Cumulus User Guide

Total Page:16

File Type:pdf, Size:1020Kb

Cumulus User Guide Cumulus 8.6 Client User Guide Copyright 2012, Canto GmbH. All rights reserved. Canto, the Canto logo, the Cumulus logo, and Cumulus are registered trade- marks of Canto, registered in the U.S. and other countries. Apple, Mac, Macintosh and QuickTime are registered trademarks of Apple Com- puter, Inc. , registered in the U.S. and other countries. Microsoft, Windows, Windows Vista, and Windows NT are either trademarks or registered trademarks of the Microsoft Corporation in the U.S. and other coun- tries. Other third-party product and company names mentioned in this document are trademarks or registered trademarks of their respective holders. Feedback? Tell us what you think about this manual. We welcome all of your comments and suggestions. Please e-mail comments to [email protected] or via fax at +49-30-390 48 555. CU-WC-861-MN-Z-1 3 Table of Contents Renaming Records . 27 Intro 7 Editing a Record’s Category Assignments . 28 Things You Can Do with Records . 28 Cumulus . 8 Things You Can Do with Assets . 29 This User Guide . 8 Categories . 29 Category Types. 30 Organization. 8 Creating Categories . 31 Cross-Platform Issues . 9 Custom Ordering of Categories. 32 User Interface Item Conventions. 9 Category Fields. 33 Cumulus Step by Step. 9 Category Information Window. 33 Your Experience . 9 Editing Category Information . 33 Categories and Auto-cataloging . 34 Understanding Cumulus . 10 Individual Category Tabs (optional) . 35 Assets . 10 Things You Can Do with Categories. 35 Catalogs . 10 Collections . 10 Information Window. 36 Categories . 10 • THE INFORMATION WINDOW....................................................................... 36 Records . 11 Sets and Templates . 38 How These Work Together . 11 View Sets. 38 Sets and Templates . 11 Asset Handling Sets . 39 Finding Help . 13 Metadata Templates. 41 Online Help . 13 Print Templates. 41 Canto Online. 13 Permissions Templates . 41 Explore Cumulus 15 Find Assets 43 • OVERVIEW: THE CUMULUS USER INTERFACE........................................ 16 Searching . 44 Catalogs . 17 Searching for Records By Category. 44 Catalog Size and Performance. 17 Searching with Quicksearch . 44 Catalog Scope. 17 Searching with the Find Window . 45 Live Filtering (optional) . 17 • OVERVIEW: THE FIND WINDOW .................................................................. 46 Things You Can Do with Catalogs . 18 • OVERVIEW: SAMPLE SEARCH OPTIONS.................................................... 47 Adding Assets to Catalogs. 18 Using the Find Window . 47 Collections. 20 Simple Searches . 47 Working with Collections. 21 Compound Searches . 48 Things You Can Do with Collections . 22 Narrowing the Search . 50 Broadening the Search . 51 Assets/Records. 23 Saving and Loading Search Queries. 52 Asset Information . 23 Things You Can Do with Searches/Queries. 53 Field Types . 24 Using the Find Window in Advanced Mode. 53 Asset Types Supported . 25 Searching for Categories. 54 Editing Asset Information. 25 Record Size. 27 User Live Filtering. 56 • User Interface Visual Overview Page 4 CUMULUS® – CLIENT USER GUIDE Adding Filters . 56 Name a Catalog Manager. 131 Managing Filters . 57 Develop an Effective File Naming Convention 131 Configuring Filters. 59 Develop an Effective Folder Naming Convention . 132 Cross-Platform Catalog Use. 132 Use Assets 65 Drag and Drop . 66 Specialized Usage 133 Copying Assets. 66 Copying Categories and Associated Assets . 66 Using Vault. 134 Organization . 134 Using Asset Actions . 66 Working with Vault . 134 Mailing Your Assets . 67 Integration . 140 Previewing Assets. 68 Using URL AssetStore . 145 Preview View and Window . 68 Cataloging Assets from FTP or HTTP Servers . 145 • OVERVIEW: TOOLBARS FOR PREVIEWS..................................................... 69 Working with URL-cataloged Assets . 146 Fullscreen Preview . 73 Storing Assets on FTP Servers. 148 Fullscreen Slide Show . 76 Central Asset Location on FTP Server . 149 Preview Comparison . 77 Working with Images. 150 Repurposing Assets . 79 Editing Images . 150 Converting Image Assets . 79 Using the IPTC Information Window . 153 Watermarking Assets . 83 • OVERVIEW: THE IPTC INFORMATION WINDOW ............................... 155 Creating Presentations . 86 Working with Raw Images . 157 Creating ZIP Archives. 93 Working with Office Documents. 160 WebAlbum . 95 Special Modules for Office Documents. 160 Creating an Album . 95 Configuring . 163 Provided Skins and Link/Output Options . 98 Cataloging Outlook Messages . 164 Preferences . 99 PowerPoint Support. 164 Customize . 100 The PowerPoint Add-In. 166 Configuring Web URL . 100 Working with InDesign Documents. 170 Special Modules for InDesign Documents . 170 Importing and Exporting. 102 Configuring . 173 Cumulus Exchange File Formats. 102 Further Special InDesign Support . 175 Maintaining Category Assignments. 103 Exporting and Importing Records and Assigning Individual Permissions for Categories . 103 Records and Categories . 175 Importing and Exporting Collections . 106 Individual Record/Category Permissions . 175 Importing from Text/CSV Files . 106 Workflow Enhancements . 113 Customize Cumulus 181 Labeling . 113 Rating Assets. 115 Preferences . 182 Workflow Automation with Cumulus. 117 User Settings. 183 Trigger . ..
Recommended publications
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • SGML As a Framework for Digital Preservation and Access. INSTITUTION Commission on Preservation and Access, Washington, DC
    DOCUMENT RESUME ED 417 748 IR 056 976 AUTHOR Coleman, James; Willis, Don TITLE SGML as a Framework for Digital Preservation and Access. INSTITUTION Commission on Preservation and Access, Washington, DC. ISBN ISBN-1-887334-54-8 PUB DATE 1997-07-00 NOTE 55p. AVAILABLE FROM Commission on Preservation and Access, A Program of the Council on Library and Information Resources, 1400 16th Street, NW, Suite 740, Washington, DC 20036-2217 ($20). PUB TYPE Reports Evaluative (142) EDRS PRICE MF01/PC03 Plus Postage. DESCRIPTORS *Access to Information; Computer Oriented Programs; *Electronic Libraries; *Information Retrieval; Library Automation; Online Catalogs; *Preservation; Standards IDENTIFIERS Digital Technology; *SGML ABSTRACT This report explores the suitability of Standard Generalized Markup Language (SGML) as a framework for building, managing, and providing access to digital libraries, with special emphasis on preservation and access issues. SGML is an international standard (ISO 8879) designed to promote text interchange. It is used to define markup languages, which can then encode the logical structure and content of any so-defined document. The connection between SGML and the traditional concerns of preservation and access may not be immediately apparent, but the use of descriptive markup tools such as SGML is crucial to the quality and long-term accessibility of digitized materials. Beginning with a general exploration of digital formats for preservation and access, the report provides a staged technical tutorial on the features and uses of SGML. The tutorial covers SGML and related standards, SGML Document Type Definitions in current use, and related projects now under development. A tiered metadata model is described that could incorporate SGML along with other standards to facilitate discovery and retrieval of digital documents.
    [Show full text]
  • Linux Networking 101
    The Gorilla ® Guide to… Linux Networking 101 Inside this Guide: • Discover how Linux continues its march toward world domination • Learn basic Linux administration tips • See how easy it can be to build your entire network on a Linux foundation • Find out how Cumulus Linux is your ticket to networking freedom David M. Davis ActualTech Media Helping You Navigate The Technology Jungle! In Partnership With www.actualtechmedia.com The Gorilla Guide To… Linux Networking 101 Author David M. Davis, ActualTech Media Editors Hilary Kirchner, Dream Write Creative, LLC Christina Guthrie, Guthrie Writing & Editorial, LLC Madison Emery, Cumulus Networks Layout and Design Scott D. Lowe, ActualTech Media Copyright © 2017 by ActualTech Media. All rights reserved. No portion of this book may be reproduced or used in any manner without the express written permission of the publisher except for the use of brief quotations. The information provided within this eBook is for general informational purposes only. While we try to keep the information up- to-date and correct, there are no representations or warranties, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the information, products, services, or related graphics contained in this book for any purpose. Any use of this information is at your own risk. ActualTech Media Okatie Village Ste 103-157 Bluffton, SC 29909 www.actualtechmedia.com Entering the Jungle Introduction: Six Reasons You Need to Learn Linux ....................................................... 7 1. Linux is the future ........................................................................ 9 2. Linux is on everything .................................................................. 9 3. Linux is adaptable ....................................................................... 10 4. Linux has a strong community and ecosystem ........................... 10 5.
    [Show full text]
  • Data Hiding and Detection in Office Open Xml (Ooxml) Documents
    DATA HIDING AND DETECTION IN OFFICE OPEN XML (OOXML) DOCUMENTS by Muhammad Ali Raffay A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Applied Science (MASc) in Electrical and Computer Engineering Faculty of Engineering and Applied Science University of Ontario Institute of Technology Oshawa, Ontario, Canada March, 2011 Copyright ©Muhammad Ali Raffay, 2011 Author’s Declaration I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. Muhammad Ali Raffay ii Abstract With the rapid development and popularity of information technology, criminals and mischievous computer users are given avenues to commit crimes and malicious activities. One of the commonly used tactics, called steganography, is to hide information under a cover media so that except participants, no one else knows the existence of such information. Many techniques have been proposed for hiding data in images, videos and audios, but there is not much research devoted to data hiding in the popular MS Office documents which have recently adopted Office Open XML (OOXML) format. In this research, we first focus on identifying several data hiding techniques for OOXML documents. Then, we design and develop a fast detection algorithm based on the unique internal structure of OOXML documents, which contains multiple XML files, by using multi-XML query technique. Experimental results show the proposed detection algorithm outperforms the traditional one in terms of detection speed and completeness, where performance is the key to success of detecting hidden data in OOXML documents due to the fact that millions of documents are generated and transferred over the internet every day.
    [Show full text]
  • Enhanced Metadata Support
    CUMULUS Enhanced Metadata Support Cumulus supports all digital file formats because it captures core meta- Updated for Cumulus 10.0 data provided by the operating system, such as file name, format, size, modification date, etc. For the world’s most popular file formats, Cumulus Contents provides additional functionality or enhanced metadata support. This Standard Supports. 2 enables users to find files based on audio / video durations, fonts used in Audio / Video File Formats ..............2 layouts, full text of presentations and documents. Image / CAD / 3D File Formats ...........4 Office / Layout File Formats .............6 Summary Tags Size File Name To find out more about metadata – check out our webinar on metadata best tips and Format Fonts practices: and a lot more! Cumulus provides enhanced metadata support for the formats listed on the following Contact Information pages. Enhanced metadata support for other file types can be easily added to Cumulus by U.S. +1 (415) 495-6545 our partners or an internal development team, using Cumulus SDK. E.U. +49 (0) 30 390 485-0 [email protected] canto.com CUMULUS Enhanced Metadata Support 2/8 Standard Supports Write Back Mac OS Cumulus Read File Format File Ext Metadata to Notes File Type Filters Metadata Asset In order to preserve the integrity of metadata originally collected EXIF (Exchangeable Image File Format) — — • EXIF P — by the EXIF-enabled camera or capture device, Cumulus does not Digital Camera Support write-back EXIF metadata to assets. Cumulus can write-back XMP-compliant metadata to the file XMP (Extensible Metadata Platform) xmp TEXT • XMP P P formats indicated throughout this document by a 3 in the “Write Adobe CS Applications Support Back IPTC/XMP” columns.
    [Show full text]
  • Documill Discovery Search - Find - Take Action
    Documill Discovery Search - Find - Take Action Documill Discovery Solution Summary 2015-08-22 All rights reserved. © 2015 Documill Slide 1 Documill Offering Visual Search Explorer Dynamo Discovery Document Discovery Document Organizer Document Publishing Discover, re-use and and Management share Ribbon Floating Embeddable Embeddable Embeddable Previewer Previewer browser UI browser UI browser UI Online Page Standalone MSOffice Standalone Viewer Composer browser UI Add-In browser UI Public and private APIs Preview Generation Dynamic Publishing Connect, crawl, index Documill Web Preview Server (DPS) Dynamo Renderer Discovery Public and private APIs Documill Core Document Processing Advanced Font Documill Engine Processing Engine All rights reserved. © 2015 Documill Slide 2 Documill Discovery Discovery is an enterprise search solution focused on cloud services. It includes: . Support for most important data sources . Data crawling . Enforcement of access controls . Processing content for indexing and previewing . Fast and scalable search index . Authentication . Localisation . Support and maintenance . Upgrades All rights reserved. © 2015 Documill Slide 3 Documill Discovery All rights reserved. © 2015 Documill Slide 4 Documill Discovery Integrated search solution for all the repositories where you store What? information, both in the cloud and behind the firewall. Any user who needs access to multiple data systems. Customer support, To whom? sales, product management … 1. Better customer service with faster information discovery Why? 2.
    [Show full text]
  • Rich Web Applications – Client Standards
    Colorado Software Summit: October 22 – 27, 2006 © Copyright 2006, Kevin E. Kelly Rich Web Applications – Client Standards Kevin E. Kelly [email protected] Part of the “Web 2.0” picture Kevin E. Kelly – Rich Web Applications – Client Standards Slide 1 Colorado Software Summit: October 22 – 27, 2006 © Copyright 2006, Kevin E. Kelly Client Standards in the Real World Kevin E. Kelly – Rich Web Applications – Client Standards Slide 2 Colorado Software Summit: October 22 – 27, 2006 © Copyright 2006, Kevin E. Kelly Agenda Introduction W3C Rich Web Activity Compound Documents WICD Issues Demo The Backplane Q&A Kevin E. Kelly – Rich Web Applications – Client Standards Slide 3 Colorado Software Summit: October 22 – 27, 2006 © Copyright 2006, Kevin E. Kelly Introduction Work ➢ Co-op'ed at IBM ➢ US Air Force ➢ Automotive Embedded Startup ➢ Rational Software ➢ Acquired by IBM Standards ➢ Chair Compound Document Format Working Group, was also in the XForms Working Group ➢ Hypertext Coordination Working Group member ➢ HL7 Advisory Council Rep to the W3C Kevin E. Kelly – Rich Web Applications – Client Standards Slide 4 Colorado Software Summit: October 22 – 27, 2006 © Copyright 2006, Kevin E. Kelly W3C Domains Architecture Domain ➢ DOM, XML, Internationalization, Web Services, URI Technology and Society Domain ➢ Patent Policy, Privacy, Semantic Web Ubiquitous Web Domain ➢ Device Independence, Mobile Web, Multimodal, Voice Browser Web Accessibility Initiative ➢ Web Accessibility, International Web Accessibility Interaction Domain ➢ Next Slide Kevin E. Kelly – Rich Web Applications – Client Standards Slide 5 Colorado Software Summit: October 22 – 27, 2006 © Copyright 2006, Kevin E. Kelly W3C Interaction Domain Graphics Activity Style Activity ➢ SVG ➢ CSS ➢ WebCGM Synchronized Multimedia Activity HTML Activity ➢ SyMM (SMIL) ➢ HTML/XHTML ➢ Timed Text ➢ Hypertext Coordination Group XForms Activity Math Activity ➢ XForms ➢ Math (MathML) Rich Web Client Activity ➢ Next Slide Kevin E.
    [Show full text]
  • Download the Paper (PDF)
    WWW.VIRUSBULLETIN.COM/CONFERENCE 2019 LONDON 2 – 4 October 2019 STATIC ANALYSIS METHODS FOR DETECTION OF MICROSOFT OFFICE EXPLOITS Chintan Shah McAfee, India [email protected] ABSTRACT Despite recent advances in exploitation strategies and exploit mitigation techniques, fundamental infection vectors remain the same. It is critical to advance security solutions to inspect both new and known infection vectors in order to successfully mitigate targeted attacks. Apparently, the use of lure documents has become one of the most favoured attack strategies for infi ltrating target organizations. Recently, some of the most high impact attacks using this conventional technique have been uncovered by the security community. In this paper, we present an exploit detection tool that we built for the purpose of detecting malicious lure documents. This detection engine employs multiple binary stream analysis techniques for fl agging malicious Offi ce documents, supporting static analysis of RTF, Offi ce Open XML and Compound Binary File format (MS-CFB). The use, by attackers, of weaponized lure documents necessitates deeper inspection of these fi le formats at the perimeter. Object Linking and Embedding exposes a rich attack surface which has been abused by attackers over the past few years to hide malicious resources. For instance, OOXML fi les can be used to load OLE controls which can eventually facilitate remote code execution. Our proposed detection tool is built to extract embedded storage streams, OLE objects, etc. and apply binary stream analysis techniques over it, in addition to inspecting specifi c fi le sections and analysing embedded scripts, to identify malicious code. This detection tool had been tested over a wide set of in-the-wild exploits and variants.
    [Show full text]
  • Testing Software Tools of Potential Interest for Digital Preservation Activities at the National Library of Australia
    PROJECT REPORT Testing Software Tools of Potential Interest for Digital Preservation Activities at the National Library of Australia Matthew Hutchins Digital Preservation Tools Researcher 30 July 2012 Project Report Testing Software Tools of Potential Interest for Digital Preservation Activities at the National Library of Australia Published by Information Technology Division National Library of Australia Parkes Place, Canberra ACT 2600 Australia This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 2.1 Australia License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/2.1/au/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco California 94105 USA. 2│57 www.nla.gov.au 30 July 2012 Creative Commons Attribution-NonCommercial-ShareAlike 2.1 Australia Project Report Testing Software Tools of Potential Interest for Digital Preservation Activities at the National Library of Australia Summary 5 List of Recommendations 5 1 Introduction 8 2 Methods 9 2.1 Test Data Sets 9 2.1.1 Govdocs1 9 2.1.2 Selections from Prometheus Ingest 9 2.1.3 Special Selections 10 2.1.4 Selections from Pandora Web Archive 11 2.2 Focus of the Testing 11 2.3 Software Framework for Testing 12 2.4 Test Platform 13 3 File Format Identification Tools 13 3.1 File Format Identification 13 3.2 Overview of Tools Included in the Test 14 3.2.1 Selection Criteria 14 3.2.2 File Investigator Engine 14 3.2.3 Outside-In File ID 15 3.2.4 FIDO 16 3.2.5 Unix file Command/libmagic 17 3.2.6 Other
    [Show full text]
  • Metadefender Core V4.10.1
    MetaDefender Core v4.10.1 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Installing Metadefender Core on Ubuntu or Debian computers 15 Installing Metadefender Core on Red Hat Enterprise Linux or CentOS computers 15 Installing Metadefender Core on Windows computers 16 1.2. License Activation 16 1.3. Scan Files with Metadefender Core 17 2. Installing or Upgrading Metadefender Core 18 2.1. Recommended System Requirements 18 System Requirements For Server 18 Browser Requirements for the Metadefender Core Management Console 20 2.2. Installing Metadefender Core 20 Installation 20 Installation notes 21 2.2.1. Installing Metadefender Core using command line 21 2.2.2. Installing Metadefender Core using the Install Wizard 23 2.3. Upgrading MetaDefender Core 23 Upgrading from MetaDefender Core 3.x 23 Upgrading from MetaDefender Core 4.x 23 2.4. Metadefender Core Licensing 24 2.4.1. Activating Metadefender Core Licenses 24 2.4.2. Checking Your Metadefender Core License 30 2.5. Performance and Load Estimation 31 What to know before reading the results: Some factors that affect performance 31 How test results are calculated 32 Test Reports 32 Performance Report - Multi-Scanning On Linux 32 Performance Report - Multi-Scanning On Windows 36 2.6. Special installation options 41 Use RAMDISK for the tempdirectory 41 3.
    [Show full text]
  • Cumulus Certified Open Network Professional Study Guide CUMULUS NETWORKS / CCONP STUDY GUIDE
    CUMULUS NETWORKS / CCONP STUDY GUIDE Cumulus Certified Open Network Professional Study Guide CUMULUS NETWORKS / CCONP STUDY GUIDE Purpose To help certification candidates organize their training and study plan, matching directly to the exam blueprint with information and resources to augment Cumulus Networks training. Some general networking exposure and knowledge is assumed, but links are always provided for additional research at your own consumption pace. Some general images of packet types or other reference information were included from web sources such as Wikipedia and vendor web sites for quick reference. Organization This study guide was organized and generated directly from the exam study guide blueprint with modifications and additions deemed appropriate. https://education.cumulusnetworks.com/getting-started-materials/287534 Creation references The document was created primarily using the Cumulus Linux 3.7 User Guide, Cumulus NetQ 1.4 User Guide (commands validated in version 2.1), validated design documents, Cumulus provided free training resources, and boot camp documentation. Additional information was added from prior knowledge and research. · Knowledge Base Home — https://support.cumulusnetworks.com/hc/en-us · Cumulus Education Home — https://education.cumulusnetworks.com/ · Cumulus Linux User Guide — https://docs.cumulusnetworks.com/display/DOCS · Cumulus NetQ User Guide — https://docs.cumulusnetworks.com/display/NETQ · Cumulus Validated Design Guides — https://cumulusnetworks.com/learn/resources/installation-guides · Cumulus Product Collateral — https://cumulusnetworks.com/learn/resources/cumulus-linux · Cumulus Data Center Networking CheatSheets — https://cumulusnetworks.com/learn/ resources/cheatsheetsf Document formatting Code, configuration, and examples The document contains a lot of examples of commands and output. Some commands output may be slightly formatted to fit inside this document and large tables may be reduced to the number of rows required for the clarity of information.
    [Show full text]
  • An NCC Group Publication
    An NCC Group Publication Understanding Microsoft Word OLE Exploit Primitives: Exploiting CVE-2015-1642 Microsoft Office CTaskSymbol Use-After-Free Vulnerability Prepared by: Dominic Wang © Copyright 2015 NCC Group Contents 1 Abstract .......................................................................................................... 3 2 Introduction ..................................................................................................... 3 2.1 Microsoft Office Suite ................................................................................... 3 2.2 Object Linking & Embedding .......................................................................... 3 2.3 Prior Research ............................................................................................ 3 3 Background ...................................................................................................... 4 3.1 Open XML Format ........................................................................................ 4 3.2 OLE Automation .......................................................................................... 4 3.3 Template Structures .................................................................................... 4 3.4 Rich Text Format ........................................................................................ 5 4 Techniques ...................................................................................................... 6 4.1 Spraying the Heap ......................................................................................
    [Show full text]