Metadefender Core V4.18.0

Total Page:16

File Type:pdf, Size:1020Kb

Metadefender Core V4.18.0 MetaDefender Core v4.18.0 © 2020 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 14 Key Features of MetaDefender Core 15 1. Quick Start with MetaDefender Core 16 1.1. Installation 16 Operating system invariant initial steps 16 Basic setup 17 1.1.1. Configuration wizard 17 1.2. License Activation 22 1.3. Process Files with MetaDefender Core 22 2. Installing or Upgrading MetaDefender Core 23 2.1. Recommended System Configuration 23 Microsoft Windows Deployments 23 Unix Based Deployments 25 Data Retention 27 Custom Engines 28 Browser Requirements for the Metadefender Core Management Console 28 2.2. Installing MetaDefender 28 Installation 28 Installation notes 28 2.2.1. Installing Metadefender Core using command line 29 2.2.2. Installing Metadefender Core using the Install Wizard 32 2.3. Upgrading MetaDefender Core 32 Upgrading from MetaDefender Core 3.x 32 Upgrading from MetaDefender Core 4.x 32 2.4. MetaDefender Core Licensing 33 2.4.1. Activating Metadefender Licenses 33 2.4.2. Checking Your Metadefender Core License 38 2.5. Performance and Load Estimation 39 What to know before reading the results: Some factors that affect performance 39 How test results are calculated 40 Test Reports 40 Performance Report - Multi-Scanning On Linux 40 Performance Report - Multi-Scanning On Windows 44 2.6. Special installation options 47 Use RAMDISK for the tempdirectory 47 3. Configuring MetaDefender Core 51 3.1. Management Console 51 3.1.1. Password Recovery 52 3.2. MetaDefender Configuration 59 3.2.1. Startup Core Configuration 60 3.2.2. Startup Node Configuration 69 3.2.3 Nginx related configuration (for API Rate Limiting) 76 3.3. User management 78 3.3.1. Users and groups 78 3.3.2. Roles 83 3.3.3. User directories 88 3.3.4. Active Directory attributes 95 3.3.5. Change user password 98 3.3.6. Single Sign-On (SSO) 99 3.4. Update settings 122 Internet 123 Folder 124 Manual 124 3.5. Clean up scan database 125 Technology Note: 125 3.6. Policy configuration 125 3.6.1. How MetaDefender Core policies work 126 3.6.2. Workflow template configuration 126 3.6.3. Security zone configuration 140 3.6.4. Workflow rule configuration 141 3.6.5. Quarantine 146 3.7. Logging 154 3.7.1. Configuration 154 3.7.2 Log message format 155 3.7.3 Syslog message format 156 3.7.4 Error Message Description Table 160 3.8 Security settings on web console 201 3.8.1 Enabling HTTPS 201 3.8.2 Session timeout 205 3.8.3 Password Policy 206 3.9. Configuring proxy settings 207 How can I set proxy server for the product 207 3.10. External Scanners And Post Actions 208 External Scanners 208 Post Actions 211 3.11. Yara rule sources 213 3.12. Configuring mail settings 216 Server configuration 216 User authentication 217 4. Process files with MetaDefender Core 218 Process Files via REST API 218 Process Files via Web Interface 218 Choose what to process and how 219 5. Deep CDR (Data Sanitization) 220 6. Proactive DLP 222 Detect and then block approach 222 Prevent and then allow approach 222 6.1 Detect sensitive information 222 Sensitive Data 222 Certainty score 223 Supported File Types 223 Optical Character Recognition (OCR) 224 Sample regular expressions 226 6.2 Redact sensitive information 230 Supported File Types 230 Supported Sensitive Information 231 To set redaction 231 6.3 Remove metadata 233 Supported File Types 233 To set remove metadata 233 6.4 Watermark files 234 Supported File Types 234 To set watermark 235 7. Operating MetaDefender Core 237 7.1. Dashboard 237 Overview page 238 Processing history 238 Quarantine 239 Update history 239 7.2. Inventory Management 240 7.2.1. Certificates 240 7.2.2. Modules 243 7.2.3. Nodes 253 7.2.4. Skip by hash 255 7.3. Regular Maintenance 257 Checking for Upgrades 257 Checking Engines / Databases Health 257 7.4 Import/Export configuration 258 Export 258 Import 258 Note 259 7.5. Database Defragmentation and Optimization 259 7.6. Reporting 262 7.7. Statistics 264 8. MetaDefender Core Developer Guide 265 How to Interact with MetaDefender Core using REST 265 File scan process 265 8.1. MetaDefender API 265 8.1.1. Sessions 266 8.1.2. Licensing 269 8.1.3. Processing files 274 8.1.4. Processing files in batch 301 8.1.5. Download Sanitized Files 313 8.1.6. Vulnerability Info In Processing Result 315 8.1.7. Skip by hash 318 8.1.8. Get version of components 324 8.1.9. Configuration related APIs 326 8.1.10. Yara 463 8.1.11. Webhooks 470 8.2. MetaDefender API Code Samples 474 10. Advanced MetaDefender Deployment 476 10.1. Scripted license management 476 Requirements 476 Activation steps 476 Deactivation steps 478 Important notes 479 10.2. Deployment automation support 479 Installation 480 Initialization 480 Configuration 485 10.3. Cloud Deployment 485 10.3.1. AWS Deployment 485 10.4. Multi-node deployment 505 Setting up several Metadefender Core nodes 505 10.5. Using external load-balancer 509 10.5.1. HTTP(S) - Layer 7 load balancing 509 10.5.2. DNS load balancing 512 11. Troubleshooting MetaDefender Core 515 Installation issues 515 Issues with nodes 515 Where are the Metadefender Core logs located? 515 How can I create a support package? 515 Issues under high load 515 Debug logging 516 How to Create Support Package? 516 Creating the package on Linux 516 Creating the package on Windows 517 Content of the created package 517 How to Read the Metadefender Core Log? 518 Files 518 Format 518 Severity levels of log entries 518 Inaccessible Management Console 519 How to detect 519 Solution 519 Possible Issues on Nodes 519 Q. Node detected 3rd party product on system 519 Q. There is no scan node connected 520 Too Many Sockets or Files Open 520 How to detect 520 Solution 521 Too Many TIME_WAIT Socket 522 How to detect 522 Solution 522 Technical Insights 523 12. Legal 524 Copyright 524 DISCLAIMER OF WARRANTY 524 COPYRIGHT NOTICE 524 MetaDefender Export Classification 524 12. Release notes 527 12.1 Archived release notes 530 Version v4.17.3 530 Version v4.17.2 533 Version v4.17.1 535 Version v4.17.0.1 536 Version v4.17.0 536 Version v4.16.3 538 Version v4.16.2 538 Version v4.16.1 539 Version v4.16.0 540 Version v4.15.2 540 Version v4.15.1 541 Version v4.15.0 541 Version v4.14.3 542 Version v4.14.2 543 Version v4.14.1 543 Version v4.14.0 544 Version v4.13.2 544 Version v4.13.1 544 Version v4.13.0 545 Version v4.12.2 545 Version v4.12.1 545 Version v4.12.0 546 Version v4.11.3 546 Version v4.11.2 546 Version v4.11.1 547 Version v4.11.0 547 Version v4.10.2 548 Version v4.10.1 548 Version v4.10.0 548 Version 4.9.1 549 Version 4.9.0 550 Version 4.8.2 550 Version 4.8.1 550 Version 4.7.2 552 Version 4.7.1 552 Version 4.6.3 553 Version 4.6.2 553 Version 4.6.1 553 Version 4.6.0 554 Version 4.5.1 555 Version 4.5.0 555 Version 4.4.1 555 Version 4.3.0 556 Version 4.2.0 557 Version 4.1.0 558 Version 4.0.1 558 Version 4.0.0 559 12.2 Proactive DLP Release Notes 559 v2.3.2 559 v2.3.1 559 v2.3.0 559 v2.2.1 560 v2.2 560 v2.1.2 560 v2.1.1 560 v2.1 560 v2.0.1 561 v2.0 561 v1.0.3 561 13. Knowledge Base Articles 562 Are MetaDefender Core v4 upgrades free? 564 Are there any limitations regarding the MetaDefender Core v4 scan engines? 564 Can I control access to the RAM disk in MetaDefender Core v4? 565 Does Metadefender Core v4 offer real-time antivirus protection on the system where it is installed? 565 Does MetaDefender Core v4 Detect the NotPetya Ransomware? 565 Does the fixing updates for Meltdown and Spectre vulnerabilities affect any engines in MetaDefender Core v4? 567 Engine clean-up instructions 568 External scanners in MetaDefender core v4.8.0 and above 571 How can I configure the maximum queue size in Metadefender Core v4 ? 574 How can I find a sanitized file scanned with MetaDefender Core v4? 575 How can I increase the scaling up performance? 575 How can I run tests to see the different scan results on MetaDefender Core v4? 578 How can I upgrade from Core v4.7.0/v4.7.1 to a newer Core v4.7 release 579 How can the TEMP folder be changed? 581 How do I check if "noexec" flag exists on a Linux OS? 582 How do I collect verbose debug packages on MetaDefender Core v4 for Linux? 583 How do I deploy MetaDefender Core v4 to an offline Linux environment? 584 Installing MetaDefender Core 585 Activate your license 585 Installing the MetaDefender Update Downloader utility 587 Applying offline updates 589 Contacting OPSWAT Support 589 How do I deploy MetaDefender Core v4 to an offline Windows environment? 590 Installing MetaDefender Core 590 Activate your license 591 Installing the MetaDefender Update Downloader utility 593 Applying offline updates 595 Contacting OPSWAT Support 596 How do I disable real-time protection of my anti-malware software if it is not allowed by corporate policy for use with MetaDefender Core v4? 596 How do I remove an engine from my MetaDefender v4 instance? 598 How do I use MetaDefender Core v4 Workflows ? 598 Defining and administering Workflow Templates in MetaDefender Core v4 599 How long is the support life cycle for a specific version/release of MetaDefender Core v4? 600 How to install MSE on Windows Server 2012 R2 and Windows Server 2016 602 MSE on Windows Server 2012 R2 602 MSE on Windows Server 2016 606 How to transfer your Metadefender Core v4 scan history database 612 Is Metadefender Core compromised while scanning files? 612 Is there a virus test I could use to test MetaDefender Core v4? 613 MetaDefender Core v4 shows a large number of files that failed to scan.
Recommended publications
  • Translators' Tool
    The Translator’s Tool Box A Computer Primer for Translators by Jost Zetzsche Version 9, December 2010 Copyright © 2010 International Writers’ Group, LLC. All rights reserved. This document, or any part thereof, may not be reproduced or transmitted electronically or by any other means without the prior written permission of International Writers’ Group, LLC. ABBYY FineReader and PDF Transformer are copyrighted by ABBYY Software House. Acrobat, Acrobat Reader, Dreamweaver, FrameMaker, HomeSite, InDesign, Illustrator, PageMaker, Photoshop, and RoboHelp are registered trademarks of Adobe Systems Inc. Acrocheck is copyrighted by acrolinx GmbH. Acronis True Image is a trademark of Acronis, Inc. Across is a trademark of Nero AG. AllChars is copyrighted by Jeroen Laarhoven. ApSIC Xbench and Comparator are copyrighted by ApSIC S.L. Araxis Merge is copyrighted by Araxis Ltd. ASAP Utilities is copyrighted by eGate Internet Solutions. Authoring Memory Tool is copyrighted by Sajan. Belarc Advisor is a trademark of Belarc, Inc. Catalyst and Publisher are trademarks of Alchemy Software Development Ltd. ClipMate is a trademark of Thornsoft Development. ColourProof, ColourTagger, and QA Solution are copyrighted by Yamagata Europe. Complete Word Count is copyrighted by Shauna Kelly. CopyFlow is a trademark of North Atlantic Publishing Systems, Inc. CrossCheck is copyrighted by Global Databases, Ltd. Déjà Vu is a trademark of ATRIL Language Engineering, S.L. Docucom PDF Driver is copyrighted by Zeon Corporation. dtSearch is a trademark of dtSearch Corp. EasyCleaner is a trademark of ToniArts. ExamDiff Pro is a trademark of Prestosoft. EmEditor is copyrighted by Emura Software inc. Error Spy is copyrighted by D.O.G. GmbH. FileHippo is copyrighted by FileHippo.com.
    [Show full text]
  • Amigan Software
    tali ► an Amiga Februar y 97 Issue No 3 Gaz te rip $3 Who said that there are no Amiga dealers left? Hardware Amiga A1200 HD, Amiga A4000 Cobra 33 68030 33, Mhz Cobra 33+ with 68882, Cobra 40 68EC030 40 Mhz, Cobra40+ with 68882, Ferret SCSI card for Cobra 1202 32 bit rami- clock, 1202+ with 16 or 33 Mhz 68882, Squirrel SCSI, Surf Squirrel SCSI plus RS@232, 2 Mb PCMCIA Ram A1200/A600, Spitfire SCSI A2000/3000/4000, Rapidfire SCSI + RAM A2000, Wildfire A2000 68060+ram+SCSI F/W+network, Megachip, 2Mb chip ram A500/A2000, Securekey Security card for A2000/3000/4000, Picasso Graphics cards, SCSI and IDE Hard drives. Accessories Green Mouse -320 DPI with pad, Hypermouse I1 400 DPI with pad, Pen mouse - super small, Joysticks, from Quickshot and Rocfire, GI 105 hand- scanner with touchup 4 and OCR Jr, Colourburst colour hand scanner with ADPRO loader & OCR Jr, Master 3A 880 K External Floppy drives, Rocgen Plus genlock, Electronic Design Genlocks and TBC, Neriki Genlocks Syquest EzDrives, External SCSI Cases with A500/A600/A1200 power lead included & CD, or hard drive option, A1200 3.5 IDE Kits, Monitor adaptors, ROM Switches, Air Freight Magazines with CD. Plus Much more Available. Software Over 70 titles in stock including games, productivity, CD rom titles, and Utilities, all at competative prices. Servicing We have a fully equiped workshop, and our techs have a total of over 50 Man years of experience as technicians in the computer industry. We do repairs and upgrades including specialist work. The Complete Amiga specialist.
    [Show full text]
  • ACS – the Archival Cytometry Standard
    http://flowcyt.sf.net/acs/latest.pdf ACS – the Archival Cytometry Standard Archival Cytometry Standard ACS International Society for Advancement of Cytometry Candidate Recommendation DRAFT Document Status The Archival Cytometry Standard (ACS) has undergone several revisions since its initial development in June 2007. The current proposal is an ISAC Candidate Recommendation Draft. It is assumed, however not guaranteed, that significant features and design aspects will remain unchanged for the final version of the Recommendation. This specification has been formally tested to comply with the W3C XML schema version 1.0 specification but no position is taken with respect to whether a particular software implementing this specification performs according to medical or other valid regulations. The work may be used under the terms of the Creative Commons Attribution-ShareAlike 3.0 Unported license. You are free to share (copy, distribute and transmit), and adapt the work under the conditions specified at http://creativecommons.org/licenses/by-sa/3.0/legalcode. Disclaimer of Liability The International Society for Advancement of Cytometry (ISAC) disclaims liability for any injury, harm, or other damage of any nature whatsoever, to persons or property, whether direct, indirect, consequential or compensatory, directly or indirectly resulting from publication, use of, or reliance on this Specification, and users of this Specification, as a condition of use, forever release ISAC from such liability and waive all claims against ISAC that may in any manner arise out of such liability. ISAC further disclaims all warranties, whether express, implied or statutory, and makes no assurances as to the accuracy or completeness of any information published in the Specification.
    [Show full text]
  • Alan Adventure System V3.0
    The ALAN Adventure Language Reference Manual Version 3.0beta2 Alan Adventure System - Reference Manual This version of the manual was printed on September 26, 2011 - ii - Alan Adventure System - Reference Manual Table of Contents 1 INTRODUCTION.........................................................................11 1.1 Programmer’s Pitch........................................................................................................12 1.2 To the Reader.................................................................................................................12 2 CONCEPTS......................................................................................13 2.1 What Is An Adventure?................................................................................................13 2.2 Elements Of Adventures.................................................................................................15 2.3 Alan Fundamentals.......................................................................................................16 What Is A Language?....................................................................................................................................16 The Alan Idea..................................................................................................................................................18 What’s Happening?........................................................................................................................................18 The Map..........................................................................................................................................................19
    [Show full text]
  • Cloud-Based Visual Discovery in Astronomy: Big Data Exploration Using Game Engines and VR on EOSC
    Novel EOSC services for Emerging Atmosphere, Underwater and Space Challenges 2020 October Cloud-Based Visual Discovery in Astronomy: Big Data Exploration using Game Engines and VR on EOSC Game engines are continuously evolving toolkits that assist in communicating with underlying frameworks and APIs for rendering, audio and interfacing. A game engine core functionality is its collection of libraries and user interface used to assist a developer in creating an artifact that can render and play sounds seamlessly, while handling collisions, updating physics, and processing AI and player inputs in a live and continuous looping mechanism. Game engines support scripting functionality through, e.g. C# in Unity [1] and Blueprints in Unreal, making them accessible to wide audiences of non-specialists. Some game companies modify engines for a game until they become bespoke, e.g. the creation of star citizen [3] which was being created using Amazon’s Lumebryard [4] until the game engine was modified enough for them to claim it as the bespoke “Star Engine”. On the opposite side of the spectrum, a game engine such as Frostbite [5] which specialised in dynamic destruction, bipedal first person animation and online multiplayer, was refactored into a versatile engine used for many different types of games [6]. Currently, there are over 100 game engines (see examples in Figure 1a). Game engines can be classified in a variety of ways, e.g. [7] outlines criteria based on requirements for knowledge of programming, reliance on popular web technologies, accessibility in terms of open source software and user customisation and deployment in professional settings.
    [Show full text]
  • Imagen Y Diseño # Nombre 1 10 Christmas Templates 2 10 DVD
    Imagen Y Diseño # Nombre 1 10 Christmas Templates 2 10 DVD Photoshop PSD layer 3 10 Frames for Photoshop 4 1000 famous Vector Cartoons 5 114 fuentes de estilo Rock and Roll 6 12 DVD Plantillas Profesionales PSD 7 12 psd TEMPLATE 8 123 Flash Menu 9 140 graffiti font 10 150_Dreamweaver_Templates 11 1600 Vector Clip Arts 12 178 Companies Fonts, The Best Collection Of Fonts 13 1800 Adobe Photoshop Plugins 14 2.900 Avatars 15 20/20 Kitchen Design 16 20000$ Worth Of Adobe Fonts! with Adobe Type Manager Deluxe 17 21000 User Bars - Great Collection 18 240+ Gold Plug-Ins for Adobe Dreamweaver CS4 19 30 PSD layered for design.Vol1 20 300.000 Animation Gif 21 32.200 Avatars - MEGA COLLECTION 22 330 templates for Power Point 23 3900 logos de marcas famosas en vectores 24 3D Apartment: Condo Designer v3.0 25 3D Box Maker Pro 2.1 26 3D Button Creator Gold 3.03 27 3D Home Design 28 3D Me Now Professional 1.5.1.1 -Crea cabezas en 3D 29 3D PaintBrush 30 3D Photo Builder Professional 2.3 31 3D Shadow plug-in for Adobe Photoshop 32 400 Flash Web Animations 33 400+ professional template designs for Microsoft Office 34 4000 Professional Interactive Flash Animations 35 44 Cool Animated Cards 36 46 Great Plugins For Adobe After Effects 37 50 BEST fonts 38 5000 Templates PHP-SWISH-DHTM-HTML Pack 39 58 Photoshop Commercial Actions 40 59 Unofficial Firefox Logos 41 6000 Gradientes para Photoshop 42 70 POSTERS Alta Calidad de IMAGEN 43 70 Themes para XP autoinstalables 44 73 Custom Vector Logos 45 80 Golden Styles 46 82.000 Logos Brands Of The World 47 90 Obras
    [Show full text]
  • Amigaos 3.2 FAQ 47.1 (09.04.2021) English
    $VER: AmigaOS 3.2 FAQ 47.1 (09.04.2021) English Please note: This file contains a list of frequently asked questions along with answers, sorted by topics. Before trying to contact support, please read through this FAQ to determine whether or not it answers your question(s). Whilst this FAQ is focused on AmigaOS 3.2, it contains information regarding previous AmigaOS versions. Index of topics covered in this FAQ: 1. Installation 1.1 * What are the minimum hardware requirements for AmigaOS 3.2? 1.2 * Why won't AmigaOS 3.2 boot with 512 KB of RAM? 1.3 * Ok, I get it; 512 KB is not enough anymore, but can I get my way with less than 2 MB of RAM? 1.4 * How can I verify whether I correctly installed AmigaOS 3.2? 1.5 * Do you have any tips that can help me with 3.2 using my current hardware and software combination? 1.6 * The Help subsystem fails, it seems it is not available anymore. What happened? 1.7 * What are GlowIcons? Should I choose to install them? 1.8 * How can I verify the integrity of my AmigaOS 3.2 CD-ROM? 1.9 * My Greek/Russian/Polish/Turkish fonts are not being properly displayed. How can I fix this? 1.10 * When I boot from my AmigaOS 3.2 CD-ROM, I am being welcomed to the "AmigaOS Preinstallation Environment". What does this mean? 1.11 * What is the optimal ADF images/floppy disk ordering for a full AmigaOS 3.2 installation? 1.12 * LoadModule fails for some unknown reason when trying to update my ROM modules.
    [Show full text]
  • Columbia Photographic Images and Photorealistic Computer Graphics Dataset
    Columbia Photographic Images and Photorealistic Computer Graphics Dataset Tian-Tsong Ng, Shih-Fu Chang, Jessie Hsu, Martin Pepeljugoski¤ fttng,sfchang,[email protected], [email protected] Department of Electrical Engineering Columbia University ADVENT Technical Report #205-2004-5 Feb 2005 Abstract Passive-blind image authentication is a new area of research. A suitable dataset for experimentation and comparison of new techniques is important for the progress of the new research area. In response to the need for a new dataset, the Columbia Photographic Images and Photorealistic Computer Graphics Dataset is made open for the passive-blind image authentication research community. The dataset is composed of four component image sets, i.e., the Photorealistic Com- puter Graphics Set, the Personal Photographic Image Set, the Google Image Set, and the Recaptured Computer Graphics Set. This dataset, available from http://www.ee.columbia.edu/trustfoto, will be for those who work on the photographic images versus photorealistic com- puter graphics classi¯cation problem, which is a subproblem of the passive-blind image authentication research. In this report, we de- scribe the design and the implementation of the dataset. The report will also serve as a user guide for the dataset. 1 Introduction Digital watermarking [1] has been an active area of research since a decade ago. Various fragile [2, 3, 4, 5] or semi-fragile watermarking algorithms [6, 7, 8, 9] has been proposed for the image content authentication and the detection of image tampering. In addition, authentication signature [10, ¤This work was done when Martin spent his summer in our research group 1 11, 12, 13] has also been proposed as an alternative image authentication technique.
    [Show full text]
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Metadefender Core V4.13.1
    MetaDefender Core v4.13.1 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • John Carmack Archive - .Plan (1998)
    John Carmack Archive - .plan (1998) http://www.team5150.com/~andrew/carmack March 18, 2007 Contents 1 January 5 1.1 Some of the things I have changed recently (Jan 01, 1998) . 5 1.2 Jan 02, 1998 ............................ 6 1.3 New stuff fixed (Jan 03, 1998) ................. 7 1.4 Version 3.10 patch is now out. (Jan 04, 1998) ......... 8 1.5 Jan 09, 1998 ............................ 9 1.6 I AM GOING OUT OF TOWN NEXT WEEK, DON’T SEND ME ANY MAIL! (Jan 11, 1998) ................. 10 2 February 12 2.1 Ok, I’m overdue for an update. (Feb 04, 1998) ........ 12 2.2 Just got back from the Q2 wrap party in vegas that Activi- sion threw for us. (Feb 09, 1998) ................ 14 2.3 Feb 12, 1998 ........................... 15 2.4 8 mb or 12 mb voodoo 2? (Feb 16, 1998) ........... 19 2.5 I just read the Wired article about all the Doom spawn. (Feb 17, 1998) .......................... 20 2.6 Feb 22, 1998 ........................... 21 1 John Carmack Archive 2 .plan 1998 3 March 22 3.1 American McGee has been let go from Id. (Mar 12, 1998) . 22 3.2 The Old Plan (Mar 13, 1998) .................. 22 3.3 Mar 20, 1998 ........................... 25 3.4 I just shut down the last of the NEXTSTEP systems running at id. (Mar 21, 1998) ....................... 26 3.5 Mar 26, 1998 ........................... 28 4 April 30 4.1 Drag strip day! (Apr 02, 1998) ................. 30 4.2 Things are progressing reasonably well on the Quake 3 en- gine. (Apr 08, 1998) ....................... 31 4.3 Apr 16, 1998 ..........................
    [Show full text]
  • Quake Manual
    The Story QUAKE Background: You get the phone call at 4 a.m. By 5:30 you're in the secret installation. The commander explains tersely, "It's about the Slipgate device. Once we perfect these, we'll be able to use them to transport people and cargo from one place to another instantly. "An enemy codenamed Quake, is using his own slipgates to insert death squads inside our bases to kill, steal, and kidnap. "The hell of it is we have no idea where he's from. Our top scientists think Quake's not from Earth, but another dimension. They say Quake's preparing to unleash his real army, whatever that is. "You're our best man. This is Operation Counterstrike and you're in charge. Find Quake, and stop him ... or it ... You have full authority to requisition anything you need. If the eggheads are right, all our lives are expendable." Prelude to Destruction: While scouting the neighborhood, you hear shots back at the base. Damn, that Quake bastard works fast! He heard about Operation Counterstrike, and hit first. Racing back, you see the place is overrun. You are almost certainly the only survivor. Operation Counterstrike is over. Except for you. You know that the heart of the installation holds a slipgate. Since Quake's killers came through, it is still set to his dimension. You can use it to get loose in his hometown. Maybe you can get to the asshole personally. You pump a round into your shotgun, and get moving. System Requirements General Quake System Requirements IBM PC and Compatible Computers Pentium 75 MHz processor or better (absolutely must have a Math Co-Processor!) VGA Compatible Display or better Windows 95 Operation: 16MB RAM minimum, 24MB+ recommended CD-ROM drive required Hard Drive Space Needed: 80 MB Specialized Requirements For WinQuake (WINQUAKE.EXE): Windows 95/98/ME/NT/2000 For GLQuake (GLQUAKE.EXE): Windows 95/98/ME/NT/2000 Open GL Compatible Video Card GLQUAKE supports most 100% fully OpenGL compliant 3D accelerator cards.
    [Show full text]