission presented in partial fulfilment of the requirements of the University of South Wales/Prifysgol De Cymru for the degree of Doctor of Philosophy NOVEMBER 2015 1 ABSTRACT This thesis proposes that it is possible to extract and analyse artefacts of potential evidential interest from host systems where miniature computing environments have been run from USB connectable devices. The research focuses on Windows systems and includes a comparison of the results obtained following traditional ‘static’ forensic data collection after conducting a range of user initiated activities. Four software products were evaluated during this research cycle, all of which could be used as anti- forensic tools - associated advertising claims that use of the software will either leave ‘no trace’ of user activity or no ‘personal data’ on a host system. It is shown that the USB-bound environments reviewed create numerous artefacts in both live and unallocated space on Windows hosts which will remain available to the digital forensic examiner after system halt. These include multiple references to identified software and related processes as well as user activity in Registry keys and elsewhere. Artefacts related to program use and data movements will also be retained in live memory (RAM) and it is recommended that this is captured and analysed. Where this is not possible, relevant information originally held in RAM may be written to disk on system shut down and hibernation, opening further opportunities to the analyst. This study builds on existing knowledge within digital forensic science and expands it in three ways. Firstly, it presents and explains a previously overlooked artefact which aids investigations involving the unauthorized use of both connected and connectable devices on Windows hosts. Secondly, it explores how portable virtualisation software interacts with host systems - a relatively unchartered field of enquiry. Finally, it informs research into antiforensics by showing that, despite its ability to cover and wipe its tracks, portable virtualisation software does leave traces of user-related activity on host systems which can greatly assist a digital forensic enquiry. By means of the methodology set out in this thesis, it is possible to uncover these traces in RAM dumps and by conducting a targeted analysis of static hard drives. 2 Table of Contents CHAPTER 1. ............................................................................................................................. 7 INTRODUCTION ............................................................................................................................... 7 1.1 Overview .................................................................................................................................................. 7 1.2 The problem area .................................................................................................................................. 8 1.3. Scope of Study .................................................................................................................................... 10 1.4 Aims, Objectives and Hypothesis ................................................................................................ 13 1.5 Methodology overview .................................................................................................................... 14 1.6 OriGinal contribution to knowledge .......................................................................................... 15 1.7 Structure of the Thesis ..................................................................................................................... 15 1.8 Chapter Summary .............................................................................................................................. 17 CHAPTER 2 ............................................................................................................................ 19 BACKGROUND ............................................................................................................................... 19 Table 1: Table of topic areas anD relevancies to the research proGram ................... 19 2.1 Virtualisation and Virtual Machines (VMs) ............................................................................ 20 FiGure 1: Virtualisation conceptualizeD ............................................................................... 20 2.2 Virtualisation TechnoloGies for USBs ........................................................................................ 22 2.3 Windows Memory Handling ......................................................................................................... 26 2.4 Windows artefacts ............................................................................................................................. 28 2.5 Current Best Practice Guides for forensic practitioners ................................................... 29 2.6. Chapter Summary ............................................................................................................................. 32 CHAPTER 3. ........................................................................................................................... 33 EXPERIMENTS ............................................................................................................................... 33 3.1 Restatement of Hypothesis and aims ........................................................................................ 33 3.2 Research methodology .................................................................................................................... 33 FiGure 2: Research Methodology Graphic ............................................................................ 35 FiGure 3: Test Disk preparation .............................................................................................. 37 FiGure 4: Test operating systems ........................................................................................... 38 FiGure 5: Test vPC applications and Windows compatibility ....................................... 39 FiGure 6: Taxonomy of artefacts for analysis ..................................................................... 43 FiGure 7: IDentification system for test vPCs & Windows OSs During experimentation .......................................................................................................................... 45 3.3 Experimentation ................................................................................................................................. 45 FiGure 8: Experiment A1 ........................................................................................................... 46 FiGure 9: Experiment A2 ........................................................................................................... 46 FiGure 10: Experiment A3 ......................................................................................................... 47 3.4 Results overview ................................................................................................................................ 47 3.5 Chapter summary .............................................................................................................................. 49 CHAPTER 4. ........................................................................................................................... 51 THE ICONCACHE DATABASE .................................................................................................... 51 4.1 Background .......................................................................................................................................... 51 3 4.2 Synopsis of findings .......................................................................................................................... 53 4.3 Research Method ................................................................................................................................ 55 Table 2. Forensic tools useD DurinG experimentation ................................................... 56 4.4 Experimentation ............................................................................................................................... 56 Table 3. Details of experiments DeviseD ............................................................................. 57 4.5 Icon caching mechanisms in Windows ..................................................................................... 59 FiGure 11: Icons storeD in Shell32.Dll .................................................................................. 60 FiGure 12: Shell32.Dll and storeD icon properties ............................................................ 60 Table 4 : Numbers of icons in the IconCache.db on first creation by version of WinDows OS ................................................................................................................................... 61 Table 5: Basic file siGnature for IconCache.Db in WinDows XP, Vista anD 7 ............ 62 Table 6: Sample Differences in IconCache.Db file siGnature in WinDows XP, Vista anD 7 ................................................................................................................................................. 62 4.6 Experimental results .......................................................................................................................
Recommended publications
  • It's That Time
    December 2014 / January 2015 | Vol. 8 No. 1 VirtualizationReview.com 2015 READERS CHOICE AWARDS WINNER IT’S THAT TIME OFYEAR! Eggnog, presents and the products you like best. PLUS > VIRTUAL PREDICTIONS > DELL’S VDI STRATEGY > UNTANGLING VMWARE DRS VISIT VIRTUALIZATIONREVIEW.COM contents The objective is helping organizations accomplish their 6 goals; not to push any specifi c type of technology. By Dan Kusnetzky 2015Readers Choice Awards “Chromebook desktop ÌÌÌÌ Winner ÌÌÌÌ access looks especially promising, especially in the education market.” Garret Grajek, dinCloud 18 6 December 2014 / January 2015 | VIRTUALIZATION REVIEW | VOL. 7, NO. 2 FEATURES 11 Best Cloud Storage Product 15 Best Network 4 The 2015 Reader’s Choice 12 Best Cloud Security Product Virtualization Product Awards and Buyer’s Guide 12 Best Cloud Software Product 16 Best Virtualization Security Product You, the readers, have spoken. 13 Best Business Continuity Product Here are the virtualization and Best Converged 14 Best Virtualization 17 cloud computing products that Automation Product Infrastructure Product rock your world. Best Virtualization Training 15 Best Storage 17 6 Best Application Virtualization Product Virtualization Product 6 Best Server Virtualization Product Best Desktop Virtualization/ 7 18 2015 Virtualization Predictions COLUMNS Virtual Desktop Infrastructure Product What can you expect to happen 2 Editor’s Note: KEITH WARD in the virtualization and cloud 3 Expectations for 2015 8 Best Mobile Virtualization/ BYOD Product industries in the coming year?
    [Show full text]
  • Avaya VPN Gateway Release Notes
    Avaya VPN Gateway Release Notes Release 9.1.3.0 NN46120-400 Issue 24.01 April 2014 © 2014 Avaya Inc. license is granted will be one (1), unless a different number of licenses or units of capacity is specified in the documentation or other All Rights Reserved. materials available to you. “Designated Processor” means a single Notice stand-alone computing device. “Server” means a Designated Processor that hosts a software application to be accessed by While reasonable efforts have been made to ensure that the multiple users. information in this document is complete and accurate at the time of printing, Avaya assumes no liability for any errors. Avaya reserves Licence types the right to make changes and corrections to the information in this Designated System(s) License (DS). End User may install and use document without the obligation to notify any person or organization each copy or an Instance of the Software only on a number of of such changes. Designated Processors up to the number indicated in the order. Documentation disclaimer Avaya may require the Designated Processor(s) to be identified in the order by type, serial number, feature key, Instance, location or “Documentation” means information published by Avaya in varying other specific designation, or to be provided by End User to Avaya mediums which may include product information, operating through electronic means established by Avaya specifically for this instructions and performance specifications that Avaya may generally purpose. make available to users of its products and Hosted Services. Documentation does not include marketing materials. Avaya shall not Concurrent User License (CU).
    [Show full text]
  • Bakalářská Práce
    Jiho česká univerzita v Českých Bud ějovicích Pedagogická fakulta Katedra fyziky Bakalá řská práce České Bud ějovice 2009 Kamil Vojík Jiho česká univerzita v Českých Bud ějovicích Pedagogická fakulta Katedra fyziky Přenosné aplikace a Virtualizace aplikací pro OS Windows Bakalá řská práce Vedoucí práce: Ing. Michal Šerý Autor: Kamil Vojík, DiS. Anotace Obsahem práce je popsání oblasti p řenosných aplikací. V teoretické části je popsána definice p řenosných aplikací a výhody jejich použití. Jsou zde dále popsány zp ůsoby jak tyto aplikace získat. Jedná se o oblast virtualizace aplikací, platformy p řenosných aplikací, Live OS a Cloud computing. Praktickou část tvo ří popis a ukázka postup ů, jak přenosné aplikace pomocí jednotlivých technologií vytvo řit. Jsou popsány vlastnosti výsledných řešení na základ ě post řeh ů, které jsem p ři jejich realizaci získal. Záv ěr práce tvo ří porovnání a doporu čení technologií na základ ě získaných poznatk ů. Neexistuje univerzální řešení a je nutné se rozhodnout na základ ě požadavk ů každého uživatele. Při porovnání podle kritéria cena/výkon nejlépe dopadla platforma Ceedo, která používá virtualizaci aplikací. Abstract The content of this theses „Portable applications and Application virtualization for Windows OS“ is to describe the area of Portable applications. The theoretical part describes definition of Portable applications and benefits of theirs use. There are also described ways how to get these applications. This is area of Application virtualization, Portable applications platform, Live OS and Cloud computing. The practical part consists of descriptions and demonstrations of procedures how to create Portable applications using various technologies. There are described properties of the resultant solutions on the basis of observations that I gained during their implementation.
    [Show full text]
  • Seven Deadliest USB Attacks.Pdf
    Syngress is an imprint of Elsevier 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA The Boulevard, Langford Lane, Kidlington, Oxford, OX5 1GB, UK Seven Deadliest USB Attacks © 2010, Elsevier, Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility. To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.
    [Show full text]
  • Portable Desktop Applications Based on P2P Transportation and Virtualization
    Portable Desktop Applications Based on P2P Transportation and Virtualization Youhui Zhang, Xiaoling Wang, and Liang Hong – Tsinghua University, Beijing, China ABSTRACT Play-on-demand is usually regarded as a feasible access mode for web content (including streaming video, web pages and so on), web services and some Software-As-A-Service (SaaS) applications, but not for common desktop applications. This paper presents such a solution for Windows desktop-applications based on lightweight virtualization and network transportation technologies which allows a user to run her personalized software on any compatible computer across the Internet even though they do not exist on local disks of the host. In our approach, the user’s data and their configurations are stored on a portable USB device. At run time, the desktop applications are downloaded from the Internet and run in a lightweight virtualization environment in which some resource-accessing APIs, such as registry, files/ directories, environment variables, and the like, are intercepted and redirected to the portable device or network as needed. Because applications are ‘‘played’’ without installation, like streaming media, they can be called ‘‘streaming software.’’ Moreover, to protect software vendors’ rights, access control technologies are used to block any illegal access. In the current imple- mentation, P2P transportation is used as the transport method. However, our design actually does not rely on P2P, and another data delivery mechanism, like a dedicated file server, could be employed instead to make the system more predictable. This paper describes the design and technical details for this system, presents a demo application and evaluates it performance.
    [Show full text]
  • DS Lecture 3
    Distributed System: Lecture 3 Box Leangsuksun SWECO Endowed Professor, Computer Science Louisiana Tech University [email protected] CTO, PB Tech International Inc. [email protected] Slides for Chapter 7: Operating System support From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Outline • Background • OS support 3 Backgound • With user/customer requirements • system modeling concepts – physical – Architecture – Fundamental (interaction/performance, failure and security) • what if analysis & Design 4/1/14 Towards survivable architecture 4 Clients-servers architecture: Processes & comm Client invocation invocation Server result result Server Client Key: Process: Computer: Instructor’s Guide for Coulouris, Dollimore, Kindberg and Blair, Distributed Systems: Concepts and Design Edn. 5 © Pearson Education 2012 Peer-to-peer architecture Instructor’s Guide for Coulouris, Dollimore, Kindberg and Blair, Distributed Systems: Concepts and Design Edn. 5 © Pearson Education 2012 Sockets and ports interaction model agreed port socket any port socket message client server other ports Internet address = 138.37.94.248 Internet address = 138.37.88.249 Instructor’s Guide for Coulouris, Dollimore, Kindberg and Blair, Distributed Systems: Concepts and Design Edn. 5 © Pearson Education 2012 Figure 7.1 System layers Applications, services Middleware OS: kernel, OS1 OS2 libraries & Processes, threads, Processes, threads, servers communication, ... communication, ... Platform Computer & Computer
    [Show full text]
  • Virtualisatie Van Servers, Werkplekken En Applicaties Een Momentopname
    Virtualisatie van servers, werkplekken en applicaties Een momentopname van de markt ©2010 Marcel Beelen www.eversa.nl Versie 1.0 – november 2010 Dit e-book is een bijlage bij het studieboek “Virtualisatie van servers, werkplekken en applicaties - Een introductie in virtualisatieconcepten” (ISBN 978 90 5752 179 9). Het bevat primair een marktoverzicht van bedrijven die zich bezig houden met server-, werkplek- en applicatievirtualisatie. Voor uitleg over terminologie en concepten in dit e-book kun je het studieboek raadplegen. Je bent vrij om dit boek te gebruiken bij je opleiding of om het te gebruiken voor je dagelijkse werk als beheerder of consultant. Het is echter niet toegestaan dit e-book digitaal of op papier te verspreiden op dvd´s of websites. We pretenderen niet dat het overzicht compleet en correct is, want de markt is voortdurend in beweging. Bezoek de website van de fabrikanten voor meer informatie. Wijzigingen of aanvullingen doorgeven? Mail naar: [email protected] ©2010 Marcel Beelen www.eversa.nl P a g i n a | 2 Inhoud Appliances voor datacenter en netwerk optimalisatie ........................................................................... 4 Producten voor servervirtualisatie .......................................................................................................... 7 Virtualisatie van het besturingssysteem ............................................................................................... 10 Virtuele appliances voor datacenter en netwerk optimalisatie ...........................................................
    [Show full text]
  • DS Lecture 3 a Virtualization
    Distributed System: Lecture 4 Virtualizations Box Leangsuksun SWECO Endowed Professor, Computer Science Louisiana Tech University [email protected] CTO, PB Tech International Inc. [email protected] Introduction to Virtualization • System virtualization studied since the 70's (Goldberg, Popek) • Fundamental – Run multiple virtual machines (OSes) simultaneously – Isolating between virtual machines. – Controlling Resources sharing between VMs – Increase resources utilization – One of the hottest technologies since 2006 Virtualization: Key concepts • Virtual Machine (VM), guest OS: complete operating system running in a virtual environment • Host OS: operating system running on top the hardware, interface between the user and the VMM and VMs • Virtual Machine Monitor (VMM):, Hypervisor: manage VMs (scheduling, hardware access) Virtualization: Usage Ø Server consolidation (cloud) Ø Software testing Ø Security, Isolation (cloud) Ø Lower cost of ownership of server. (cloud) Ø Increase manageability (cloud) Ø Enhance server reliability Major Fields of Virtualization • Storage Virtualization • Network Virtualization • Server Virtualization Architecture & Interfaces • Architecture: formal specification of a system’s interface and the logical behavior of its visible resources. API Applications Libraries System Calls ABI Operating System ISA System ISA User ISA Hardware n API – application binary interface n ABI – application binary interface n ISA – instruction set architecture Credit: CS5204 – Operating Systems from vtech u Sample of API vs ABI 4/22/14
    [Show full text]
  • Virtualizationreview.Com the 2013 Virtualization Review Reader’S Choice Awards & Ultimate Buyer’S Guide
    December 2012/January 2013 | Vol. 6 No. 1 VirtualizationReview.com The 2013 Virtualization Review Reader’s Choice Awards & Ultimate Buyer’s Guide A guide to the best READERSREADERS companies and products in the virtualization CHOICECHOICE market. PLUS > What’s New in VMware vSphere and vCenter 5.1 > 5 Tips to Mastering Virtualization Backup > SimpliVity CEO Doron Kempel VISIT VIRTUALIZATIONREVIEW.COM contents We spared no effort in our pursuit of the maximum number of READERSREADERS products and companies CHOICECHOICE that are germane to the virtualization universe. 4 DECEMBER 2012/JANUARY 2013 | VIRTUALIZATION REVIEW | VOL. 6, NO. 1 COLUMNS FEATURES 16 Cloud Infrastructure & Platform Virtualization Review 2 Hoard: BRUCE HOARD 4 The 2013 19 Cloud Storage Following a Process that Reader’s Choice Awards & Keeps on Working Ultimate Buyer’s Guide 19 Cloud Security A guide to the best companies and 20 Cloud Software 30 Virtual Insider: ELIAS KHNASER products in the virtualization market. What’s New in VMware vSphere 22 Business Continuity 6 Application Virtualization and vCenter 5.1 23 Virtualization Automation 6 Server Virtualization 26 Storage Virtualization How-To Guy: DAVID DAVIS 32 8 Desktop Virtualization & VDI 5 Tips for Mastering 27 Network Virtualization Virtualization Backup 10 Mobile Virtualization & Bring Your Own Device 27 Virtualization Security 10 Thin-Client & 28 Virtualization Training Zero-Client Computing 12 Virtualization Management & Optimization ID STATEMENT Virtualization Review Magazine (ISSN 1941-2843) is published fi ve times a year (April, July, August/September, October, and December/January) by 1105 Media, Inc., 9201 Oakdale Avenue, Ste. 101, Chatsworth, CA 91311. Complimentary subscriptions are sent to qualifying subscribers.
    [Show full text]
  • Veeam Software 6 PHOTO PROVIDED by VEEAM SOFTWARE
    December 2011/January 2012 | Vol. 5 | No. 1 VirtualizationReview.com CHOICE S AW ER A D R A D E S R WINNER A N E D ID U U LT G IM RS ATE BUYE PLUS ATLANTIS COMPUTING ILIO REVIEW INTERVIEW WITH VEEAM CHIEF RATMIR TIMASHEV THE MERRY PRANKSTER OF STORAGE CONTROL COSTS BY CONTROLLING YOUR INFRASTRUCTURE. :PVSFYQBOEJOHEBUBDFOUFSJTBGPSDF HP ProLiant DL360 G7 Rack-mount Server Hard drives sold separately CDW 2320503 to be reckoned with. We get it and t0QUJNJ[FEGPSTQBDFDPOTUSBJOFEJOTUBMMBUJPOT have what you need to consolidate t2VBE$PSF*OUFM® Xeon® processor E5606 ()[ systems and make room for growth. t.FNPSZ(#TUE (#NBY *OEVTUSZMFBEJOHUFDIOPMPHZ%FEJDBUFE t)BSEESJWFOPOFTIJQTUE5#NBY account managers. A highly trained 7JSUVBMJ[BUJPO"TTFTTNFOU5FBN4P Microsoft Windows Server 2008 R2 Standard you can reverse server sprawl, save $%8 money and reclaim your data center. t*ODMVEFT)ZQFS7GPSBTJNQMJmFEWJSUVBMJ[BUJPO solution All you have to do is call or click. t#VJMUJO FOIBODFE8FCBOEWJSUVBMJ[BUJPO capabilities 800.399.4CDW | CDW.com/virtualization t%FTJHOFEUPJODSFBTFUIFSFMJBCJMJUZBOEnFYJCJMJUZ of server infrastructure VMware® vSphere™ 5 Enterprise Plus Upgrade from vSphere Enterprise1 CDW 2471737 t1PMJDZCBTFE BVUPNBUFEEBUBDFOUFS New version t'VMMSBOHFPG7.XBSFW4QIFSFGFBUVSFT t5SBOTGPSNEBUBDFOUFSTJOUPTJNQMJmFEDMPVE infrastructures t3VOBQQMJDBUJPOTBMPOHTJEF*5TFSWJDFT 1Savings up to 25% off MSRP with purchase of CDW 2471737; valid through 12/15/11. Call your CDW account manager for details. Offers subject to CDW’s standard terms and conditions of sale, available at CDW.com. ©2011 CDW LLC. CDW® $%8t(®BOE1&01-&8)0(&5*5™ are trademarks of CDW, LLC. VISIT VIRTUALIZATIONREVIEW.COM contents The results of the voting were 12 hardly surprising, as VMware Inc. once again ran roughshod over all challengers by tallying the most votes in CHOICE nine of the 14 categories.
    [Show full text]
  • Applications of Virtualization in Systems Design JYVÄSKYLÄ STUDIES in COMPUTING 153
    JYVÄSKYLÄ STUDIES IN COMPUTING 153 Nezer Jacob Zaidenberg Applications of Virtualization in Systems Design JYVÄSKYLÄ STUDIES IN COMPUTING 153 Nezer Jacob Zaidenberg Applications of Virtualization in Systems Design Esitetään Jyväskylän yliopiston informaatioteknologian tiedekunnan suostumuksella julkisesti tarkastettavaksi yliopiston Ylistönrinteellä, salissa YlistöKem4 kesäkuun 15. päivänä 2012 kello 12. Academic dissertation to be publicly discussed, by permission of the Faculty of Information Technology of the University of Jyväskylä, in Ylistönrinne, hall YlistöKem4, on June 15, 2012 at 12 o'clock noon. UNIVERSITY OF JYVÄSKYLÄ JYVÄSKYLÄ 2012 Applications of Virtualization in Systems Design JYVÄSKYLÄ STUDIES IN COMPUTING 153 Nezer Jacob Zaidenberg Applications of Virtualization in Systems Design UNIVERSITY OF JYVÄSKYLÄ JYVÄSKYLÄ 2012 Editor Timo Männikkö Department of Mathematical Information Technology, University of Jyväskylä Pekka Olsbo, Ville Korkiakangas Publishing Unit, University Library of Jyväskylä URN:ISBN:978-951-39-4763-7 ISBN 978-951-39-4763-7 (PDF) ISBN 978-951-39-4762-0 (nid.) ISSN 1456-5390 Copyright © 2012 , by University of Jyväskylä Jyväskylä University Printing House, Jyväskylä 2012 ABSTRACT Zaidenberg, Nezer Jacob Applications of Virtualization in Systems Design Jyväskylä: University of Jyväskylä, 2012, 288 p. (Jyväskylä Studies in Computing ISSN 1456-5390; 153) ISBN 978-951-39-4762-0 (nid.) ISBN 978-951-39-4763-7 (PDF) Finnish summary Diss. In recent years, the field of virtualization has generated a lot of attention and has demonstrated massive growth in usage and applications. Recent modification to the underlying hardware such as Intel VT-x instruc- tions and AMD-v instructions have made system virtualization much more effi- cient. Furthermore, recent advances in compiler technology have led the process virtual machine to dominate not only modern programming languages such as C# and Java but also in “ancient" programming languages such as C, C++ and Objective-C.
    [Show full text]
  • Release Notes Avaya VPN Gateway
    Release Notes Avaya VPN Gateway 9.0 NN46120-400, 10.03 September 2012 © 2012 Avaya Inc. protected by copyright and other intellectual property laws including the sui generis rights relating to the protection of databases. You may not All Rights Reserved. modify, copy, reproduce, republish, upload, post, transmit or distribute in any way any content, in whole or in part, including any code and Notice software. Unauthorized reproduction, transmission, dissemination, storage, and or use without the express written consent of Avaya can While reasonable efforts have been made to ensure that the be a criminal, as well as a civil, offense under the applicable law. information in this document is complete and accurate at the time of printing, Avaya assumes no liability for any errors. Avaya reserves the Third-party components right to make changes and corrections to the information in this document without the obligation to notify any person or organization of Certain software programs or portions thereof included in the Product such changes. may contain software distributed under third party agreements (“Third Party Components”), which may contain terms that expand or limit Documentation disclaimer rights to use certain portions of the Product (“Third Party Terms”). Information regarding distributed Linux OS source code (for those Avaya shall not be responsible for any modifications, additions, or Products that have distributed the Linux OS source code), and deletions to the original published version of this documentation unless identifying the copyright holders of the Third Party Components and the such modifications, additions, or deletions were performed by Avaya. Third Party Terms that apply to them is available on the Avaya Support End User agree to indemnify and hold harmless Avaya, Avaya's agents, Web site: http://www.avaya.com/support/Copyright/.
    [Show full text]